期刊文献+
共找到720篇文章
< 1 2 36 >
每页显示 20 50 100
Optimal two-channel switching false data injection attacks against remote state estimation of the unmanned aerial vehicle cyber-physical system
1
作者 Juhong Zheng Dawei Liu +1 位作者 Jinxing Hua Xin Ning 《Defence Technology(防务技术)》 2025年第5期319-332,共14页
A security issue with multi-sensor unmanned aerial vehicle(UAV)cyber physical systems(CPS)from the viewpoint of a false data injection(FDI)attacker is investigated in this paper.The FDI attacker can employ attacks on ... A security issue with multi-sensor unmanned aerial vehicle(UAV)cyber physical systems(CPS)from the viewpoint of a false data injection(FDI)attacker is investigated in this paper.The FDI attacker can employ attacks on feedback and feed-forward channels simultaneously with limited resource.The attacker aims at degrading the UAV CPS's estimation performance to the max while keeping stealthiness characterized by the Kullback-Leibler(K-L)divergence.The attacker is resource limited which can only attack part of sensors,and the attacked sensor as well as specific forms of attack signals at each instant should be considered by the attacker.Also,the sensor selection principle is investigated with respect to time invariant attack covariances.Additionally,the optimal switching attack strategies in regard to time variant attack covariances are modeled as a multi-agent Markov decision process(MDP)with hybrid discrete-continuous action space.Then,the multi-agent MDP is solved by utilizing the deep Multi-agent parameterized Q-networks(MAPQN)method.Ultimately,a quadrotor near hover system is used to validate the effectiveness of the results in the simulation section. 展开更多
关键词 Unmanned aerial vehicle(UAV) Cyber physical systems(CPS) K-L divergence Multi-sensor fusion kalman filter Stealthy switching false data injection(fdi) attacks
在线阅读 下载PDF
Localization of False Data Injection Attacks in Power Grid Based on Adaptive Neighborhood Selection and Spatio-Temporal Feature Fusion
2
作者 Zehui Qi Sixing Wu Jianbin Li 《Computers, Materials & Continua》 2025年第11期3739-3766,共28页
False Data Injection Attacks(FDIAs)pose a critical security threat to modern power grids,corrupting state estimation and enabling malicious control actions that can lead to severe consequences,including cascading fail... False Data Injection Attacks(FDIAs)pose a critical security threat to modern power grids,corrupting state estimation and enabling malicious control actions that can lead to severe consequences,including cascading failures,large-scale blackouts,and significant economic losses.While detecting attacks is important,accurately localizing compromised nodes or measurements is even more critical,as it enables timely mitigation,targeted response,and enhanced system resilience beyond what detection alone can offer.Existing research typically models topological features using fixed structures,which can introduce irrelevant information and affect the effectiveness of feature extraction.To address this limitation,this paper proposes an FDIA localization model with adaptive neighborhood selection,which dynamically captures spatial dependencies of the power grid by adjusting node relationships based on data-driven similarities.The improved Transformer is employed to pre-fuse global spatial features of the graph,enriching the feature representation.To improve spatio-temporal correlation extraction for FDIA localization,the proposed model employs dilated causal convolution with a gating mechanism combined with graph convolution to capture and fuse long-range temporal features and adaptive topological features.This fully exploits the temporal dynamics and spatial dependencies inherent in the power grid.Finally,multi-source information is integrated to generate highly robust node embeddings,enhancing FDIA detection and localization.Experiments are conducted on IEEE 14,57,and 118-bus systems,and the results demonstrate that the proposed model substantially improves the accuracy of FDIA localization.Additional experiments are conducted to verify the effectiveness and robustness of the proposed model. 展开更多
