针对信息物理系统的自生成epsilon-隐性最优欺骗攻击策略设计
CSTR:
作者:
作者单位:

沈阳工业大学 人工智能学院,沈阳 110870

作者简介:

通讯作者:

E-mail: liyigang920407@163.com.

中图分类号:

TP273

基金项目:

辽宁省自然科学基金博士启动项目(2022-BS-178);辽宁省教育厅基本科研项目青年项目(JYTQN2023292).


Optimal off-line generated $epsilon$-stealthy deception attack strategy design in cyber-physical system
Author:
Affiliation:

School of Artificial Intelligence,Shenyang University of Technology,Shenyang 110870,China

Fund Project:

  • 摘要
  • |
  • 图/表
  • |
  • 访问统计
  • |
  • 参考文献
  • |
  • 相似文献
  • |
  • 引证文献
  • |
  • 资源附件
  • |
  • 文章评论
    摘要:

    近年来,信息物理系统网络安全问题成为一大研究热点.以攻击者角度研究攻击设计问题可有效评估系统对网络攻击的脆弱性并为设计网络保护措施提供理论依据.鉴于此,在$\epsilon$-隐性下研究针对信息物理系统远程状态估计的最优欺骗攻击设计问题.首先,与需要额外滤波器和历史数据在线计算真实新息的相关结果不同,提出一种利用离线生成的攻击信号篡改传感器测量值以降低系统性能的自生成攻击模型,使攻击更易实现.随后,推导得出该攻击下远程估计误差以量化攻击效果,并将攻击设计问题转化为多变量受限二次优化问题.不同于相关结果的恒定均值,模型采用更具一般性的时变均值,使优化问题包含更多决策变量且相关结果中的攻击优化方法无法直接求解.因此,利用K-L(Kullback-Leibler)散度和互信息的相关统计学性质将问题等价转化.再结合拉格朗日乘数法和所提出的参数特征关联覆盖法得到最优攻击策略,使其在$\epsilon$-隐性下最大化远程估计误差.最后,通过仿真实例验证结果的有效性.

    Abstract:

    In recent years, network security of cyber-physical systems has become a hot research topic. Investigating the problem of designing attacks from the attacker's perspective can effectively evaluate the vulnerability of the system to network attacks, and provide theoretical basis for designing network protection methods. For this reason, this paper investigates the problem of designing the optimal $\epsilon$-stealthy deception attacks against remote state estimation in cyber-physical systems. Firstly, different from the related results which require extra filters and historical data to calculate the true innovation online, this paper proposes a self-generated attack model which uses off-line generated attack signals to tamper with the sensor measurements and deteriorate the estimation performance, such that the attacks are more easily to be implemented. Subsequently, the remote estimation error under the attack is derived to quantify the attack effect, based on which, the attack design problem is transformed into a variable optimization problem. Since the model uses the more general time-varying mean, the optimization problem contains more decision variables, which cannot be solved directly by the attack optimization methods in the related results. Therefore, the problem is equivalently transformed by using the relevant statistical properties of K-L divergence and mutual information. Furthermore, by combining the Lagrange multiplier method and the optimization method with the covering by the related parameter characteristics, the optimal attack strategy is obtained to maximize the remote estimation error under the $\epsilon$-stealthiness. Finally, simulation examples are given to verify the validity of the results.

    参考文献
    相似文献
    引证文献
引用本文

单华晟,李一刚.针对信息物理系统的自生成epsilon-隐性最优欺骗攻击策略设计[J].控制与决策,2024,39(12):4191-4199

复制
分享
文章指标
  • 点击次数:
  • 下载次数:
  • HTML阅读次数:
  • 引用次数:
历史
  • 收稿日期:
  • 最后修改日期:
  • 录用日期:
  • 在线发布日期: 2024-11-20
  • 出版日期: 2024-12-20
文章二维码