Completely Stealthy and Energy-Stealthy Sensor Attacks With Constrained Channels: Existence and Design

成果类型:
Article
署名作者:
Jin, Kaijing; Ye, Dan; Zhang, Tian-Yu
署名单位:
Northeastern University - China; Northeastern University - China
刊物名称:
IEEE TRANSACTIONS ON AUTOMATIC CONTROL
ISSN/ISSBN:
0018-9286
DOI:
10.1109/TAC.2025.3535910
发表日期:
2025
页码:
4759-4765
关键词:
TECHNOLOGICAL INNOVATION detectors State estimation system dynamics Channel estimation indexes Wireless communication Real-time systems reachability analysis Noise measurement Completely stealthy attacks constrained attack channels cyber-physical systems (CPSs) energy-stealthy attacks security
摘要:
In this article, the security of state estimation is studied under stealthy false-data injection attacks launched in the sensor-to-estimator channels. It is proved that there is no strictly stealthy sensor attack such that the state estimation is insecure. Thus, we focus on the existence of the attacks with complete and energy stealthiness to gradually remove the attack impact on detectors. Since the existence of stealthy attacks is significantly affected by accessing attack channels, the necessary and sufficient conditions of such two types of attacks with constrained channels are proposed by matrix decomposition techniques and the reachability analysis of system dynamics. In general, deeper stealthiness for attacks will require harsher constraints on the system dynamics, while it turns out that the completely-stealthy attacks are achievable under the same existence conditions as the generally stealthy attacks. Meanwhile, we indicate that though launching energy-stealthy attacks needs more demanding system dynamics, they can deceive detectors more deeply. The simulation examples demonstrate the effectiveness of the presented theoretical results.
来源URL: