Next Article in Journal
Assessment and Influencing Factor Analysis of Multi-Type Load Acceptance Capacity of Active Distribution Network
Previous Article in Journal
A Novel Hybrid Model Combining LMD, MSCA, and SCINet for Electricity Forecasting
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Optimal Innovation-Based Deception Attacks on Multi-Channel Cyber–Physical Systems

1
School of Information Science and Engineering (School of Cyber Science and Technology), Zhejiang Sci-Tech University, Hangzhou 310018, China
2
School of Computer Science and Technology (School of Artificial Intelligence), Zhejiang Sci-Tech University, Hangzhou 310018, China
*
Author to whom correspondence should be addressed.
Electronics 2025, 14(8), 1569; https://doi.org/10.3390/electronics14081569
Submission received: 28 February 2025 / Revised: 5 April 2025 / Accepted: 11 April 2025 / Published: 12 April 2025
(This article belongs to the Section Systems & Control Engineering)

Abstract

:
This article addresses the optimal scheduling problem for linear deception attacks in multi-channel cyber–physical systems. The scenario where the attacker can only attack part of the channels due to energy constraints is considered. The effectiveness and stealthiness of attacks are quantified using state estimation error and Kullback–Leibler divergence, respectively. Unlike existing strategies relying on zero-mean Gaussian distributions, we propose a generalized attack model with Gaussian distributions characterized by time-varying means. Based on this model, an optimal stealthy attack strategy is designed to maximize remote estimation error while ensuring stealthiness. By analyzing correlations among variables in the objective function, the solution is decomposed into a semi-definite programming problem and a 0–1 programming problem. This approach yields the modified innovation and an attack scheduling matrix. Finally, numerical simulations validate the theoretical results.

1. Introduction

Cyber–physical systems (CPSs) seamlessly merge computational processes with physical components via real-time networked communication, thereby achieving coordinated collection, processing, and exchange of information [1]. These systems have demonstrated broad applicability across diverse domains [2,3], including vehicle platooning [4], smart grid management [5], and healthcare systems [6]. However, cyberattacks targeting communication channels can destabilize CPSs by compromising their operational integrity. Notable cybersecurity incidents, such as the Stuxnet virus [7] and the Maroochy water services breach [8], further highlight these vulnerabilities. Consequently, the security of CPSs has become a critical research focus.
Attack detection schemes are predominantly categorized into knowledge-driven and data-driven methodologies [9]. Among knowledge-driven systems, residual-based statistical methods stand out as one of the most representative detection strategies. Common implementations include the Chi-square ( χ 2 ) detector, Euclidean detector, Kullback–Leibler divergence (KLD) detector and so on. The core principle involves generating a residual sequence by comparing sensor measurements with system estimations, followed by evaluating this residual against predefined thresholds to identify potential attacks. For data-driven approaches, machine learning (ML) and deep learning (DL) techniques are employed to model behavioral patterns in CPS. Attacks are flagged when significant deviations arise between observed data and model-predicted associations. ML algorithms, such as support vector machines (SVM), logistic regression, naïve Bayes, K-means clustering, and decision trees, utilize training data to achieve sophisticated pattern-matching capabilities. Notably, Aldallal et al. proposed a hybrid intrusion detection model that synergistically integrates the classification precision of the SVM with the global optimization capability of the genetic algorithm (GA) [10]. By employing a novel fitness function to optimize accuracy evaluation in cloud computing environments, this methodology not only addresses cloud attack detection challenges but also maintains adaptability to evolving dynamic threats.
Existing research mainly categorizes cyberattacks into two classes: denial-of-service (DoS) and deception attacks. Network communication is blocked in DoS attacks, thereby preventing sensors or actuators from obtaining valid data [11,12]. However, if defensive mechanisms reject transmitted data packets, the attack can be readily detected, thereby minimizing its impact on system performance [13,14,15]. Deception attacks are intentionally crafted by adversaries to intercept and modify in-transit data while maintaining stealthiness, thereby degrading system performance. A seminal study on power grid state estimation first introduced the concept of false data injection (FDI) attacks [16]. Attackers can arbitrarily manipulate state estimation results through two strategies: restricting access to measurement devices or exploiting resource constraints to compromise them. To evade detection by the χ 2 detector, Guo et al. developed a strictly stealthy attack that preserves identical statistical characteristics before and after the attack [17]. Based on this, Ren et al. proposed an enhanced strictly stealthy attack strategy that incorporates all available historical innovation data [18]. However, deception attacks against χ 2 detectors constitute a class of highly stealth attacks. Such attacks can be effectively identified through KLD detectors with properly configured thresholds. Yang et al. devised a fully stealthy attack strategy for CPSs with KLD detectors, eliminating the impact of attacks on innovation [19]. Recent studies have widely adopted KLD as a metric to quantify attack stealthiness in CPSs across diverse detector architectures. An ϵ -stealth attack strategy balancing a fixed stealthiness level and maximizing estimating performance loss was developed in [20]. A novel linear attack strategy grounded in innovation was proposed in [21], where the KLD between the original innovation and the modified innovation was employed as a measure of attack stealthiness. The attack strategy sacrifices certain stealth in exchange for improved attack performance. Different from the linear attack strategy that required a zero-mean Gaussian distribution [21], an attack scheme based on the innovation of time-invariant mean Gaussian distribution was proposed in [22].
While the aforementioned studies predominantly address deception attacks in single communication channels, the security of multi-channel systems has emerged as a critical research focus. In [23], a game-theoretic framework was employed to analyze resource allocation strategies for defenders and deception attackers in multi-channel systems. In [24], optimal deception attacks were proposed for systems equipped with χ 2 detectors. These attack strategies utilized KLD as a stealthiness metric and were designed to meet both strict and relaxed stealthiness criteria. In [25,26], multi-channel systems with fixed attack locations across different time steps were considered, a limitation that significantly reduced the practicality of the proposed strategies. Recently, in [27], under the constraint that the KLD value did not exceed the preset threshold, the real energy constraint of the attacker was considered, which limited the attacker to targeting only some of the channels at each time step. In this way, the switching location attack strategy was optimized. In [28], innovations from different channels were linearly combined to derive the remote estimation error. Multi-channel attacks are inherently more complex than their single-channel counterparts, as attack parameters and scheduling variables need to be carefully balanced to maximize remote estimation error. However, these attack strategies have two limitations: (1) The attack model follows a Gaussian distribution with a fixed mean. (2) The objective function focuses on maximizing the estimation error at a specific time step.
Inspired by this, a linear deception attack model based on a Gaussian distribution with a time-varying mean is established, and the optimal attack scheduling under the attacker’s energy constraints is investigated, with KLD utilized as an indicator of attack stealth. To effectively degrade the estimation effect of the system, the optimal stealthy attack scheme is required to maximize the cumulative estimation error during the attack period while maintaining the stealthiness of the attack. The primary contributions of this study are summarized as follows:
  • This paper introduces the cumulative estimation error over a finite time horizon as a metric to quantify the impact of attacks on the estimation performance degradation of multi-channel CPSs. This method is more complex and more reasonable, as it accounts for the remote estimation error over the entire attack duration rather than at a specific time point.
  • An attack model based on the Gaussian distribution with a time-varying mean is proposed. Based on this model, the optimal attack strategy for multi-channel systems is investigated. This approach is more general and more complicated as it introduces more decision variables.
  • The time-varying covariance of the modified innovation results in a significant increase in estimation error. An algorithm for generating optimal stealthy attacks is proposed, enabling offline calculation of attack scheduling to alleviate the pressure of online calculation.
The rest of the article is constructed as follows. Section 2 reviews the related work in this area. Section 3 considers the system structure and the modeling of the research problem. The key findings and the proposed attack scheme are presented in Section 4. Section 5 simulates relevant theorems. Finally, the paper is summarized in Section 6.

2. Related Work

In this section, we provide a concise summary of recent advances in innovation-based deception attack strategies, including their current research status and application scenarios.

2.1. Research Status

In the previous work [21], the innovation-driven attack model under single-channel CPS was explored to maximize the system estimation error at each moment. In  [22], a Gaussian attack strategy with time-invariant mean was proposed to maximize the cumulative estimation error over finite-time horizons. On this basis, in [27,28], the architecture was extended to multi-channel CPSs, and the attack strategies were investigated to maximize the terminal estimation error under energy constraint. A critical limitation arises from the proposed attack strategies’ lack of generality, stemming from their fundamental reliance on constant-mean Gaussian distribution assumptions. Since the attacker has knowledge of the attack’s start and end times, it is reasonable that the objective shifts from maximizing the estimation error at specific time steps to maximizing the cumulative estimation error throughout the attack duration. Nevertheless, the formulation of optimal attack scheduling under this objective has not been addressed in the existing literature. A comprehensive synopsis of the comparison among related works is presented in Table 1.

2.2. Application Scenarios

To enhance the applicability of the attack strategy, discussions are provided for several classic CPS scenarios:
  • Smart Grid: The proposed optimal attack scheduling can degrade state estimation accuracy by disrupting multi-channel measurement consistency. For wide-area measurement systems (WAMS) with high-frequency sampling, the attack strategy requires further optimization of temporal window parameters to evade dynamic residual-based detection mechanisms.
  • SCADA Systems: The periodic data transmission characteristics of protocols (e.g., Modbus, DNP3) necessitate synchronization between attack scheduling and data update cycles. While the energy constraint model aligns with resource limitations of attackers in industrial control systems (ICS), additional considerations must address the latency sensitivity of real-time control loops.
  • Vehicle-to-Everything (V2X) Networks: The strategy can extend to multi-vehicle cooperative attack scenarios. By switching attack channels among different vehicles, it disrupts collaborative perception algorithms in traffic flow while leveraging the time-varying mean model to bypass location-correlation-based detection.
This analysis demonstrates the adaptability of the framework across CPS architectures, with scenario-specific parameter tuning ensuring compatibility with domain-specific communication protocols and defense mechanisms.

3. System Framework and Problem Formulation

This paper studies a CPS with m channels, as illustrated in Figure 1. Each sensor is capable of measuring the state of the relevant process and calculating the corresponding innovation, which is then transmitted to the remote estimator via the associated wireless communication channel. The attackers attempt to intercept and forge transmitted innovation signals, deliberately inducing deviations in state estimation while maintaining stealth characteristics against anomaly detectors. The detailed design of each physical component will be described in the following text.

3.1. Process Model

H = { 1 , 2 , . . . , m } is used to represent the index set of sensors. A linear discrete-time process is considered, and the specific model is described as
x k + 1 = A x k + w k ,
y k ( i ) = C ( i ) x k + v k ( i ) ,
where i H , k N is the time step index. x k R l signifies the state of the process at time k. y k ( i ) R n i shows the measurement of sensor i at time k. A R l × l and C ( i ) R n i × l are the system matrix and measurement matrix, respectively. w k and v k ( i ) are Gaussian noises with covariances Q 0 and R ( i ) 0 , respectively. For any time k, the initial state x 0 satisfies x 0 N ( 0 , Π 0 ) , and is independent of w k and v k ( i ) .

3.2. State Estimator

The local sensor first transforms the measurement data into an innovation and then transmits it to the remote estimator via the wireless channel. The remote estimators employ Kalman filters (KFs) to estimate the system state by
x ^ k ( i ) = A x ^ k 1 ( i ) ,
P k ( i ) = A P k 1 ( i ) A T + Q ,
G k ( i ) = P k ( i ) C ( i ) T C ( i ) P k ( i ) C ( i ) T + R ( i ) 1 ,
x ^ k ( i ) = x ^ k ( i ) + G k ( i ) y k ( i ) C ( i ) x ^ k ( i ) ,
P k ( i ) = I G k ( i ) C ( i ) P k ( i ) ,
where x ^ k ( i ) and x ^ k ( i ) are the priori and posteriori minimum mean square error (MMSE) estimates of state x k given by the remote estimator, respectively. P k ( i ) and P k ( i ) are relevant error covariances, which are expressed as follows:
P k ( i ) E x k x ^ k ( i ) x k x ^ k ( i ) T ,
P k ( i ) E x k x ^ k ( i ) x k x ^ k ( i ) T .
The iteration starts from x ^ 0 ( i ) = 0 and P 0 ( i ) = Π 0 . Under the premise that the pair ( A , C ( i ) ) is detectable and ( A , Q ) is stabilizable, the KF will be asymptotically stable for any initial error covariance [29]. The error covariance of the steady state is expressed as P ¯ ( i ) lim k P k ( i ) and the fixed gain is G ¯ ( i ) P ¯ ( i ) C ( i ) T Σ ( i ) 1 . The local innovation z k ( i ) is a zero-mean i.i.d. Gaussian variable with covariance Σ ( i ) = ( C ( i ) P ¯ ( i ) C ( i ) T + R ( i ) ) , calculated by the sensor i from z k ( i ) = y k ( i ) C ( i ) x ^ k ( i ) .
Remark 1.
Compared with traditional sensors [30], intelligent sensors enhance computational precision and enable efficient transmission. The decision to transmit the innovation z k ( i ) to the remote estimator, instead of x ^ k ( i ) or y k ( i ) , stems from the more stable statistical properties of z k ( i ) . This stability facilitates the detector’s ability to identify whether an attack has modified the innovation.

3.3. Detector and Stealthiness Condition

A detector is needed at the remote end to detect network attacks by checking the statistical properties of the transmitted innovation. We assume that using the well-known χ 2 detector as the false data detector. This detector evaluates the statistical properties of the innovation sequence via the following function:
h ( z k ( i ) ) = z k ( i ) T Σ ( i ) 1 z k ( i ) ,
where Σ ( i ) denotes the covariance matrix of the innovation z k ( i ) , and h ( z k ( i ) ) follows the χ 2 distribution with n i degrees of freedom. The alarm will be triggered if the statistic exceeds a predefined threshold.
Similar to the stealth evaluation criteria established in [31,32], the KLD between the original sequence and the modified sequence is used as the core stealth metric to strictly quantify the stealth characteristics of the attack. For two Gaussian-distributed variables, the KLD is defined as follows.
Definition 1
(KLD). The KLD quantifies the discrepancy between two probability distributions. Let α and β be characterized by their probability density functions f α and f β , respectively. The KLD from α to β is formally defined as
D ( α β ) = + log f α ( γ ) f β ( γ ) f α ( γ ) d γ .
In particular, if α and β are n-dimensional Gaussian random variables distributed as α N ( μ α , Σ α ) and β N ( μ β , Σ β ) , respectively, (11) reduces to
D ( α β ) = 1 2 ( log | Σ β | | Σ α | n + Tr Σ β 1 Σ α + μ β μ α T Σ β 1 μ β μ α ) .
A smaller difference between the two distributions results in a lower KLD value. Notably, D ( α β ) = 0 if f α = f β .
Definition 2
(Stealthiness Condition). For an arbitrary channel i, the attacker must ensure statistical similarity between the modified and original innovations to avoid triggering the detector’s alarm. Therefore, the stealthiness condition for the attack is given by
D ( z ˜ k ( i ) z k ( i ) ) δ ,
where z ˜ k ( i ) is the innovation collected on the remote end, and δ is the threshold.
Remark 2.
Since the threshold satisfies δ > 0 , the attack is not strictly stealthy [20,21]. In this circumstance, stealthiness has to be compromised to tolerate a larger estimation error. Subsequently, the condition for strict stealthiness was thoroughly investigated in  [19].

3.4. Energy Restriction

Definition 3.
Unlike attackers considered in [11,23], who have sufficient energy to manipulate all communication channels, this paper takes into account the actual energy constraint, so that the attacker can only attack a subset of communication channels at each time step. The number of channels targeted for attack at each step is restricted, whereas the location of the attack is random. The specific energy constraint is as follows:
i = 1 m φ k ( i ) σ k ,
φ k ( i ) = 1 if the attacker attacks at time k , 0 otherwise . ,
where σ k is the maximum number of channels that are attacked at time k. Moreover, the start time of the attack is k = 0 and the end time is k = k ˇ .

3.5. Problem Formulation

First, some assumptions about the malicious attacker are given to facilitate the subsequent analysis of the attack strategy.
Assumption 1.
During data transmission, the attacker can intercept and tamper with the transmitted data.
Assumption 2.
The attacker possesses full knowledge of the system parameters G ¯ ( i ) , A, C ( i ) , Q, and R ( i ) .
Assumption 3.
The attack is launched after the system enters the steady state, where x ˜ 0 ( i ) = x ^ 0 ( i ) and E [ ( x 0 x ˜ 0 ( i ) ) ( x 0 x ˜ 0 ( i ) ) T ] = P ¯ ( i ) .
During wireless transmission of the innovation, the attacker may intercept and tamper with the original data z k ( i ) , changing it to z k a ( i ) . Consequently, the recursion formula when the remote side is attacked becomes
x ˜ k ( i ) = A x ˜ k 1 ( i ) ,
x ˜ k ( i ) = x ˜ k ( i ) + G ¯ ( i ) z ˜ k ( i ) ,
z ˜ k ( i ) = φ k ( i ) z k a ( i ) + ( 1 φ k ( i ) ) z k ( i ) .
where x ˜ k ( i ) and x ˜ k ( i ) are the priori and posteriori MMSE estimates under remote attacks, respectively. When φ k ( i ) = 1 , the local innovation z k ( i ) is tampered with the attack signal z k a ( i ) and the remote estimator obtains an innovation of z ˜ k ( i ) . Moreover, the error covariance of the remote estimator is P ˜ k ( i ) E [ ( x k x ˜ k ( i ) ) ( x k x ˜ k ( i ) ) T ] .
Unlike strategies focused on maximizing the terminal estimation error covariance [27], the attacker seeks to maximize the cumulative estimation error over a finite time horizon while maintaining attack stealthiness. This objective is formally expressed as the following constrained optimization problem:
max z ˜ k ( i ) , φ k ( i ) J = i = 1 m ζ ( i ) k = 0 k ˇ Tr ( P ˜ k ( i ) ) , s . t . D ( z ˜ k ( i ) z k ( i ) ) δ , i = 1 m φ k ( i ) σ k , k [ 0 , k ˇ ] ,
where ζ ( i ) is the weight coefficient assigned by the attacker to remote estimator i. In multi-channel CPSs, the total system estimation error J is formulated as a weighted sum of the cumulative estimation errors from all remote estimators over the time horizon [ 0 , k ˇ ] .
Remark 3.
In contrast to the attack strategy in [21], the attacker knows when to start and end attacks. For each estimator i H , the goal of the attacker is to maximize the sum of Tr ( P ˜ k ( i ) ) within a finite time horizon rather than the trace of the estimated error covariance at each time. This approach is more reasonable.

4. Optimal Attack Design

This section presents an optimal attack scheme designed to maximize the remote estimation error while maintaining stealth under energy constraints. By leveraging a Gaussian attack model with a time-varying mean, we first derive the total estimation error over the attack period. Subsequently, structural analysis of the estimation error enables the reformulation of the original non-convex optimization problem (19) into a semidefinite programming (SDP) problem and a 0-1 programming problem. Lastly, a proposed algorithm outlines the execution process for the optimal attack strategy employed by the attacker.

4.1. Attack Model

When the channel i is attacked, the original innovation is transformed by the attacker into z k a ( i ) , whose formula is given by
z k a ( i ) = T k ( i ) z k ( i ) + b k ( i ) ,
where T k ( i ) R n i × n i is an attack matrix. The term b k ( i ) denotes a Gaussian random variable with b k ( i ) N ( μ k ( i ) , ξ k ( i ) ) and is independent of z k ( i ) . Moreover, it is shown that z k a ( i ) follows a Gaussian distribution with z k a ( i ) N ( μ k ( i ) , Σ ˜ k ( i ) ) . Under this attack model, (18) can be rewritten as
z ˜ k ( i ) = φ k ( i ) T k ( i ) z k ( i ) + b k ( i ) + 1 φ k ( i ) z k ( i ) .

4.2. Attack Strategy Formulation

Under the Gaussian attack model with a time-varying mean, an optimal attack scheme is proposed. This scheme aims to maximize the total estimation error over a finite time period while satisfying stealthiness constraints.
To analyze the estimation performance of the remote estimator, the iterative formula for the estimation error of the corresponding remote estimator is derived.
Lemma 1.
For the attack model in (20), the estimation error of estimator i over k [ 0 , k ˇ ] satisfies
P ˜ k ( i ) = A P ˜ k 1 ( i ) A T + Q + ( 1 φ k ( i ) ) ( G ¯ ( i ) Σ ( i ) G ¯ ( i ) T G ¯ ( i ) C ( i ) P ¯ ( i ) P ¯ ( i ) C ( i ) T G ¯ ( i ) T ) + φ k ( i ) ( G ¯ ( i ) Σ ˜ k ( i ) G ¯ ( i ) T + G ¯ ( i ) μ k ( i ) μ k ( i ) T G ¯ ( i ) T G ¯ ( i ) T k ( i ) C ( i ) P ¯ ( i ) + t = 0 k 1 G ¯ ( i ) μ k ( i ) μ k ( i ) T G ¯ ( i ) T A ( t + 1 ) T P ¯ ( i ) C ( i ) T T k ( i ) T G ¯ ( i ) T + t = 0 k 1 A ( t + 1 ) G ¯ ( i ) μ k ( i ) μ k ( i ) T G ¯ ( i ) T ) .
Proof of Lemma 1.
First, based on Equation (25) provided in [27], the key expression is
P ˜ k ( i ) = A P ˜ k 1 ( i ) A T + Q + φ k ( i ) E [ G ¯ ( i ) z k a ( i ) z k a ( i ) T G ¯ ( i ) T ] φ k ( i ) E [ G ¯ ( i ) z k a ( i ) ( x k x ˜ k ( i ) ) T ] φ k ( i ) E [ ( x k x ˜ k ( i ) ) z k a ( i ) T G ¯ ( i ) T ] + ( 1 φ k ( i ) ) E [ G ¯ ( i ) z k ( i ) z k ( i ) T G ¯ ( i ) T ] ( 1 φ k ( i ) ) E [ G ¯ ( i ) z k ( i ) ( x k x ˜ k ( i ) ) T ] ( 1 φ k ( i ) ) E [ ( x k x ˜ k ( i ) ) z k ( i ) T G ¯ ( i ) T ] ,
According to Lemma 4.1 in [22], the following holds:
E [ G ¯ ( i ) z k a ( i ) z k a ( i ) T G ¯ ( i ) T ] = G ¯ ( i ) Σ ˜ k ( i ) G ¯ ( i ) T + G ¯ ( i ) μ k ( i ) μ k ( i ) T G ¯ ( i ) T ,
E [ G ¯ ( i ) z k a ( i ) ( x k x ˜ k ( i ) ) T ] = G ¯ ( i ) T k ( i ) C ( i ) P ¯ ( i ) t = 0 k 1 G ¯ ( i ) μ k ( i ) μ k ( i ) T G ¯ ( i ) T A ( t + 1 ) T ,
E [ ( x k x ˜ k ( i ) ) z k a ( i ) T G ¯ ( i ) T ] = P ¯ ( i ) C ( i ) T T k ( i ) T G ¯ ( i ) T t = 0 k 1 A ( t + 1 ) G ¯ ( i ) μ k ( i ) μ k ( i ) T G ¯ ( i ) T ,
Similarly, following the same approach, we derive
E [ G ¯ ( i ) z k ( i ) z k ( i ) T G ¯ ( i ) T ] = G ¯ ( i ) Σ ( i ) G ¯ ( i ) T ,
E [ G ¯ ( i ) z k ( i ) ( x k x ˜ k ( i ) ) T ] = G ¯ ( i ) C ( i ) P ¯ ( i ) ,
E [ ( x k x ˜ k ( i ) ) z k ( i ) T G ¯ ( i ) T ] = P ¯ ( i ) C ( i ) T G ¯ ( i ) T .
By substituting (24)–(29) into (23), the proof is completed.    □
Remark 4.
Since the proposed attack model follows a Gaussian distribution with a time-varying mean, E [ z m a ( i ) z n a ( i ) T ] 0 and E [ z k a ( i ) z k a ( i ) T ] Σ ˜ k ( i ) hold. Notably, if μ k ( i ) = 0 , the result of Lemma 1 reduces to Lemma 3.1 in [27].
Subsequently, based on Lemma 1, we derive the performance deterioration J for the entire system as follows:
Theorem 1.
For the considered attack model, the performance degradation J across all estimators is given by
J = i = 1 m ζ ( i ) Tr k = 0 k ˇ P ˜ k ( i ) = i = 1 m ζ ( i ) Tr [ r = 0 k ˇ A r P ¯ ( i ) A r T + j = 0 k ˇ 1 r = 0 j A r Q A r T + r = 0 k ˇ k φ k ( i ) A r ( G ¯ ( i ) Σ ˜ k ( i ) G ¯ ( i ) T + G ¯ ( i ) μ k ( i ) μ k ( i ) T G ¯ ( i ) T G ¯ ( i ) T k ( i ) C ( i ) P ¯ ( i ) P ¯ ( i ) C ( i ) T T k ( i ) T G ¯ ( i ) T ) A r T + r = 0 k ˇ k φ k ( i ) ( t = 0 k 1 A ( r + t + 1 ) G ¯ ( i ) μ k ( i ) μ k ( i ) T G ¯ ( i ) T A r T + t = 0 k 1 A r G ¯ ( i ) μ k ( i ) μ k ( i ) T G ¯ ( i ) T A ( r + t + 1 ) T ) + r = 0 k ˇ k ( 1 φ k ( i ) ) A r ( G ¯ ( i ) Σ ( i ) G ¯ ( i ) T G ¯ ( i ) C ( i ) P ¯ ( i ) P ¯ ( i ) C ( i ) T G ¯ ( i ) T ) A r T ] .
Proof of Theorem 1.
Under Assumption 3, the attack is launched after the system enters the steady-state condition. Based on (16)–(18), the initial error covariance is given by
P ˜ 0 ( i ) = E [ ( x 0 x ˜ 0 ( i ) ) ( x 0 x ˜ 0 ( i ) ) T ] = E [ ( x 0 x ˜ 0 ( i ) G ¯ ( i ) z ˜ 0 ( i ) ) ( x 0 x ˜ 0 ( i ) G ¯ ( i ) z ˜ 0 ( i ) ) T ] = P ¯ ( i ) + ( 1 φ 0 ( i ) ) ( G ¯ ( i ) Σ ( i ) G ¯ ( i ) T G ¯ ( i ) C ( i ) P ¯ ( i ) P ¯ ( i ) C ( i ) T G ¯ ( i ) T ) + φ 0 ( i ) ( G ¯ ( i ) Σ ˜ 0 ( i ) G ¯ ( i ) T + G ¯ ( i ) μ 0 ( i ) μ 0 ( i ) T G ¯ ( i ) T G ¯ ( i ) T 0 ( i ) C ( i ) P ¯ ( i ) P ¯ ( i ) C ( i ) T T 0 ( i ) T G ¯ ( i ) T ) ,
For k 1 , according to Lemma 1, P ˜ k ( i ) is rewritten as
P ˜ k ( i ) = A k P ¯ ( i ) A k T + r = 0 k 1 A r Q A r T + r = 0 k ( 1 φ k r ( i ) ) [ A r ( G ¯ ( i ) Σ ( i ) G ¯ ( i ) T G ¯ ( i ) C ( i ) P ¯ ( i ) P ¯ ( i ) C ( i ) T G ¯ ( i ) T ) A r T ] + r = 0 k φ k r ( i ) [ A r ( G ¯ ( i ) Σ ˜ k r ( i ) G ¯ ( i ) T + G ¯ ( i ) μ k r ( i ) μ k r ( i ) T G ¯ ( i ) T G ¯ ( i ) T k r ( i ) C ( i ) P ¯ ( i ) P ¯ ( i ) C ( i ) T T k r ( i ) T G ¯ ( i ) T + t = 0 k r 1 A ( t + 1 ) G ¯ ( i ) μ k r ( i ) μ k r ( i ) T G ¯ ( i ) T + t = 0 k r 1 G ¯ ( i ) μ k r ( i ) μ k r ( i ) T G ¯ ( i ) T A ( t + 1 ) T ) A r T ] ,
Furthermore, the cumulative sum of P ˜ k ( i ) over k [ 0 , k ˇ ] is derived as
k = 0 k ˇ P ˜ k ( i ) = P ˜ 0 ( i ) + P ˜ 1 ( i ) + . . . + P ˜ k ˇ ( i ) = r = 0 k ˇ A r P ¯ ( i ) A r T + j = 0 k ˇ 1 r = 0 j A r Q A r T + j = 0 k ˇ r = 0 j ( 1 φ j r ( i ) ) [ A r ( G ¯ ( i ) Σ ( i ) G ¯ ( i ) T G ¯ ( i ) C ( i ) P ¯ ( i ) P ¯ ( i ) C ( i ) T G ¯ ( i ) T ) A r T ] + j = 0 k ˇ r = 0 j φ j r ( i ) [ A r ( G ¯ ( i ) Σ ˜ j r ( i ) G ¯ ( i ) T + G ¯ ( i ) μ j r ( i ) μ j r ( i ) T G ¯ ( i ) T G ¯ ( i ) T j r ( i ) C ( i ) P ¯ ( i ) P ¯ ( i ) C ( i ) T T j r ( i ) T G ¯ ( i ) T + t = 0 j r 1 A ( t + 1 ) G ¯ ( i ) μ j r ( i ) μ j r ( i ) T G ¯ ( i ) T + t = 0 j r 1 G ¯ ( i ) μ j r ( i ) μ j r ( i ) T G ¯ ( i ) T A ( t + 1 ) T ) A r T ] ,
Combining with the analysis of (33), it follows that J is a function of ζ ( i ) , P ¯ ( i ) , Σ ˜ k ( i ) , μ k ( i ) , T k ( i ) , and φ k ( i ) . Since ζ ( i ) and P ¯ ( i ) are fixed parameters, the remaining optimization variables Σ ˜ k ( i ) , μ k ( i ) , T k ( i ) , and φ k ( i ) are to be determined for maximizing J.
In order to facilitate the subsequent solution of Σ ˜ k ( i ) , μ k ( i ) , T k ( i ) , and φ k ( i ) at each time, (33) is rewritten as
k = 0 k ˇ P ˜ k ( i ) = r = 0 k ˇ A r P ¯ ( i ) A r T + j = 0 k ˇ 1 r = 0 j A r Q A r T + r = 0 k ˇ k φ k ( i ) [ A r ( G ¯ ( i ) Σ ˜ k ( i ) G ¯ ( i ) T + G ¯ ( i ) μ k ( i ) μ k ( i ) T G ¯ ( i ) T G ¯ ( i ) T k ( i ) C ( i ) P ¯ ( i ) P ¯ ( i ) C ( i ) T T k ( i ) T G ¯ ( i ) T ) A r T ] + r = 0 k ˇ k φ k ( i ) [ A r ( t = 0 k 1 A ( t + 1 ) G ¯ ( i ) μ k ( i ) μ k ( i ) T G ¯ ( i ) T ) A r T + A r ( t = 0 k 1 G ¯ ( i ) μ k ( i ) μ k ( i ) T G ¯ ( i ) T A ( t + 1 ) T ) A r T ] + r = 0 k ˇ k ( 1 φ k ( i ) ) A r ( G ¯ ( i ) Σ ( i ) G ¯ ( i ) T G ¯ ( i ) C ( i ) P ¯ ( i ) P ¯ ( i ) C ( i ) T G ¯ ( i ) T ) A r T .
