Loading…

Scheduler-pointed false data injection attack for event-based remote state estimation

In this paper, an attack problem is investigated for event-based remote state estimation in cyber–physical systems. Our objective is to degrade the effect of the event-based scheduler while bypassing the χ2 false data detector. A two-channel scheduler-pointed false data injection attack strategy is...

Full description

Saved in:
Bibliographic Details
Published in:Automatica (Oxford) 2024-04, Vol.162, p.111523, Article 111523
Main Authors: Xu, Qiulin, Xiong, Junlin
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites cdi_FETCH-LOGICAL-c263t-3d37364b0764f09200dbbcdec501dfadeaa0b261e1ea1e524095c3c4567c61d3
container_end_page
container_issue
container_start_page 111523
container_title Automatica (Oxford)
container_volume 162
creator Xu, Qiulin
Xiong, Junlin
description In this paper, an attack problem is investigated for event-based remote state estimation in cyber–physical systems. Our objective is to degrade the effect of the event-based scheduler while bypassing the χ2 false data detector. A two-channel scheduler-pointed false data injection attack strategy is proposed by modifying the numerical characteristics of innovation signals. The attack strategy is proved to be always existent, and an algorithm is provided to find it. Under the proposed attack strategy, the scheduler becomes almost invalid and the performance of the remote estimator is degraded. Finally, one simulation example of a flight vehicle is provided to illustrate our theoretical results.
doi_str_mv 10.1016/j.automatica.2024.111523
format article
fullrecord <record><control><sourceid>elsevier_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1016_j_automatica_2024_111523</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0005109824000153</els_id><sourcerecordid>S0005109824000153</sourcerecordid><originalsourceid>FETCH-LOGICAL-c263t-3d37364b0764f09200dbbcdec501dfadeaa0b261e1ea1e524095c3c4567c61d3</originalsourceid><addsrcrecordid>eNqFkM1OwzAQhC0EEqXwDn6BhF07cdIjVPxJlThQzpZjb4RDG1e2W4m3J6VIHLnsaqWd0czHGEcoEVDdDqXZ57A12VtTChBViYi1kGdshm0jC9FKdc5mAFAXCIv2kl2lNExnha2Ysfc3-0Fuv6FY7IIfMznem00i7kw23I8D2ezDyE3Oxn7yPkROBxpz0Zk0_Ubahkw8ZTNNStkfg4Txml38uNz87jlbPz6sl8_F6vXpZXm3KqxQMhfSyUaqqoNGVT0sBIDrOuvI1oCuN46MgU4oJCSDVIsKFrWVtqpVYxU6OWftydbGkFKkXu_ilCB-aQR9pKMH_UdHH-noE51Jen-S0hTv4CnqZD2NlpyPU2Xtgv_f5Bvs1XTl</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Scheduler-pointed false data injection attack for event-based remote state estimation</title><source>ScienceDirect Freedom Collection</source><creator>Xu, Qiulin ; Xiong, Junlin</creator><creatorcontrib>Xu, Qiulin ; Xiong, Junlin</creatorcontrib><description>In this paper, an attack problem is investigated for event-based remote state estimation in cyber–physical systems. Our objective is to degrade the effect of the event-based scheduler while bypassing the χ2 false data detector. A two-channel scheduler-pointed false data injection attack strategy is proposed by modifying the numerical characteristics of innovation signals. The attack strategy is proved to be always existent, and an algorithm is provided to find it. Under the proposed attack strategy, the scheduler becomes almost invalid and the performance of the remote estimator is degraded. Finally, one simulation example of a flight vehicle is provided to illustrate our theoretical results.</description><identifier>ISSN: 0005-1098</identifier><identifier>EISSN: 1873-2836</identifier><identifier>DOI: 10.1016/j.automatica.2024.111523</identifier><language>eng</language><publisher>Elsevier Ltd</publisher><subject>Cyber–physical security ; Event-based scheduling ; False data injection attack ; Remote state estimation</subject><ispartof>Automatica (Oxford), 2024-04, Vol.162, p.111523, Article 111523</ispartof><rights>2024</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c263t-3d37364b0764f09200dbbcdec501dfadeaa0b261e1ea1e524095c3c4567c61d3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><creatorcontrib>Xu, Qiulin</creatorcontrib><creatorcontrib>Xiong, Junlin</creatorcontrib><title>Scheduler-pointed false data injection attack for event-based remote state estimation</title><title>Automatica (Oxford)</title><description>In this paper, an attack problem is investigated for event-based remote state estimation in cyber–physical systems. Our objective is to degrade the effect of the event-based scheduler while bypassing the χ2 false data detector. A two-channel scheduler-pointed false data injection attack strategy is proposed by modifying the numerical characteristics of innovation signals. The attack strategy is proved to be always existent, and an algorithm is provided to find it. Under the proposed attack strategy, the scheduler becomes almost invalid and the performance of the remote estimator is degraded. Finally, one simulation example of a flight vehicle is provided to illustrate our theoretical results.