Data-Importance-Aware Attack Strategy Design and Secure Control Countermeasure

IF 6.3 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS IEEE Transactions on Information Forensics and Security Pub Date : 2024-12-25 DOI:10.1109/TIFS.2024.3522770
Jiancun Wu;Engang Tian;Chen Peng;Zhiru Cao
{"title":"Data-Importance-Aware Attack Strategy Design and Secure Control Countermeasure","authors":"Jiancun Wu;Engang Tian;Chen Peng;Zhiru Cao","doi":"10.1109/TIFS.2024.3522770","DOIUrl":null,"url":null,"abstract":"This paper is concerned with the security issues related to integrated attack-defense strategy for a category of multi-sensor networked control systems with state saturation constraints. In general, existing denial-of-service (DoS) attack models typically conduct indiscriminate attacks on data packets, disregarding the significance of the attacked data packets to the system. Note that the measurement data from different sensor nodes possesses varying levels of importance. In light of this, we first propose a novel form of attack from the perspective of attack design, known as a data-importance-aware attack. The importance of data refers to the quantitative impact of the measured values at each sensor node on the stable and safe operation of the entire system. As such, the proposed attack has the awareness to launch attacks against critical sensor nodes, rendering data unable to be transmitted. Then, an attack-node-dependent security controller is devised from the defender’s perspective against the constructed attack, which can effectively resist the impact of attacks and stabilize the system. By employing the Lyapunov functional method, sufficient conditions are derived to ensure the asymptotic stability of the closed-loop system. Finally, the reliability and effectiveness of the node importance-aware attack strategy and control countermeasure are validated by numerical simulation.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 ","pages":"944-954"},"PeriodicalIF":6.3000,"publicationDate":"2024-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Information Forensics and Security","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10816202/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0

Abstract

This paper is concerned with the security issues related to integrated attack-defense strategy for a category of multi-sensor networked control systems with state saturation constraints. In general, existing denial-of-service (DoS) attack models typically conduct indiscriminate attacks on data packets, disregarding the significance of the attacked data packets to the system. Note that the measurement data from different sensor nodes possesses varying levels of importance. In light of this, we first propose a novel form of attack from the perspective of attack design, known as a data-importance-aware attack. The importance of data refers to the quantitative impact of the measured values at each sensor node on the stable and safe operation of the entire system. As such, the proposed attack has the awareness to launch attacks against critical sensor nodes, rendering data unable to be transmitted. Then, an attack-node-dependent security controller is devised from the defender’s perspective against the constructed attack, which can effectively resist the impact of attacks and stabilize the system. By employing the Lyapunov functional method, sufficient conditions are derived to ensure the asymptotic stability of the closed-loop system. Finally, the reliability and effectiveness of the node importance-aware attack strategy and control countermeasure are validated by numerical simulation.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
数据重要性感知攻击策略设计与安全控制对策
研究一类具有状态饱和约束的多传感器网络控制系统集成攻防策略的安全问题。一般来说,现有的DoS (denial-of-service)攻击模型通常对数据包进行不加区分的攻击,而忽略了被攻击数据包对系统的重要性。请注意,来自不同传感器节点的测量数据具有不同的重要程度。鉴于此,我们首先从攻击设计的角度提出了一种新的攻击形式,称为数据重要性感知攻击。数据的重要性是指每个传感器节点的测量值对整个系统稳定安全运行的定量影响。因此,所提出的攻击具有对关键传感器节点发起攻击的意识,导致数据无法传输。然后,从防御者的角度出发,针对构造的攻击设计了一个依赖于攻击节点的安全控制器,可以有效抵御攻击的影响,使系统保持稳定。利用Lyapunov泛函方法,得到了保证闭环系统渐近稳定的充分条件。最后,通过数值仿真验证了节点重要性感知攻击策略和控制对策的可靠性和有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security 工程技术-工程:电子与电气
CiteScore
14.40
自引率
7.40%
发文量
234
审稿时长
6.5 months
期刊介绍: The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features
期刊最新文献
SMSSE: Size-pattern Mitigation Searchable Symmetric Encryption Privacy for Free: Spy Attack in Vertical Federated Learning by Both Active and Passive Parties All Points Guided Adversarial Generator for Targeted Attack Against Deep Hashing Retrieval Anonymous and Efficient (t, n)-Threshold Ownership Transfer for Cloud EMRs Auditing Query Correlation Attack against Searchable Symmetric Encryption with Supporting for Conjunctive Queries
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1