which completes the proof.    □
Remark 5.
To facilitate the determination of parameters Σ ˜ k ( i ) , μ k ( i ) , T k ( i ) , and φ k ( i ) at each time step, (33) is expanded and terms at identical time steps are aggregated, resulting in its transformation into (34).
The distribution analysis of z ˜ k ( i ) in (21) reveals that it is Gaussian-distributed with a time-varying mean. Consequently, the stealthiness condition (13) is formulated as follows:
D ( z ˜ k ( i ) z k ( i ) ) = ( a ) D ( z k a ( i ) z k ( i ) ) = 1 2 log | Σ ( i ) | | Σ ˜ k ( i ) | + Tr ( Σ ( i ) 1 Σ ˜ k ( i ) ) n ( i ) + μ k ( i ) T Σ ( i ) 1 μ k ( i ) ,
where (a) holds due to the fact that D ( z k ( i ) z k ( i ) ) = 0 . Furthermore, by substituting (30) and (35) into (19), the optimization problem is transformed into
max z ˜ k ( i ) , φ k ( i ) J = i = 1 m ζ ( i ) k = 0 k ˇ Tr ( P ˜ k ( i ) ) s . t . 1 2 log | Σ ( i ) | | Σ ˜ k ( i ) | + Tr ( Σ ( i ) 1 Σ ˜ k ( i ) ) n ( i ) + μ k ( i ) T Σ ( i ) 1 μ k ( i ) δ , i = 1 m φ k ( i ) σ k , k [ 0 , k ˇ ] .
Since the optimal attack strategy involves the co-optimization of attack parameters and the scheduling variable, finding a direct solution to (36) is highly challenging. By analyzing the structure of (30), it is found that the scheduling variable φ k ( i ) is not correlated with covariance Σ ˜ k ( i ) , mean μ k ( i ) and the attack matrix T k ( i ) . Consequently, the optimization process of stealthy attacks can be divided into two different stages: solving for the optimal μ k ( i ) , Σ ˜ k ( i ) , T k ( i ) and the scheduling variable φ k ( i ) .
For any φ k ( i ) , according to (30), the problem of solving attack variables μ k ( i ) , Σ ˜ k ( i ) , T k ( i ) of channel i is transformed into
max μ k ( i ) , Σ ˜ k ( i ) , T k ( i ) Tr [ r = 0 k ˇ k ( A r ( G ¯ ( i ) Σ ˜ k ( i ) G ¯ ( i ) T + G ¯ ( i ) μ k ( i ) μ k ( i ) T G ¯ ( i ) T G ¯ ( i ) T k ( i ) C ( i ) P ¯ ( i ) P ¯ ( i ) C ( i ) T T k ( i ) T G ¯ ( i ) T ) A r T + t = 0 k 1 A ( r + t + 1 ) G ¯ ( i ) μ k ( i ) μ k ( i ) T G ¯ ( i ) T A r T + t = 0 k 1 A r G ¯ ( i ) μ k ( i ) μ k ( i ) T G ¯ ( i ) T A ( r + t + 1 ) T ) ] , s . t . 1 2 log | Σ ( i ) | | Σ ˜ k ( i ) | + Tr ( Σ ( i ) 1 Σ ˜ k ( i ) ) n ( i ) + μ k ( i ) T Σ ( i ) 1 μ k ( i ) δ .
First, for any T k ( i ) , the distribution of z k a ( i ) in the worst case is obtained.
Theorem 2.
For any certain T k ( i ) , the solution to the optimal covariance Σ ˜ k ( i ) at time step k is as follows:
Σ ˜ k ( i ) = Σ ( i ) 1 2 η r = 0 k ˇ k G ¯ ( i ) T A r T A r G ¯ ( i ) 1 ,
Let λ m a x represent the maximum eigenvalue of Θ Σ ( i ) , where Θ is defined as follows:
Θ k ( i ) = 2 r = 0 k ˇ k t = 0 k 1 ( G ¯ ( i ) T A r T A ( r + t + 1 ) G ¯ ( i ) + G ¯ ( i ) T A ( r + t + 1 ) T A r G ¯ ( i ) ) + 2 r = 0 k ˇ k G ¯ ( i ) T A r T A r G ¯ ( i ) ,
and η can be obtained according to the following two situations.
(i) If λ m a x 0 , the innovation z k a ( i ) follows a Gaussian distribution with zero-mean, and η is given by
2 δ + n ( i ) = τ = 1 n ( i ) log ( 1 2 η λ τ ) + 1 1 2 η λ τ ,
where λ τ denotes the eigenvalue of r = 0 k ˇ k G ¯ ( i ) T A r T A r G ¯ ( i ) Σ ( i ) .
(ii) If λ m a x > 0 and Θ k ( i ) Σ ( i ) possesses q positive eigenvalues, the optimal η and μ k ( i ) are as follows:
( η , μ k ( i ) ) = arg max λ i , α i J { ( Σ ˜ k ( i ) ( λ 1 ) , α 1 ) , , ( Σ ˜ k ( i ) ( λ q ) , α q ) , ( Σ ˜ k ( i ) ( λ 0 ) , 0 ) } .
where λ i is the positive eigenvalue and α i is the corresponding eigenvector of Θ k ( i ) Σ ( i ) . Moreover, λ 0 is the solution of (40).
Proof of Theorem  2.
For any T k ( i ) , the solution for obtaining the distribution of z k a ( i ) can be transformed into
min μ k ( i ) , Σ ˜ k ( i ) Tr [ r = 0 k ˇ k ( A r ( G ¯ ( i ) Σ ˜ k ( i ) G ¯ ( i ) T + G ¯ ( i ) μ k ( i ) μ k ( i ) T G ¯ ( i ) T ) A r T + t = 0 k 1 A ( r + t + 1 ) G ¯ ( i ) μ k ( i ) μ k ( i ) T G ¯ ( i ) T A r T + t = 0 k 1 A r G ¯ ( i ) μ k ( i ) μ k ( i ) T G ¯ ( i ) T A ( r + t + 1 ) T ) ] , s . t . 1 2 log | Σ ( i ) | | Σ ˜ k ( i ) | + Tr ( Σ ( i ) 1 Σ ˜ k ( i ) ) n ( i ) + μ k ( i ) T Σ ( i ) 1 μ k ( i ) δ .
Since the fact is that Tr ( M N ) = Tr ( N M ) , (42) is rewritten as a typical convex optimization problem.
min μ k ( i ) , Σ ˜ k ( i ) Tr [ r = 0 k ˇ k ( G ¯ ( i ) T A r T A r G ¯ ( i ) Σ ˜ k ( i ) + μ k ( i ) T G ¯ ( i ) T A r T A r G ¯ ( i ) μ k ( i ) + t = 0 k 1 μ k ( i ) T G ¯ ( i ) T A r T A ( r + t + 1 ) G ¯ ( i ) μ k ( i ) + t = 0 k 1 μ k ( i ) T G ¯ ( i ) T A ( r + t + 1 ) T A r G ¯ ( i ) μ k ( i ) ) ] , s . t . 1 2 log | Σ ( i ) | | Σ ˜ k ( i ) | + Tr ( Σ ( i ) 1 Σ ˜ k ( i ) ) n ( i ) + μ k ( i ) T Σ ( i ) 1 μ k ( i ) δ .
The Lagrangian multiplier η is added to construct the Lagrangian function.
L ( Σ ˜ k ( i ) , μ k ( i ) , η ) = Tr [ r = 0 k ˇ k ( G ¯ ( i ) T A r T A r G ¯ ( i ) Σ ˜ k ( i ) + μ k ( i ) T G ¯ ( i ) T A r T A r G ¯ ( i ) μ k ( i ) + t = 0 k 1 ( μ k ( i ) T G ¯ ( i ) T A r T A ( r + t + 1 ) G ¯ ( i ) μ k ( i ) + μ k ( i ) T G ¯ ( i ) T A ( r + t + 1 ) T A r G ¯ ( i ) μ k ( i ) ) ) ] + η 2 log | Σ ( i ) | | Σ ˜ k ( i ) | + Tr ( Σ ( i ) 1 Σ ˜ k ( i ) ) n ( i ) + μ k ( i ) T Σ ( i ) 1 μ k ( i ) 2 δ ,
where the Lagrangian multiplier η > 0 , and the KKT conditions are given by
L ( Σ ˜ k ( i ) , μ k ( i ) , η ) Σ ˜ k ( i ) = r = 0 k ˇ k G ¯ ( i ) T A r T A r G ¯ ( i ) + η 2 ( Σ ( i ) 1 Σ ˜ k ( i ) 1 ) = 0 ,
L ( Σ ˜ k ( i ) , μ k ( i ) , η ) μ k ( i ) = 2 r = 0 k ˇ k μ k ( i ) T G ¯ ( i ) T A r T A r G ¯ ( i ) 2 r = 0 k ˇ k t = 0 k 1 μ k ( i ) T ( G ¯ ( i ) T A r T A ( r + t + 1 ) G ¯ ( i ) + G ¯ ( i ) T A ( r + t + 1 ) T A r G ¯ ( i ) ) + η μ k ( i ) T Σ ( i ) 1 = μ k ( i ) T Θ k ( i ) + η μ k ( i ) T Σ ( i ) 1 = 0 ,
and
η 2 log | Σ ( i ) | | Σ ˜ k ( i ) | + Tr ( Σ ( i ) 1 Σ ˜ k ( i ) ) n ( i ) + μ k ( i ) T Σ ( i ) 1 μ k ( i ) 2 δ = 0 ,
where
Θ k ( i ) = 2 r = 0 k ˇ k t = 0 k 1 ( G ¯ ( i ) T A r T A ( r + t + 1 ) G ¯ ( i ) + G ¯ ( i ) T A ( r + t + 1 ) T A r G ¯ ( i ) ) + 2 r = 0 k ˇ k G ¯ ( i ) T A r T A r G ¯ ( i ) .
From (45), it can be obtained that
Σ ˜ k ( i ) = Σ ( i ) 1 2 η r = 0 k ˇ k G ¯ ( i ) T A r T A r G ¯ ( i ) 1 .
Based on (46), the mean of the modified innovation is given by
( Θ k ( i ) Σ ( i ) ) T μ k ( i ) = η μ k ( i ) .
Let λ m a x denote the maximum eigenvalue of Θ Σ ( i ) . The solution to the problem is divided into the following two situations.
(i) If λ m a x 0 , it is easy to see that the optimal mean μ k ( i ) is 0 since η > 0 . In other words, the optimal modified innovation follows a Gaussian distribution with a zero mean. According to Theorem 3.3 in reference [27], the unique solution to η can be obtained.
