menu_book Explore the article's raw data

Stealthiness Analysis of the Identified Model-Based Covert Attacks With Unknown Model

Abstract

Most existing covert attacks are achieved based on a known model, which is, however, impractical for the attacker, leading to the failure of covert attacks. To solve this problem, this article presents a novel covert attack method with an unknown model. First, the negative correlation between the model errors and the stealthiness of traditional covert attacks (TCAs) is quantitatively analyzed, where bigger errors bring worse stealthiness. Second, the subspace identification method is used to obtain the identified model of the plant. Furthermore, a novel identification and adaptive compensation-based covert attacks (IACCAs) method is proposed, which can adaptively compensate the attack signals by adaptive law. Although the identification errors exist, the stealthiness of IACCAs is proven to be similar to TCAs with a known model. Finally, experimental results demonstrate the feasibility and effectiveness of the proposed IACCAs method, which can achieve covert attacks with an unknown model.

article Article
date_range 2024
language English
link Link of the paper
format_quote
Sorry! There is no raw data available for this article.
Loading references...
Loading citations...
Featured Keywords

Adaptive compensation
covert attacks
identification
networked control systems (NCSs)
Citations by Year

Share Your Research Data, Enhance Academic Impact