Optimal stealthy false data injection attacks for networked linear quadratic Gaussian control systems with two channels

Rui Rui Liu, Hao Yu, Fei Hao*

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

1 Citation (Scopus)

Abstract

In this paper, a security problem in networked control systems which are modeled as linear quadratic Gaussian control systems is investigated from the perspective of attackers. We consider the scenario that the attackers can inject false data into two channels: sensor-to-controller and controller-to-actuator channels. The goal of attackers is to design the optimal stealthy false data injection attacks to maximize the linear quadratic Gaussian control cost function, where Kullback-Leiber divergence is used as a stealthiness metric. Firstly, the cost function is divided into a fixed part and a part which is related to a remote estimation error covariance. Then, when the two channels are attacked by attackers, the recursion of remote estimation error covariance is derived. In the presence of attacks, the optimization problem with multiple decision variables, which may not be a convex problem, is transformed into a convex optimization problem and the corresponding optimal solution is obtained. In addition, an upper bound of benefit loss when using the optimal solution of the convex optimization problem is presented. Finally, a simulation example is presented to show the effectiveness of the obtained results.

Original languageEnglish
Pages (from-to)3566-3588
Number of pages23
JournalInternational Journal of Robust and Nonlinear Control
Volume33
Issue number6
DOIs
Publication statusPublished - Apr 2023

Keywords

  • Kullback-Leiber divergence
  • false data injection attacks
  • linear quadratic Gaussian control systems
  • networked control systems
  • security problem

Fingerprint

Dive into the research topics of 'Optimal stealthy false data injection attacks for networked linear quadratic Gaussian control systems with two channels'. Together they form a unique fingerprint.

Cite this