University of Leicester
Browse
23-0149_02_MS.pdf (1.06 MB)

Stealthiness Analysis of the Identified Model-Based Covert Attacks with Unknown Model

Download (1.06 MB)
journal contribution
posted on 2023-07-05, 15:25 authored by D Du, C Zhang, J Zhang, Q Sun, M Fei, Huiyu Zhou

Most of existing covert attacks are achieved based on known model, which is however impractical for the attacker, leading to the failure of covert attacks. To solve this problem, this paper presents a novel covert attacks method with unknown model. Firstly, the negative correlation between the model errors and the stealthiness of traditional covert attacks (TCAs) is quantitatively analyzed, where bigger errors brings worse stealthiness. Secondly, the subspace identification method is used to obtain the identified model of the plant. Furthermore, a novel identification and adaptive compensation based covert attacks (IACCAs) method is proposed, which can adaptively compensate the attack signals by adaptive law. Although there exist the identification errors, the stealthiness of IACCAs is proved to be similar as TCAs with known model. Finally, experimental results demonstrate the feasibility and effectiveness of the proposed IACCAs method, which can achieve covert attacks with unknown model.

History

Author affiliation

School of Computing and Mathematical Sciences, University of Leicester

Version

  • AM (Accepted Manuscript)

Published in

IEEE Transactions on Control of Network Systems

Publisher

IEEE

issn

2325-5870

Copyright date

2023

Available date

2023-07-05

Language

en

Usage metrics

    University of Leicester Publications

    Categories

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC