Abstract
Attack design is indispensable for analyzing potential risks of networked control systems (NCSs). However, the remote control center is usually well protected and its knowledge is difficult to be disclosed, which becomes a major obstacle in developing stealthy false data injection (FDI) attack scheme because only partial system knowledge (i.e., the system matrices of the physical plant) could be used. To meet this challenge, a novel stealthy FDI attack scheme against the sensor measurement is proposed by employing the normal and compromised self-governed filters held by malicious attackers, where the normal one is adopted to estimate the system state and the compromised one is used as the virtual attacked target. The corresponding attack strategy is obtained by maximizing the estimation error of the compromised self-governed filter. Then, the residual of the compromised system is derived to prove attack stealthiness. Next, it is derived and found that the attack impact on system estimation performance is the same as that based on full system knowledge. Furthermore, the divergence condition of NCSs under the attack is presented. Finally, all the theoretical analyses are verified by simulation results.
Original language | English |
---|---|
Journal | IEEE Transactions on Automatic Control |
DOIs | |
Publication status | Accepted/In press - 2025 |
Keywords
- attack stealthiness
- Kalman filter
- Networked control systems
- stealthy FDI attacks