2.845

2023影响因子

(CJCR)

  • 中文核心
  • EI
  • 中国科技核心
  • Scopus
  • CSCD
  • 英国科学文摘

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

定位系统恶意攻击同源性分析及协同观测器定位矫正方法

史雨堃 李肖磊 上官义恒 车万里 王友清

史雨堃, 李肖磊, 上官义恒, 车万里, 王友清. 定位系统恶意攻击同源性分析及协同观测器定位矫正方法. 自动化学报, xxxx, xx(x): x−xx doi: 10.16383/j.aas.c240717
引用本文: 史雨堃, 李肖磊, 上官义恒, 车万里, 王友清. 定位系统恶意攻击同源性分析及协同观测器定位矫正方法. 自动化学报, xxxx, xx(x): x−xx doi: 10.16383/j.aas.c240717
Shi Yu-Kun, Li Xiao-Lei, Shangguan Yi-Heng, Che Wan-Li, Wang You-Qing. Homology analysis of positioning system offset caused by malicious attack and the method of positioning calibration using distributed secure state observer. Acta Automatica Sinica, xxxx, xx(x): x−xx doi: 10.16383/j.aas.c240717
Citation: Shi Yu-Kun, Li Xiao-Lei, Shangguan Yi-Heng, Che Wan-Li, Wang You-Qing. Homology analysis of positioning system offset caused by malicious attack and the method of positioning calibration using distributed secure state observer. Acta Automatica Sinica, xxxx, xx(x): x−xx doi: 10.16383/j.aas.c240717

定位系统恶意攻击同源性分析及协同观测器定位矫正方法

doi: 10.16383/j.aas.c240717 cstr: 32138.14.j.aas.c240717
基金项目: 国家自然科学基金(62303038, 62433004), 中央高校基本科研业务费(ZY2411), 新疆生产建设兵团科技计划(2024YD016)资助
详细信息
    作者简介:

    史雨堃:北京化工大学信息科学与技术学院讲师. 主要研究方向为控制系统恶意攻击, 分布式安全状态估计. E-mail: yukun_shi@buct.edu.cn

    李肖磊:北京化工大学信息科学与技术学院硕士研究生. 主要研究方向为GPS定位模拟. E-mail: 2023200743@buct.edu.cn

    上官义恒:北京化工大学信息科学与技术学院硕士研究生. 主要研究方向为分布式系统恶意攻击. E-mail: 2023200785@buct.edu.cn

    车万里:北京化工大学信息科学与技术学院硕士研究生. 主要研究方向为控制系统恶意攻击. E-mail: 2024200769@buct.edu.cn

    王友清:北京化工大学信息科学与技术学院教授. 主要研究方向为复杂工业系统安全, 故障诊断与容错控制. 本文通信作者. E-mail: wang.youqing@ieee.org

Homology Analysis of Positioning System Offset Caused by Malicious Attack and the Method of Positioning Calibration Using Distributed Secure State Observer

Funds: Supported by National Natural Science Foundation of China (62303038, 62433004), Fundamental Research Funds for the Central Universities (ZY2411), and Science and Technology Program of XPCC (2024YD016)
More Information
    Author Bio:

    SHI Yu-Kun Lecturer at the College of Information Science and Technology, Beijing University of Chemical Technology. His research interest covers malicious attacks on control systems, and distributed security state estimation

    LI Xiao-Lei Master student at the College of Information Science and Technology, Beijing University of Chemical Technology. His main research interest is GPS positioning simulation

    SHANGGUAN Yi-Heng Master student at the College of Information Science and Technology, Beijing University of Chemical Technology. His main research interest is malicious attacks on distributed systems

    CHE Wan-Li Master student at the College of Information Science and Technology, Beijing University of Chemical Technology. His main research interest is malicious attacks on control systems

    WANG You-Qing Professor at the College of Information Science and Technology, Beijing University of Chemical Technology. His research interest covers complex industrial system security, and fault diagnosis and fault-tolerant control. Corresponding author of this paper

  • 摘要: 全球定位系统由于其较长的传输距离和较弱的加密方式, 易受到恶意攻击的影响. 定位系统中的恶意阻断攻击、恶意欺骗攻击与恶意偏差注入攻击会导致攻击范围内的接收设备产生相似的定位偏移. 针对定位系统中恶意攻击的同源性进行了深入分析, 并设计了分布式观测器以实现定位矫正. 针对定位系统中常见的三种攻击, 分别设计了恰当的模拟实现方式, 能够在多次蒙特卡洛实验很好的控制环境变量, 从而得到具有统计意义的实验结果. 本文还建立了不随偏差注入攻击幅值变化的定位偏移同源性的衡量指标, 分析了三种典型恶意攻击的同源性. 然而, 现有的分布式观测器方法没有考虑系统包含安全输出和存在有界噪声的情况, 这使得观测器的应用受到了限制. 同时提出了一种适配复杂系统的观测器来实现恶意攻击下的定位校正, 并得到了观测器收敛的充分条件. 仿真结果证明了观测器理论的有效性.
    1)  11 http://github.com/google/gps-output-tools2 https://urs.earthdata.nasa.gov/
    2)  2https: //urs.earthdata.nasa.gov/
    3)  33 https: //en.wikipedia.org/wiki/Coefficient_of_variation
    4)  44 卫星编号为: 1 4 5 10 11 12 13 15 18 19 21 24 28 33 195 196.
  • 图  1  GPS定位中使用的硬件和软件

    Fig.  1  Hardware and software used in GPS positioning

    图  2  三种攻击的模拟实现方法原理示意图

    Fig.  2  Schematic diagram of simulation implementation methods for three types of attacks

