Optimal Stealthy Linear Man-in-the-Middle Attacks With Resource Constraints on Remote State Estimation

IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS(2024)

引用 0|浏览27
暂无评分
摘要
This article studies the impact of constrained optimal stealthy attacks on the state estimator, where MITM attacks with a linear form can compromise innovations transmitted through a wireless network. First, a novel resource-constrained attack model is proposed, in which there are only a finite number of attack instants within a fixed interval. Second, the evolution of the estimation error covariance under attacks is obtained, and the covariance at the ultimate instant of the attack interval is regarded as the attacker's cost function. Moreover, a relaxed condition of the strict stealthiness, named KL divergence, is employed to describe the attacker's the stealthiness metric. Third, the one-time and holistic optimization problems of stealthy attacks are solved by exploiting the Lagrange multiplier method. Then the constrained optimal attack strategies are obtained to produce the largest ultimate estimation error covariance. Finally, two simulation cases are provided to confirm the correctness of the designed attack strategies.
更多
查看译文
关键词
Kullback-Leibler (KL) divergence,man-in-the-middle (MITM) attack,optimal stealthy attack,remote state estimator (RSE),resource constraint
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要