{"title":"Low-Rank Undetectable Attacks Against Multiagent Systems: A Data-Driven Approach","authors":"Kaiyu Wang;Dan Ye","doi":"10.1109/TII.2024.3514172","DOIUrl":null,"url":null,"abstract":"This article is concerned with the problem of potential security threats in multiagent systems (MASs) with consensus control protocols. Most existing security strategies focus on resilient control schemes, ignoring potentially more stealthy malicious attacks. To explore system vulnerabilities, a class of data-driven low-rank undetectable attack strategies is investigated against communication channels in MASs. The objective of attacks is to corrupt minimal sensors to degrade the state estimate performance while avoiding being detected. First, the conditions for the existence of low-rank undetectable attacks are determined by analyzing the kernel space of the low-rank subspace of the system expansion matrix. Utilizing the accessible measurement data, the attack matrix under undetectable conditions is constructed using the subspace identification method. To avoid proposing attack vectors on the full column space of the attack matrix, a bilateral random projection algorithm is designed to derive a low-rank approximation of the attack matrix. By analyzing the kernel space of low-rank undetectable attacks, an undetectable attack sequence is generated. Simulation results validate the effectiveness of the proposed low-rank undetectable attack algorithm.","PeriodicalId":13301,"journal":{"name":"IEEE Transactions on Industrial Informatics","volume":"21 3","pages":"2709-2718"},"PeriodicalIF":9.9000,"publicationDate":"2024-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Industrial Informatics","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10811747/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
This article is concerned with the problem of potential security threats in multiagent systems (MASs) with consensus control protocols. Most existing security strategies focus on resilient control schemes, ignoring potentially more stealthy malicious attacks. To explore system vulnerabilities, a class of data-driven low-rank undetectable attack strategies is investigated against communication channels in MASs. The objective of attacks is to corrupt minimal sensors to degrade the state estimate performance while avoiding being detected. First, the conditions for the existence of low-rank undetectable attacks are determined by analyzing the kernel space of the low-rank subspace of the system expansion matrix. Utilizing the accessible measurement data, the attack matrix under undetectable conditions is constructed using the subspace identification method. To avoid proposing attack vectors on the full column space of the attack matrix, a bilateral random projection algorithm is designed to derive a low-rank approximation of the attack matrix. By analyzing the kernel space of low-rank undetectable attacks, an undetectable attack sequence is generated. Simulation results validate the effectiveness of the proposed low-rank undetectable attack algorithm.
期刊介绍:
The IEEE Transactions on Industrial Informatics is a multidisciplinary journal dedicated to publishing technical papers that connect theory with practical applications of informatics in industrial settings. It focuses on the utilization of information in intelligent, distributed, and agile industrial automation and control systems. The scope includes topics such as knowledge-based and AI-enhanced automation, intelligent computer control systems, flexible and collaborative manufacturing, industrial informatics in software-defined vehicles and robotics, computer vision, industrial cyber-physical and industrial IoT systems, real-time and networked embedded systems, security in industrial processes, industrial communications, systems interoperability, and human-machine interaction.