2 δ + n ( i ) = τ = 1 n ( i ) log ( 1 2 η λ τ ) + 1 1 2 η λ τ ,
where λ τ denotes the eigenvalue of r = 0 k ˇ k G ¯ ( i ) T A r T A r G ¯ ( i ) Σ ( i ) .
(ii) If λ m a x > 0 and Θ k ( i ) Σ ( i ) has q positive eigenvalues, it can be seen from (50) that the η is the eigenvalue and the μ k ( i ) is the corresponding eigenvector. Suppose that the positive eigenvalue of Θ k ( i ) Σ ( i ) is λ i ( i [ 1 , . . . , q ] ) , and the corresponding eigenvector is α i ( i [ 1 , . . . , q ] ) . For each pair ( λ i , α i ) , we obtain the related Σ ˜ k ( i ) , μ k ( i ) according to (49), (50) and calculate the corresponding J. The optimal values of η and μ k ( i ) are obtained based on the pair ( λ i , α i ) that maximizes J. Specifically, the optimal η and μ k ( i ) are as follows:
( η , μ k ( i ) ) = arg max λ i , α i J { ( Σ ˜ k ( i ) ( λ 1 ) , α 1 ) , , ( Σ ˜ k ( i ) ( λ q ) , α q ) , ( Σ ˜ k ( i ) ( λ 0 ) , 0 ) } .
where λ 0 is the solution of (51), and the proof is complete.    □
Remark 6.
The optimal attack strategy studied in this paper follows a Gaussian distribution with a time-varying mean, generalizing the zero-mean case in [27]. The solution process introduces additional time-varying parameters, resulting in greater complexity.
Remark 7.
Compared with related works in [21,22], the time-varying covariance Σ ˜ k ( i ) and mean μ k ( i ) lead to additional decision variables in the optimization problem, resulting in a greater remote estimation error.
After obtaining the covariance Σ ˜ k ( i ) and the mean μ k ( i ) , the attack matrix T k ( i ) will be derived.
Theorem 3.
With the covariance Σ ˜ k ( i ) and mean μ k ( i ) of the modified innovation, the optimal attack matrix T k ( i ) can be obtained by solving the following SDP problem using the CVX toolbox in MATLAB (https://www.mathworks.com/products/matlab.html).
min T k ( i ) Tr r = 0 k ˇ k C ( i ) T A r T P ¯ ( i ) P ¯ ( i ) A r C ( i ) Σ ( i ) 1 T k ( i ) , s . t . Σ ˜ k ( i ) T k ( i ) T k ( i ) T Σ ( i ) 1 0 .
Proof of Theorem 3.
The distribution of the attacked innovation can be derived from Theorem 2. Based on the attack mode (20), the constraint becomes T k ( i ) Σ ( i ) T k ( i ) T + ξ k ( i ) = Σ ˜ k ( i ) , which must satisfy the following conditions:
ξ k ( i ) = Σ ˜ k ( i ) T k ( i ) Σ ( i ) T k ( i ) T 0 ,
where ξ k ( i ) is the covariance of b k ( i ) . By combining (54), solving for the optimal T k ( i ) is equivalent to the following constrained optimization problem:
min T k ( i ) Tr r = 0 k ˇ k A r G ¯ ( i ) T k ( i ) C ( i ) P ¯ ( i ) A r T , s . t . Σ ˜ k ( i ) T k ( i ) Σ ( i ) T k ( i ) T 0 .
To proceed, the objective in (55) is reformulated into a standard convex optimization form, and the constraints are transformed using the Schur complement. This completes the proof.    □
After the optimal distribution and attack matrix are obtained, the next step is to solve an integer programming problem to acquire the attack scheduling matrix φ k ( i ) for each k [ 0 , k ˇ ] . The specific details of designing φ k ( i ) are as follows.
Theorem 4.
For each k [ 0 , k ˇ ] , the optimal attack scheduling matrix is derived through the resolution of the 0–1 integer programming problem (56).
min φ k ( i ) i = 1 m ζ ( i ) φ k ( i ) ( Φ k ( i ) Ψ k ( i ) ) , s . t . i = 1 m φ k ( i ) σ k , φ k ( i ) { 0 , 1 } ,
where
Φ k ( i ) = Tr [ r = 0 k ˇ k ( A r ( G ¯ ( i ) Σ ˜ k ( i ) G ¯ ( i ) T + G ¯ ( i ) μ k ( i ) μ k ( i ) T G ¯ ( i ) T G ¯ ( i ) T k ( i ) C ( i ) P ¯ ( i ) P ¯ ( i ) C ( i ) T T k ( i ) T G ¯ ( i ) T ) A r T + t = 0 k 1 A ( r + t + 1 ) G ¯ ( i ) μ k ( i ) μ k ( i ) T G ¯ ( i ) T A r T + t = 0 k 1 A r G ¯ ( i ) μ k ( i ) μ k ( i ) T G ¯ ( i ) T A ( r + t + 1 ) T ) ] ,
Ψ k ( i ) = Tr r = 0 k ˇ k A r ( G ¯ ( i ) Σ ( i ) G ¯ ( i ) T G ¯ ( i ) C ( i ) P ¯ ( i ) P ¯ ( i ) C ( i ) T G ¯ ( i ) T ) A r T .
Proof of Theorem 4.
First, (30) is transformed as follows:
J = i = 1 m ζ ( i ) Tr [ r = 0 k ˇ A r P ¯ ( i ) A r T + j = 0 k ˇ 1 r = 0 j A r Q A r T + r = 0 k ˇ k φ k ( i ) ( A r ( G ¯ ( i ) Σ ˜ k ( i ) G ¯ ( i ) T + G ¯ ( i ) μ k ( i ) μ k ( i ) T G ¯ ( i ) T G ¯ ( i ) T k ( i ) C ( i ) P ¯ ( i ) P ¯ ( i ) C ( i ) T T k ( i ) T G ¯ ( i ) T ) A r T + t = 0 k 1 A ( r + t + 1 ) G ¯ ( i ) μ k ( i ) μ k ( i ) T G ¯ ( i ) T A r T + t = 0 k 1 A r G ¯ ( i ) μ k ( i ) μ k ( i ) T G ¯ ( i ) T A ( r + t + 1 ) T ) + r = 0 k ˇ k ( 1 φ k ( i ) ) A r ( G ¯ ( i ) Σ ( i ) G ¯ ( i ) T G ¯ ( i ) C ( i ) P ¯ ( i ) P ¯ ( i ) C ( i ) T G ¯ ( i ) T ) A r T ] ,
Since the terms Tr ( r = 0 k ˇ A r P ¯ ( i ) A r T + j = 0 k ˇ 1 r = 0 j A r Q A r T ) and Ψ k ( i ) do not depend on φ k ( i ) , the attack scheduling problem reduces to solving the following 0–1 integer programming problem:
max φ k ( i ) i = 1 m ζ ( i ) φ k ( i ) ( Φ k ( i ) Ψ k ( i ) ) , s . t . i = 1 m φ k ( i ) σ k , φ k ( i ) { 0 , 1 } , k [ 0 , k ˇ ] ,
which can be transformed into (56), and the proof is complete.    □
Remark 8.
The distribution and attack matrix of the modified innovation are derived from Theorems 2 and 3. Consequently, Σ ˜ k ( i ) , μ k ( i ) and T k ( i ) become known parameters in (56). Given that the energy constraint limits the number of damaged channels at each time step, the intlinprog function in MATLAB is employed to solve (56).
Finally, by summarizing the above work, an algorithm that can generate the optimal attack is proposed.
Remark 9.
Analysis of Algorithm 1 reveals that in a single-channel scenario, the attacker calculates the optimal attack matrix T k at each time step based on the distribution parameters Σ ˜ k and μ k of the modified innovation, substituting it into z k a = T k z k + b k to alter the original innovation (the derivation of Σ ˜ k , μ k and T k follows Theorems 2 and 3 and is omitted for brevity). In multi-channel scenarios, the attack scheduling matrix φ k ( i ) is precomputed offline. When φ k ( i ) = 1 , online computation is triggered to modify the original innovation to z k a ( i ) , thereby reducing the online computational burden.
Algorithm 1 Construction of the optimal innovation-based attacks.
 1:
Input: A, C ( i ) , Q, R ( i ) , x 0 , P 0 ( i ) , σ k , δ , ζ ( i ) ;
 2:
Obtain the covariance Σ ˜ k ( i ) and the mean μ k ( i ) of z k a ( i ) in the worst case based on Theorem 2;
 3:
Acquire the optimal attack matrix T k ( i ) by solving (53);
 4:
Determine attack scheduling φ k ( i ) according to Theorem 4;
 5:
for  k = 0 ; k k ˇ ; k + + do
 6:
   for  i = 1 ; i m ; i + +  do
 7:
     if  φ k ( i ) = 1  then
 8:
        Modify the innovation of channel i at time k to z k a ( i ) ;
 9:
     end if
10:
   end for
11:
end for
12:
Output:  φ k ( i ) , z k a ( i ) ;

