This paper mainly studies the security issues of networked control systems based on the theory of zonotope.With the continuous development and integration of control technology,computer network technology and communication technology,network control systems have emerged and are widely used.However,due to the open and shared nature of the network control system,it is more vulnerable to attacks from the outside world.The main contribution of this paper is to study the optimal attack strategy and coordinated attack strategy for the network control system with unknown-but-bounded noise.First,a new estimation method based on zonotope is proposed.The principle of this method is to use the intersection of the prediction equation and the measurement equation to obtain an accurate set of states,and to estimate the state of the system.Secondly,an attack detection method based on the fully symmetric polytope theory and an optimal false data attack strategy are proposed.Combined with the theory of zonotope,an attack detection method based on system residuals is designed.Assuming that the attacker knows all the knowledge of the system,the attacker designs an optimal false data attack strategy,which needs to satisfy the two conditions of the inequality constraint of attack detection and the maximum estimation error.Finally,on this basis,a cooperative false data attack strategy based on the fully symmetric polytope theory is proposed.In order to obtain a better attack effect,the attacker has designed a coordinated attack strategy that can realize covert attacks.The coordinated attack strategy is designed for the attacker to carefully control the false data and measure the false data,and then inject them into the controller side and the false data side of the system respectively.The synergy of this strategy is embodied in that the purpose of the false data injected on the system controller side is to interfere with the state of the system,and the false data injected on the sensor side is to eliminate the adverse effects caused by system changes and avoid being detected by the detector.In order to verify the validity and correctness of the method,numerical simulation is used to verify the proposed strategy. |