版权所有:内蒙古大学图书馆 技术提供:维普资讯• 智图
内蒙古自治区呼和浩特市赛罕区大学西街235号 邮编: 010021
作者机构:East China Univ Sci & Technol Dept Math Shanghai 200237 Peoples R China East China Univ Sci & Technol Minist Educ Key Lab Adv Control & Optimizat Chem Proc Shanghai 200237 Peoples R China
出 版 物:《IEEE TRANSACTIONS ON CYBERNETICS》 (IEEE Trans. Cybern.)
年 卷 期:2020年第50卷第2期
页 面:729-738页
核心收录:
学科分类:0808[工学-电气工程] 08[工学] 0811[工学-控制科学与工程] 0812[工学-计算机科学与技术(可授工学、理学学位)]
基 金:National Key Research and Development Program of China [2018YFC0809302] National Natural Science Foundation of China [61773161, 61751305, 61673176] Science and Technology Commission of Shanghai Municipality [18ZR1409800] Programme of Introducing Talents of Discipline to Universities (111 Project) [B17017] Alexander von Humboldt Foundation of Germany Thousand Youth Talents Plan of China
主 题:Sensors Cyberattack Multidimensional systems Covariance matrices Optimization State estimation Kalman filters Convex optimization cyber-physical systems (CPSs) false data injection attack remote estimator estimation
摘 要:Cyber-security is of the fundamental importance for cyber-physical systems (CPSs), since CPSs are vulnerable to cyber attack. In order to make the defensive measures better, one needs to understand the behavior from the view of an attacker. In this paper, the problem of false data injection attack on remote state estimation with resource constraints is studied in two cases, where the first case is that the attacker adds a Gaussian noise to the innovation, while the other is that the attacker employs a Gaussian noise to replace the innovation. In addition, the attacker is assumed to has a resource constraint, i.e., he/she cannot attack all the sensors, at the same time should decide which sensors to attack. By using the matrix theory, the optimal attack strategy problem, which aims to maximize the trace of the remote estimation error covariance, is converted into a convex optimization problem that can be solved. Thus, an optimal attack strategy is given to illustrate which sensors should be attacked. An example is given to show the effectiveness of the theoretical results.