Volume 33, Issue 6 pp. 3566-3588
RESEARCH ARTICLE

Optimal stealthy false data injection attacks for networked linear quadratic Gaussian control systems with two channels

Rui-Rui Liu

Rui-Rui Liu

The Seventh Research Division, School of Automation Science and Electrical Engineering, Beihang University, Beijing, China

Network and Information Security Business Department, Beijing Jinghang Computation and Communication Research Institute, Beijing, China

Network Security General Department, The Classified Information Carrier Safety Management Engineering Technology Research Center of Beijing, Beijing, China

Search for more papers by this author
Hao Yu

Hao Yu

The School of Automation, Beijing Institute of Technology, Beijing, China

Search for more papers by this author
Fei Hao

Corresponding Author

Fei Hao

The Seventh Research Division, School of Automation Science and Electrical Engineering, Beihang University, Beijing, China

Correspondence Fei Hao, The Seventh Research Division, School of Automation Science and Electrical Engineering, Beihang University, Beijing 100191, China.

Email: [email protected]

Search for more papers by this author
First published: 03 January 2023
Citations: 1

Funding information: National Nature Science Foundation of China, Grant/Award Numbers: 61573036, 62227810, 62133001

Summary

In this paper, a security problem in networked control systems which are modeled as linear quadratic Gaussian control systems is investigated from the perspective of attackers. We consider the scenario that the attackers can inject false data into two channels: sensor-to-controller and controller-to-actuator channels. The goal of attackers is to design the optimal stealthy false data injection attacks to maximize the linear quadratic Gaussian control cost function, where Kullback-Leiber divergence is used as a stealthiness metric. Firstly, the cost function is divided into a fixed part and a part which is related to a remote estimation error covariance. Then, when the two channels are attacked by attackers, the recursion of remote estimation error covariance is derived. In the presence of attacks, the optimization problem with multiple decision variables, which may not be a convex problem, is transformed into a convex optimization problem and the corresponding optimal solution is obtained. In addition, an upper bound of benefit loss when using the optimal solution of the convex optimization problem is presented. Finally, a simulation example is presented to show the effectiveness of the obtained results.

CONFLICT OF INTEREST

The authors declare that there is no conflict of interest.

DATA AVAILABILITY STATEMENT

Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.

The full text of this article hosted at iucr.org is unavailable due to technical difficulties.