Data-Driven Injection Attack Against Discrete-Time Intelligent Automation Systems With Slowly Time-Varying Delays
This paper addresses data-driven injection attack against unknown intelligent automation systems (IASs) with slowly time-varying delays, which is a more general but also more challenging to deal with than the model-based real-time systems. Using the control input and system output measurements, seve...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on automation science and engineering 2023, p.1-13 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 13 |
---|---|
container_issue | |
container_start_page | 1 |
container_title | IEEE transactions on automation science and engineering |
container_volume | |
creator | Gao, Sheng Zhang, Hao Wang, Zhuping Huang, Haohan Yan, Huaicheng |
description | This paper addresses data-driven injection attack against unknown intelligent automation systems (IASs) with slowly time-varying delays, which is a more general but also more challenging to deal with than the model-based real-time systems. Using the control input and system output measurements, several new data-driven injection attack strategies based on compact form dynamic linearization (CFDL) and incremental triangular dynamic linearization (ITDL) are proposed. The attack strategies are more general than the existing ones, taking into account the unknown model parameters and time-varying delays in control-to-actuator as well as sensor-to-controller data transmission channels. Consequently, the new design attack results are anticipated to have wider applicability. Based on the established attack models of CFDL and ITDL, the data-driven optimal parameter estimation algorithms are employed to overcome the difficulty of the unknown model. Furthermore, with the help of the principle of the linear regression equation, the problem of seeking partial derivatives for the attack inputs with time delays is avoided. Several examples are presented to illustrate the validity of the designed attack strategies. Note to Practitioners -The primary objective of this paper is to focus on the cyber security of discrete-time intelligent automation systems from the viewpoint of the attacker, which provides insight into the way of generating attack strategies under the data-driven framework. The majority of the available attack strategies against intelligent automation systems are based on a priori knowledge of the system, without delays or with single-sided fixed time delay, and thus in reality the attack strategies fail or are mostly ineffective due to inaccessibility of the attacked system parameters in conjunction with communication network time delays. This paper synthesizes parameter estimation, dynamic linearization, optimality principle and control theory to propose data-driven injection attack strategies based on CFDL and ITDL, respectively. Compared with the CFDL-based attack strategy, the latter is more applicable in the situation where the attacker suffers from restricted memory space occupation and hashrate. Specifically, the operation of attacker has two phases: eavesdropping estimation and strategy generation. In the eavesdropping estimation phase, the attacker continuously eavesdrops and stores the traffic data of the system for parameter estimation as well as |
doi_str_mv | 10.1109/TASE.2023.3319828 |
format | Article |
fullrecord | <record><control><sourceid>crossref_RIE</sourceid><recordid>TN_cdi_ieee_primary_10271332</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10271332</ieee_id><sourcerecordid>10_1109_TASE_2023_3319828</sourcerecordid><originalsourceid>FETCH-LOGICAL-c218t-5cf25ac73f3bd08cbe0d4d9cb188d12b91effc4688a42821e12ac5abf967ed0d3</originalsourceid><addsrcrecordid>eNpNkMlOwzAQQC0EEqXwAUgc_AMuXuLGPkYNS6VKHFrgGDnOuLhkgdiA8vc0tAdOM4f3RqOH0DWjM8aovt1k67sZp1zMhGBacXWCJkxKRUSqxOm4J5JILeU5ughhRylPlKYT9JmbaEje-29o8bLdgY2-a3EWo7HvONsa34aIcx9sDxHIxjewxyLUtd9CG3H2FbvG_DnrIURoAn718Q2v6-6nHvDIkxfTD77d4hxqM4RLdOZMHeDqOKfo-f5us3gkq6eH5SJbEcuZikRax6WxqXCirKiyJdAqqbQtmVIV46Vm4JxN5kqZhCvOgHFjpSmdnqdQ0UpMETvctX0XQg-u-Oh9s3-lYLQYmxVjs2JsVhyb7Z2bg-MB4B_PUyYEF78c2Wsp</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Data-Driven Injection Attack Against Discrete-Time Intelligent Automation Systems With Slowly Time-Varying Delays</title><source>IEEE Electronic Library (IEL)</source><creator>Gao, Sheng ; Zhang, Hao ; Wang, Zhuping ; Huang, Haohan ; Yan, Huaicheng</creator><creatorcontrib>Gao, Sheng ; Zhang, Hao ; Wang, Zhuping ; Huang, Haohan ; Yan, Huaicheng</creatorcontrib><description>This paper addresses data-driven injection attack against unknown intelligent automation systems (IASs) with slowly time-varying delays, which is a more general but also more challenging to deal with than the model-based real-time systems. Using the control input and system output measurements, several new data-driven injection attack strategies based on compact form dynamic linearization (CFDL) and incremental triangular dynamic linearization (ITDL) are proposed. The attack strategies are more general than