5. Illustrative Examples

To verify the theoretical results, simulations are conducted on a CPS with two independent channels. The parameter selection aims to balance theoretical tractability and practical relevance. Specifically, matrix A guarantees system stability, while the noise covariance matrices Q and R ( i ) capture the actual measurement and process disturbances. x 0 is required to follow a zero-mean Gaussian distribution, and P 0 ( i ) is set as the identity matrix. These choices ensure that the system attains a steady-state condition prior to the onset of the attack, as stated in Assumption 3. The specific parameters are designed as follows: A = 0.65 0.2 0.05 0.7 , Q = 0.5 0 0 0.7 , C ( 1 ) = 0.5 0.8 0 0.7 , R ( 1 ) = 1 0 0 0.8 , C ( 2 ) = 0.5 0.8 0 0.7 , R ( 2 ) = 1 0 0 0.9 .
The initial states are set as x 0 = [ 0.54 , 1.83 ] T and P 0 ( 1 ) = P 0 ( 2 ) = 1 0 0 1 . The experiment runs from k = 0 to the terminal step k ˇ = 90 , with the attack initiated at k = 50 . Due to energy constraints, the attacker modifies at most σ k = 1 channel per time step.
First, the influence exerted by diverse attack strategies on the estimation performance of the CPSs is illustrated in Figure 2 with parameters ζ 1 = ζ 2 = 1 and δ = 1.5 , while Figure 3 presents the empirical estimation error from 10,000 Monte Carlo simulations under these conditions. The black triangular line describes the estimation error induced by the proposed optimal attack. By contrast, the red plus line reflects the influence of the zero-mean Gaussian attack scheme in [27] on remote estimation performance. Owing to the time-varying mean of the Gaussian distribution in the optimal attack strategy, the resulting estimation error is significantly larger than that of [27]. The blue square line corresponds to the estimation error caused by the attack strategy in [21], which shares the attack scheduling parameter φ k ( i ) with our approach. The green fork-marked line denotes the estimation error under random Gaussian noise when all channels are continuously attacked, i.e., φ k ( 1 ) = φ k ( 2 ) = 1 . Comparative analysis of Figure 2 and Figure 3 confirms that the optimal stealthy attack leads to the most significant degradation in estimation performance.
Figure 4 illustrates the impact of various attacks on the estimation error under the parameters ζ ( 1 ) = 1 , ζ ( 2 ) = 0 , and δ = 1.5 , corresponding to φ k ( 1 ) = 1 and φ k ( 2 ) = 0 at each time step k. The empirical estimation error from 10,000 Monte Carlo simulations under these conditions is shown in Figure 5. Compared to the orange five-pointed star-marked line, the optimal attack strategy is found to induce a greater estimation error at each attack time step. Due to the time-invariant covariance of the modified innovation proposed in [21], the generated attack fails to significantly disrupt the remote estimation. The simulation setup in Figure 4 and Figure 5 represents a single-channel attack scenario, where the optimal attack strategy demonstrates substantial effectiveness in degrading estimation performance.
The stealth performance of different attack schemes is further analyzed in Figure 6 under the parameter configuration ζ ( 1 ) = ζ ( 2 ) = 1 and δ = 1.5 . The blue dotted and solid lines depict the stealthiness of attacks on channels 1 and 2, respectively, at each time step, while the purple dotted and solid lines correspond to the attack scheme proposed in [27]. Figure 6 demonstrates that the KLD of all channels remains below the threshold δ = 1.5 under the optimal stealthy attacks, ensuring stealthiness throughout the attack duration. A comparative analysis of Figure 2 and Figure 6 reveals that the proposed attack design achieves superior stealth performance compared to the method in [27], while simultaneously inducing a significantly larger remote estimation error.
For enhanced clarity of the simulation framework, Table 2 summarizes the comparative analysis.
Finally, Figure 7 demonstrates the influence of varying thresholds δ on the estimation error under the proposed attack strategy, evaluated through 10,000 Monte Carlo simulations. The black asterisk-marked, blue dashed, magenta dash-dot, and red solid lines represent the estimation errors for δ = 2 , δ = 1.5 , δ = 1 , and δ = 0 , respectively. A larger δ corresponds to weaker stealth performance but amplifies the attack’s impact on degrading estimation performance. This highlights the critical role of selecting an appropriate δ to balance stealthiness and attack effectiveness. Notably, even when δ = 0 , the optimal attack scheme remains feasible and significantly degrades the remote estimation performance.

6. Conclusions

In this paper, we investigate the design problem of optimal deception attacks in multi-channel CPS, aiming to maximize the estimation error while ensuring attack stealthiness. Due to energy constraints, the attacker can only modify the transmission data of a subset of channels at each attack time. The innovation-based linear deception attack model is constructed, where the modified innovation follows a Gaussian distribution with a time-varying mean, to derive the total estimation error during the attack period. By leveraging the statistical interdependencies among variables in the objective function, the original problem is transformed into tractable semidefinite and 0–1 integer programming formulations. Moreover, we propose an algorithm to guide attackers in strategically devising the optimal attack approach. Numerical simulations validate the effectiveness of the proposed strategy, demonstrating its superiority in balancing stealth and attack impact compared to existing methods. The computational complexity of attack scheduling optimization grows exponentially with the number of communication channels. We plan to explore heuristic approaches (e.g., GA, particle swarm optimization (PSO)) to address real-time implementation in large-scale systems, thereby mitigating this complexity while maintaining acceptable performance levels. Moreover, the current attack strategy does not sufficiently consider the temporal dynamics of network traffic and the impact of network environment variations. Future research could integrate time-series analysis with online learning algorithms to design more robust attack strategies with enhanced adaptability to dynamic network conditions.

Author Contributions

X.Y. established the model of the system, simulated the experiment, and wrote the first draft. Z.R. participated in the construction of the paper framework and fund acquisition. J.Z. proposed amendments to the paper. J.H. managed the overall project. All authors have read and agreed to the published version of the manuscript.

Funding

This work was funded by Key R&D Program of Zhejiang Province, grant number 2023C01023, 2024C01134.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

Nomenclature

The symbolic variables used in this paper are shown in nomenclature:
SymbolDefinition
N Natural number
R Real number
R n n-dimensional Euclidean space
Y T Transpose of matrix Y
Y 1 Inverse of matrix Y
| Y | Determinant of matrix Y
log y Natural logarithm of y
Tr ( . ) Trace of matrix
ξ N ( μ ξ , Σ ξ ) Gaussian distribution with covariance Σ ξ and mean μ ξ
x k System state vector at time k
y k ( i ) Measurement of sensor i at time k
ASystem state transition matrix
C ( i ) Measurement matrix of sensor i
w k Process noise
v k ( i ) Measurement noise of sensor i
x ^ k ( i ) Prior estimate of state x k by estimator i
x ^ k ( i ) Posterior estimate of state x k by estimator i
P k ( i ) Prior estimation error covariance
P k ( i ) Posterior estimation error covariance
G k ( i ) Kalman gain matrix
z k ( i ) Local innovation
Σ ( i ) Covariance of innovation z k ( i )
z k a ( i ) Modified innovation under attack
Σ ˜ k ( i ) Covariance of innovation z k a ( i )
T k ( i ) Attack matrix
φ k ( i ) Attack scheduling matrix
b k ( i ) Attack noise
μ k ( i ) Mean of attack noise b k ( i )
Ξ k ( i ) Covariance of attack noise b k ( i )
δ KLD threshold
σ k Maximum number of attacked channels at time k

