{"title":"通过无模型 Q-learning 方法优化航天器系统的数据注入攻击设计","authors":"Huanhuan Yuan, Mengbi Wang, Chao Xi","doi":"10.1049/cth2.12685","DOIUrl":null,"url":null,"abstract":"<p>This paper aims to analyse the dynamic response of a corrupted spacecraft rendezvous system from the perspective of attacker. The optimal data injection attack problem is formulated by constructing a tradeoff cost function in a quadratic form. First, the optimal attack strategy and associated sufficient condition for its existence are derived similar to optimal control for attacker without being detected. Breaking the assumption in most existing works, the goal of this paper is to explore the optimal attack strategy without knowing system matrices. A model free Q-learning approach is designed with the application to solve attacker's optimization problem. Critic network and action network are used to adaptive tuning the value and action for attacker in a forward time. For a more practical situation, a model free attack strategy design is implemented only based on measured input/output data. Finally, the simulation results on the spacecraft system are presented to show the effectiveness of the proposed method for model free attack strategy design.</p>","PeriodicalId":50382,"journal":{"name":"IET Control Theory and Applications","volume":"18 18","pages":"2841-2851"},"PeriodicalIF":2.2000,"publicationDate":"2024-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cth2.12685","citationCount":"0","resultStr":"{\"title\":\"Optimal data injection attack design for spacecraft systems via a model free Q-learning approach\",\"authors\":\"Huanhuan Yuan, Mengbi Wang, Chao Xi\",\"doi\":\"10.1049/cth2.12685\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>This paper aims to analyse the dynamic response of a corrupted spacecraft rendezvous system from the perspective of attacker. The optimal data injection attack problem is formulated by constructing a tradeoff cost function in a quadratic form. First, the optimal attack strategy and associated sufficient condition for its existence are derived similar to optimal control for attacker without being detected. Breaking the assumption in most existing works, the goal of this paper is to explore the optimal attack strategy without knowing system matrices. A model free Q-learning approach is designed with the application to solve attacker's optimization problem. Critic network and action network are used to adaptive tuning the value and action for attacker in a forward time. For a more practical situation, a model free attack strategy design is implemented only based on measured input/output data. Finally, the simulation results on the spacecraft system are presented to show the effectiveness of the proposed method for model free attack strategy design.</p>\",\"PeriodicalId\":50382,\"journal\":{\"name\":\"IET Control Theory and Applications\",\"volume\":\"18 18\",\"pages\":\"2841-2851\"},\"PeriodicalIF\":2.2000,\"publicationDate\":\"2024-06-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cth2.12685\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IET Control Theory and Applications\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1049/cth2.12685\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET Control Theory and Applications","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1049/cth2.12685","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
Optimal data injection attack design for spacecraft systems via a model free Q-learning approach
This paper aims to analyse the dynamic response of a corrupted spacecraft rendezvous system from the perspective of attacker. The optimal data injection attack problem is formulated by constructing a tradeoff cost function in a quadratic form. First, the optimal attack strategy and associated sufficient condition for its existence are derived similar to optimal control for attacker without being detected. Breaking the assumption in most existing works, the goal of this paper is to explore the optimal attack strategy without knowing system matrices. A model free Q-learning approach is designed with the application to solve attacker's optimization problem. Critic network and action network are used to adaptive tuning the value and action for attacker in a forward time. For a more practical situation, a model free attack strategy design is implemented only based on measured input/output data. Finally, the simulation results on the spacecraft system are presented to show the effectiveness of the proposed method for model free attack strategy design.
期刊介绍:
IET Control Theory & Applications is devoted to control systems in the broadest sense, covering new theoretical results and the applications of new and established control methods. Among the topics of interest are system modelling, identification and simulation, the analysis and design of control systems (including computer-aided design), and practical implementation. The scope encompasses technological, economic, physiological (biomedical) and other systems, including man-machine interfaces.
Most of the papers published deal with original work from industrial and government laboratories and universities, but subject reviews and tutorial expositions of current methods are welcomed. Correspondence discussing published papers is also welcomed.
Applications papers need not necessarily involve new theory. Papers which describe new realisations of established methods, or control techniques applied in a novel situation, or practical studies which compare various designs, would be of interest. Of particular value are theoretical papers which discuss the applicability of new work or applications which engender new theoretical applications.