the existing ones, taking into account the unknown model parameters and time-varying delays in control-to-actuator as well as sensor-to-controller data transmission channels. Consequently, the new design attack results are anticipated to have wider applicability. Based on the established attack models of CFDL and ITDL, the data-driven optimal parameter estimation algorithms are employed to overcome the difficulty of the unknown model. Furthermore, with the help of the principle of the linear regression equation, the problem of seeking partial derivatives for the attack inputs with time delays is avoided. Several examples are presented to illustrate the validity of the designed attack strategies. Note to Practitioners -The primary objective of this paper is to focus on the cyber security of discrete-time intelligent automation systems from the viewpoint of the attacker, which provides insight into the way of generating attack strategies under the data-driven framework. The majority of the available attack strategies against intelligent automation systems are based on a priori knowledge of the system, without delays or with single-sided fixed time delay, and thus in reality the attack strategies fail or are mostly ineffective due to inaccessibility of the attacked system parameters in conjunction with communication network time delays. This paper synthesizes parameter estimation, dynamic linearization, optimality principle and control theory to propose data-driven injection attack strategies based on CFDL and ITDL, respectively. Compared with the CFDL-based attack strategy, the latter is more applicable in the situation where the attacker suffers from restricted memory space occupation and hashrate. Specifically, the operation of attacker has two phases: eavesdropping estimation and strategy generation. In the eavesdropping estimation phase, the attacker continuously eavesdrops and stores the traffic data of the system for parameter estimation as well as optimizes the estimated parameters. In the strategy generation phase, the attacker generates strategies with the assistance of optimal parameters. Mathematically analytical forms of the proposed two data-driven injection attack strategies are presented in detail. Then, their effectiveness is verified through numerical simulation and experiments based on a leader-following form consisting of five quadcopters, but not tested in production. In the future, we are intending to design the data-driven attack strategies for heterogeneous intelligent automation systems with time-varying delays under the framework of game.</description><identifier>ISSN: 1545-5955</identifier><identifier>EISSN: 1558-3783</identifier><identifier>DOI: 10.1109/TASE.2023.3319828</identifier><identifier>CODEN: ITASC7</identifier><language>eng</language><publisher>IEEE</publisher><subject>compact form dynamic linearization ; Cyberattack ; Data communication ; data-driven injection attack ; Delay effects ; Delays ; incremental triangular dynamic linearization ; Intelligent automation ; Intelligent automation systems ; slowly time-varying delays ; Switches ; Time-varying systems</subject><ispartof>IEEE transactions on automation science and engineering, 2023, p.1-13</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed><orcidid>0000-0001-5496-1809 ; 0000-0003-3694-0021 ; 0000-0002-0334-4082 ; 0000-0002-4527-9610</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10271332$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,778,782,794,4012,27906,27907,27908,54741</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/10271332$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Gao, Sheng</creatorcontrib><creatorcontrib>Zhang, Hao</creatorcontrib><creatorcontrib>Wang, Zhuping</creatorcontrib><creatorcontrib>Huang, Haohan</creatorcontrib><creatorcontrib>Yan, Huaicheng</creatorcontrib><title>Data-Driven Injection Attack Against Discrete-Time Intelligent Automation Systems With Slowly Time-Varying Delays</title><title>IEEE transactions on automation science and engineering</title><addtitle>TASE</addtitle><description>This paper addresses data-driven injection attack against unknown intelligent automation systems (IASs) with slowly time-varying delays, which is a more general but also more challenging to deal with than the model-based real-time systems. Using the control input and system output measurements, several new data-driven injection attack strategies based on compact form dynamic linearization (CFDL) and incremental triangular dynamic linearization (ITDL) are proposed. The attack strategies are more general than the existing ones, taking into account the unknown model parameters and time-varying delays in control-to-actuator as well as sensor-to-controller data transmission channels. Consequently, the new design attack results are anticipated to have wider applicability. Based on the established attack models of CFDL and ITDL, the data-driven optimal parameter estimation algorithms are employed to overcome the difficulty of the unknown model. Furthermore, with the help of