当前位置: X-MOL 学术IEEE Trans. Cybern. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Optimal Data Injection Attacks in Cyber-Physical Systems
IEEE Transactions on Cybernetics ( IF 11.8 ) Pub Date : 2018-12-01 , DOI: 10.1109/tcyb.2018.2846365
Guangyu Wu , Jian Sun , Jie Chen

The primary goal of this paper is to analyze the dynamic response of a system under optimal data injection attacks from a control perspective. In this paper, optimal data injection attack design problems are formulated in a similar framework of optimal control. We consider a scenario, where an attacker injects false data to a healthy plant comprising many actuators distributed in different regions. For the case, where an attacker pollutes all actuators, an optimal state feedback injection law is proposed to minimize a quadratic cost functional containing two conflicting objectives. For the case, where the attacker only pollutes partial actuators within a short period, the quadratic programming is employed to solve an optimal switching data injection attack design problem using the technique of embedded transformation. A bang-bang-type solution of the quadratic programming exists on account of the minimum value of the Hamilton functional and is achieved at an extreme point of the convex set. Consequently, a switching condition is derived to obtain the optimal attack sequence. We also introduce a closed-form switching policy for data injection attacks with multiple objectives, which is shown optimal in the sense of minimizing a hybrid quadratic performance criterion. Finally, applications of our approaches to a networked dc motor and a power system are provided to illustrate the effectiveness of the proposed method.

中文翻译:

网络物理系统中的最佳数据注入攻击

本文的主要目标是从控制角度分析在最佳数据注入攻击下的系统动态响应。在本文中,在类似的最优控制框架中提出了最优数据注入攻击设计问题。我们考虑一种情况,攻击者将错误数据注入到健康的植物中,该植物由分布在不同区域的许多执行器组成。对于攻击者污染所有执行器的情况,提出了一种最佳状态反馈注入法则,以最小化包含两个冲突目标的二次成本函数。对于攻击者在短时间内仅污染部分执行器的情况,采用二次编程通过嵌入式变换技术解决了最优的开关数据注入攻击设计问题。由于汉密尔顿泛函的最小值,因此存在二次规划的爆炸式解决方案,该解决方案是在凸集的极点实现的。因此,导出切换条件以获得最佳攻击序列。我们还针对具有多个目标的数据注入攻击引入了一种封闭形式的交换策略,从最小化混合二次性能标准的角度来看,这种策略表现出最佳性。最后,提供了我们的方法在联网直流电动机和电力系统中的应用,以说明所提出方法的有效性。我们还针对具有多个目标的数据注入攻击引入了一种封闭形式的交换策略,从最小化混合二次性能标准的角度来看,这种策略表现出最佳性。最后,提供了我们的方法在联网直流电动机和电力系统中的应用,以说明所提出方法的有效性。我们还针对具有多个目标的数据注入攻击引入了一种封闭形式的交换策略,从最小化混合二次性能标准的角度来看,这种策略表现出最佳性。最后,提供了我们的方法在联网直流电动机和电力系统中的应用,以说明所提出方法的有效性。
更新日期:2018-12-01
down
wechat
bug