论文标题

网络控制系统中的无模型错误数据注射攻击:反馈优化方法

Model-free False Data Injection Attack in Networked Control Systems: A Feedback Optimization Approach

论文作者

Luo, Xiaoyu, Fang, Chongrong, He, Jianping, Zhao, Chengcheng, Paccagnan, Dario

论文摘要

由于物理组件和通信网络越来越容易受到网络攻击的影响,安全性问题已经引起了控制系统社区的日益兴趣。在这种情况下,最近的文献研究了越来越复杂的\ emph {false Data Injection}攻击,目的是设计改善系统安全性的缓线措施。值得注意的是,数据驱动的攻击策略 - 系统动态对对手的遗漏 - 受到了越来越多的关注。但是,关于该主题的许多现有作品都取决于线性系统动力学的隐式假设,从而大大限制了它们的范围。与此相反,在这项工作中,我们设计和分析适用于一般线性和非线性系统的无模型的虚假数据注入攻击。更具体地说,我们旨在设计一个注入的信号,该信号将系统的输出转向(恶意选择的)轨迹。我们通过设计零订单反馈优化策略并共同使用探测信号进行实时测量来做到这一点。然后,我们通过其最佳差距来表征所提出的无模型攻击的质量,该攻击差距受攻击信号的尺寸,迭代次数的影响以及系统的收敛速率的影响。最后,我们将提出的攻击方案扩展到具有内部噪声的系统。广泛的模拟显示了拟议的攻击方案的有效性。

Security issues have gathered growing interest within the control systems community, as physical components and communication networks are increasingly vulnerable to cyber attacks. In this context, recent literature has studied increasingly sophisticated \emph{false data injection} attacks, with the aim to design mitigative measures that improve the systems' security. Notably, data-driven attack strategies -- whereby the system dynamics is oblivious to the adversary -- have received increasing attention. However, many of the existing works on the topic rely on the implicit assumption of linear system dynamics, significantly limiting their scope. Contrary to that, in this work we design and analyze \emph{truly} model-free false data injection attack that applies to general linear and nonlinear systems. More specifically, we aim at designing an injected signal that steers the output of the system toward a (maliciously chosen) trajectory. We do so by designing a zeroth-order feedback optimization policy and jointly use probing signals for real-time measurements. We then characterize the quality of the proposed model-free attack through its optimality gap, which is affected by the dimensions of the attack signal, the number of iterations performed, and the convergence rate of the system. Finally, we extend the proposed attack scheme to the systems with internal noise. Extensive simulations show the effectiveness of the proposed attack scheme.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源