Design of Stealthy Deception Attacks With Partial System Knowledge

Qirui Zhang, Kun Liu*, Dongyu Han, Guangzhen Su, Yuanqing Xia

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

32 Citations (Scopus)

Abstract

This article investigates the design of stealthy deception attacks with the aim of destroying the estimate performance without knowing the filter gain. The residual used to detect attacks is generated by the parity space approach and the Kullback-Leibler divergence is adopted as the metric of stealthiness. We first give the necessary and sufficient condition for the inexistence of the strictly stealthy attack, which does not change the residual and can lead to unbounded estimate error. When the strictly stealthy attack does not exist, a lower bound of the secondary moment of the estimate error is then derived via the posterior Cramér-Rao bound. The zero-mean Gaussian attack that maximizes this lower bound is obtained by solving a convex optimization problem. The proposed method can also be applied to design stealthy attacks with the aim of destroying the control performance. Finally, a numerical example of longitudinal flight control system is illustrated to demonstrate the effectiveness of the proposed attack.

Original languageEnglish
Pages (from-to)1069-1076
Number of pages8
JournalIEEE Transactions on Automatic Control
Volume68
Issue number2
DOIs
Publication statusPublished - 1 Feb 2023

Keywords

  • Cyber-physical system (CPS) security
  • Kullback-Leibler divergence (KLD)
  • posterior Cramér-Rao bound (PCRB)
  • stealthy attack

Fingerprint

Dive into the research topics of 'Design of Stealthy Deception Attacks With Partial System Knowledge'. Together they form a unique fingerprint.

Cite this