基于命令治理器的估算差分调节隐形攻击设计

IF 4.8 2区 计算机科学 Q1 AUTOMATION & CONTROL SYSTEMS Automatica Pub Date : 2024-09-30 DOI:10.1016/j.automatica.2024.111951
Tao Chen, Lei Wang, Zhitao Liu, Hongye Su
{"title":"基于命令治理器的估算差分调节隐形攻击设计","authors":"Tao Chen,&nbsp;Lei Wang,&nbsp;Zhitao Liu,&nbsp;Hongye Su","doi":"10.1016/j.automatica.2024.111951","DOIUrl":null,"url":null,"abstract":"<div><div>In the field of cyber–physical systems, significant attention has been received by the problem of stealthy attack strategy design for remote estimators, for which most existing approaches are exploited by maximizing the difference between the healthy and attacked estimations. However, in some practical scenarios, it is more effective to regulate such difference to some specific set so as to achieve some desired damages, e.g., collisions of unmanned aerial vehicles. Motivated by this, in this paper a novel stealthy attack strategy is developed with the attack purpose of regulating, instead of maximizing, the estimation difference. By constructing the stealthy constraint and identifying the feasible reference set, it is shown that such a design problem can be transformed into that of regulation subject to constraints on estimation and innovation difference. Then, an <em>on-line</em> attack sequence design approach is proposed by incorporating the command governor into the linear quadratic regulator, which regulates the estimation difference to the target reference for achieving the desired attack purpose, while maintaining stealthiness. Numerical simulations are conducted to verify the effectiveness of the proposed attack strategy.</div></div>","PeriodicalId":55413,"journal":{"name":"Automatica","volume":null,"pages":null},"PeriodicalIF":4.8000,"publicationDate":"2024-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Command-governor-based stealthy attack design for estimation difference regulation\",\"authors\":\"Tao Chen,&nbsp;Lei Wang,&nbsp;Zhitao Liu,&nbsp;Hongye Su\",\"doi\":\"10.1016/j.automatica.2024.111951\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>In the field of cyber–physical systems, significant attention has been received by the problem of stealthy attack strategy design for remote estimators, for which most existing approaches are exploited by maximizing the difference between the healthy and attacked estimations. However, in some practical scenarios, it is more effective to regulate such difference to some specific set so as to achieve some desired damages, e.g., collisions of unmanned aerial vehicles. Motivated by this, in this paper a novel stealthy attack strategy is developed with the attack purpose of regulating, instead of maximizing, the estimation difference. By constructing the stealthy constraint and identifying the feasible reference set, it is shown that such a design problem can be transformed into that of regulation subject to constraints on estimation and innovation difference. Then, an <em>on-line</em> attack sequence design approach is proposed by incorporating the command governor into the linear quadratic regulator, which regulates the estimation difference to the target reference for achieving the desired attack purpose, while maintaining stealthiness. Numerical simulations are conducted to verify the effectiveness of the proposed attack strategy.</div></div>\",\"PeriodicalId\":55413,\"journal\":{\"name\":\"Automatica\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":4.8000,\"publicationDate\":\"2024-09-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Automatica\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S000510982400445X\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Automatica","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S000510982400445X","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

在网络物理系统领域,远程估计器的隐形攻击策略设计问题受到了极大关注,现有的大多数方法都是通过最大化健康估计器和被攻击估计器之间的差值来实现的。然而,在某些实际场景中,将这种差值调节到某个特定的集合以达到某些预期的破坏效果更为有效,例如无人驾驶飞行器的碰撞。受此启发,本文开发了一种新颖的隐形攻击策略,其攻击目的是调节而不是最大化估计差值。通过构建隐身约束条件和确定可行的参考集,可以证明这种设计问题可以转化为受估计和创新差约束的调节问题。然后,通过将指令调控器纳入线性二次调节器,提出了一种在线攻击序列设计方法,在保持隐身性的前提下,调节估计差值与目标参考值的关系,以达到预期的攻击目的。通过数值模拟验证了所提攻击策略的有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Command-governor-based stealthy attack design for estimation difference regulation
In the field of cyber–physical systems, significant attention has been received by the problem of stealthy attack strategy design for remote estimators, for which most existing approaches are exploited by maximizing the difference between the healthy and attacked estimations. However, in some practical scenarios, it is more effective to regulate such difference to some specific set so as to achieve some desired damages, e.g., collisions of unmanned aerial vehicles. Motivated by this, in this paper a novel stealthy attack strategy is developed with the attack purpose of regulating, instead of maximizing, the estimation difference. By constructing the stealthy constraint and identifying the feasible reference set, it is shown that such a design problem can be transformed into that of regulation subject to constraints on estimation and innovation difference. Then, an on-line attack sequence design approach is proposed by incorporating the command governor into the linear quadratic regulator, which regulates the estimation difference to the target reference for achieving the desired attack purpose, while maintaining stealthiness. Numerical simulations are conducted to verify the effectiveness of the proposed attack strategy.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Automatica
Automatica 工程技术-工程:电子与电气
CiteScore
10.70
自引率
7.80%
发文量
617
审稿时长
5 months
期刊介绍: Automatica is a leading archival publication in the field of systems and control. The field encompasses today a broad set of areas and topics, and is thriving not only within itself but also in terms of its impact on other fields, such as communications, computers, biology, energy and economics. Since its inception in 1963, Automatica has kept abreast with the evolution of the field over the years, and has emerged as a leading publication driving the trends in the field. After being founded in 1963, Automatica became a journal of the International Federation of Automatic Control (IFAC) in 1969. It features a characteristic blend of theoretical and applied papers of archival, lasting value, reporting cutting edge research results by authors across the globe. It features articles in distinct categories, including regular, brief and survey papers, technical communiqués, correspondence items, as well as reviews on published books of interest to the readership. It occasionally publishes special issues on emerging new topics or established mature topics of interest to a broad audience. Automatica solicits original high-quality contributions in all the categories listed above, and in all areas of systems and control interpreted in a broad sense and evolving constantly. They may be submitted directly to a subject editor or to the Editor-in-Chief if not sure about the subject area. Editorial procedures in place assure careful, fair, and prompt handling of all submitted articles. Accepted papers appear in the journal in the shortest time feasible given production time constraints.
期刊最新文献
Predict globally, correct locally: Parallel-in-time optimization of neural networks Set-based value operators for non-stationary and uncertain Markov decision processes Successive over relaxation for model-free LQR control of discrete-time Markov jump systems Nonuniqueness and convergence to equivalent solutions in observer-based inverse reinforcement learning Asymmetrical vulnerability of heterogeneous multi-agent systems under false-data injection attacks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1