A novel adaptive cooperative attack design against cyber-physical systems via mixed H∞/H- index

Abstract In this paper, a novel cooperative attack policy comprising adaptive and bias signals is studied against the cyber-physical systems (CPSs) based on the model knowledge. From the attacker’s stand point, the design objective is deteriorating the system performance and deceiving the previously equipped detector in the CPSs. Combining with H∞ and H − indexes, the bias signal is elaborately designed to compromise the systems by applying the linear matrix inequality (LMI) technology. Different from the existing works, in order to increase the attack effectiveness, an adaptive signal is also injected to compensate the possible external disturbance by the attacker. Moreover, some technology difficulties in the H ∞ / H − attack design problems are also investigated with the LMI approach. Finally, a practical example is given to illustrate the effectiveness and stealthiness of the cooperative attack policy.

[1]  Guang-Hong Yang,et al.  Input-to-State Stabilizing Control for Cyber-Physical Systems With Multiple Transmission Channels Under Denial of Service , 2018, IEEE Transactions on Automatic Control.

[2]  Guang-Hong Yang,et al.  Adaptive sliding mode fault tolerant control for nonlinearly chaotic systems against DoS attack and network faults , 2017, J. Frankl. Inst..

[3]  Qing-Long Han,et al.  State estimation under false data injection attacks: Security analysis and system protection , 2018, Autom..

[4]  Jian Liu,et al.  An LMI approach to H_ index and mixed H_/Hinfinit fault detection observer design , 2007, Autom..

[5]  Ling Shi,et al.  Optimal Denial-of-Service Attack Scheduling With Energy Constraint , 2015, IEEE Transactions on Automatic Control.

[6]  Xiaoqiang Ren,et al.  Attack Allocation on Remote State Estimation in Multi-Systems: Structural Results and Asymptotic Solution , 2016, Autom..

[7]  Karl Henrik Johansson,et al.  A secure control framework for resource-limited adversaries , 2012, Autom..

[8]  Jie Cao,et al.  H∞ filtering for networked systems with hybrid-triggered communication mechanism and stochastic cyber attacks , 2017, J. Frankl. Inst..

[9]  Ling Shi,et al.  SINR-Based DoS Attack on Remote State Estimation: A Game-Theoretic Approach , 2017, IEEE Transactions on Control of Network Systems.

[10]  Guang-Hong Yang,et al.  Fault Detection for T–S Fuzzy Systems With Unknown Membership Functions , 2014, IEEE Transactions on Fuzzy Systems.

[11]  Qing-Long Han,et al.  An Overview of Recent Advances in Fixed-Time Cooperative Control of Multiagent Systems , 2018, IEEE Transactions on Industrial Informatics.

[12]  Frank L. Lewis,et al.  Reinforcement Learning for Partially Observable Dynamic Processes: Adaptive Dynamic Programming Using Measured Output Data , 2011, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[13]  Qing-Long Han,et al.  Network-based H∞H∞ filtering using a logic jumping-like trigger , 2013, Autom..

[14]  Qing-Long Han,et al.  A Threshold-Parameter-Dependent Approach to Designing Distributed Event-Triggered $H_{\infty}$ Consensus Filters Over Sensor Networks , 2019, IEEE Transactions on Cybernetics.

[15]  Guang-Hong Yang,et al.  Decentralized Adaptive Fuzzy Secure Control for Nonlinear Uncertain Interconnected Systems Against Intermittent DoS Attacks , 2019, IEEE Transactions on Cybernetics.

[16]  Dan Ye,et al.  A cooperative detection and compensation mechanism against Denial-of-Service attack for cyber-physical systems , 2018, Inf. Sci..

[17]  Paulo Tabuada,et al.  Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.

[18]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[19]  Qing-Long Han,et al.  Distributed event-triggered H1 filtering over sensor networks with communication delays , 2014 .

[20]  Bruno Sinopoli,et al.  On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks , 2016, IEEE Transactions on Automatic Control.

[21]  Ling Shi,et al.  Worst-case stealthy innovation-based linear attack on remote state estimation , 2018, Autom..

[22]  Vijay Gupta,et al.  Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs , 2017, Autom..

[23]  Pietro Tesi,et al.  Input-to-State Stabilizing Control Under Denial-of-Service , 2015, IEEE Transactions on Automatic Control.

[24]  Guang-Hong Yang,et al.  Data-Driven Coordinated Attack Policy Design Based on Adaptive $\mathcal {L}_2$-Gain Optimal Theory , 2018, IEEE Transactions on Automatic Control.

[25]  Ling Shi,et al.  A multi-channel transmission schedule for remote state estimation under DoS attacks , 2017, Autom..

[26]  Quanyan Zhu,et al.  Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks , 2016, IEEE Transactions on Control of Network Systems.

[27]  Zhihua Qu,et al.  Competitive Interaction Design of Cooperative Systems Against Attacks , 2018, IEEE Transactions on Automatic Control.

[28]  Qing-Long Han,et al.  Consensus of Multiagent Systems Subject to Partially Accessible and Overlapping Markovian Network Topologies , 2017, IEEE Transactions on Cybernetics.

[29]  Peter Xiaoping Liu,et al.  A stochastic game approach to the security issue of networked control systems under jamming attacks , 2014, J. Frankl. Inst..

[30]  Heng Wang,et al.  Fault detection observer design for linear discrete-time systems in finite frequency domain , 2007, 2007 46th IEEE Conference on Decision and Control.

[31]  Fuad E. Alsaadi,et al.  Centralized security-guaranteed filtering in multirate-sensor fusion under deception attacks , 2018, J. Frankl. Inst..

[32]  Panganamala Ramana Kumar,et al.  Cyber–Physical Systems: A Perspective at the Centennial , 2012, Proceedings of the IEEE.