首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 296 毫秒
1.
2.
This paper is concerned with a security problem about malicious integrity attacks in state estimation system, in which multiple smart sensors locally measure information and transmit it to a remote fusion estimator though wireless channels. A joint constraint is considered for the attacker behaviour in each channel to keep stealthiness under a residual-based detector on the remote side. In order to degrade the estimator performance, the attacker will maximize the trace of the remote state estimation error covariance which is derived based on Kalman filter theory. It is proved that the optimal linear attack strategy design problem is convex and finally turned into a semi-definite programming problem. In addition, the tendency of attack behaviour on recursive and fixed Kalman filter system is analyzed. Several examples are given to illustrate the theoretical results.  相似文献   

3.
In this paper, we consider a malicious attack issue against remote state estimation in cyber-physical systems. Due to the limited energy, the sensor adopts an acknowledgment-based (ACK-based) online power schedule to improve the remote state estimation. However, the feedback channel will also increase the risk of being attacked. The malicious attacker has the ability to intercept the ACK information and modify the ACK signals (ACKs) from the remote estimator. It could induce the sensor to make poor decisions while maintaining the observed data packet acceptance rate to keep the attacker undetected. To maximize the estimation error, the attacker will select appropriate attack times so that the sensor makes bad decisions. The optimal attack strategy based on the true ACKs and the corrosion ACKs is analytically proposed. The optimal attack time to modify the ACKs is the time when the sensor’s tolerance, i.e., the number of consecutive data packet losses allowed, is about to reach the maximum. In addition, such an optimal attack strategy is independent of the system parameters. Numerical simulations are provided to demonstrate the analytical results.  相似文献   

4.
This paper mainly focuses on the problems of attack detection and reconstruction of cyber physical systems (CPS) under dynamic load altering attacks (D-LAA). Taking the smart grid as an example, firstly, the power system subjected to the attack is modeled as a power CPS through system characteristics to provide conditions for attack detection. On this basis, we assume that two vulnerable loads are attacked simultaneously to investigate the impact of the attack on the system. Secondly, a robust sliding mode observer is designed to implement attack reconstruction with the residual signal generated by the observer. After that, an attack detection logic is applied to complete the attack detection by comparing the threshold with the residual. Finally, a three generators and six buses power system is given as an example to verify the feasibility of attack detection and reconstruction by using the real-time simulation platform built by StarSim and MT respectively. The simulation results are given in this paper.  相似文献   

5.
In this paper, we investigate the optimal denial-of-service attack scheduling problems in a multi-sensor case over interference channels. Multiple attackers aim to degrade the performance of remote state estimation under attackers’ energy constraints. The attack decision of one attacker may be affected by the others while all attackers find their own optimal strategies to degrade estimation performance. Consequently, the Markov decision process and Markov cooperative game in two different information scenarios are formulated to study the optimal attack strategies for multiple attackers. Because of the complex computations of the high-dimensional Markov decision process (Markov cooperative game) as well as the limited information for attackers, we propose a value iteration adaptive dynamic programming method to approximate the optimal solution. Moreover, the structural properties of the optimal solution are analyzed. In the Markov cooperative game, the optimal joint attack strategy which admits a Nash equilibrium is studied. Several numerical simulations are provided to illustrate the feasibility and effectiveness of the main results.  相似文献   

6.
In this paper, the state estimation problem for discrete-time networked systems with communication constraints and random packet dropouts is considered. The communication constraint is that, at each sampling instant, there is at most one of the various transmission nodes in the networked systems is allowed to access a shared communication channel, and then the received data are transmitted to a remote estimator to perform the estimation task. The channel accessing process of those transmission nodes is determined by a finite-state discrete-time Markov chain, and random packet dropouts in remote data transmission are modeled by a Bernoulli distributed white sequence. Using Bayes’ rule and some results developed in this study, two state estimation algorithms are proposed in the sense of minimum mean-square error. The first algorithm is optimal, which can exactly compute the minimum mean-square error estimate of system state. The second algorithm is a suboptimal algorithm obtained under a lot of Gaussian hypotheses. The proposed suboptimal algorithm is recursive and has time-independent complexity. Computer simulations are carried out to illustrate the performance of the proposed algorithms.  相似文献   

7.
1981年Lamport提出了第一个非常著名的智能卡远程用户认证方案,从此,大量的此类方案被提出。最近Shen,Lin和Hwang针对该方案提出了一种不同的攻击方法,并提供了一个改进方案用于抵御这些攻击。文中主要在Shen-Lin-Hwang方案的基础上,提出了一个新的远程用户认证方案,该方案中口令由用户选择掌握,注册时增强了安全性,有效地抵御了类似Chan-Cheng和Chang-Hwang的攻击。该方案还可根据用户需要随时更改口令,这是与以往方案最大的不同之处。  相似文献   

8.
徐婷  彭亚红  罗建宝  刘俞伯 《大众科技》2012,14(4):82-83,88
在短波通信中,为了克服信道中的多径干扰、衰落和多普勒频移等对接收信号的影响,实现低信噪比下,信号高速传输,文章提出了一种基于压缩感知的短波多天线分集合并接收系统设计方法。该系统有效地将OFDM调制方式和压缩感知相结合,充分利用了OFDM调制方式频谱效率高、抗多径衰落能力强等优势以及压缩感知抗干扰能力强、能以低采样率高精度重建待测信号的特性。实验结果表明:与现有的短波通信系统相比,在信号受强噪声干扰且高速传输的情况下,重建性能最优。  相似文献   

9.
This paper proposes a frequency-based approach for the detection of replay attacks affecting cyber-physical systems (CPS). In particular, the method employs a sinusoidal signal with a time-varying frequency (authentication signal) into the closed-loop system and checks whether the time profile of the frequency components in the output signal are compatible with the authentication signal or not. In order to carry out this target, the couplings between inputs and outputs are eliminated using a dynamic decoupling technique based on vector fitting. In this way, a signature introduced on a specific input channel will affect only the output that is selected to be associated with that input, which is a property that can be exploited to determine which channels are being affected. A bank of band-pass filters is used to generate signals whose energies can be compared to reconstruct an estimation of the time-varying frequency profile. By matching the known frequency profile with its estimation, the detector can provide the information about whether a replay attack is being carried out or not. The design of the signal generator and the detector are thoroughly discussed, and an example based on a quadruple-tank process is used to show the application and effectiveness of the proposed method.  相似文献   

10.
In wireless communications, the channel is typically modeled as a random, linear, time-varying system that spreads the transmitted signal in both time and frequency due to multi-path propagation and Doppler effects. Estimated channel parameters allow system designers to develop coherent receivers that increase the system performance. In this paper, we show how time-frequency analysis can be used to model and estimate the time-varying channel of a multi-carrier spread spectrum (MCSS) system using a complex quadratic sequence as the spreading code. We will show that for this spreading code, the effects of time delays and Doppler frequency shifts, caused by the mobility of environment objects, can be combined and represented effectively as time shifts. The discrete evolutionary transform (DET), as a time-frequency analysis method, enables us to estimate the effective time shifts via a spreading function and to use them to equalize the channel. Using the effective time shifts, the time-varying channel can be represented simply as linear-time invariant system by embedding the Doppler shifts that characterize the time-varying channel into effective time shifts. The channel parameters are used to estimate the data bit sent. To illustrate the performance of the proposed method we perform several simulations with different levels of channel noise, jammer interference, and Doppler frequency shifts.  相似文献   

11.
朱娟 《大众科技》2013,(10):16-17,51
针对偏远地区水情数据远程监测的实际需求,文章进行了基于zigbee协议和CDMA通信技术的远程数据采集传输系统的设计开发。以支持zigbee协议的芯片CC2530来构建传感器节点和中心节点,以CDMA无线通信模块构建能与internet进行数据传输的网关。传感器节点采用星型拓扑结构组成无线传感网络后,采集数据传给中心节点,再通过ARM处理器驱动CDMA模块实现数据的远程传输。该监测系统低功耗、易组网、易安装,适合大区域的远程无线实时监测。  相似文献   

12.
We consider a remote state estimation process under an active eavesdropper for cyber-physical system. A smart sensor transmits its local state estimates to a remote estimator over an unreliable network, which is eavesdropped by an adversary. The intelligent adversary can work in passive eavesdropping mode and active jamming mode. An active jamming mode enables the adversary to interfere the data transmission from sensor to estimator, and meanwhile improve the data reception of itself. To protect the transmission data from being wiretapped, the sensor with two antennas injects noise to the eavesdropping link with different power levels. Aiming at minimizing the estimation error covariance and power cost of themselves while maximizing the estimation error covariance of their opponents, a two-player nonzero-sum game is constructed for sensor and active eavesdropper. For an open-loop case, the mixed Nash equilibrium is obtained by solving an one-stage nonzero-sum game. For a long term consideration, a Markov stochastic game is introduced and a Nash Q-learning method is given to find the Nash equilibrium strategies for two players. Numerical results are provided to show the effectiveness of our theoretical conclusions.  相似文献   

13.
In this paper, the issue of CPS security is investigated. By analyzing the process of multi-sources cyber-attacks of denial-of-service (DoS), information disclosure, stealthy attack and replay attack, a unified system model with uncertainties is formulated. Under this system model framework, robust control theory is applied to design the control scenarios for cyber-attack prevention. Furthermore, a double closed-loop NCS framework combined with information integration technology is proposed, necessary conditions for security guarantee are derived. Finally, a DC motor speed moderating example is given to demonstrate the problem.  相似文献   

14.
This paper investigates the joint design of power control and beamforming codebooks for limited-feedback multiple-input single-output (MISO) wireless systems. The problem is formulated as the minimization of the outage probability subject to the transmit power constraint and cardinality constraints on the beamforming and power codebooks. We show that the two codebooks need to be designed jointly in this setup, and provide a numerical method for the joint optimization. For independent and identically distributed (i.i.d.) Rayleigh channel, we also propose a low-complexity approach of fixing a uniform beamforming codebook and optimizing the power codebook for that particular beamformer, and show that it performs very close to the optimum. Further, this paper investigates the optimal tradeoffs between beamforming and power codebook sizes. We show that as the outage probability decreases, optimal joint design should use more feedback bits for power control and fewer feedback bits for beamforming. The jointly optimized beamforming and power control modules combine the power gain of beamforming and diversity gain of power control, which enable it to approach the performance of the system with perfect channel state information as the feedback link capacity increases—something that is not possible with either beamforming or power control alone.  相似文献   

15.
This paper is concerned with the optimal stealthy attack problems of cyber-physical system, which is represented as discrete-time linear systems. It is considered that a deceptive attack assumed to be able to hijack and modify the nominal control signals from the controller-actuator channel with the metric of ? -stealthiness. Different from the existing literatures, some optimal attack strategies with objectives such that maintaining a fixed level of stealthiness and achieving the maximized performance degradation are designed under some constraints. It is further derived that the results of ours are more relaxed than some methods proposed before. Finally, some numerical simulations are given to illustrate the validity of the theoretical results.  相似文献   

16.
本文介绍了一种基于GSM网络的智能家居系统。该系统采用无线通信模块,以微处理器为控制核心,进行家居安防和家居控制,实现了远程报警、远程遥控等功能。同时该系统具有性能可靠和成本低的优点,可广泛应用于现代住宅中。  相似文献   

17.
本文的写作的目的是向读者介绍一种通过公共电话交换网连接,用于供电系统的计算机远程监控系统。该系统的设计理念是分布式结构,在这种结构中,我们可以实现对多个太阳能供电站点的实时监控,并且应用于无线通信基站供电系统、程控交换基站的实时监控。实验证实,这种系统可以有效解决经济落后地区电气设备不足和设备不易维护的问题。  相似文献   

18.
华斌  王维 《科技广场》2006,(11):23-25
本文提出了一种以ARM和嵌入式技术为基础,采用CDMA无线网络实现远程道口数据的实时传输,以及时了解道口状况的无线铁路视频监控系统。文中阐明了该系统终端的总体结构和各个组成模块,分析了视频监控、无线传输和模拟信号采集部分的具体功能和软件实现。经过试验测试表明,该系统能够实时采集、分析、存储、传输及显示铁路道口数据。  相似文献   

19.
In this paper, the problem of observer-based model predictive control (MPC) for a multi-channel cyber-physical system (CPS) with uncertainties and hybrid attacks is investigated via interval type-2 Takagi-Sugeno (IT2 T-S) fuzzy model. Both denial-of-service (DoS) and false data injection (FDI) attacks are studied due to the vulnerability of wireless transmission channels. The objective of the addressed problem is to improve the security performance of the multi-channel CPS under malicious attacks, which has not been adequately investigated in the existing MPC algorithms. Moreover, uncertainties which appear not only in the membership functions but in both state and input matrices are considered. In this paper, different from the method that FDI attacks are handled by the bounded functions, an off-line observer is designed to actively defend against the FDI attacks. Meanwhile, an on-line MPC optimization algorithm, which minimizes the upper bound of objective function respecting input constraints, is presented to obtain the secure controller gains. Finally, an illustrative example is provided to verify the effectiveness and superiority of presented approach.  相似文献   

20.
无线传感器网络的分布式用户认证机制   总被引:1,自引:0,他引:1  
本文针对无线传感器网络的用户认证问题给出了一套分布式的认证方案。此方案利用自我验证密码系统(self-certified key cryptosystems)来建立对等密钥,在对等密钥建立的基础上给出了两种不同类型的认证:本地认证和远端认证。我们的认证方案不但具有很强的安全性,而且由于具有较低的通信与计算代价,从而很容易在传感器网络中实现。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号