TY - JOUR
T1 - Performance analysis for cyber–physical systems under two types of stealthy deception attacks
AU - Liu, Qingchen
AU - Wang, Jie
AU - Ni, Yuqing
AU - Zhang, Cong
AU - Shi, Ling
AU - Qin, Jiahu
N1 - Publisher Copyright:
© 2023 Elsevier Ltd
PY - 2024/2
Y1 - 2024/2
N2 - This paper focuses on the performance analysis of cyber–physical systems under the stealthy deception attack. Two types of attack models, strictly stealthy attack and ϵ-stealthy attack, are considered. The strictly stealthy deception attack model is firstly formulated based on the difference equations of the normal and compromised systems. We then present a necessary and sufficient condition for the existence of the strictly stealthy deception attack. The design method for the attacker to achieve the strictly stealthy deception attack is also provided. Considering that the strictly stealthy attack strategy is associated with the undetectable points of the difference equations, we propose a computationally efficient algorithm to find such points. It is shown that these points form a subspace which can be obtained in finite recursion steps. The corresponding defense strategy is further designed by avoiding the initial state falling into the subspace. For ϵ-stealthy attack, a necessary condition is provided for its existence. Furthermore, due to the fact that the difference system matrix does not have an unstable eigenvalue, it is proved that the ϵ-stealthy attack does not exist. Simulation examples are presented to illustrate the theoretical results.
AB - This paper focuses on the performance analysis of cyber–physical systems under the stealthy deception attack. Two types of attack models, strictly stealthy attack and ϵ-stealthy attack, are considered. The strictly stealthy deception attack model is firstly formulated based on the difference equations of the normal and compromised systems. We then present a necessary and sufficient condition for the existence of the strictly stealthy deception attack. The design method for the attacker to achieve the strictly stealthy deception attack is also provided. Considering that the strictly stealthy attack strategy is associated with the undetectable points of the difference equations, we propose a computationally efficient algorithm to find such points. It is shown that these points form a subspace which can be obtained in finite recursion steps. The corresponding defense strategy is further designed by avoiding the initial state falling into the subspace. For ϵ-stealthy attack, a necessary condition is provided for its existence. Furthermore, due to the fact that the difference system matrix does not have an unstable eigenvalue, it is proved that the ϵ-stealthy attack does not exist. Simulation examples are presented to illustrate the theoretical results.
KW - Cyber–physical system (CPS)
KW - Estimation
KW - Kalman filter
KW - Stealthy deception attack
UR - https://www.webofscience.com/wos/woscc/full-record/WOS:001132546700001
UR - https://openalex.org/W4389256089
UR - https://www.scopus.com/pages/publications/85178666598
U2 - 10.1016/j.automatica.2023.111446
DO - 10.1016/j.automatica.2023.111446
M3 - Journal Article
SN - 0005-1098
VL - 160
JO - Automatica
JF - Automatica
M1 - 111446
ER -