TY - JOUR
T1 - Optimal allocation of false data injection attacks for networked control systems with two communication channels
AU - Guo, Li
AU - Yu, Hao
AU - Hao, Fei
N1 - Publisher Copyright:
© 2014 IEEE.
PY - 2021/3
Y1 - 2021/3
N2 - Recently, the security issues in networked control systems (NCSs) have become a major challenge, since NCSs are vulnerable to malicious attacks. In this article, we consider the false data injection (FDI) attacks employed on two communication channels - namely: 1) sensor-to-controller and 2) controller-to-actuator channels. The FDI attacker aims to disturb the systems by injecting external control inputs and fake sensor measurements in the form of Gaussian noises. The problems of attack allocation with resource constraints are studied, i.e., the attacker decides instants of attack occurrence as well as the allocation of attack energy in order to obtain the optimal attack strategy. Also, the optimal attack strategies with respect to both time-invariant and time-varying attack covariances are proposed for two channels, where the time-varying attack covariances suffer a given budget. Finally, the feasibility of theoretical results is validated by a numerical example of an unmanned aerial vehicle.
AB - Recently, the security issues in networked control systems (NCSs) have become a major challenge, since NCSs are vulnerable to malicious attacks. In this article, we consider the false data injection (FDI) attacks employed on two communication channels - namely: 1) sensor-to-controller and 2) controller-to-actuator channels. The FDI attacker aims to disturb the systems by injecting external control inputs and fake sensor measurements in the form of Gaussian noises. The problems of attack allocation with resource constraints are studied, i.e., the attacker decides instants of attack occurrence as well as the allocation of attack energy in order to obtain the optimal attack strategy. Also, the optimal attack strategies with respect to both time-invariant and time-varying attack covariances are proposed for two channels, where the time-varying attack covariances suffer a given budget. Finally, the feasibility of theoretical results is validated by a numerical example of an unmanned aerial vehicle.
KW - False data injection (FDI) attacks
KW - Kalman filters
KW - networked control systems (NCSs)
KW - resource constraint
UR - http://www.scopus.com/inward/record.url?scp=85092478083&partnerID=8YFLogxK
U2 - 10.1109/TCNS.2020.3030002
DO - 10.1109/TCNS.2020.3030002
M3 - Article
AN - SCOPUS:85092478083
SN - 2325-5870
VL - 8
SP - 2
EP - 14
JO - IEEE Transactions on Control of Network Systems
JF - IEEE Transactions on Control of Network Systems
IS - 1
M1 - 9219166
ER -