Model-free False Data Injection Attack in Networked Control Systems: A Feedback Optimization Approach
Abstract
Security issues have gathered growing interest within the control systems community, as physical components and communication networks are increasingly vulnerable to cyber attacks. In this context, recent literature has studied increasingly sophisticated false data injection attacks, with the aim to design mitigative measures that improve the systems’ security. Notably, data-driven attack strategies – whereby the system dynamics is oblivious to the adversary – have received increasing attention. However, many of the existing works on the topic rely on the implicit assumption of linear system dynamics, significantly limiting their scope. Contrary to that, in this work we design and analyze truly model-free false data injection attack that applies to general linear and nonlinear systems. More specifically, we aim at designing an injected signal that steers the output of the system toward a (maliciously chosen) trajectory. We do so by designing a zeroth-order feedback optimization policy and jointly use probing signals for real-time measurements. We then characterize the quality of the proposed model-free attack through its optimality gap, which is affected by the dimensions of the attack signal, the number of iterations performed, and the convergence rate of the system. Finally, we extend the proposed attack scheme to the systems with internal noise. Extensive simulations show the effectiveness of the proposed attack scheme.
Index Terms:
Data-driven, false data injection attacks, zeroth-order feedback optimization.I Introduction
Networked control systems have seen a surge of interest in recent years, largely owing to their widespread applicability to commonly encountered problems including mobile robots coordination, smart grids operation, unmanned vehicles control, remote diagnosis, to mention but a few [1, 2, 3]. As physical components and communication networks are increasingly vulnerable to cyber attacks, security issues have gathered growing traction in the community.
In this context, false data injection (FDI) – whereby an attacker injects false data by compromising sensor readings or communication channels – is a commonly encountered form of attack [4]. Crucially, through an FDI attack, an adversary can cause significant damage to the infrastructure while remaining undetected.
I-A Motivation
Against this backdrop, recent literature has proposed increasingly sophisticated FDI attacks, with the hope that understanding their workings would lead to the design of mitigative measures that improve the systems’ security [5, 6, 7, 8]. Among them, data-driven attack strategies – whereby an attack signal is designed solely relying on the available system’s measurements – have received growing attention. However, three critical issues deserve further consideration. First, many of the existing works tacitly assume that, while unknown, the underlying system follows a linear time invariant dynamics [9, 10, 11]. This significantly restricts the power of the adversary. Second, without any prior information about the system model, the ability that the adversary achieves its attack objective needs to be explored. It is conducive to analyzing the system’s vulnerability. Third, when the capability of the adversary is limited, e.g., the attack energy is limited [12], it is practical and promising to excavate the potential attack’s impact while achieving the malicious objective.
In this work, we tackle the aforementioned issues by proposing a novel data-driven FDI attack that, crucially, does not rely on prior information regarding the system’s model, and applies to general non-linear dynamics. Towards this goal, we leverage zeroth-order optimization methods, a class of optimization algorithms that do not necessitate the availability of the cost function’s gradient, but simply exploit function evaluations [13]. More specifically, we leverage zeroth-order optimization methods in the context of feedback optimization, where optimization algorithms are utilized as feedback controllers for dynamical systems [14]. These tools provide a new approach to design data-driven attacks.
I-B Contributions
In this work, we design a model-free FDI attack that does not rely on knowledge of the underlying dynamics and that applies to general linear and non-linear systems. Specifically, we aim at steering the output of an unknown dynamical system to a (maliciously chosen) trajectory, through the sole use of real-time measurements. We do so in the bounded attack model, where an upper bound on the energy of the injected signal is given. A comparison between the existing FDI attack strategies and our work is shown in Table I.
Compared to our conference version [15], we extend the proposed model-free attack strategy to systems with internal noise and explore its effects on the optimality of the obtained solutions. Moreover, we significantly expand upon the related work, motivation, performance analysis, and simulation results. The main contributions are summarized as follows.
|
|
Our work | ||||||||
---|---|---|---|---|---|---|---|---|---|---|
|
|
|
None | |||||||
|
|
|
|
|||||||
|
|
|
|
-
•
We construct a zeroth-order feedback optimization framework for the design of an FDI attack strategy, where the adversary has limited capability and no prior information about the system model.
-
•
We propose a model-free attack scheme that drives the output of the system to a maliciously chosen trajectory. From a methodological standpoint, its novelty lies in directly updating the attack signal based on the objective function evaluations.
-
•
We theoretically characterize the solution’s optimality gap. Further, we analyze the impact of the attack signal’s dimension, of the iteration numbers, of the variance of the objective function, and of the convergence rate of the dynamical system on the optimality gap. Finally, we extend the proposed model-free attack scheme to noisy systems and derive an upper bound of the optimality gap.
I-C Paper organization
The rest of the paper is organized as follows. Section II reviews the related works. Section III introduces the system and adversary model and formulates the FDI attack design problem. In Section IV, we design the proposed model-free attack strategy and analyze the optimality gap. Section V extends the model-free attack scheme to noisy systems. In Section VI, we analyze the design of stealthy attacks. Simulation results are presented in Section VII. Finally, we conclude our work in Section VIII.
II Related works
Existing FDI attack strategies can be divided into two streams depending on whether they rely on a model-based or data-driven approach.
The literature on model-based FDI attack strategy is vast, and includes [5, 16, 7, 17, 8]. In the following, we review only the works that are most relevant to ours. When the adversary is aware of the system dynamics and other critical information (e.g., statistical properties of noise and the controller’s feedback matrix), Chen et al. [5] formulate a linear quadratic cost function to steer the system state to a desired value, while satisfying a detection-avoidance constraint. In similar settings, i.e., when knowledge of the system dynamics is available, Guo et al. [16] propose an innovation-based linear attack strategy and formulates a two-stage optimization problem to obtain the most-damaging attack policy. In [7], Wang proposes an optimal attack strategy to deteriorate the performance of fault detectors by solving coupled backward recursive Riccati difference equations (RDEs). In [17], the authors design an FDI attack strategy against a remote state estimation algorithm with sensor-to-estimator communication rate constraint. With the knowledge of all system parameters except for the filter gain, Zhang et al. [8] design stealthy attacks based on the Fisher information matrix to maximize the estimation error. Note that the design of the above FDI attack strategies is mostly based on the full knowledge of the system model. However, when the system model changes or its exact knowledge is unavailable, the previous approaches can not be applied.
On the other hand, data-driven attack strategies have recently gained momentum [18, 9, 10, 6]. Two approaches are typically pursued. The first approach consists in exploiting offline observation of the system’s dynamics to identify the matrices of the linear system model. Naturally, this approach does not apply to genuinely non-linear dynamics. The second approach consists in directly utilizing input-output data to design an attack strategy. For example, Esmalifalak et al. [18] apply linear independent component analysis (ICA) to estimate the system Jacobian matrix and design unobservable attacks based on the inferred structure. Kim et al. [9] extend the work in [4] and present two data-driven attack strategies based on subspace methods. An et al. [10] formulate the attack goal as a data-based -gain composite optimization problem and propose a new multiobjective adaptive dynamic programming (ADP) method for designing the attack policy. Zhao et al. [6] propose an undetected FDI attack strategy based on a subspace identification technique to maximize the state estimation error. Note that the linearity of the system dynamics is still a crucial and implicit assumption necessary for all the aforementioned works. Our work relaxes this assumption and provides a new perspective to construct a completely model-free attack strategy based on the zeroth-order feedback optimization framework.
III Problem formulation
III-A System dynamic model adversary model
Consider a discrete-time dynamical system
(1) |
where is the system state at iteration , is the system input, is the system output.
Assumption 1.
The system (1) is stable under the control of system input .
Consider that the adversary can compromise the stable system and manipulate the state arbitrarily and aims to steer the output value to its expected trajectory. The dynamical system under attack can be rewritten as
(2) |
where the attack selection matrix is defined as the non-zero columns of with the binary variable if the -th dimensional state is compromised, and is the injected false data. Then, we make the following assumption about the ability of the adversary.
Assumption 2.
The capability of the adversary is limited, i.e., , where is the upper bound of attack energy.
Assumption 2 is common for energy-constrained adversaries [12], which means that the injected false data is bounded. With Assumptions 1 and 2, it is easy to obtain the following lemma to show that the compromised system (2) is still stable.
Lemma 1.
For the compromised system (2), there exists a unique steady-state map such that . The map is -Lipschitz with respect to , and the function is -Lipschitz with respect to .
Remark 1.
Lemma 1 is similar to [19] for guaranteeing the stability of the system. If the system under the bounded FDI attacks has no unique steady-state map , it is obvious that the system will diverse and even the original system (1) is unstable. The properties of the map can be ensured by the implicit function theorem [20, Theorem 1B.1]. With Lemma 1, in the steady state we have
Additionally, the Lyapunov theorem presented in [21, Theorem 2.7] guarantees that there exist a Lyapunov function and parameters such that
(3) | |||
(4) |
Based on (3) and (4), the rate of the change in one step of the function value is denoted by
(5) |
Assumption 3.
The convergence rate satisfies .
III-B Problem formulation
In this paper, we aim to design a completely model-free attack strategy, which is independent of the characteristics and parameters of the system model itself.
Herein, we consider that the adversary’s objective is to steer the output value to follow its expected malicious trajectory as closely as possible. We also consider that the adversary has limited attack energy. Therefore, the total goal of adversaries is to reduce both the error between the true system output and expected trajectory and the consumed attack energy as much as possible. In addition, since our proposed attack strategy performs the optimization with the same objective function at each iteration , we omit the subscript and formally formulate the problem as
(6) | ||||
where is the steady-state map under attacks in (2) to guarantee the stability of the compromised system (2), is the expected trajectory and is the positive definite weight matrix chosen by the adversary according to the tradeoff between the limited attack energy and tracking deviation . We also make a common assumption for the optimized objective function as follows.
Assumption 4.
The function is -Lipschitz with respect to , -Lipschitz with respect to , and .
The challenges of solving problem come from two aspects. One is the nonlinearity of the system model. For the unknown nonlinear system model (2), it is hard to regress its critical system parameters. The other is how to use the compromised measurements to guide the output value to move along the desired trajectory while reducing the consumed attack energy as much as possible. Since is unknown, it is difficult to directly obtain the gradients of the objective function with respect to the independent variable to solve problem .
The key idea of the zeroth-order optimization is to utilize the objective function evaluations to construct gradient estimates, thus avoiding using the gradients directly. We aim to construct the gradient estimates of the objective function to solve problem . Different from the traditional zeroth-order optimization framework for the design of the controller with non-manipulated measurements, our design focuses on utilizing the compromised measurements to design the attack signal in the original control systems with designed controllers. Herein, we mainly explore the model-free attack strategy without detector constraints and the attack design under detector constraints will be analyzed in Section VI.
IV Model-free attack strategy design
In this section, we first introduce the zeroth-order optimization framework, which is the basis of our attack strategy design. Then, we utilize real-time measurements to design the attack signal. Finally, we analyze the optimality of the proposed attack strategy.
IV-A Preliminaries of zeroth-order optimization
The attack strategy design in this paper is inspired by the gradient estimates based on the residual feedback in [13].
For an objective function , the gradient estimate proposed in [13] is
(7) |
where and are independent random vectors selected uniformly from the unit sphere , i.e., and is the smoothing parameter. Note that only a new objective function evaluation needs to be computed at each iteration in (7) because the objective value evaluated at the previous iteration is reused at the current iteration .
According to [13, Lemma 5], in (7) is an unbiased estimate of the gradient of the smooth approximation for at , where
(8) |
The properties of are shown as follows.
From (9c), we know that is -smooth, i.e., its gradient is -Lipschitz continuous.

IV-B Attack strategy design
The proposed attack strategy iteratively updates attack inputs along the composite direction of the negative gradient estimates of the objective function and the projected gradients. Such a design only utilizes real-time measurements and thus makes the attack strategy intrinsically model-free.
We denote as the constraint set in problem . With the zeroth-order optimization framework, the proposed model-free attack strategy can be divided into three steps and the schematic of the attack strategy design is shown in Fig.1.
Step : Compute the gradient estimate
(10) |
where and are independent probing signals and follow the uniform distribution from the Euclidean unit sphere , i.e., .
Since only the real-time measurements are available for the adversary and it is hard to directly compute the gradients of the objective function in problem , we first utilize the probing signal for measurements, which can be used to construct the objective function evaluations and at the current and previous iteration. Herein, the historic function evaluation is reused at iteration . Then we compute the gradient estimates of the objective function by these evaluations with (10).
Step : Update the obtained solution
(11) |
where is the projection onto constrained set , i.e., , and step-size . To constrain the obtained solutions in the feasible region set by , we turn to the projected gradient descent method for updating the solution at iteration and solving the optimization problem with constraints.
Step : Update the attack signal
(12) |
Finally, the attack signal can be obtained by perturbing the solution with the probing signal .
IV-C Performance analysis
Let . We use the optimality gap, i.e.,
(13) |
to measure the optimality of the proposed attack strategy at where is the optimal solution at iteration and is the expectation with respect to where .
Before we characterize (13), we provide the upper bounds of and , and some supporting lemmas for auxiliary analysis. We have
(14) |
where follows from the projection property [23, Lemma 2.4] and [24], i.e., for any and all , we have , and follows the fact that . Similarly, we have
(15) |
Note that we replace the steady output value with the real-time output value to enter the closed-loop zeroth-order feedback optimization framework. It is unavoidable for the system to produce the error , which is shown as
(16) |
To derive the optimality gap (13), we first analyze the upper bound of the error and recursive inequalities of two critical variables, i.e., and .
The proofs of Lemmas 3, 4 and 5 are shown in Appendix IX-A, IX-B and IX-C, respectively. Lemma 3 quantifies the close relationship between and . Lemma 4 measures the proximity of the current state compared with the steady state . Lemma 5 reflects the first order smoothness of the objective function evaluation at the solution .
Next, we provide the following theorem to characterize the optimality of the obtained solutions. Note that . For simplicity, all the complexity results in this paper are presented in notations.
Theorem 1.
Proof.
Please see Appendix IX-D. ∎
Theorem 1 shows that the optimality gap is related to the dimension of the attack signal, the convergence rate of the system, and the iterations . As the iterations increase gradually, the optimality gap decreases and it can even decay to zero as long as is large enough.
V Noise effects on model-free attack design
In this part, we further explore the effects of internal inherent noises on the proposed attack strategy and derive the optimality of solutions.
V-A Problem reformulation
With noise , the original system (2) can be rewritten as
(21) |
where the injected false data satisfies Assumption 2 and the internal inherent noise is independent of the state and statistically. Herein, we consider the additive noise , such as . Similar to Assumption 1, the above discrete-time system is stable with noise before the invasion of attacks, which can be guaranteed by [25, Theorem 2.2] if follows a standard Wiener process, i.e., the stochastic noise has zero mean and time-varying covariance. Let . In this case, the optimization problem becomes
(22) | ||||
where is the steady-state map under attacks in (21) to guarantee the stability of the compromised system. Let . Then, we provide the following assumptions for the objective function .
Assumption 5.
For any , there exists such that
(23) |
Assumption 6.
The function is -Lipschitz with respect to , -Lipschitz with respect to , and . Moreover, we have and .
Assumption 5 provides a bounded variance of the objective function in the stochastic setting, which also implies that [13]. In Assumption 6, the Lipschitz constants in the noisy system are constrained to be not larger than that in the noiseless system.
Moreover, the following lemma reveals that the compromised system (21) can still be stable in spite of the process and measurement noises and the noises do not influence the Lipschitz constant of the steady-state map.
Lemma 6.
For the compromised system (21), there exists a unique steady-state map such that for any . In addition, is -Lipschitz with respect to , and the function is -Lipschitz with respect to .
Proof.
The proof can be divided into two parts. One is to find a Lyapunov function for guaranteeing the existence of the steady-state map. The other is to show the continuation property of the steady-state map based on the implicit function theorem [20, Theorem 1B.1].
Existence of the steady-state. In the steady-state, we have
Similarly, there exists the following Lyapunov function and parameters such that
(24) | |||
(25) |
Based on (24) and (25), the rate of the change in one step of the function value is denoted as
(26) |
The stability of the compromised system can be guaranteed if .
Continuity of the steady-state. Let . Differentiating both sides of the above equation with respect to gives that
When is continuously differentiable with respect to in the neighborhood of and is nonsingular, is the Lipschitz function with respect to where the Lipschitz constant satisfies
Since we consider the additive noise from (21), it can be followed that
where . Thus, it is inferred that the existence of noise does not influence the Lipschitz continuous property of the steady-state with respect to and the Lipschitz constant is the same as that without noise. Similarly, for , we have the same result. Hence, the proof is completed. ∎
Remark 2.
Lemma 6 is similar to Lemma 3 where the noise is independent of the state and the injected false data . From Lemma 6, we know that the process and measurement noises affect the convergence rate but not the Lipschitz constant of the steady-state map. Apparently, . If , the rate that the system converges to the steady state becomes slow (i.e., the noise reduces the convergence rate), which is shown in Fig. 5 in Section VII.
V-B Attack strategy design with noise
With the zeroth-order optimization framework, the model-free attack strategy under the discrete-time system with noise is designed as
(27) |
where and are independent random noises that are sampled at iterations and , respectively. Different from (10), the existence of noise will also affect the objective function value. Moreover, the function value is not repeatable at different iterations and it is hard to store the noise value at each iteration for computing the function value. Thus, at iteration , only one evaluation is possible. In other words, compared to (10), it takes the residual of objective function evaluations between two consecutive stochastic feedback points.
V-C Optimality with the general noise
With the noise , the following lemma provides the upper bound of and in this stochastic setting.
The proofs of Lemmas 7 and 8 are shown in Appendix IX-E and IX-F, respectively. Different from Lemmas 4 and 5, the internal inherent noise leads to an additional term and , respectively.
Next, we show the following theorem to characterize the effects of noise on the optimality of the obtained solutions.
Theorem 2.
Remark 3.
The proof is shown in Appendix IX-G. As , the right side of (2) approaches . The nonzero upper bound is related to the dimension of the injected false data, the variance of the objective function originating from noise and the convergence rate . Compared with (1) in Theorem 1, we also reveal that the existence of noise increases the optimality gap.
VI Discussion
In this part, we show the detailed comparisons among the existing works on the design of the FDI attack strategy in Table II and Table III, and introduce the feasible stealthy attack design. Since the design of the stealthy attack depends on the existence of the original attack detector, the produced stealthy attack strategy could be different due to distinct detection criteria. Moreover, the general assumption on the stealthy attack is that the knowledge of the existing detector is known. Herein, we discuss the following three detection criteria.
Works | [16] | [17] | [5] | [8] | ||||||||||
|
|
|
|
|||||||||||
Noise | Gaussian distribution with zero mean (i.i.d.) | |||||||||||||
|
|
|
detector |
|
||||||||||
|
|
|
|
|
||||||||||
|
Innovation-based | Random theory |
|
|
||||||||||
|
All system model knowledge |
|
If the detection criterion satisfies
(31) |
the optimality of the obtained solutions in the proposed strategy remains as long as the actual output trajectory meets . Since it is a crude and inaccurate detection for a nonlinear/linear system, it is easy to deal with the stealthy constraint.
If the detection criterion depends on the distribution gap between the normal output value and the compromised output value. For example, Kullback-Leibler divergence [26] is a good tool to measure how well two probability distributions match. Let and follows a known distribution. For example, in the linear system with Gaussian noise, the Kalman filter error is an independent and identically distributed (i.i.d) Gaussian variable with . Let and then the stealthy attacks should meet
(32) |
where is a given stealthy parameter. In this case, the stealthy constraint can be further simplified when has the same statistical property as .
If the system adopts the data-driven detector, such as the machine-learning-based detection mechanisms [27, 28, 29] or the behavior-based data-driven detection methods [30], the anomalies can be detected based on the characteristic of the chosen methods. Specifically, the study [27] develops a One-Class Support Vector Machine (OCSVM) algorithm to classify the outlier class. The work [28] proposes the cumulative sum (CUSUM) method to detect the deviations that correspond to anomalies. In [30], a behavior-based detector was constructed based on a sequence of inputs and outputs and their covariance. When the stealthy attack is familiar with the existing learning-based/behavior-based detectors, the stealthy constraints can be derived and the obtained solutions are restricted in a new constraint set. Thus, the analysis of the updated constraint set is critical to the design of the FDI attack strategy with detectors.
Works | [18] | [9] | [10] | [6] | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|
|||||||||||||
Noise | Gaussian distribution | Gaussian distribution | ||||||||||||
|
Subsapce |
|
detector | |||||||||||
|
|
|
|
|
||||||||||
|
|
Subspace method |
|
Subspace method | ||||||||||
|
|
|
|
|
VII Simulation results
In this section, we evaluate the performance of the proposed attack scheme, i.e., the tracking performance and the optimality of solutions without/with noise.
Consider the following system
(33) |
where with . It is stable, controllable, and observable. We consider two kinds of noise, including and . We set the initial state , the probing signal to satisfy , and the initial solution is random and follows the standard uniform distribution. We also set the smoothing parameter , the step-size , the attack selection matrix and the weight matrix where is a two-dimensional diagonal unit matrix. We define two types of the expected output trajectories, including the static trajectory and dynamic output trajectory with respect to iteration . Each data point in the following figures represents an ensemble average of trials.
Without noise , we first analyze the tracking performance with different desired output trajectories. As shown in Fig. 2, the output value of the system under the proposed attack strategy has the ability to track the expected output trajectory whether the trajectory is static or dynamic. Especially, Fig. 2 and Fig. 2 illustrate that the output values fluctuate along the desired trajectory. Note that the phenomenon of fluctuation is normal since the output values are constantly perturbed by the time-varying probing signal .
Then, we illustrate the optimality of solutions via the optimality gap , which is shown in Fig. 3. When the expected trajectory is static, i.e., , we find that the obtained solution is close to the optimal solution and the optimality gap converges to about , as shown in Fig. 3. When the expected trajectory is time-varying, i.e., , in Fig. 3, the obtained solutions also approach the optimal one and the upper bound of the optimality gap does not exceed . To sum up, the proposed model-free attack strategy can obtain the suboptimal attack signals that drive the output values to the desired output trajectory by only utilizing the real-time compromised measurements.




With noise , we analyze its effects on the tracking performance and optimality. The output and the optimality gap under uniform distribution noise and normal distribution noise are denoted as , , and , respectively. From boxplot Fig. 4 with iterations , we know that the final value of the actual output is and the median is . In other words, the slope of the dynamic trajectory of the output value is , which follows the expected one, and the noise does not influence the tracking trend while adding lots of outliers. In addition, combined with Fig. 5, the average optimality gap (red line in Fig. 4 / blue line in Fig 5) of trials approaches zero although there are some outliers (red plus in Fig. 4 / pink shadow in Fig. 5). Moreover, the optimality gap is larger than that without noise and the normal distribution noise has smaller effects than the uniform distribution noise on the optimality gap.


VIII Conclusion
We considered the problem of designing a model-free attack scheme where the adversary with limited capability aims to make the output value follow the desired trajectory without any prior system model information. The designed attack scheme is model-free since only real-time measurements are required. These measurements are used to compute objective function evaluations and gradient estimates are constructed to update the attack signal based on these objective function evaluations at the previous and current time. Moreover, considering the adversary has limited capability, we constrained the obtained solutions within the feasible region by the projected gradient descent method. Finally, we analyzed the optimality of solutions and established its dependence on the dimensions of the attack signal, the iterations, the variance of the objective function, and the convergence rate of the system. Future works include the design of attack strategies with partial observations and specific detector constraints.
IX APPENDIX
IX-A Proof of Lemma 3
IX-B Proof of Lemma 4
Based on (3), we have
where follows the fact that and follows from (2), (IX-A), and the Lipschitz continuity of . The upper bound of is given as
where follows that , follows from (IV-C) and , and follows the fact that since is selected uniformly at random from the unit sphere.
Combining the above results, we can infer that (4) holds.
IX-C Proof of Lemma 5
Let and . With (10) and (16), then we have
where follows the fact that . Next, we provide the upper bound of the item and , respectively.
(36) |
where holds by adding and minus , holds due to Assumption 4 and the dependency of with respect to , and follows the fact that (IV-C) holds and .
(37) |
where holds based on the Cauchy-Schwarz inequality capable of splitting the product of two correlated random variables and and holds based on (17). Combined with the above results, the proof is completed.
IX-D Proof of Theorem 1
Since the objective function is convex, the Gaussian smooth approximation of is also convex[31]. With (9b), then we have
(38) |
With (9c), the Taylor expansion of at solution is shown as
(39) |
where is the optimal solution of the problem at iteration . Taking the expectation of at both ends of the inequality (IX-D), then we have
Since
where the inequality follows the fact that for ,
then it can be inferred that
Next, we analyze the upper bound of the item and .
where follows the fact that , follows from (9c), i.e., is smoothness, and follows from (9c) and .
where follows from (IV-C), follows that , and follows from (IV-C).
The second moment of the gradient of at solution is and we have
where the inequality follows the fact that . Since
which follows from in [19, Theorem 8], with (5),
Rearranging the above items, thus we have
Then, it follows that
(40) |
To guarantee , we set . Combined (4), (38) and (IX-D), we obtain
(41) |
Since and are coupled variables, we rely on [19, Lemma 11], which shows the upper bound of the partial sum of non-negative coupled series, to analyze (IX-D).
Combining (4) and (5), we can obtain a compacted form, which is shown as
where with
(42) |
Then, we have
(43) | ||||
(44) |
where and is the maximum singular value of the matrix .
By solving the characteristic equation with eigenvalues , then
(45) |
To guarantee , we need to set and such that
(46) |
Then, combined (IX-D) and (IX-D), it follows that
(47) |
where
Due to , we set such that and have the same order. Then, the order of (IX-D) is shown as (1). The parameter is set to satisfy (46), i.e.,
(48) |
where
The feasible range is denoted by . Based on (48), we have
IX-E Proof of Lemma 7
IX-F Proof of Lemma 8
The analysis is similar to the proof of Appendix IX-C. Let . With (27), then we have
Next, we provide the upper bound of the item and , respectively.
where holds by adding and minus , follows from the Cauchy-Schwarz inequality, follows from Assumption 5 and , (s.4) holds due to the same procedure as (IX-C) of the proof in Appendix IX-C. Similarly, the term follows from (IX-C). Based on the above inequalities, (8) can be obtained.
IX-G Proof of Theorem 2
Following from the same procedure in Appendix IX-D, we have that
(50) |
Acknowledgments
The authors would like to thank Zhiyu He (now pursuing Ph.D in ETH ) for early inspiring discussions and valuable comments on this topic.
References
- [1] P. Antsaklis and J. Baillieul, “Special issue on technology of networked control systems,” Proceedings of the IEEE, vol. 95, no. 1, pp. 5–8, 2007.
- [2] R. A. Gupta and M.-Y. Chow, “Networked control system: Overview and research trends,” IEEE Transactions on Industrial Electronics, vol. 57, no. 7, pp. 2527–2535, 2009.
- [3] X.-M. Zhang, Q.-L. Han, X. Ge, D. Ding, L. Ding, D. Yue, and C. Peng, “Networked control systems: A survey of trends and techniques,” IEEE/CAA Journal of Automatica Sinica, vol. 7, no. 1, pp. 1–17, 2019.
- [4] Y. Liu, P. Ning, and M. K. Reiter, “False data injection attacks against state estimation in electric power grids,” ACM Transactions on Information and System Security (TISSEC), vol. 14, no. 1, pp. 1–33, 2011.
- [5] Y. Chen, S. Kar, and J. M. Moura, “Optimal attack strategies subject to detection constraints against cyber-physical systems,” IEEE Transactions on Control of Network Systems, vol. 5, no. 3, pp. 1157–1168, 2017.
- [6] Z. Zhao, Y. Huang, Z. Zhen, and Y. Li, “Data-driven false data-injection attack design and detection in cyber-physical systems,” IEEE Transactions on Cybernetics, vol. 51, no. 12, pp. 6179–6187, 2020.
- [7] X.-L. Wang, “Optimal attack strategy against fault detectors for linear cyber-physical systems,” Information Sciences, vol. 581, pp. 390–402, 2021.
- [8] Q. Zhang, K. Liu, D. Han, G. Su, and Y. Xia, “Design of stealthy deception attacks with partial system knowledge,” IEEE Transactions on Automatic Control, 2022.
- [9] J. Kim, L. Tong, and R. J. Thomas, “Subspace methods for data attack on state estimation: A data driven approach,” IEEE Transactions on Signal Processing, vol. 63, no. 5, pp. 1102–1114, 2014.
- [10] L. An and G.-H. Yang, “Data-driven coordinated attack policy design based on adaptive -gain optimal theory,” IEEE Transactions on Automatic Control, vol. 63, no. 6, pp. 1850–1857, 2017.
- [11] R. Alisic, J. Kim, and H. Sandberg, “Model-free undetectable attacks on linear systems using lwe-based encryption,” IEEE Control Systems Letters, vol. 7, pp. 1249–1254, 2023.
- [12] H. Zhang, P. Cheng, L. Shi, and J. Chen, “Optimal denial-of-service attack scheduling with energy constraint,” IEEE Transactions on Automatic Control, vol. 60, no. 11, pp. 3023–3028, 2015.
- [13] Y. Zhang, Y. Zhou, K. Ji, and M. M. Zavlanos, “A new one-point residual-feedback oracle for black-box learning and control,” Automatica, vol. 136, p. 110006, 2022.
- [14] M. Colombino, E. Dall’Anese, and A. Bernstein, “Online optimization as a feedback controller: Stability and tracking,” IEEE Transactions on Control of Network Systems, vol. 7, no. 1, pp. 422–432, 2020.
- [15] X. Luo, C. Fang, C. Zhao, and J. He, “A model-free false data injection attack strategy in networked control systems,” in IEEE Conference on Decision and Control (CDC), accepted, 2022.
- [16] Z. Guo, D. Shi, K. H. Johansson, and L. Shi, “Worst-case stealthy innovation-based linear attack on remote state estimation,” Automatica, vol. 89, pp. 117–124, 2018.
- [17] H. Zhang, P. Cheng, J. Wu, L. Shi, and J. Chen, “Online deception attack against remote state estimation,” IFAC Proceedings Volumes, vol. 47, no. 3, pp. 128–133, 2014.
- [18] M. Esmalifalak, H. Nguyen, R. Zheng, and Z. Han, “Stealth false data injection using independent component analysis in smart grid,” in 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm). IEEE, 2011, pp. 244–248.
- [19] Z. He, S. Bolognani, J. He, F. Dörfler, and X. Guan, “Model-free nonlinear feedback optimization,” arXiv preprint arXiv:2201.02395, 2022.
- [20] A. L. Dontchev and R. T. Rockafellar, Implicit functions and solution mappings. Springer, 2009, vol. 543.
- [21] N. Bof, R. Carli, and L. Schenato, “Lyapunov theory for discrete time systems,” arXiv preprint arXiv:1809.05289, 2018.
- [22] G. Belgioioso, D. Liao-McPherson, M. H. de Badyn, S. Bolognani, J. Lygeros, and F. Dörfler, “Sampled-data online feedback equilibrium seeking: Stability and tracking,” arXiv preprint arXiv:2103.13988, 2021.
- [23] P. Jain, P. Kar et al., “Non-convex optimization for machine learning,” Foundations and Trends® in Machine Learning, vol. 10, no. 3-4, pp. 142–363, 2017.
- [24] A. Nedić and J. Liu, “Distributed optimization for control,” Annual Review of Control, Robotics, and Autonomous Systems, vol. 1, pp. 77–103, 2018.
- [25] H. Deng, M. Krstic, and R. J. Williams, “Stabilization of stochastic nonlinear systems driven by noise of unknown covariance,” IEEE Transactions on Automatic Control, vol. 46, no. 8, pp. 1237–1253, 2001.
- [26] S. Kullback, Information theory and statistics. Courier Corporation, 1997.
- [27] L. A. Maglaras and J. Jiang, “Intrusion detection in SCADA systems using machine learning techniques,” in Science and Information Conference, 2014, pp. 626–631.
- [28] J. Goh, S. Adepu, M. Tan, and Z. S. Lee, “Anomaly detection in cyber physical systems using recurrent neural networks,” in IEEE International Symposium on High Assurance Systems Engineering (HASE), 2017, pp. 140–145.
- [29] E. Anthi, L. Williams, M. Rhode, P. Burnap, and A. Wedgbury, “Adversarial attacks on machine learning cybersecurity defences in industrial control systems,” Journal of Information Security and Applications, vol. 58, p. 102717, 2021.
- [30] D. Gadginmath, V. Krishnan, and F. Pasqualetti, “Direct vs indirect methods for behavior-based attack detection,” arXiv preprint arXiv:2209.07564, 2022.
- [31] S. Liu, X. Li, P.-Y. Chen, J. Haupt, and L. Amini, “Zeroth-order stochastic projected gradient descent for nonconvex optimization,” in IEEE Global Conference on Signal and Information Processing (GlobalSIP), 2018, pp. 1179–1183.
Xiaoyu Luo (S’19) received B.E. degree in the Department of Automation from Tianjin University, Tianjin, China, in 2019. She is currently pursuing the Ph.D. degree with the Department of Automation, Shanghai Jiao Tong University, Shanghai, China. She is a member of Intelligent of Wireless Networking and Cooperative Control group. Her research interests include fault-tolerant control in multi-agent systems, cooperative charging in energy storage system and security of cyber-physical systems.
Chrongrong Fang received the B.Sc. degree in automation and the Ph.D. degree in control science and engineering from Zhejiang University, Hangzhou, China, in 2015 and 2020, respectively. He is currently an Assistant Professor with the Department of Automation, Shanghai Jiao Tong University, Shanghai, China. His research interests include anomaly detection and diagnosis in cyber-physical systems and cloud networks.
Jianping He (M’15-SM’19) is currently an associate professor in the Department of Automation at Shanghai Jiao Tong University. He received the Ph.D. degree in control science and engineering from Zhejiang University, Hangzhou, China, in 2013, and had been a research fellow in the Department of Electrical and Computer Engineering at University of Victoria, Canada, from Dec. 2013 to Mar. 2017. His research interests mainly include the distributed learning, control and optimization, security and privacy in network systems. Dr. He serves as an Associate Editor for IEEE Trans. on Control of Network Systems, IEEE Open Journal of Vehicular Technology and KSII Trans. Internet and Information Systems. He was also a Guest Editor of IEEE TAC, IEEE TII, International Journal of Robust and Nonlinear Control, etc. He was the winner of Outstanding Thesis Award, Chinese Association of Automation, 2015. He received the best paper award from IEEE WCSP’17, the best conference paper award from IEEE PESGM’17, the finalist best student paper award from IEEE ICCA’17, and the finalist best conference paper award from IEEE VTC’20-Fall.
Chengcheng Zhao received the PhD degree in control science and engineering from Zhejiang University, Hangzhou, China, in 2018. She is currently a research fellow in the Department of Electrical and Computer Engineering, University of Victoria. Her research interests include consensus and distributed optimization, distributed energy management in smart grids, vehicle platoon, and security and privacy in network systems. She received IEEE PESGM 2017 best conference papers award, and one of her paper was shortlisted in IEEE ICCA 2017 best student paper award finalist. She is a peer reviewer for Automatica, IEEE Transactions on Information Forensics and Security, IEEE Transactions on Industrial Electronics and etc. She was the TPC member for IEEE GLOBECOM 2017, 2018, and IEEE ICC 2018.
Dario Paccagnan is an Assistant Professor and a member of the Computational Optimization Group in the Department of Computing, Imperial College London. Previously, he was a Postdoctoral Fellow with the Mechanical Engineering Department and the Center for Control, Dynamical Systems and Computation, University of California, Santa Barbara. In 2018, Dario obtained a Ph.D. degree from the Information Technology and Electrical Engineering Department, ETH Zurich, Switzerland. He received a B.Sc. and M.Sc. in Aerospace Engineering in 2011 and 2014 from the University of Padova, Italy, and a M.Sc. in Mathematical Modelling and Computation from the Technical University of Denmark in 2014; all with Honors. Dario was a visiting scholar at the University of California, Santa Barbara in 2017, and at Imperial College of London, in 2014. His interests are at the interface between control theory and game theory, with a focus on the design of behavior-influencing mechanisms for socio-technical systems. Applications include multiagent systems and smart cities. Dr. Paccagnan was awarded the ETH medal, and is recipient of the SNSF fellowship for his work in Distributed Optimization and Game Design.