TY - JOUR
T1 - Worst-Case Stealthy Innovation-Based Linear Attacks on Remote State Estimation Under Kullback-Leibler Divergence
AU - Shang, Jun
AU - Yu, Hao
AU - Chen, Tongwen
N1 - Publisher Copyright:
© 1963-2012 IEEE.
PY - 2022/11/1
Y1 - 2022/11/1
N2 - With the wide application of cyber-physical systems, stealthy attacks on remote state estimation have attracted increasing research attention. Recently, various stealthy innovation-based linear attack models were proposed, in which the relaxed stealthiness constraint was based on the Kullback-Leibler divergence. This article studies existing innovation-based linear attack strategies with relaxed stealthiness and concludes that all of them provided merely suboptimal solutions. The main reason is some oversight in solving the involved optimization problems: some covariance constraints were not perfectly handled. This article provides the corresponding optimal solutions for those stealthy attacks. Both one-step and holistic optimizations of stealthy attacks are studied, and the worst-case attacks with and without zero-mean constraints are derived analytically, without the necessity to numerically solve semidefinite programming problems.
AB - With the wide application of cyber-physical systems, stealthy attacks on remote state estimation have attracted increasing research attention. Recently, various stealthy innovation-based linear attack models were proposed, in which the relaxed stealthiness constraint was based on the Kullback-Leibler divergence. This article studies existing innovation-based linear attack strategies with relaxed stealthiness and concludes that all of them provided merely suboptimal solutions. The main reason is some oversight in solving the involved optimization problems: some covariance constraints were not perfectly handled. This article provides the corresponding optimal solutions for those stealthy attacks. Both one-step and holistic optimizations of stealthy attacks are studied, and the worst-case attacks with and without zero-mean constraints are derived analytically, without the necessity to numerically solve semidefinite programming problems.
KW - Cyber-physical systems
KW - Kullback-Leibler divergence
KW - remote state estimation
KW - stealthy attacks
UR - http://www.scopus.com/inward/record.url?scp=85141524462&partnerID=8YFLogxK
U2 - 10.1109/TAC.2021.3125430
DO - 10.1109/TAC.2021.3125430
M3 - Article
AN - SCOPUS:85141524462
SN - 0018-9286
VL - 67
SP - 6082
EP - 6089
JO - IEEE Transactions on Automatic Control
JF - IEEE Transactions on Automatic Control
IS - 11
ER -