</description><subject>Cyber–physical security</subject><subject>Event-based scheduling</subject><subject>False data injection attack</subject><subject>Remote state estimation</subject><issn>0005-1098</issn><issn>1873-2836</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><recordid>eNqFkM1OwzAQhC0EEqXwDn6BhF07cdIjVPxJlThQzpZjb4RDG1e2W4m3J6VIHLnsaqWd0czHGEcoEVDdDqXZ57A12VtTChBViYi1kGdshm0jC9FKdc5mAFAXCIv2kl2lNExnha2Ysfc3-0Fuv6FY7IIfMznem00i7kw23I8D2ezDyE3Oxn7yPkROBxpz0Zk0_Ubahkw8ZTNNStkfg4Txml38uNz87jlbPz6sl8_F6vXpZXm3KqxQMhfSyUaqqoNGVT0sBIDrOuvI1oCuN46MgU4oJCSDVIsKFrWVtqpVYxU6OWftydbGkFKkXu_ilCB-aQR9pKMH_UdHH-noE51Jen-S0hTv4CnqZD2NlpyPU2Xtgv_f5Bvs1XTl</recordid><startdate>202404</startdate><enddate>202404</enddate><creator>Xu, Qiulin</creator><creator>Xiong, Junlin</creator><general>Elsevier Ltd</general><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>202404</creationdate><title>Scheduler-pointed false data injection attack for event-based remote state estimation</title><author>Xu, Qiulin ; Xiong, Junlin</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c263t-3d37364b0764f09200dbbcdec501dfadeaa0b261e1ea1e524095c3c4567c61d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Cyber–physical security</topic><topic>Event-based scheduling</topic><topic>False data injection attack</topic><topic>Remote state estimation</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Xu, Qiulin</creatorcontrib><creatorcontrib>Xiong, Junlin</creatorcontrib><collection>CrossRef</collection><jtitle>Automatica (Oxford)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Xu, Qiulin</au><au>Xiong, Junlin</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Scheduler-pointed false data injection attack for event-based remote state estimation</atitle><jtitle>Automatica (Oxford)</jtitle><date>2024-04</date><risdate>2024</risdate><volume>162</volume><spage>111523</spage><pages>111523-</pages><artnum>111523</artnum><issn>0005-1098</issn><eissn>1873-2836</eissn><abstract>In this paper, an attack problem is investigated for event-based remote state estimation in cyber–physical systems. Our objective is to degrade the effect of the event-based scheduler while bypassing the χ2 false data detector. A two-channel scheduler-pointed false data injection attack strategy is proposed by modifying the numerical characteristics of innovation signals. The attack strategy is proved to be always existent, and an algorithm is provided to find it. Under the proposed attack strategy, the scheduler becomes almost invalid and the performance of the remote estimator is degraded. Finally, one simulation example of a flight vehicle is provided to illustrate our theoretical results.</abstract><pub>Elsevier Ltd</pub><doi>10.1016/j.automatica.2024.111523</doi></addata></record>
fulltext fulltext
identifier ISSN: 0005-1098
ispartof Automatica (Oxford), 2024-04, Vol.162, p.111523, Article 111523
issn 0005-1098
1873-2836
language eng
recordid cdi_crossref_primary_10_1016_j_automatica_2024_111523
source ScienceDirect Freedom Collection
subjects Cyber–physical security
Event-based scheduling
False data injection attack
Remote state estimation
title Scheduler-pointed false data injection attack for event-based remote state estimation
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-10T12%3A49%3A14IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-elsevier_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Scheduler-pointed%20false%20data%20injection%20attack%20for%20event-based%20remote%20state%20estimation&rft.jtitle=Automatica%20(Oxford)&rft.au=Xu,%20Qiulin&rft.date=2024-04&rft.volume=162&rft.spage=111523&rft.pages=111523-&rft.artnum=111523&rft.issn=0005-1098&rft.eissn=1873-2836&rft_id=info:doi/10.1016/j.automatica.2024.111523&rft_dat=%3Celsevier_cross%3ES0005109824000153%3C/elsevier_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c263t-3d37364b0764f09200dbbcdec501dfadeaa0b261e1ea1e524095c3c4567c61d3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true