References

  1. Antsaklis, P. Goals and challenges in cyber-physical systems research editorial of the editor in chief. IEEE Trans. Autom. Control 2014, 59, 3117–3119. [Google Scholar] [CrossRef]
  2. Ma, X.J.; Wang, H. Blind false data injection attacks in smart grids subject to measurement outliers. J. Control. Decis. 2022, 9, 445–454. [Google Scholar] [CrossRef]
  3. Zhang, D.; Wang, Q.G.; Feng, G.; Shi, Y.; Vasilakos, A.V. A survey on attack detection, estimation and control of industrial cyber-physical systems. ISA Trans. 2021, 116, 1–16. [Google Scholar] [CrossRef] [PubMed]
  4. Dutta, R.G.; Hu, Y.; Yu, F.; Zhang, T.; Jin, Y. Design and analysis of secure distributed estimator for vehicular platooning in adversarial environment. IEEE trans. Intell. Transp. Syst. 2022, 23, 3418–3429. [Google Scholar] [CrossRef]
  5. Ren, Z.; Cheng, P.; Shi, L.; Dai, Y. State estimation over delayed mutihop network. IEEE Trans. Automat. Control 2018, 63, 3545–3550. [Google Scholar] [CrossRef]
  6. Qiu, H.; Qiu, M.; Liu, M.; Memmi, G. Secure health data sharing for medical cyber-physical systems for the healthcare 4.0. IEEE J. Biomed. Health Inform. 2020, 24, 2499–2505. [Google Scholar] [CrossRef]
  7. Lindsay, J.R. Stuxnet and the limits of cyber warfare. Secur. Stud. 2013, 22, 365–404. [Google Scholar] [CrossRef]
  8. Slay, J.; Miller, M. Lessons learned from the maroochy water breach. In Proceedings of the International Conference on Critical Infrastructure Protection, Hanover, NH, USA, 19–21 March 2007; pp. 73–82. [Google Scholar]
  9. Paridari, K.; O’Mahony, N.; Mady, A.E.-D.; Chabukswar, R.; Boubekeur, M.; Sandberg, H. A framework for attack- resilient industrial control systems: Attack detection and controller reconfiguration. Proc. IEEE. 2018, 106, 113–128. [Google Scholar] [CrossRef]
  10. Aldallal, A.; Alisa, F. Effective intrusion detection system to secure data in cloud using machine learning. Symmetry 2021, 13, 2306. [Google Scholar] [CrossRef]
  11. Qin, J.; Li, M.; Shi, L.; Yu, X. Optimal denial-of-service attack scheduling with energy constraint over packet-dropping networks. IEEE Trans. Autom. Control 2018, 63, 1648–1663. [Google Scholar] [CrossRef]
  12. Wang, D.; Jia, P.; Lian, J.; Pei, X. An Optimal DoS Attack Strategy With Pause and Restart Rules Under Energy Constraints. IEEE Trans. Control. Netw. Syst. 2022, 10, 1291–1302. [Google Scholar] [CrossRef]
  13. Ai, Z.; Peng, L.; Cao, M. Optimal attack schedule for two sensors state estimation under jamming attack. IEEE Access 2019, 7, 75741–75748. [Google Scholar] [CrossRef]
  14. Deng, C.; Jin, X.Z.; Wu, Z.G.; Che, W.W. Data-Driven-Based Cooperative Resilient Learning Method for Nonlinear MASs Under DoS Attacks. IEEE Trans. Neural Netw. Learn. Syst. 2023, 35, 12107–12116. [Google Scholar] [CrossRef]
  15. Jin, X.; Lu, S.; Qin, J.; Zheng, W.X.; Liu, Q. Adaptive ELM-Based Security Control for a Class of Nonlinear- Interconnected Systems With DoS Attacks. IEEE Trans. Cybern. 2023, 53, 5000–5012. [Google Scholar] [CrossRef]
  16. Liu, Y.; Ning, P.; Reiter, M.K. False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. 2011, 14, 1–33. [Google Scholar] [CrossRef]
  17. Guo, Z.; Shi, D.; Johansson, K.H.; Shi, L. Optimal linear cyber-attack on remote state estimation. IEEE Trans. Control Netw. Syst. 2016, 4, 4–13. [Google Scholar] [CrossRef]
  18. Ren, X.X.; Yang, G.H.; Zhang, X.G. Optimal stealthy attack with historical data on cyber–physical systems. Automatica 2023, 151, 110895. [Google Scholar] [CrossRef]
  19. Yang, G.Y.; Li, X.J. Complete stealthiness false data injection attacks against dynamic state estimation in cyber-physical systems. Inf. Sci. 2022, 586, 408–423. [Google Scholar] [CrossRef]
  20. Tu, W.; Dong, J.; Zhai, D. Optimal ϵ-stealthy attack in cyber-physical systems. J. Franklin Inst. 2021, 358, 151–171. [Google Scholar] [CrossRef]
  21. Guo, Z.; Shi, D.; Johansson, K.H.; Shi, L. Worst-case stealthy innovation-based linear attack on remote state estimation. Automatica 2018, 89, 117–124. [Google Scholar] [CrossRef]
  22. Li, Y.G.; Yang, G.H. Optimal stealthy false data injection attacks in cyber-physical systems. Inf. Sci. 2019, 481, 474–490. [Google Scholar] [CrossRef]
  23. Li, Y.; Shi, D.; Chen, T. False data injection attacks on networked control systems: A Stackelberg game analysis. IEEE Trans. Autom. Control 2018, 63, 3503–3509. [Google Scholar] [CrossRef]
  24. Zhou, J.; Shang, J.; Chen, T. Optimal Deception Attacks Against Remote State Estimation: An Information-Based Approach. IEEE Trans. Automat. Control 2023, 68, 3947–3962. [Google Scholar] [CrossRef]
  25. Guo, H.; Sun, J.; Pang, Z.H. Stealthy false data injection attacks with resource constraints against multi-sensor estimation systems. ISA Trans. 2022, 127, 32–40. [Google Scholar] [CrossRef]
  26. Li, Y.; Yang, Y.; Zhao, Z.; Zhou, J.; Quevedo, D.E. Deception Attacks on Remote Estimation with Disclosure and Disruption Resources. IEEE Trans. Autom. Control 2023, 68, 4096–4112. [Google Scholar] [CrossRef]
  27. Li, Y.G.; Yang, G.H. Optimal stealthy switching location attacks against remote estimation in cyber-physical systems. Neurocomputing 2021, 421, 183–194. [Google Scholar] [CrossRef]
  28. Li, Y.G.; Yang, G.H.; Wang, X. Optimal energy constrained deception attacks in cyber-physical systems with multiple channels: A fusion attack approach. ISA Trans. 2023, 137, 1–12. [Google Scholar] [CrossRef]
  29. Anderson, B.D.; Moore, J.B. Optimal filtering, 1st ed; Prentice-Hall: New York, NY, USA, 1979; pp. 103–133. [Google Scholar]
  30. Favennec, J.M. Smart sensors in industry. J. Phys. E: Sci. Instrum. 1987, 20, 1087–1090. [Google Scholar] [CrossRef]
  31. Zhang, Q.; Liu, K.; Xia, Y.; Ma, A. Optimal stealthy deception attack against cyber-physical systems. IEEE Trans. Cybern. 2020, 50, 3963–3972. [Google Scholar] [CrossRef]
  32. Ren, X.X.; Yang, G.H. Kullback–Leibler divergence-based optimal stealthy sensor attack against networked linear quadratic Gaussian systems. IEEE Trans. Cybern. 2021, 52, 11539–11548. [Google Scholar] [CrossRef]
Figure 1. System structure.
Figure 1. System structure.
Electronics 14 01569 g001
Figure 2. The theoretical estimation error induced by various attack strategies with ζ 1 = ζ 2 = 1 [21,27].
Figure 2. The theoretical estimation error induced by various attack strategies with ζ 1 = ζ 2 = 1 [21,27].
Electronics 14 01569 g002
Figure 3. The empirical estimation error induced by various attack strategies with ζ 1 = ζ 2 = 1 [21,27].
Figure 3. The empirical estimation error induced by various attack strategies with ζ 1 = ζ 2 = 1 [21,27].
Electronics 14 01569 g003
Figure 4. The theoretical estimation error induced by various attack strategies with ζ 1 = 1 ,   ζ 2 = 0 [21,27].
Figure 4. The theoretical estimation error induced by various attack strategies with ζ 1 = 1 ,   ζ 2 = 0 [21,27].
Electronics 14 01569 g004
Figure 5. The empirical error estimation error induced by various attack strategies with ζ 1 = 1 ,   ζ 2 = 0 [21,27].
Figure 5. The empirical error estimation error induced by various attack strategies with ζ 1 = 1 ,   ζ 2 = 0 [21,27].
Electronics 14 01569 g005
Figure 6. The stealthiness under different attack strategies [27].
Figure 6. The stealthiness under different attack strategies [27].
Electronics 14 01569 g006
Figure 7. The estimation errors under different thresholds δ .
Figure 7. The estimation errors under different thresholds δ .
Electronics 14 01569 g007
Table 1. Comparative analysis of related research metrics.
Table 1. Comparative analysis of related research metrics.
Related WorksChannel TypeObjectiveMeanCovariance
This PaperMulti-ChannelMaximize the Cumulative
Estimation Error
Time-VaryingTime-Varying
Guo et al. [21]Single-ChannelMaximize the Estimation
Error at Each Moment
ZeroTime-Invariant
Li et al. [27,28]Multi-ChannelMaximize the Terminal
Estimation Error
ZeroTime-Varying
Li et al. [22]Single-ChannelMaximize the Cumulative
Estimation Error
Time-InvariantTime-Invariant
Table 2. Key comparisons of attack strategies.
Table 2. Key comparisons of attack strategies.
MetricProposed Optimal AttackAttack in [27]Attack in [21]
Channel TypeMulti-ChannelMulti-ChannelSingle-Channel
ObjectiveMaximize the Cumulative
Estimation Error
Maximize the Terminal
Estimation Error
Maximize the Estimation
Error at Each Moment
MeanTime-VaryingZeroZero
CovarianceTime-VaryingTime-VaryingTime-Invariant
Single-channelLarger Estimation Error-Smaller Estimation Error
Multi-channelLarger Estimation Error;
Superior Stealthiness
Smaller Estimation Error;
Poorer Stealthiness
-
LimitationsStatic DistributionsConstant MeanSingle-Channel;
Constant Mean and Covariance
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Yang, X.; Ren, Z.; Zhou, J.; Huang, J. Optimal Innovation-Based Deception Attacks on Multi-Channel Cyber–Physical Systems. Electronics 2025, 14, 1569. https://doi.org/10.3390/electronics14081569

AMA Style

Yang X, Ren Z, Zhou J, Huang J. Optimal Innovation-Based Deception Attacks on Multi-Channel Cyber–Physical Systems. Electronics. 2025; 14(8):1569. https://doi.org/10.3390/electronics14081569

Chicago/Turabian Style

Yang, Xinhe, Zhu Ren, Jingquan Zhou, and Jing Huang. 2025. "Optimal Innovation-Based Deception Attacks on Multi-Channel Cyber–Physical Systems" Electronics 14, no. 8: 1569. https://doi.org/10.3390/electronics14081569

APA Style

Yang, X., Ren, Z., Zhou, J., & Huang, J. (2025). Optimal Innovation-Based Deception Attacks on Multi-Channel Cyber–Physical Systems. Electronics, 14(8), 1569. https://doi.org/10.3390/electronics14081569

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop