Loading…
Scheduler-pointed false data injection attack for event-based remote state estimation
In this paper, an attack problem is investigated for event-based remote state estimation in cyber–physical systems. Our objective is to degrade the effect of the event-based scheduler while bypassing the χ2 false data detector. A two-channel scheduler-pointed false data injection attack strategy is...
Saved in:
Published in: | Automatica (Oxford) 2024-04, Vol.162, p.111523, Article 111523 |
---|---|
Main Authors: | , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | cdi_FETCH-LOGICAL-c263t-3d37364b0764f09200dbbcdec501dfadeaa0b261e1ea1e524095c3c4567c61d3 |
container_end_page | |
container_issue | |
container_start_page | 111523 |
container_title | Automatica (Oxford) |
container_volume | 162 |
creator | Xu, Qiulin Xiong, Junlin |
description | In this paper, an attack problem is investigated for event-based remote state estimation in cyber–physical systems. Our objective is to degrade the effect of the event-based scheduler while bypassing the χ2 false data detector. A two-channel scheduler-pointed false data injection attack strategy is proposed by modifying the numerical characteristics of innovation signals. The attack strategy is proved to be always existent, and an algorithm is provided to find it. Under the proposed attack strategy, the scheduler becomes almost invalid and the performance of the remote estimator is degraded. Finally, one simulation example of a flight vehicle is provided to illustrate our theoretical results. |
doi_str_mv | 10.1016/j.automatica.2024.111523 |
format | article |
fullrecord | <record><control><sourceid>elsevier_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1016_j_automatica_2024_111523</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0005109824000153</els_id><sourcerecordid>S0005109824000153</sourcerecordid><originalsourceid>FETCH-LOGICAL-c263t-3d37364b0764f09200dbbcdec501dfadeaa0b261e1ea1e524095c3c4567c61d3</originalsourceid><addsrcrecordid>eNqFkM1OwzAQhC0EEqXwDn6BhF07cdIjVPxJlThQzpZjb4RDG1e2W4m3J6VIHLnsaqWd0czHGEcoEVDdDqXZ57A12VtTChBViYi1kGdshm0jC9FKdc5mAFAXCIv2kl2lNExnha2Ysfc3-0Fuv6FY7IIfMznem00i7kw23I8D2ezDyE3Oxn7yPkROBxpz0Zk0_Ubahkw8ZTNNStkfg4Txml38uNz87jlbPz6sl8_F6vXpZXm3KqxQMhfSyUaqqoNGVT0sBIDrOuvI1oCuN46MgU4oJCSDVIsKFrWVtqpVYxU6OWftydbGkFKkXu_ilCB-aQR9pKMH_UdHH-noE51Jen-S0hTv4CnqZD2NlpyPU2Xtgv_f5Bvs1XTl</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Scheduler-pointed false data injection attack for event-based remote state estimation</title><source>ScienceDirect Freedom Collection</source><creator>Xu, Qiulin ; Xiong, Junlin</creator><creatorcontrib>Xu, Qiulin ; Xiong, Junlin</creatorcontrib><description>In this paper, an attack problem is investigated for event-based remote state estimation in cyber–physical systems. Our objective is to degrade the effect of the event-based scheduler while bypassing the χ2 false data detector. A two-channel scheduler-pointed false data injection attack strategy is proposed by modifying the numerical characteristics of innovation signals. The attack strategy is proved to be always existent, and an algorithm is provided to find it. Under the proposed attack strategy, the scheduler becomes almost invalid and the performance of the remote estimator is degraded. Finally, one simulation example of a flight vehicle is provided to illustrate our theoretical results.</description><identifier>ISSN: 0005-1098</identifier><identifier>EISSN: 1873-2836</identifier><identifier>DOI: 10.1016/j.automatica.2024.111523</identifier><language>eng</language><publisher>Elsevier Ltd</publisher><subject>Cyber–physical security ; Event-based scheduling ; False data injection attack ; Remote state estimation</subject><ispartof>Automatica (Oxford), 2024-04, Vol.162, p.111523, Article 111523</ispartof><rights>2024</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c263t-3d37364b0764f09200dbbcdec501dfadeaa0b261e1ea1e524095c3c4567c61d3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><creatorcontrib>Xu, Qiulin</creatorcontrib><creatorcontrib>Xiong, Junlin</creatorcontrib><title>Scheduler-pointed false data injection attack for event-based remote state estimation</title><title>Automatica (Oxford)</title><description>In this paper, an attack problem is investigated for event-based remote state estimation in cyber–physical systems. Our objective is to degrade the effect of the event-based scheduler while bypassing the χ2 false data detector. A two-channel scheduler-pointed false data injection attack strategy is proposed by modifying the numerical characteristics of innovation signals. The attack strategy is proved to be always existent, and an algorithm is provided to find it. Under the proposed attack strategy, the scheduler becomes almost invalid and the performance of the remote estimator is degraded. Finally, one simulation example of a flight vehicle is provided to illustrate our theoretical results.</description><subject>Cyber–physical security</subject><subject>Event-based scheduling</subject><subject>False data injection attack</subject><subject>Remote state estimation</subject><issn>0005-1098</issn><issn>1873-2836</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><recordid>eNqFkM1OwzAQhC0EEqXwDn6BhF07cdIjVPxJlThQzpZjb4RDG1e2W4m3J6VIHLnsaqWd0czHGEcoEVDdDqXZ57A12VtTChBViYi1kGdshm0jC9FKdc5mAFAXCIv2kl2lNExnha2Ysfc3-0Fuv6FY7IIfMznem00i7kw23I8D2ezDyE3Oxn7yPkROBxpz0Zk0_Ubahkw8ZTNNStkfg4Txml38uNz87jlbPz6sl8_F6vXpZXm3KqxQMhfSyUaqqoNGVT0sBIDrOuvI1oCuN46MgU4oJCSDVIsKFrWVtqpVYxU6OWftydbGkFKkXu_ilCB-aQR9pKMH_UdHH-noE51Jen-S0hTv4CnqZD2NlpyPU2Xtgv_f5Bvs1XTl</recordid><startdate>202404</startdate><enddate>202404</enddate><creator>Xu, Qiulin</creator><creator>Xiong, Junlin</creator><general>Elsevier Ltd</general><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>202404</creationdate><title>Scheduler-pointed false data injection attack for event-based remote state estimation</title><author>Xu, Qiulin ; Xiong, Junlin</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c263t-3d37364b0764f09200dbbcdec501dfadeaa0b261e1ea1e524095c3c4567c61d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Cyber–physical security</topic><topic>Event-based scheduling</topic><topic>False data injection attack</topic><topic>Remote state estimation</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Xu, Qiulin</creatorcontrib><creatorcontrib>Xiong, Junlin</creatorcontrib><collection>CrossRef</collection><jtitle>Automatica (Oxford)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Xu, Qiulin</au><au>Xiong, Junlin</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Scheduler-pointed false data injection attack for event-based remote state estimation</atitle><jtitle>Automatica (Oxford)</jtitle><date>2024-04</date><risdate>2024</risdate><volume>162</volume><spage>111523</spage><pages>111523-</pages><artnum>111523</artnum><issn>0005-1098</issn><eissn>1873-2836</eissn><abstract>In this paper, an attack problem is investigated for event-based remote state estimation in cyber–physical systems. Our objective is to degrade the effect of the event-based scheduler while bypassing the χ2 false data detector. A two-channel scheduler-pointed false data injection attack strategy is proposed by modifying the numerical characteristics of innovation signals. The attack strategy is proved to be always existent, and an algorithm is provided to find it. Under the proposed attack strategy, the scheduler becomes almost invalid and the performance of the remote estimator is degraded. Finally, one simulation example of a flight vehicle is provided to illustrate our theoretical results.</abstract><pub>Elsevier Ltd</pub><doi>10.1016/j.automatica.2024.111523</doi></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0005-1098 |
ispartof | Automatica (Oxford), 2024-04, Vol.162, p.111523, Article 111523 |
issn | 0005-1098 1873-2836 |
language | eng |
recordid | cdi_crossref_primary_10_1016_j_automatica_2024_111523 |
source | ScienceDirect Freedom Collection |
subjects | Cyber–physical security Event-based scheduling False data injection attack Remote state estimation |
title | Scheduler-pointed false data injection attack for event-based remote state estimation |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-10T12%3A49%3A14IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-elsevier_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Scheduler-pointed%20false%20data%20injection%20attack%20for%20event-based%20remote%20state%20estimation&rft.jtitle=Automatica%20(Oxford)&rft.au=Xu,%20Qiulin&rft.date=2024-04&rft.volume=162&rft.spage=111523&rft.pages=111523-&rft.artnum=111523&rft.issn=0005-1098&rft.eissn=1873-2836&rft_id=info:doi/10.1016/j.automatica.2024.111523&rft_dat=%3Celsevier_cross%3ES0005109824000153%3C/elsevier_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c263t-3d37364b0764f09200dbbcdec501dfadeaa0b261e1ea1e524095c3c4567c61d3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |