Data-Driven Injection Attack Against Discrete-Time Intelligent Automation Systems With Slowly Time-Varying Delays

This paper addresses data-driven injection attack against unknown intelligent automation systems (IASs) with slowly time-varying delays, which is a more general but also more challenging to deal with than the model-based real-time systems. Using the control input and system output measurements, seve...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on automation science and engineering 2023, p.1-13
Hauptverfasser: Gao, Sheng, Zhang, Hao, Wang, Zhuping, Huang, Haohan, Yan, Huaicheng
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 13
container_issue
container_start_page 1
container_title IEEE transactions on automation science and engineering
container_volume
creator Gao, Sheng
Zhang, Hao
Wang, Zhuping
Huang, Haohan
Yan, Huaicheng
description This paper addresses data-driven injection attack against unknown intelligent automation systems (IASs) with slowly time-varying delays, which is a more general but also more challenging to deal with than the model-based real-time systems. Using the control input and system output measurements, several new data-driven injection attack strategies based on compact form dynamic linearization (CFDL) and incremental triangular dynamic linearization (ITDL) are proposed. The attack strategies are more general than the existing ones, taking into account the unknown model parameters and time-varying delays in control-to-actuator as well as sensor-to-controller data transmission channels. Consequently, the new design attack results are anticipated to have wider applicability. Based on the established attack models of CFDL and ITDL, the data-driven optimal parameter estimation algorithms are employed to overcome the difficulty of the unknown model. Furthermore, with the help of the principle of the linear regression equation, the problem of seeking partial derivatives for the attack inputs with time delays is avoided. Several examples are presented to illustrate the validity of the designed attack strategies. Note to Practitioners -The primary objective of this paper is to focus on the cyber security of discrete-time intelligent automation systems from the viewpoint of the attacker, which provides insight into the way of generating attack strategies under the data-driven framework. The majority of the available attack strategies against intelligent automation systems are based on a priori knowledge of the system, without delays or with single-sided fixed time delay, and thus in reality the attack strategies fail or are mostly ineffective due to inaccessibility of the attacked system parameters in conjunction with communication network time delays. This paper synthesizes parameter estimation, dynamic linearization, optimality principle and control theory to propose data-driven injection attack strategies based on CFDL and ITDL, respectively. Compared with the CFDL-based attack strategy, the latter is more applicable in the situation where the attacker suffers from restricted memory space occupation and hashrate. Specifically, the operation of attacker has two phases: eavesdropping estimation and strategy generation. In the eavesdropping estimation phase, the attacker continuously eavesdrops and stores the traffic data of the system for parameter estimation as well as
doi_str_mv 10.1109/TASE.2023.3319828
format Article
fullrecord <record><control><sourceid>crossref_RIE</sourceid><recordid>TN_cdi_ieee_primary_10271332</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10271332</ieee_id><sourcerecordid>10_1109_TASE_2023_3319828</sourcerecordid><originalsourceid>FETCH-LOGICAL-c218t-5cf25ac73f3bd08cbe0d4d9cb188d12b91effc4688a42821e12ac5abf967ed0d3</originalsourceid><addsrcrecordid>eNpNkMlOwzAQQC0EEqXwAUgc_AMuXuLGPkYNS6VKHFrgGDnOuLhkgdiA8vc0tAdOM4f3RqOH0DWjM8aovt1k67sZp1zMhGBacXWCJkxKRUSqxOm4J5JILeU5ughhRylPlKYT9JmbaEje-29o8bLdgY2-a3EWo7HvONsa34aIcx9sDxHIxjewxyLUtd9CG3H2FbvG_DnrIURoAn718Q2v6-6nHvDIkxfTD77d4hxqM4RLdOZMHeDqOKfo-f5us3gkq6eH5SJbEcuZikRax6WxqXCirKiyJdAqqbQtmVIV46Vm4JxN5kqZhCvOgHFjpSmdnqdQ0UpMETvctX0XQg-u-Oh9s3-lYLQYmxVjs2JsVhyb7Z2bg-MB4B_PUyYEF78c2Wsp</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Data-Driven Injection Attack Against Discrete-Time Intelligent Automation Systems With Slowly Time-Varying Delays</title><source>IEEE Electronic Library (IEL)</source><creator>Gao, Sheng ; Zhang, Hao ; Wang, Zhuping ; Huang, Haohan ; Yan, Huaicheng</creator><creatorcontrib>Gao, Sheng ; Zhang, Hao ; Wang, Zhuping ; Huang, Haohan ; Yan, Huaicheng</creatorcontrib><description>This paper addresses data-driven injection attack against unknown intelligent automation systems (IASs) with slowly time-varying delays, which is a more general but also more challenging to deal with than the model-based real-time systems. Using the control input and system output measurements, several new data-driven injection attack strategies based on compact form dynamic linearization (CFDL) and incremental triangular dynamic linearization (ITDL) are proposed. The attack strategies are more general than the existing ones, taking into account the unknown model parameters and time-varying delays in control-to-actuator as well as sensor-to-controller data transmission channels. Consequently, the new design attack results are anticipated to have wider applicability. Based on the established attack models of CFDL and ITDL, the data-driven optimal parameter estimation algorithms are employed to overcome the difficulty of the unknown model. Furthermore, with the help of the principle of the linear regression equation, the problem of seeking partial derivatives for the attack inputs with time delays is avoided. Several examples are presented to illustrate the validity of the designed attack strategies. Note to Practitioners -The primary objective of this paper is to focus on the cyber security of discrete-time intelligent automation systems from the viewpoint of the attacker, which provides insight into the way of generating attack strategies under the data-driven framework. The majority of the available attack strategies against intelligent automation systems are based on a priori knowledge of the system, without delays or with single-sided fixed time delay, and thus in reality the attack strategies fail or are mostly ineffective due to inaccessibility of the attacked system parameters in conjunction with communication network time delays. This paper synthesizes parameter estimation, dynamic linearization, optimality principle and control theory to propose data-driven injection attack strategies based on CFDL and ITDL, respectively. Compared with the CFDL-based attack strategy, the latter is more applicable in the situation where the attacker suffers from restricted memory space occupation and hashrate. Specifically, the operation of attacker has two phases: eavesdropping estimation and strategy generation. In the eavesdropping estimation phase, the attacker continuously eavesdrops and stores the traffic data of the system for parameter estimation as well as optimizes the estimated parameters. In the strategy generation phase, the attacker generates strategies with the assistance of optimal parameters. Mathematically analytical forms of the proposed two data-driven injection attack strategies are presented in detail. Then, their effectiveness is verified through numerical simulation and experiments based on a leader-following form consisting of five quadcopters, but not tested in production. In the future, we are intending to design the data-driven attack strategies for heterogeneous intelligent automation systems with time-varying delays under the framework of game.</description><identifier>ISSN: 1545-5955</identifier><identifier>EISSN: 1558-3783</identifier><identifier>DOI: 10.1109/TASE.2023.3319828</identifier><identifier>CODEN: ITASC7</identifier><language>eng</language><publisher>IEEE</publisher><subject>compact form dynamic linearization ; Cyberattack ; Data communication ; data-driven injection attack ; Delay effects ; Delays ; incremental triangular dynamic linearization ; Intelligent automation ; Intelligent automation systems ; slowly time-varying delays ; Switches ; Time-varying systems</subject><ispartof>IEEE transactions on automation science and engineering, 2023, p.1-13</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed><orcidid>0000-0001-5496-1809 ; 0000-0003-3694-0021 ; 0000-0002-0334-4082 ; 0000-0002-4527-9610</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10271332$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,778,782,794,4012,27906,27907,27908,54741</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/10271332$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Gao, Sheng</creatorcontrib><creatorcontrib>Zhang, Hao</creatorcontrib><creatorcontrib>Wang, Zhuping</creatorcontrib><creatorcontrib>Huang, Haohan</creatorcontrib><creatorcontrib>Yan, Huaicheng</creatorcontrib><title>Data-Driven Injection Attack Against Discrete-Time Intelligent Automation Systems With Slowly Time-Varying Delays</title><title>IEEE transactions on automation science and engineering</title><addtitle>TASE</addtitle><description>This paper addresses data-driven injection attack against unknown intelligent automation systems (IASs) with slowly time-varying delays, which is a more general but also more challenging to deal with than the model-based real-time systems. Using the control input and system output measurements, several new data-driven injection attack strategies based on compact form dynamic linearization (CFDL) and incremental triangular dynamic linearization (ITDL) are proposed. The attack strategies are more general than the existing ones, taking into account the unknown model parameters and time-varying delays in control-to-actuator as well as sensor-to-controller data transmission channels. Consequently, the new design attack results are anticipated to have wider applicability. Based on the established attack models of CFDL and ITDL, the data-driven optimal parameter estimation algorithms are employed to overcome the difficulty of the unknown model. Furthermore, with the help of the principle of the linear regression equation, the problem of seeking partial derivatives for the attack inputs with time delays is avoided. Several examples are presented to illustrate the validity of the designed attack strategies. Note to Practitioners -The primary objective of this paper is to focus on the cyber security of discrete-time intelligent automation systems from the viewpoint of the attacker, which provides insight into the way of generating attack strategies under the data-driven framework. The majority of the available attack strategies against intelligent automation systems are based on a priori knowledge of the system, without delays or with single-sided fixed time delay, and thus in reality the attack strategies fail or are mostly ineffective due to inaccessibility of the attacked system parameters in conjunction with communication network time delays. This paper synthesizes parameter estimation, dynamic linearization, optimality principle and control theory to propose data-driven injection attack strategies based on CFDL and ITDL, respectively. Compared with the CFDL-based attack strategy, the latter is more applicable in the situation where the attacker suffers from restricted memory space occupation and hashrate. Specifically, the operation of attacker has two phases: eavesdropping estimation and strategy generation. In the eavesdropping estimation phase, the attacker continuously eavesdrops and stores the traffic data of the system for parameter estimation as well as optimizes the estimated parameters. In the strategy generation phase, the attacker generates strategies with the assistance of optimal parameters. Mathematically analytical forms of the proposed two data-driven injection attack strategies are presented in detail. Then, their effectiveness is verified through numerical simulation and experiments based on a leader-following form consisting of five quadcopters, but not tested in production. In the future, we are intending to design the data-driven attack strategies for heterogeneous intelligent automation systems with time-varying delays under the framework of game.</description><subject>compact form dynamic linearization</subject><subject>Cyberattack</subject><subject>Data communication</subject><subject>data-driven injection attack</subject><subject>Delay effects</subject><subject>Delays</subject><subject>incremental triangular dynamic linearization</subject><subject>Intelligent automation</subject><subject>Intelligent automation systems</subject><subject>slowly time-varying delays</subject><subject>Switches</subject><subject>Time-varying systems</subject><issn>1545-5955</issn><issn>1558-3783</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpNkMlOwzAQQC0EEqXwAUgc_AMuXuLGPkYNS6VKHFrgGDnOuLhkgdiA8vc0tAdOM4f3RqOH0DWjM8aovt1k67sZp1zMhGBacXWCJkxKRUSqxOm4J5JILeU5ughhRylPlKYT9JmbaEje-29o8bLdgY2-a3EWo7HvONsa34aIcx9sDxHIxjewxyLUtd9CG3H2FbvG_DnrIURoAn718Q2v6-6nHvDIkxfTD77d4hxqM4RLdOZMHeDqOKfo-f5us3gkq6eH5SJbEcuZikRax6WxqXCirKiyJdAqqbQtmVIV46Vm4JxN5kqZhCvOgHFjpSmdnqdQ0UpMETvctX0XQg-u-Oh9s3-lYLQYmxVjs2JsVhyb7Z2bg-MB4B_PUyYEF78c2Wsp</recordid><startdate>2023</startdate><enddate>2023</enddate><creator>Gao, Sheng</creator><creator>Zhang, Hao</creator><creator>Wang, Zhuping</creator><creator>Huang, Haohan</creator><creator>Yan, Huaicheng</creator><general>IEEE</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0001-5496-1809</orcidid><orcidid>https://orcid.org/0000-0003-3694-0021</orcidid><orcidid>https://orcid.org/0000-0002-0334-4082</orcidid><orcidid>https://orcid.org/0000-0002-4527-9610</orcidid></search><sort><creationdate>2023</creationdate><title>Data-Driven Injection Attack Against Discrete-Time Intelligent Automation Systems With Slowly Time-Varying Delays</title><author>Gao, Sheng ; Zhang, Hao ; Wang, Zhuping ; Huang, Haohan ; Yan, Huaicheng</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c218t-5cf25ac73f3bd08cbe0d4d9cb188d12b91effc4688a42821e12ac5abf967ed0d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>compact form dynamic linearization</topic><topic>Cyberattack</topic><topic>Data communication</topic><topic>data-driven injection attack</topic><topic>Delay effects</topic><topic>Delays</topic><topic>incremental triangular dynamic linearization</topic><topic>Intelligent automation</topic><topic>Intelligent automation systems</topic><topic>slowly time-varying delays</topic><topic>Switches</topic><topic>Time-varying systems</topic><toplevel>online_resources</toplevel><creatorcontrib>Gao, Sheng</creatorcontrib><creatorcontrib>Zhang, Hao</creatorcontrib><creatorcontrib>Wang, Zhuping</creatorcontrib><creatorcontrib>Huang, Haohan</creatorcontrib><creatorcontrib>Yan, Huaicheng</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><jtitle>IEEE transactions on automation science and engineering</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Gao, Sheng</au><au>Zhang, Hao</au><au>Wang, Zhuping</au><au>Huang, Haohan</au><au>Yan, Huaicheng</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Data-Driven Injection Attack Against Discrete-Time Intelligent Automation Systems With Slowly Time-Varying Delays</atitle><jtitle>IEEE transactions on automation science and engineering</jtitle><stitle>TASE</stitle><date>2023</date><risdate>2023</risdate><spage>1</spage><epage>13</epage><pages>1-13</pages><issn>1545-5955</issn><eissn>1558-3783</eissn><coden>ITASC7</coden><abstract>This paper addresses data-driven injection attack against unknown intelligent automation systems (IASs) with slowly time-varying delays, which is a more general but also more challenging to deal with than the model-based real-time systems. Using the control input and system output measurements, several new data-driven injection attack strategies based on compact form dynamic linearization (CFDL) and incremental triangular dynamic linearization (ITDL) are proposed. The attack strategies are more general than the existing ones, taking into account the unknown model parameters and time-varying delays in control-to-actuator as well as sensor-to-controller data transmission channels. Consequently, the new design attack results are anticipated to have wider applicability. Based on the established attack models of CFDL and ITDL, the data-driven optimal parameter estimation algorithms are employed to overcome the difficulty of the unknown model. Furthermore, with the help of the principle of the linear regression equation, the problem of seeking partial derivatives for the attack inputs with time delays is avoided. Several examples are presented to illustrate the validity of the designed attack strategies. Note to Practitioners -The primary objective of this paper is to focus on the cyber security of discrete-time intelligent automation systems from the viewpoint of the attacker, which provides insight into the way of generating attack strategies under the data-driven framework. The majority of the available attack strategies against intelligent automation systems are based on a priori knowledge of the system, without delays or with single-sided fixed time delay, and thus in reality the attack strategies fail or are mostly ineffective due to inaccessibility of the attacked system parameters in conjunction with communication network time delays. This paper synthesizes parameter estimation, dynamic linearization, optimality principle and control theory to propose data-driven injection attack strategies based on CFDL and ITDL, respectively. Compared with the CFDL-based attack strategy, the latter is more applicable in the situation where the attacker suffers from restricted memory space occupation and hashrate. Specifically, the operation of attacker has two phases: eavesdropping estimation and strategy generation. In the eavesdropping estimation phase, the attacker continuously eavesdrops and stores the traffic data of the system for parameter estimation as well as optimizes the estimated parameters. In the strategy generation phase, the attacker generates strategies with the assistance of optimal parameters. Mathematically analytical forms of the proposed two data-driven injection attack strategies are presented in detail. Then, their effectiveness is verified through numerical simulation and experiments based on a leader-following form consisting of five quadcopters, but not tested in production. In the future, we are intending to design the data-driven attack strategies for heterogeneous intelligent automation systems with time-varying delays under the framework of game.</abstract><pub>IEEE</pub><doi>10.1109/TASE.2023.3319828</doi><tpages>13</tpages><orcidid>https://orcid.org/0000-0001-5496-1809</orcidid><orcidid>https://orcid.org/0000-0003-3694-0021</orcidid><orcidid>https://orcid.org/0000-0002-0334-4082</orcidid><orcidid>https://orcid.org/0000-0002-4527-9610</orcidid></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1545-5955
ispartof IEEE transactions on automation science and engineering, 2023, p.1-13
issn 1545-5955
1558-3783
language eng
recordid cdi_ieee_primary_10271332
source IEEE Electronic Library (IEL)
subjects compact form dynamic linearization
Cyberattack
Data communication
data-driven injection attack
Delay effects
Delays
incremental triangular dynamic linearization
Intelligent automation
Intelligent automation systems
slowly time-varying delays
Switches
Time-varying systems
title Data-Driven Injection Attack Against Discrete-Time Intelligent Automation Systems With Slowly Time-Varying Delays
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-16T19%3A54%3A07IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Data-Driven%20Injection%20Attack%20Against%20Discrete-Time%20Intelligent%20Automation%20Systems%20With%20Slowly%20Time-Varying%20Delays&rft.jtitle=IEEE%20transactions%20on%20automation%20science%20and%20engineering&rft.au=Gao,%20Sheng&rft.date=2023&rft.spage=1&rft.epage=13&rft.pages=1-13&rft.issn=1545-5955&rft.eissn=1558-3783&rft.coden=ITASC7&rft_id=info:doi/10.1109/TASE.2023.3319828&rft_dat=%3Ccrossref_RIE%3E10_1109_TASE_2023_3319828%3C/crossref_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=10271332&rfr_iscdi=true