咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >False Data Injection Attack fo... 收藏

False Data Injection Attack for Cyber-Physical Systems With Resource Constraint

作     者:Li, Fangfei Tang, Yang 

作者机构:East China Univ Sci & Technol Dept Math Shanghai 200237 Peoples R China East China Univ Sci & Technol Minist Educ Key Lab Adv Control & Optimizat Chem Proc Shanghai 200237 Peoples R China 

出 版 物:《IEEE TRANSACTIONS ON CYBERNETICS》 (IEEE Trans. Cybern.)

年 卷 期:2020年第50卷第2期

页      面:729-738页

核心收录:

学科分类:0808[工学-电气工程] 08[工学] 0811[工学-控制科学与工程] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

基  金:National Key Research and Development Program of China [2018YFC0809302] National Natural Science Foundation of China [61773161, 61751305, 61673176] Science and Technology Commission of Shanghai Municipality [18ZR1409800] Programme of Introducing Talents of Discipline to Universities (111 Project) [B17017] Alexander von Humboldt Foundation of Germany Thousand Youth Talents Plan of China 

主  题:Sensors Cyberattack Multidimensional systems Covariance matrices Optimization State estimation Kalman filters Convex optimization cyber-physical systems (CPSs) false data injection attack remote estimator estimation 

摘      要:Cyber-security is of the fundamental importance for cyber-physical systems (CPSs), since CPSs are vulnerable to cyber attack. In order to make the defensive measures better, one needs to understand the behavior from the view of an attacker. In this paper, the problem of false data injection attack on remote state estimation with resource constraints is studied in two cases, where the first case is that the attacker adds a Gaussian noise to the innovation, while the other is that the attacker employs a Gaussian noise to replace the innovation. In addition, the attacker is assumed to has a resource constraint, i.e., he/she cannot attack all the sensors, at the same time should decide which sensors to attack. By using the matrix theory, the optimal attack strategy problem, which aims to maximize the trace of the remote estimation error covariance, is converted into a convex optimization problem that can be solved. Thus, an optimal attack strategy is given to illustrate which sensors should be attacked. An example is given to show the effectiveness of the theoretical results.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分