估计员
数据完整性
计算机科学
估计
无线
光学(聚焦)
无线传感器网络
计算机安全
实时计算
工程类
计算机网络
系统工程
电信
数学
统计
物理
光学
作者
Haoyuan Xu,Yake Yang,Jun Shang,Jun Fu,Yuzhe Li
出处
期刊:Automatica
[Elsevier BV]
日期:2023-06-26
卷期号:155: 111172-111172
被引量:4
标识
DOI:10.1016/j.automatica.2023.111172
摘要
This paper considers the design issue of optimal integrity attacks on remote estimation with multiple information sources in cyber–physical systems. The specific scenario is that the smart sensors transmit innovations via a wireless network to the remote estimator. There are two types of sensors—safe and suspicious ones, where the innovations of safe sensors have no possibility of being modified by a malicious attacker, but the innovations from suspicious sensors may be intercepted and modified. The typical integrity attacks focus on utilizing the innovations of suspicious sensors and current innovations, which underutilize the available information that limits the impact on remote estimation and may be exposed under mutual verification between safe and suspicious sensors. Consequently, we propose a stealthy integrity attack with a finite horizon of historical data from both types of sensors, i.e., the so-called integrity attack with spatial–temporal information sources, which further enhances the effectiveness of integrity attacks. The stealthiness constraints and the corresponding estimation error covariances under the proposed attacks are obtained. The analytical expressions of optimal integrity attack strategies are derived by maximizing the estimation error under stealthiness constraints. In addition, we investigate the properties of the optimal integrity attack strategies when the attacks occur consecutively. Finally, some numerical simulations are presented to demonstrate the effectiveness of the obtained results.
科研通智能强力驱动
Strongly Powered by AbleSci AI