检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:单华晟 李一刚 SHAN Hua-sheng;LI Yi-gang(School of Artificial Intelligence,Shenyang University of Technology,Shenyang 110870,China)
出 处:《控制与决策》2024年第12期4191-4199,共9页Control and Decision
基 金:辽宁省自然科学基金博士启动项目(2022-BS-178);辽宁省教育厅基本科研项目青年项目(JYTQN2023292)。
摘 要:近年来,信息物理系统网络安全问题成为一大研究热点.以攻击者角度研究攻击设计问题可有效评估系统对网络攻击的脆弱性并为设计网络保护措施提供理论依据.鉴于此,在?-隐性下研究针对信息物理系统远程状态估计的最优欺骗攻击设计问题.首先,与需要额外滤波器和历史数据在线计算真实新息的相关结果不同,提出一种利用离线生成的攻击信号篡改传感器测量值以降低系统性能的自生成攻击模型,使攻击更易实现.随后,推导得出该攻击下远程估计误差以量化攻击效果,并将攻击设计问题转化为多变量受限二次优化问题.不同于相关结果的恒定均值,模型采用更具一般性的时变均值,使优化问题包含更多决策变量且相关结果中的攻击优化方法无法直接求解.因此,利用K-L (Kullback-Leibler)散度和互信息的相关统计学性质将问题等价转化.再结合拉格朗日乘数法和所提出的参数特征关联覆盖法得到最优攻击策略,使其在?-隐性下最大化远程估计误差.最后,通过仿真实例验证结果的有效性.In recent years,network security of cyber-physical systems has become a hot research topic.Investigating the problem of designing attacks from the attacker's perspective can effectively evaluate the vulnerability of the system to network attacks,and provide theoretical basis for designing network protection methods.For this reason,this paper investigates the problem of designing the optimal$\epsilon$-stealthy deception attacks against remote state estimation in cyber-physical systems.Firstly,different from the related results which require extra filters and historical data to calculate the true innovation online,this paper proposes a self-generated attack model which uses off-line generated attack signals to tamper with the sensor measurements and deteriorate the estimation performance,such that the attacks are more easily to be implemented.Subsequently,the remote estimation error under the attack is derived to quantify the attack effect,based on which,the attack design problem is transformed into a variable optimization problem.Since the model uses the more general time-varying mean,the optimization problem contains more decision variables,which cannot be solved directly by the attack optimization methods in the related results.Therefore,the problem is equivalently transformed by using the relevant statistical properties of K-L divergence and mutual information.Furthermore,by combining the Lagrange multiplier method and the optimization method with the covering by the related parameter characteristics,the optimal attack strategy is obtained to maximize the remote estimation error under the$\epsilon$-stealthiness.Finally,simulation examples are given to verify the validity of the results.
关 键 词:信息物理系统 自生成攻击 远程状态估计 ?-隐性 K-L散度 互信息
分 类 号:TP273[自动化与计算机技术—检测技术与自动化装置]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:3.142.83.171