关键词 Power grid security adaptive neighborhood selection spatio-temporal correlation false data injection attacks localization
在线阅读 下载PDF
热网FDI攻击的非侵入式检测方法
3
作者 刘鑫蕊 张修宇 +2 位作者 吴泽群 王睿 孙秋野 《控制理论与应用》 北大核心 2025年第7期1265-1274,共10页
针对热网易受网络攻击影响且惯性大的问题,为提高热网攻击检测的快速性和准确性,本文首次提出了一种能够放大攻击带来的状态量偏差的非侵入式在线检测方法,该方法首先将居住人热行为归纳为黑盒模型,将房屋和散热器归纳为白盒模型,通过... 针对热网易受网络攻击影响且惯性大的问题,为提高热网攻击检测的快速性和准确性,本文首次提出了一种能够放大攻击带来的状态量偏差的非侵入式在线检测方法,该方法首先将居住人热行为归纳为黑盒模型,将房屋和散热器归纳为白盒模型,通过白盒与黑盒组成的灰盒模型来计算室内热平衡状态,其次以室内温度为输入/散失热量计算的中间量,放大攻击带来的系统状态量偏差,最后通过多重匹配状态预测方法进行攻击检测.为验证所提方法的有效性,采用巴厘岛热网模型进行仿真实验,与传统的检测方法相比,本文所提方法可以有效放大攻击带来的状态量偏差,检测速度和检测率均更高. 展开更多
关键词 fdi 网络攻击 非侵入式检测 灰盒模型 热网
在线阅读 下载PDF
Residual-Based False Data Injection Attacks Against Multi-Sensor Estimation Systems 被引量:5
4
作者 Haibin Guo Jian Sun Zhong-Hua Pang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第5期1181-1191,共11页
This paper investigates the security issue of multisensor remote estimation systems.An optimal stealthy false data injection(FDI)attack scheme based on historical and current residuals,which only tampers with the meas... This paper investigates the security issue of multisensor remote estimation systems.An optimal stealthy false data injection(FDI)attack scheme based on historical and current residuals,which only tampers with the measurement residuals of partial sensors due to limited attack resources,is proposed to maximally degrade system estimation performance.The attack stealthiness condition is given,and then the estimation error covariance in compromised state is derived to quantify the system performance under attack.The optimal attack strategy is obtained by solving several convex optimization problems which maximize the trace of the compromised estimation error covariance subject to the stealthiness condition.Moreover,due to the constraint of attack resources,the selection principle of the attacked sensor is provided to determine which sensor is attacked so as to hold the most impact on system performance.Finally,simulation results are presented to verify the theoretical analysis. 展开更多
关键词 Cyber-physical systems(CPSs) false data injection(fdi)attacks remote state estimation stealthy attacks
在线阅读 下载PDF
Analysis of cascading failures of power cyber-physical systems considering false data injection attacks 被引量:8
5
作者 Jian Li Chaowei Sun Qingyu Su 《Global Energy Interconnection》 CAS CSCD 2021年第2期204-213,共10页
This study considers the performance impacts of false data injection attacks on the cascading failures of a power cyber-physical system,and identifies vulnerable nodes.First,considering the monitoring and control func... This study considers the performance impacts of false data injection attacks on the cascading failures of a power cyber-physical system,and identifies vulnerable nodes.First,considering the monitoring and control functions of a cyber network and power flow characteristics of a power network,a power cyber-physical system model is established.Then,the influences of a false data attack on the decision-making and control processes of the cyber network communication processes are studied,and a cascading failure analysis process is proposed for the cyber-attack environment.In addition,a vulnerability evaluation index is defined from two perspectives,i.e.,the topology integrity and power network operation characteristics.Moreover,the effectiveness of a power flow betweenness assessment for vulnerable nodes in the cyberphysical environment is verified based on comparing the node power flow betweenness and vulnerability assessment index.Finally,an IEEE14-bus power network is selected for constructing a power cyber-physical system.Simulations show that both the uplink communication channel and downlink communication channel suffer from false data attacks,which affect the ability of the cyber network to suppress the propagation of cascading failures,and expand the scale of the cascading failures.The vulnerability evaluation index is calculated for each node,so as to verify the effectiveness of identifying vulnerable nodes based on the power flow betweenness. 展开更多
关键词 Power cyber-physical systems False date injection attack Cascading failure VULNERABILITY Power flow betweenness.
在线阅读 下载PDF
基于DACDiff的分布式电源调度控制系统FDIAs防御方法
6
作者 李元诚 孙鹤洋 +2 位作者 张桐 张贺方 杨立群 《信息网络安全》 北大核心 2025年第4期578-586,共9页
随着可再生能源的发展,分布式电源的应用规模持续扩大,其在高效能源利用和绿色环保方面的优势得到了广泛认可。然而,由于系统的分散性、复杂性和不确定性,使分布式电源调控更易受到虚假数据注入攻击(FDIAs)的安全威胁。FDIAs篡改实时量... 随着可再生能源的发展,分布式电源的应用规模持续扩大,其在高效能源利用和绿色环保方面的优势得到了广泛认可。然而,由于系统的分散性、复杂性和不确定性,使分布式电源调控更易受到虚假数据注入攻击(FDIAs)的安全威胁。FDIAs篡改实时量测数据干扰状态估计和调度决策,可能导致电力系统的不稳定、运行失误,甚至引发严重的电力事故。为确保新型电力系统的安全可靠运行,文章提出一种针对分布式电源调控FDIAs的DACDiff防御方法,该模型基于改进的条件扩散模型,采用DACformer作为去噪网络,采用双重注意力机制捕捉时间序列中的依赖性,通过上采样和多尺度设计更好保留数据特征,用高度逼真的生成数据替换受攻击影响的数据,以保证状态估计的连续性和调控指令的正确性。在电力数据集上的仿真实验结果表明,DACDiff模型在数据生成质量和防御能力方面表现优异,能够有效恢复受到FDIAs影响的分布式电源调控系统,提供了更优的安全性与稳定性。 展开更多
关键词 分布式电源调控 虚假数据注入攻击 主动防御 扩散模型 双重注意力机制
在线阅读 下载PDF
基于自适应差分进化-模糊宽度学习系统的FDIA定位检测方法
7
作者 席磊 陈洪军 +2 位作者 彭典名 王文卓 白芳岩 《中国电机工程学报》 北大核心 2025年第19期7468-7480,I0017,共14页
作为能源互联网的关键组成部分,电力信息物理系统面临着虚假数据注入攻击的威胁。针对此类攻击的检测技术往往忽视攻击注入位置的定位检测,而试图解决这一问题的研究难以在检测精度和计算时间上取得平衡。因此,该文提出一种基于自适应... 作为能源互联网的关键组成部分,电力信息物理系统面临着虚假数据注入攻击的威胁。针对此类攻击的检测技术往往忽视攻击注入位置的定位检测,而试图解决这一问题的研究难以在检测精度和计算时间上取得平衡。因此,该文提出一种基于自适应差分进化-模糊宽度学习系统的定位检测方法。所提算法采用具有横向网络结构的模糊宽度学习系统构成定位检测算法,实现定位检测的快速响应。同时,提出一种自适应差分进化算法对量测数据进行特征选择,剔除其中的冗余特征,有效地提升算法的定位检测精确性。在IEEE-14和57节点系统中进行大量仿真,验证所提方法能够对虚假数据注入攻击进行精确定位,且与多种传统检测算法相比,具有更佳的准确率、精度、召回率和F1-Score。 展开更多
关键词 能源互联网 电力信息物理系统 虚假数据注入攻击 模糊宽度学习系统 差分进化
原文传递
Passivity-Based Robust Control Against Quantified False Data Injection Attacks in Cyber-Physical Systems 被引量:4
8
作者 Yue Zhao Ze Chen +2 位作者 Chunjie Zhou Yu-Chu Tian Yuanqing Qin 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第8期1440-1450,共11页
Secure control against cyber attacks becomes increasingly significant in cyber-physical systems(CPSs).False data injection attacks are a class of cyber attacks that aim to compromise CPS functions by injecting false d... Secure control against cyber attacks becomes increasingly significant in cyber-physical systems(CPSs).False data injection attacks are a class of cyber attacks that aim to compromise CPS functions by injecting false data such as sensor measurements and control signals.For quantified false data injection attacks,this paper establishes an effective defense framework from the energy conversion perspective.Then,we design an energy controller to dynamically adjust the system energy changes caused by unknown attacks.The designed energy controller stabilizes the attacked CPSs and ensures the dynamic performance of the system by adjusting the amount of damping injection.Moreover,with the disturbance attenuation technique,the burden of control system design is simplified because there is no need to design an attack observer.In addition,this secure control method is simple to implement because it avoids complicated mathematical operations.The effectiveness of our control method is demonstrated through an industrial CPS that controls a permanent magnet synchronous motor. 展开更多
关键词 Cyber-physical systems energy controller energy conversion false data injection attacks L2 disturbance attenuation technology
在线阅读 下载PDF
A Probabilistic Trust Model and Control Algorithm to Protect 6G Networks against Malicious Data Injection Attacks in Edge Computing Environments 被引量:1
9
作者 Borja Bordel Sánchez Ramón Alcarria Tomás Robles 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期631-654,共24页
Future 6G communications are envisioned to enable a large catalogue of pioneering applications.These will range from networked Cyber-Physical Systems to edge computing devices,establishing real-time feedback control l... Future 6G communications are envisioned to enable a large catalogue of pioneering applications.These will range from networked Cyber-Physical Systems to edge computing devices,establishing real-time feedback control loops critical for managing Industry 5.0 deployments,digital agriculture systems,and essential infrastructures.The provision of extensive machine-type communications through 6G will render many of these innovative systems autonomous and unsupervised.While full automation will enhance industrial efficiency significantly,it concurrently introduces new cyber risks and vulnerabilities.In particular,unattended systems are highly susceptible to trust issues:malicious nodes and false information can be easily introduced into control loops.Additionally,Denialof-Service attacks can be executed by inundating the network with valueless noise.Current anomaly detection schemes require the entire transformation of the control software to integrate new steps and can only mitigate anomalies that conform to predefined mathematical models.Solutions based on an exhaustive data collection to detect anomalies are precise but extremely slow.Standard models,with their limited understanding of mobile networks,can achieve precision rates no higher than 75%.Therefore,more general and transversal protection mechanisms are needed to detect malicious behaviors transparently.This paper introduces a probabilistic trust model and control algorithm designed to address this gap.The model determines the probability of any node to be trustworthy.Communication channels are pruned for those nodes whose probability is below a given threshold.The trust control algorithmcomprises three primary phases,which feed themodel with three different probabilities,which are weighted and combined.Initially,anomalous nodes are identified using Gaussian mixture models and clustering technologies.Next,traffic patterns are studied using digital Bessel functions and the functional scalar product.Finally,the information coherence and content are analyzed.The noise content and abnormal information sequences are detected using a Volterra filter and a bank of Finite Impulse Response filters.An experimental validation based on simulation tools and environments was carried out.Results show the proposed solution can successfully detect up to 92%of malicious data injection attacks. 展开更多
关键词 6G networks noise injection attacks Gaussian mixture model Bessel function traffic filter Volterra filter
在线阅读 下载PDF
Active resilient defense control against false data injection attacks in smart grids
10
作者 Xiaoyuan Luo Lingjie Hou +3 位作者 Xinyu Wang Ruiyang Gao Shuzheng Wang Xinping Guan 《Control Theory and Technology》 EI CSCD 2023年第4期515-529,共15页
The emerging of false data injection attacks(FDIAs)can fool the traditional detection methods by injecting false data,which has brought huge risks to the security of smart grids.For this reason,a resilient active defe... The emerging of false data injection attacks(FDIAs)can fool the traditional detection methods by injecting false data,which has brought huge risks to the security of smart grids.For this reason,a resilient active defense control scheme based on interval observer detection is proposed in this paper to protect smart grids.The proposed active defense highlights the integration of detection and defense against FDIAs in smart girds.First,a dynamic physical grid model under FDIAs is modeled,in which model uncertainty and parameter uncertainty are taken into account.Then,an interval observer-based detection method against FDIAs is proposed,where a detection criteria using interval residual is put forward.Corresponding to the detection results,the resilient defense controller is triggered to defense the FDIAs if the system states are affected by FDIAs.Linear matrix inequality(LMI)approach is applied to design the resilient controller with H_(∞)performance.The system with the resilient defense controller can be robust to FDIAs and the gain of the resilient controller has a certain gain margin.Our active resilient defense approach can be built in real time and show accurate and quick respond to the injected FDIAs.The effectiveness of the proposed defense scheme is verified by the simulation results on an IEEE 30-bus grid system. 展开更多
关键词 Active resilient defense Attack detection Cyber attacks Cyber-attack detection Cyber grid elements Cyber threat False data injection attack Smart grids security Interval observer
原文传递
Security control of Markovian jump neural networks with stochastic sampling subject to false data injection attacks
11
作者 Lan Yao Xia Huang +1 位作者 Zhen Wang Min Xiao 《Communications in Theoretical Physics》 SCIE CAS CSCD 2023年第10期146-154,共9页
The security control of Markovian jumping neural networks(MJNNs)is investigated under false data injection attacks that take place in the shared communication network.Stochastic sampleddata control is employed to rese... The security control of Markovian jumping neural networks(MJNNs)is investigated under false data injection attacks that take place in the shared communication network.Stochastic sampleddata control is employed to research the exponential synchronization of MJNNs under false data injection attacks(FDIAs)since it can alleviate the impact of the FDIAs on the performance of the system by adjusting the sampling periods.A multi-delay error system model is established through the input-delay approach.To reduce the conservatism of the results,a sampling-periodprobability-dependent looped Lyapunov functional is constructed.In light of some less conservative integral inequalities,a synchronization criterion is derived,and an algorithm is provided that can be solved for determining the controller gain.Finally,a numerical simulation is presented to confirm the efficiency of the proposed method. 展开更多
关键词 Markovian jumping neural networks stochastic sampling looped-functional false data injection attack
原文传递
An Effective Control Report Based Security Countermeasure against the Joint Attacks of False Report Injection Attack and Selective Forwarding Attack
12
作者 Hyun Woo Lee Tae Ho Cho 《Wireless Sensor Network》 2012年第8期185-190,共6页
Sensor networks are vulnerable to many attacks because the sensor networks operate in open environments. It is easy to incur one or more attacks such as a selective forwarding attack, a false report injection attack. ... Sensor networks are vulnerable to many attacks because the sensor networks operate in open environments. It is easy to incur one or more attacks such as a selective forwarding attack, a false report injection attack. It is hard to defend the sensor network from the multiple attacks through existing security methods. Thus, we suggest an energy-efficient security method in order to detect the multiple attacks. This paper presents a security method to detect the false report injection attack and the selective forwarding attack in the sensor network using a new message type. The message type is a filtering message. The filtering message prevents from generating and forwarding false alert messages. We evaluated performance of our proposed method through a simulation in comparison with an application of SEF (statistical enroute filtering scheme) and CHEMAS (Check point-based Multi-hop Acknowledgement Scheme). The simulation results represent that the proposed method is 10% more energy-efficient than the application when the number of false reports is great while retaining the detection performance. 展开更多
关键词 False REPORT injection ATTACK Selective FORWARDING ATTACK SEF CHEMAS
暂未订购
数据驱动算法的电力信息物理系统FDIA定位检测 被引量:1
13
作者 席磊 彭典名 +3 位作者 曹伟 陈洪军 白芳岩 王文卓 《中国电机工程学报》 北大核心 2025年第18期7110-7122,I0008,共14页
虚假数据注入攻击严重威胁电力信息物理系统的安全。针对传统攻击检测方法无法高精度识别攻击并快速定位受攻击节点的问题,该文提出一种数据驱动算法的电力信息物理系统虚假数据注入攻击定位检测方法。首先,将核极限学习机与自编码器结... 虚假数据注入攻击严重威胁电力信息物理系统的安全。针对传统攻击检测方法无法高精度识别攻击并快速定位受攻击节点的问题,该文提出一种数据驱动算法的电力信息物理系统虚假数据注入攻击定位检测方法。首先,将核极限学习机与自编码器结合为多层核极限学习机,逐层学习电力量测数据。然后,利用融合Tent映射和黄金正弦策略的哈里斯鹰算法为多层核极限学习机的参数寻优,提升寻优速度和收敛精度。最后,在IEEE-14和IEEE-118节点系统对所提算法进行仿真验证。结果表明,与其他算法相比,所提算法具有更优的检测速度、准确率、精确率、召回率和F1值,可快速精准定位受攻击节点。 展开更多
关键词 虚假数据注入攻击 电力信息物理系统 定位检测 哈里斯鹰优化算法 核极限学习机
原文传递
FDI Attack Detection and LLM-Assisted Resource Allocation for 6G Edge Intelligence-Empowered Distribution Power Grid 被引量:1
14
作者 Zhang Sunxuan Zhang Hongshuo +3 位作者 Zhou Wen Zhang Ruqi Yao Zijia Zhou Zhenyu 《China Communications》 2025年第7期58-73,共16页
The intelligent operation management of distribution services is crucial for the stability of power systems.Integrating the large language model(LLM)with 6G edge intelligence provides customized management solutions.H... The intelligent operation management of distribution services is crucial for the stability of power systems.Integrating the large language model(LLM)with 6G edge intelligence provides customized management solutions.However,the adverse effects of false data injection(FDI)attacks on the performance of LLMs cannot be overlooked.Therefore,we propose an FDI attack detection and LLM-assisted resource allocation algorithm for 6G edge intelligenceempowered distribution power grids.First,we formulate a resource allocation optimization problem.The objective is to minimize the weighted sum of the global loss function and total LLM fine-tuning delay under constraints of long-term privacy entropy and energy consumption.Then,we decouple it based on virtual queues.We utilize an LLM-assisted deep Q network(DQN)to learn the resource allocation strategy and design an FDI attack detection mechanism to ensure that fine-tuning remains on the correct path.Simulations demonstrate that the proposed algorithm has excellent performance in convergence,delay,and security. 展开更多
关键词 distribution power grids false data injection(fdi)attack large language model(LLM) resource allocation 6G edge intelligence
在线阅读 下载PDF
GUARDIAN: A Multi-Tiered Defense Architecture for Thwarting Prompt Injection Attacks on LLMs
15
作者 Parijat Rai Saumil Sood +1 位作者 Vijay K. Madisetti Arshdeep Bahga 《Journal of Software Engineering and Applications》 2024年第1期43-68,共26页
This paper introduces a novel multi-tiered defense architecture to protect language models from adversarial prompt attacks. We construct adversarial prompts using strategies like role emulation and manipulative assist... This paper introduces a novel multi-tiered defense architecture to protect language models from adversarial prompt attacks. We construct adversarial prompts using strategies like role emulation and manipulative assistance to simulate real threats. We introduce a comprehensive, multi-tiered defense framework named GUARDIAN (Guardrails for Upholding Ethics in Language Models) comprising a system prompt filter, pre-processing filter leveraging a toxic classifier and ethical prompt generator, and pre-display filter using the model itself for output screening. Extensive testing on Meta’s Llama-2 model demonstrates the capability to block 100% of attack prompts. The approach also auto-suggests safer prompt alternatives, thereby bolstering language model security. Quantitatively evaluated defense layers and an ethical substitution mechanism represent key innovations to counter sophisticated attacks. The integrated methodology not only fortifies smaller LLMs against emerging cyber threats but also guides the broader application of LLMs in a secure and ethical manner. 展开更多
关键词 Large Language Models (LLMs) Adversarial Attack Prompt injection Filter Defense Artificial Intelligence Machine Learning CYBERSECURITY
在线阅读 下载PDF
基于海马优化深层极限学习机的电力信息物理系统FDIA检测 被引量:2
16
作者 席磊 白芳岩 +3 位作者 王文卓 彭典名 陈洪军 李宗泽 《电力系统保护与控制》 北大核心 2025年第4期14-26,共13页
虚假数据注入攻击(false data injection attack,FDIA)严重威胁电力信息物理系统的安全稳定。针对已有FDIA检测算法无法精确定位受攻击位置的局限性,提出了一种基于精英余弦变异融合的海马优化算法优化深层极限学习机(deep extreme lear... 虚假数据注入攻击(false data injection attack,FDIA)严重威胁电力信息物理系统的安全稳定。针对已有FDIA检测算法无法精确定位受攻击位置的局限性,提出了一种基于精英余弦变异融合的海马优化算法优化深层极限学习机(deep extreme learning machine,DELM)的FDIA检测定位算法。首先,该算法将极限学习机和极限学习机自编码器相结合得到了具备强特征表达能力的DELM。然后,通过海马优化算法对DELM的偏置和输入权重进行择优,用于改善算法指标不稳定的问题。同时在捕食阶段引入精英余弦变异算法以提升海马的收敛速度与DELM的精度。最后,将系统量测数据作为输入特征,利用DELM得到节点状态标签,从而实现污染状态量的定位。通过在IEEE 14节点系统和IEEE 57节点系统进行大量仿真对比分析,验证了所提算法在准确率、精确率、召回率及F1值等检测定位性能方面均具有明显优势,能够实现FDIA的精确定位。 展开更多
关键词 电力信息物理系统 虚假数据注入攻击 海马优化算法 深层极限学习机
在线阅读 下载PDF
FDI攻击下变比例积分观测的ICPS稳定控制策略
17
作者 黄什倪 孙子文 《控制与决策》 北大核心 2025年第12期3605-3618,共14页
针对非线性工业信息物理系统遭受双侧虚假数据注入攻击和执行器故障的问题,在事件触发的基础上,设计T-S模糊的变比例积分观测器,研究稳定性控制策略.设计平滑自适应事件触发机制,触发参数根据输出误差自适应调整,以减少不必要的数据传输... 针对非线性工业信息物理系统遭受双侧虚假数据注入攻击和执行器故障的问题,在事件触发的基础上,设计T-S模糊的变比例积分观测器,研究稳定性控制策略.设计平滑自适应事件触发机制,触发参数根据输出误差自适应调整,以减少不必要的数据传输;采用T-S模糊模型将非线性系统线性化后,通过构建新的增广系统,设计模糊变比例积分观测器,以估计系统状态、双侧FDI攻击和执行器故障;设计模糊补偿反馈控制器,利用观测器的估计结果,对攻击和故障进行补偿;集成Lyapunov-Krasovskii泛函、线性凸组合、改进的仿射Bessel-Legendre不等式等理论,设计观测器矩阵,协同设计控制器及事件触发矩阵.以工业四容水箱为仿真对象,通过Matlab仿真,验证所提出策略能够确保系统受到攻击和故障时稳定运行,自适应触发机制能够有效减少数据传输. 展开更多
关键词 工业信息物理系统 虚假数据注入攻击 自适应事件触发 T-S模糊 观测器 反馈控制器
原文传递
Stackelberg game-based optimal secure control against hybrid attacks for networked control systems
18
作者 Wei Xiong Yi Dong Liubin Zhou 《Journal of Automation and Intelligence》 2025年第3期236-241,共6页
This paper investigates the problem of optimal secure control for networked control systems under hybrid attacks.A control strategy based on the Stackelberg game framework is proposed,which differs from conventional m... This paper investigates the problem of optimal secure control for networked control systems under hybrid attacks.A control strategy based on the Stackelberg game framework is proposed,which differs from conventional methods by considering both denial-of-service(DoS)and false data injection(FDI)attacks simultaneously.Additionally,the stability conditions for the system under these hybrid attacks are established.It is technically challenging to design the control strategy by predicting attacker actions based on Stcakelberg game to ensure the system stability under hybrid attacks.Another technical difficulty lies in establishing the conditions for mean-square asymptotic stability due to the complexity of the attack scenarios Finally,simulations on an unstable batch reactor system under hybrid attacks demonstrate the effectiveness of the proposed strategy. 展开更多
关键词 Stackelberg game Networked control systems Hybrid attacks DoS attack fdi attack
在线阅读 下载PDF
Hash-based FDI attack-resilient distributed self-triggered secondary frequency control for islanded microgrids
19
作者 Xing Huang Yulin Chen +4 位作者 Donglian Qi Yunfeng Yan Shaohua Yang Ying Weng Xianbo Wang 《Global Energy Interconnection》 2025年第1期1-12,共12页
