Font Size: a A A

Research On Cyber Attack Scheduling Methods For CPS Remote State Estimation

Posted on:2022-04-26Degree:MasterType:Thesis
Country:ChinaCandidate:S Y SuFull Text:PDF
GTID:2518306605455744Subject:Control Engineering
Abstract/Summary:PDF Full Text Request
With the rapid development and deep integration of computing,communication and control technologies,the security issue faced by cyber-physical systems(Cyber-Physical Systems,CPS)has become increasingly severe.In CPS,malicious cyber attacks can severely damage the operation of the system,and even directly endanger people's lives and property.In order to analyze the impact of potential cyber attacks on system performance,people need to study attack schedule problem from the perspective of the attacker.Remote state estimation is the basis of the application of wireless CPS.At present,there have been many excellent research achievements in cyber attacks scheduling for remote state estimation.However,most of the current literatures only consider the independence of transmission channels when studying the scheduling problem of sensors and attacks.In fact,in the actual physical environment,due to the similar channel frequency bands or signal crosstalk,an interactive relationship will occur between channels.Based on this,this paper constructs the optimal jamming attack scheduling for CPS state estimation under channel coupling.In addition,few scholars discuss the influence of the system components themselves on remote state estimation.Considering the inherent characteristics of sensors,this paper introduces sensor accuracy into the research of network attack scheduling for the first time.The main contributions of this article are as follows:1.From the point of view of the attacker,we focus on studying the optimal jamming attack scheduling problem which can minimize the system's remote state estimation performance when the attacker's energy is limited.In this paper,we investigate the optimal attack schedules for remote state estimation through multiple interactive channels,which is different from the previous research scenarios of multiple independent channels.Assuming that the attacker has radio constraint,only one channel is subject to jamming attacks at a time.This paper considers the situation of two subsystems,re-describes the estimation process of the remote state estimator when the system is under jamming attack,and theoretically derives the optimal jamming attack schedule.Finally,verify the correctness of the theoretical derivation through numerical simulation.2.Considering the impact of sensor accuracy on remote state estimation,this paper takes sensor accuracy as the key factor affecting cyber attacks scheduling and re-describes the remote state estimation process under the jamming attack.We firstly analyze the relationship between sensor accuracy and attack effect by continuously attacking two independent wireless channels.Secondly,an algorithm is proposed for an attacker to judge the accuracy of the sensor without any system knowledge.Considering that in an actual system,there must be more than one state,we use two sensors to observe the two states of the system and transmit them to the remote state estimator through two independent channels.Finally,an optimal jamming attack schedule based on sensor accuracy is constructed,that is,continuous attacks on channels with lower sensor accuracy,and the validity of the theoretical results is verified by numerical simulation.
Keywords/Search Tags:Cyber-physical system, jamming attack, Kalman filtering, optimal attack schedule, remote state estimation
PDF Full Text Request
Related items