Optimal Injection Attack Strategy for Nonlinear Cyber-Physical Systems Based on Iterative Learning
Sheng Gao,Hao Zhang,Chao Huang,Zhuping Wang,Huaicheng Yan
DOI: https://doi.org/10.1109/tase.2022.3232496
IF: 6.636
2024-01-01
IEEE Transactions on Automation Science and Engineering
Abstract:This paper aims to investigate the security problem of nonlinear cyber-physical systems (CPSs), which poses a challenge to handle compared with linear CPSs. A series of optimization problems for nonlinear CPSs under injection attack are constructed, which are based on a general model of the nonlinear systems with repetitive operation characteristics and a novel introduction of the key technical lemma. These optimization results are more general than the existing injection attack results and the requirements for attackers to obtain system information are relaxed. Also, the form of switching applied to the attack strategy possesses several advantages, including high stealthiness, lower cost, and more flexibility. Therefore, the new optimal injection attack strategies are expected to be more widespread and provide a basis for the design of defense strategies. The key to acquiring the designed optimal attack strategies is to adopt the linear input/output (I/O) data model for these systems via introducing an estimation term of the improved projection estimation method into the linear model. Finally, a networked GLUON-6L3 manipulator example validates the effectiveness of the proposed methods. Note to Practitioners —The main purpose of this paper is to study the cyber security of nonlinear cyber-physical systems from the perspective of attackers, which can help defenders fully understand the behavior of attackers. Most of the existing attack strategies aimed at linear systems or have a priori knowledge of the attacked systems. However, there are great limitations and difficulties in practical application. In this paper, the new attack strategies are proposed by combining system identification, iterative learning and control theory, which relaxes the requirement of the attacker’s ability. In detail, the attacker only needs to obtain the control input and output data of the attacked system and design the attack strategy according to it. Among them, the first-in, first-out queue storage method is applied to remove the requirements for the storage capability of the attacker. In practical applications, the attacker does not need to store the I/O data continuously, but only store the initial value and the data of two successive iterations. The mathematical analytic forms of two optimal attack strategies are given, and then their effectiveness are verified on a welding work of a networked six-axis manipulator. In the future, we will investigate the design of attack strategies for nonlinear systems with heterogeneous dynamics and multiple delays.