Given the rapid development of advanced information systems,microgrids(MGs)suffer from more potential attacks that affect their operational performance.Conventional distributed secondary control with a small,fixed sam... Given the rapid development of advanced information systems,microgrids(MGs)suffer from more potential attacks that affect their operational performance.Conventional distributed secondary control with a small,fixed sampling time period inevitably causes the wasteful use of communication resources.This paper proposes a self-triggered secondary control scheme under perturbations from false data injection(FDI)attacks.We designed a linear clock for each DG to trigger its controller at aperiodic and intermittent instants.Sub-sequently,a hash-based defense mechanism(HDM)is designed for detecting and eliminating malicious data infiltrated in the MGs.With the aid of HDM,a self-triggered control scheme achieves the secondary control objectives even in the presence of FDI attacks.Rigorous theoretical analyses and simulation results indicate that the introduced secondary control scheme significantly reduces communication costs and enhances the resilience of MGs under FDI attacks. 展开更多
关键词 MICROGRIDS Distributed secondary control Self-triggered control Hash algorithms False data injection attack
在线阅读 下载PDF
Wavelet Transform-Based Bayesian Inference Learning with Conditional Variational Autoencoder for Mitigating Injection Attack in 6G Edge Network
20
作者 Binu Sudhakaran Pillai Raghavendra Kulkarni +1 位作者 Venkata Satya Suresh kumar Kondeti Surendran Rajendran 《Computer Modeling in Engineering & Sciences》 2025年第10期1141-1166,共26页
Future 6G communications will open up opportunities for innovative applications,including Cyber-Physical Systems,edge computing,supporting Industry 5.0,and digital agriculture.While automation is creating efficiencies... Future 6G communications will open up opportunities for innovative applications,including Cyber-Physical Systems,edge computing,supporting Industry 5.0,and digital agriculture.While automation is creating efficiencies,it can also create new cyber threats,such as vulnerabilities in trust and malicious node injection.Denialof-Service(DoS)attacks can stop many forms of operations by overwhelming networks and systems with data noise.Current anomaly detection methods require extensive software changes and only detect static threats.Data collection is important for being accurate,but it is often a slow,tedious,and sometimes inefficient process.This paper proposes a new wavelet transformassisted Bayesian deep learning based probabilistic(WT-BDLP)approach tomitigate malicious data injection attacks in 6G edge networks.The proposed approach combines outlier detection based on a Bayesian learning conditional variational autoencoder(Bay-LCVariAE)and traffic pattern analysis based on continuous wavelet transform(CWT).The Bay-LCVariAE framework allows for probabilistic modelling of generative features to facilitate capturing how features of interest change over time,spatially,and for recognition of anomalies.Similarly,CWT allows emphasizing the multi-resolution spectral analysis and permits temporally relevant frequency pattern recognition.Experimental testing showed that the flexibility of the Bayesian probabilistic framework offers a vast improvement in anomaly detection accuracy over existing methods,with a maximum accuracy of 98.21%recognizing anomalies. 展开更多
关键词 Bayesian inference learning automaton convolutional wavelet transform conditional variational autoencoder malicious data injection attack edge environment 6G communication
在线阅读 下载PDF
上一页 1 2 36 下一页 到第
使用帮助 返回顶部