Optimal Stealthy Attack With Side Information Against Remote State Estimation: A Corrupted Innovation-Based Strategy

IF 10.5 1区 计算机科学 Q1 AUTOMATION & CONTROL SYSTEMS IEEE Transactions on Cybernetics Pub Date : 2024-12-03 DOI:10.1109/TCYB.2024.3502790
Li-Wei Mao;Guang-Hong Yang
{"title":"Optimal Stealthy Attack With Side Information Against Remote State Estimation: A Corrupted Innovation-Based Strategy","authors":"Li-Wei Mao;Guang-Hong Yang","doi":"10.1109/TCYB.2024.3502790","DOIUrl":null,"url":null,"abstract":"This article studies the problem of designing the optimal strictly stealthy attack against remote state estimation in cyber-physical systems, where the attacker possesses both the intercepted information and the side information sensed by an additional sensor. Combining the intercepted information with the side information, a novel corrupted innovation-based attack model with higher-design flexibility is proposed, and the analytical optimal attack strategy is derived. Compared with the existing results based on nominal innovation, the proposed attack model eliminates the need for an additional filter to calculate nominal innovation, which saves computational resources, and can achieve greater performance degradation of remote state estimation. Finally, in order to verify the superiority and effectiveness of the results, the numerical examples are given.","PeriodicalId":13112,"journal":{"name":"IEEE Transactions on Cybernetics","volume":"55 2","pages":"897-904"},"PeriodicalIF":10.5000,"publicationDate":"2024-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Cybernetics","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10772658/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

This article studies the problem of designing the optimal strictly stealthy attack against remote state estimation in cyber-physical systems, where the attacker possesses both the intercepted information and the side information sensed by an additional sensor. Combining the intercepted information with the side information, a novel corrupted innovation-based attack model with higher-design flexibility is proposed, and the analytical optimal attack strategy is derived. Compared with the existing results based on nominal innovation, the proposed attack model eliminates the need for an additional filter to calculate nominal innovation, which saves computational resources, and can achieve greater performance degradation of remote state estimation. Finally, in order to verify the superiority and effectiveness of the results, the numerical examples are given.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
针对远程状态估计的带侧信息的最优隐身攻击:一种基于腐败创新的策略
本文研究了网络物理系统中针对远程状态估计的最优严格隐身攻击的设计问题,在这种情况下,攻击者既拥有被截获的信息,又拥有由附加传感器感知的侧信息。将截获信息与侧信息相结合,提出了一种具有较高设计灵活性的基于破坏创新的攻击模型,并推导出了解析最优攻击策略。与现有基于标称创新的结果相比,该攻击模型不需要额外的滤波器来计算标称创新,节省了计算资源,并且可以实现更大的远程状态估计性能退化。最后,为了验证所得结果的优越性和有效性,给出了数值算例。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IEEE Transactions on Cybernetics
IEEE Transactions on Cybernetics COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE-COMPUTER SCIENCE, CYBERNETICS
CiteScore
25.40
自引率
11.00%
发文量
1869
期刊介绍: The scope of the IEEE Transactions on Cybernetics includes computational approaches to the field of cybernetics. Specifically, the transactions welcomes papers on communication and control across machines or machine, human, and organizations. The scope includes such areas as computational intelligence, computer vision, neural networks, genetic algorithms, machine learning, fuzzy systems, cognitive systems, decision making, and robotics, to the extent that they contribute to the theme of cybernetics or demonstrate an application of cybernetics principles.
期刊最新文献
Social Network Large-Scale Group Decision-Making Based on Feature Selection and Pseudo-Trust Behavior. A Lyapunov-Based Event-Triggered Model Predictive Control Approach for Safe Tracking Control of Discrete-Time Nonlinear Systems. Distributed Output Formation Optimal Tracking of Heterogeneous Linear Multiagent Systems via Distributed Time-Varying Optimization. On Safe Sliding Mode Control Design for Nonlinear Uncertain Systems. RNN Learning-Based Prescribed-Time Safe and Robust Cooperative Group Formation Control for High-Speed Flight Vehicle Swarm Under Dynamic Event-Triggered Communication.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1