...
首页> 外文期刊>Neurocomputing >On scheduling of deception attacks for discrete-time networked systems equipped with attack detectors
【24h】

On scheduling of deception attacks for discrete-time networked systems equipped with attack detectors

机译:关于配备攻击检测器的离散时间网络系统的欺骗攻击的调度

获取原文
获取原文并翻译 | 示例
           

摘要

This paper is concerned with the attack scheduling of deception attacks for discrete-time systems with attack detection. Specifically, for a class of Kalman filters with chi(2) detectors, an attacker with the given attack task needs to decide how many the maximum number is or how much the attack probability is for different kinds of attack scenarios (i.e. consecutive deception attacks or randomly launched deception attacks). Firstly, in light of the property of chi(2) distribution, the predictions of detection probabilities under attacks are calculated in mean-square sense for these two attack scenarios. Then, in terms of predicted probabilities, the deception attack schemes are designed in the framework of Kalman filtering. For the case of consecutive attacks, the maximum number of attacks is determined via recursive Riccati-like difference equations. For the case of randomly launched deception attacks, the desired attack probability is obtained by solving a Riccati-like equation. Finally, a numerical example on target tracking is presented to demonstrate the effectiveness of the proposed suboptimal attack schemes. (C) 2016 Elsevier B.V. All rights reserved.
机译:本文涉及带有攻击检测的离散时间系统的欺骗攻击的攻击调度。具体来说,对于一类带有chi(2)检测器的卡尔曼滤波器,具有给定攻击任务的攻击者需要针对不同类型的攻击场景(例如,连续的欺骗攻击或随机发起欺骗攻击)。首先,根据chi(2)分布的性质,针对这两种攻击场景,均方根计算攻击下的检测概率预测。然后,根据预测的概率,在卡尔曼滤波的框架下设计了欺骗攻击方案。对于连续攻击,最大攻击次数是通过递归的类似Riccati的差分方程式确定的。对于随机发起的欺骗攻击,可以通过求解类似Riccati的方程式来获得所需的攻击概率。最后,给出了一个关于目标跟踪的数值例子,以证明所提出的次优攻击方案的有效性。 (C)2016 Elsevier B.V.保留所有权利。

著录项

  • 来源
    《Neurocomputing》 |2017年第5期|99-106|共8页
  • 作者单位

    Univ Shanghai Sci & Technol, Dept Control Sci & Engn, Shanghai Key Lab Modern Opt Syst, Shanghai 200093, Peoples R China;

    Univ Shanghai Sci & Technol, Dept Control Sci & Engn, Shanghai Key Lab Modern Opt Syst, Shanghai 200093, Peoples R China;

    Univ Shanghai Sci & Technol, Dept Control Sci & Engn, Shanghai Key Lab Modern Opt Syst, Shanghai 200093, Peoples R China;

    Yangzhou Univ, Dept Math, Yangzhou 225002, Jiangsu, Peoples R China|King Abdulaziz Univ, Fac Engn, CSN Res Grp, Jeddah 21589, Saudi Arabia;

    King Abdulaziz Univ, Fac Engn, CSN Res Grp, Jeddah 21589, Saudi Arabia;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Deception attack design; Consecutive attacks; Randomly launched deception attacks; The maximum number; Attack probability;

    机译:欺骗攻击设计;连续攻击;随机发动的欺骗攻击;最大次数;攻击概率;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号