University of Leicester
Browse
23-0149_02_MS.pdf (1.06 MB)

Stealthiness Analysis of the Identified Model-Based Covert Attacks with Unknown Model

Download (1.06 MB)
journal contribution
posted on 2023-07-05, 15:25 authored by D Du, C Zhang, J Zhang, Q Sun, M Fei, Huiyu Zhou

Most  of  existing  covert  attacks  are  achieved  basedon known model, which is however impractical for the attacker,leading  to  the  failure  of  covert  attacks.  To  solve  this  problem,this paper presents a novel covert attacks method with unknownmodel.  Firstly,  the  negative  correlation  between  the  model  er-rors  and  the  stealthiness  of  traditional  covert  attacks  (TCAs)is  quantitatively  analyzed,  where  bigger  errors  brings  worsestealthiness. Secondly, the subspace identification method is usedto obtain the identified model of the plant. Furthermore, a novelidentification  and  adaptive  compensation  based  covert  attacks(IACCAs) method is proposed, which can adaptively compensatethe  attack  signals  by  adaptive  law.  Although  there  exist  theidentification errors, the stealthiness of IACCAs is proved to besimilar as TCAs with known model. Finally, experimental resultsdemonstrate  the  feasibility  and  effectiveness  of  the  proposedIACCAs method, which can achieve covert attacks with unknown model.

History

Author affiliation

School of Computing and Mathematical Sciences, University of Leicester

Version

  • AM (Accepted Manuscript)

Published in

IEEE Transactions on Control of Network Systems

Publisher

IEEE

issn

2325-5870

Copyright date

2023

Available date

2023-07-05

Publisher DOI

Language

en

Usage metrics

    University of Leicester Publications

    Categories

    Exports