the principle of the linear regression equation, the problem of seeking partial derivatives for the attack inputs with time delays is avoided. Several examples are presented to illustrate the validity of the designed attack strategies. Note to Practitioners -The primary objective of this paper is to focus on the cyber security of discrete-time intelligent automation systems from the viewpoint of the attacker, which provides insight into the way of generating attack strategies under the data-driven framework. The majority of the available attack strategies against intelligent automation systems are based on a priori knowledge of the system, without delays or with single-sided fixed time delay, and thus in reality the attack strategies fail or are mostly ineffective due to inaccessibility of the attacked system parameters in conjunction with communication network time delays. This paper synthesizes parameter estimation, dynamic linearization, optimality principle and control theory to propose data-driven injection attack strategies based on CFDL and ITDL, respectively. Compared with the CFDL-based attack strategy, the latter is more applicable in the situation where the attacker suffers from restricted memory space occupation and hashrate. Specifically, the operation of attacker has two phases: eavesdropping estimation and strategy generation. In the eavesdropping estimation phase, the attacker continuously eavesdrops and stores the traffic data of the system for parameter estimation as well as optimizes the estimated parameters. In the strategy generation phase, the attacker generates strategies with the assistance of optimal parameters. Mathematically analytical forms of the proposed two data-driven injection attack strategies are presented in detail. Then, their effectiveness is verified through numerical simulation and experiments based on a leader-following form consisting of five quadcopters, but not tested in production. In the future, we are intending to design the data-driven attack strategies for heterogeneous intelligent automation systems with time-varying delays under the framework of game.</description><subject>compact form dynamic linearization</subject><subject>Cyberattack</subject><subject>Data communication</subject><subject>data-driven injection attack</subject><subject>Delay effects</subject><subject>Delays</subject><subject>incremental triangular dynamic linearization</subject><subject>Intelligent automation</subject><subject>Intelligent automation systems</subject><subject>slowly time-varying delays</subject><subject>Switches</subject><subject>Time-varying systems</subject><issn>1545-5955</issn><issn>1558-3783</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpNkMlOwzAQQC0EEqXwAUgc_AMuXuLGPkYNS6VKHFrgGDnOuLhkgdiA8vc0tAdOM4f3RqOH0DWjM8aovt1k67sZp1zMhGBacXWCJkxKRUSqxOm4J5JILeU5ughhRylPlKYT9JmbaEje-29o8bLdgY2-a3EWo7HvONsa34aIcx9sDxHIxjewxyLUtd9CG3H2FbvG_DnrIURoAn718Q2v6-6nHvDIkxfTD77d4hxqM4RLdOZMHeDqOKfo-f5us3gkq6eH5SJbEcuZikRax6WxqXCirKiyJdAqqbQtmVIV46Vm4JxN5kqZhCvOgHFjpSmdnqdQ0UpMETvctX0XQg-u-Oh9s3-lYLQYmxVjs2JsVhyb7Z2bg-MB4B_PUyYEF78c2Wsp</recordid><startdate>2023</startdate><enddate>2023</enddate><creator>Gao, Sheng</creator><creator>Zhang, Hao</creator><creator>Wang, Zhuping</creator><creator>Huang, Haohan</creator><creator>Yan, Huaicheng</creator><general>IEEE</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0001-5496-1809</orcidid><orcidid>https://orcid.org/0000-0003-3694-0021</orcidid><orcidid>https://orcid.org/0000-0002-0334-4082</orcidid><orcidid>https://orcid.org/0000-0002-4527-9610</orcidid></search><sort><creationdate>2023</creationdate><title>Data-Driven Injection Attack Against Discrete-Time Intelligent Automation Systems With Slowly Time-Varying Delays</title><author>Gao, Sheng ; Zhang, Hao ; Wang, Zhuping ; Huang, Haohan ; Yan, Huaicheng</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c218t-5cf25ac73f3bd08cbe0d4d9cb188d12b91effc4688a42821e12ac5abf967ed0d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>compact form dynamic linearization</topic><topic>Cyberattack</topic><topic>Data communication</topic><topic>data-driven injection attack</topic><topic>Delay effects</topic><topic>Delays</topic><topic>incremental triangular dynamic linearization</topic><topic>Intelligent automation</topic><topic>Intelligent automation systems</topic><topic>slowly time-varying delays</topic><topic>Switches</topic><topic>Time-varying systems</topic><toplevel>online_resources</toplevel><creatorcontrib>Gao, Sheng</creatorcontrib><creatorcontrib>Zhang, Hao</creatorcontrib><creatorcontrib>Wang, Zhuping</creatorcontrib><creatorcontrib>Huang, Haohan</creatorcontrib><creatorcontrib>Yan, Huaicheng</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><jtitle>IEEE transactions on automation science and engineering</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Gao, Sheng</au><au>Zhang, Hao</au><au>Wang, Zhuping</au><au>Huang, Haohan</au><au>Yan, Huaicheng</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Data-Driven Injection Attack Against Discrete-Time