TY - JOUR
T1 - Design of Stealthy Joint Attacks Against Cyber-Physical Systems
T2 - A Reachable Set Approach
AU - Zhang, Qirui
AU - Dai, Wei
AU - Liu, Kun
AU - Wang, Lanhao
AU - Yang, Chunyu
N1 - Publisher Copyright:
© 2004-2012 IEEE.
PY - 2025
Y1 - 2025
N2 - This article studies the joint design of stealthy actuator and sensor attacks against cyber-physical systems with the aim of keeping the system’s state in an unsafe region. The Kullback-Leibler divergence is adopted as the metric of the joint attacks’ stealthiness. The attacker’s objective is realized by making the system’s ellipsoidal invariant reachable set under stealthy joint attacks belong to the unsafe set. Firstly, the relationship between the actuator attack and the shape of the ellipsoid is analyzed and it can be characterized by a non-convex optimization problem. Parameters of the actuator attack are obtained by solving another convex optimization problem constructed through applying a linear transformation to the original problem. Then, the sensor attack is analytically solved from a non-convex optimization problem to move the center of the ellipsoid to the desired target and increase the controller’s cost. Finally, an example of the flotation industrial process is illustrated to demonstrate effectiveness of the attack.
AB - This article studies the joint design of stealthy actuator and sensor attacks against cyber-physical systems with the aim of keeping the system’s state in an unsafe region. The Kullback-Leibler divergence is adopted as the metric of the joint attacks’ stealthiness. The attacker’s objective is realized by making the system’s ellipsoidal invariant reachable set under stealthy joint attacks belong to the unsafe set. Firstly, the relationship between the actuator attack and the shape of the ellipsoid is analyzed and it can be characterized by a non-convex optimization problem. Parameters of the actuator attack are obtained by solving another convex optimization problem constructed through applying a linear transformation to the original problem. Then, the sensor attack is analytically solved from a non-convex optimization problem to move the center of the ellipsoid to the desired target and increase the controller’s cost. Finally, an example of the flotation industrial process is illustrated to demonstrate effectiveness of the attack.
KW - Cyber-physical system
KW - Kullback-Leibler divergence
KW - reachable set
KW - stealthy joint attacks
UR - http://www.scopus.com/inward/record.url?scp=105003045428&partnerID=8YFLogxK
U2 - 10.1109/TASE.2024.3521970
DO - 10.1109/TASE.2024.3521970
M3 - Article
AN - SCOPUS:105003045428
SN - 1545-5955
VL - 22
SP - 10333
EP - 10342
JO - IEEE Transactions on Automation Science and Engineering
JF - IEEE Transactions on Automation Science and Engineering
ER -