Intelligent Automation Systems With Slowly Time-Varying Delays</atitle><jtitle>IEEE transactions on automation science and engineering</jtitle><stitle>TASE</stitle><date>2023</date><risdate>2023</risdate><spage>1</spage><epage>13</epage><pages>1-13</pages><issn>1545-5955</issn><eissn>1558-3783</eissn><coden>ITASC7</coden><abstract>This paper addresses data-driven injection attack against unknown intelligent automation systems (IASs) with slowly time-varying delays, which is a more general but also more challenging to deal with than the model-based real-time systems. Using the control input and system output measurements, several new data-driven injection attack strategies based on compact form dynamic linearization (CFDL) and incremental triangular dynamic linearization (ITDL) are proposed. The attack strategies are more general than the existing ones, taking into account the unknown model parameters and time-varying delays in control-to-actuator as well as sensor-to-controller data transmission channels. Consequently, the new design attack results are anticipated to have wider applicability. Based on the established attack models of CFDL and ITDL, the data-driven optimal parameter estimation algorithms are employed to overcome the difficulty of the unknown model. Furthermore, with the help of the principle of the linear regression equation, the problem of seeking partial derivatives for the attack inputs with time delays is avoided. Several examples are presented to illustrate the validity of the designed attack strategies. Note to Practitioners -The primary objective of this paper is to focus on the cyber security of discrete-time intelligent automation systems from the viewpoint of the attacker, which provides insight into the way of generating attack strategies under the data-driven framework. The majority of the available attack strategies against intelligent automation systems are based on a priori knowledge of the system, without delays or with single-sided fixed time delay, and thus in reality the attack strategies fail or are mostly ineffective due to inaccessibility of the attacked system parameters in conjunction with communication network time delays. This paper synthesizes parameter estimation, dynamic linearization, optimality principle and control theory to propose data-driven injection attack strategies based on CFDL and ITDL, respectively. Compared with the CFDL-based attack strategy, the latter is more applicable in the situation where the attacker suffers from restricted memory space occupation and hashrate. Specifically, the operation of attacker has two phases: eavesdropping estimation and strategy generation. In the eavesdropping estimation phase, the attacker continuously eavesdrops and stores the traffic data of the system for parameter estimation as well as optimizes the estimated parameters. In the strategy generation phase, the attacker generates strategies with the assistance of optimal parameters. Mathematically analytical forms of the proposed two data-driven injection attack strategies are presented in detail. Then, their effectiveness is verified through numerical simulation and experiments based on a leader-following form consisting of five quadcopters, but not tested in production. In the future, we are intending to design the data-driven attack strategies for heterogeneous intelligent automation systems with time-varying delays under the framework of game.</abstract><pub>IEEE</pub><doi>10.1109/TASE.2023.3319828</doi><tpages>13</tpages><orcidid>https://orcid.org/0000-0001-5496-1809</orcidid><orcidid>https://orcid.org/0000-0003-3694-0021</orcidid><orcidid>https://orcid.org/0000-0002-0334-4082</orcidid><orcidid>https://orcid.org/0000-0002-4527-9610</orcidid></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1545-5955 |
ispartof | IEEE transactions on automation science and engineering, 2023, p.1-13 |
issn | 1545-5955 1558-3783 |
language | eng |
recordid | cdi_ieee_primary_10271332 |
source | IEEE Electronic Library (IEL) |
subjects | compact form dynamic linearization Cyberattack Data communication data-driven injection attack Delay effects Delays incremental triangular dynamic linearization Intelligent automation Intelligent automation systems slowly time-varying delays Switches Time-varying systems |
title | Data-Driven Injection Attack Against Discrete-Time Intelligent Automation Systems With Slowly Time-Varying Delays |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-16T19%3A54%3A07IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Data-Driven%20Injection%20Attack%20Against%20Discrete-Time%20Intelligent%20Automation%20Systems%20With%20Slowly%20Time-Varying%20Delays&rft.jtitle=IEEE%20transactions%20on%20automation%20science%20and%20engineering&rft.au=Gao,%20Sheng&rft.date=2023&rft.spage=1&rft.epage=13&rft.pages=1-13&rft.issn=1545-5955&rft.eissn=1558-3783&rft.coden=ITASC7&rft_id=info:doi/10.1109/TASE.2023.3319828&rft_dat=%3Ccrossref_RIE%3E10_1109_TASE_2023_3319828%3C/crossref_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=10271332&rfr_iscdi=true |