    图  3  接收器的位置以及它的同源度$ \theta$

    Fig.  3  The location of the receiver and its homology $ \theta$

    图  4  阻断攻击数量对同源度的影响(蒙特卡洛)

    Fig.  4  The impact of blocking attack quantity on homology (Monte Carlo)

    图  5  欺骗攻击数量对同源度的影响(蒙特卡洛)

    Fig.  5  The impact of spoofing attack quantity on homology (Monte Carlo)

    图  6  偏差注入攻击数量对同源度的影响(蒙特卡洛)

    Fig.  6  The impact of biasing injection attack quantity on homology (Monte Carlo)

    图  7  偏差注入攻击幅值对同源度的影响(蒙特卡洛)

    Fig.  7  The impact of biasing injection attack amplitude on homology (Monte Carlo)

    图  8  利用DSSE实现GPS定位校正的整体系统图

    Fig.  8  The overall system diagram of GPS positioning calibration using DSSE

    图  9  系统的拓扑结构

    Fig.  9  Topology structure of the system

    图  10  各个无人机的状态估计误差

    Fig.  10  Estimation error of state for each drone

    图  11  各个无人机的状态分量估计误差

    Fig.  11  Estimation error of state components for each drone

    图  12  各个无人机的中间攻击估计

    Fig.  12  Estimation of intermediate attacks by each drones

  • [1] 谭粤, 黄观文, 付文举, 王乐, 谢威, 曹钰. 一种顾及轨道误差的实时GPS钟差估计方法. 导航定位与授时, 2023, 10(01): 125−132

    Tan Yue, Huang Guan-Wen, Fu Wen-Ju, Wang Le, Xie Wei, Cao Yu. A real-time GPS clock estimation method considering orbital error. Navigation Positioning and Timing, 2023, 10(01): 125−132
    [2] Berkane S, Tayebi A, De M S. A nonlinear navigation observer using imu and generic position information. Automatica, 2021, 127: 109513
    [3] Pardhasaradhi B, Yakkati R R, Cenkeramaddi L R. Machine learning-based screening and measurement to measurement association for navigation in GNSS spoofing environment. IEEE Sensors Journal, 2022, 22: 23423−23435
    [4] He H, Chen Y, Qi W, Wang M, Chen X. Observer-based resilient control of positive systems with heterogeneous dos attacks: A markov model approach. J. Frankl. Inst., 2021, 359: 272−293
    [5] 应晨铎, 伍益明, 徐明, 郑宁, 何熊熊. 欺骗攻击下具备隐私保护的多智能体系统均值趋同控制. 自动化学报, 2023, 49(2): 425−436

    Ying Chen-Duo, Wu Yi-Ming, Xu Ming, Zheng Ning, He Xiong-Xiong. Privacy-preserving average consensus control for multi-agent systems under deception attacks. Acta Automatica Sinica, 2023, 49(2): 425−436
    [6] 翁品迪, 陈博, 俞立. 虚假数据注入攻击信号的融合估计. 自动化学报, 2021, 47(9): 2292−2300

    Weng Pin-di, Chen Bo, Yu Li. Fusion estimate of FDI attack signals. Acta Automatica Sinica, 2021, 47(9): 2292−2300
    [7] 胡沁伶, 郑宁, 徐明, 伍益明, 何熊熊. DoS攻击下具备隐私保护的多智能体系统均值趋同控制. 自动化学报, 2022, 48(8): 1961−1971

    Hu Qin-Ling, Zheng Ning, Xu Ming, Wu Yi-Ming, He Xiong-Xiong. Privacy-preserving average consensus control for multi-agent systems under DoS attacks. Acta Automatica Sinica, 2022, 48(8): 1961−1971
    [8] Shi M, Wan N. Estimate the states of multiagent systems under homologous attacks by optimization approaches. IEEE Transactions on Control of Network Systems, 2023, 10(1): 430−440
    [9] Pirayesh H, Zeng H. Jamming attacks and anti-jamming strategies in wireless networks: A comprehensive survey. IEEE Communications Surveys & Tutorials, 2021, 24: 767−809
    [10] Pardhasaradhi B, Srihari P, Aparna P. Spoofer-to-target association in multi-spoofer multi-target scenario for stealthy GPS spoofing. IEEE Access, 2021, 9: 108675−108688
    [11] Chen X, He D, Yan X, Yu W, Truong T. GNSS interference type recognition with fingerprint spectrum dnn method. IEEE Transactions on Aerospace and Electronic Systems, 2022, 58: 4745−4760
    [12] Zhang K W, Larsson E G, Papadimitratos P. Protecting GNSS open service navigation message authentication against distance-decreasing attacks. IEEE Transactions on Aerospace and Electronic Systems, 2022, 58: 1224−1240
    [13] Zhu X, Lu Z, Hua T, Yang F, Tu G, Chen X. A novel GPS meaconing spoofing detection technique based on improved ratio combined with carrier-to-noise moving variance. Electronics, 2022, 11(5): 738
    [14] Pardhasaradhi B, Cenkeramaddi L R. GPS spoofing detection and mitigation for drones using distributed radar tracking and fusion. IEEE Sensors Journal, 2022, 22(11): 11122−11134
    [15] Shi Y, Wang Y. Online secure state estimation of multiagent systems using average consensus. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2022, 52(5): 3174−3186
    [16] Zhang H, Peng S, Liu L, Su S, Cao Y. Review on GPS spoofing-based time synchronisation attack on power system. IET Generation, Transmission and Distribution, 2020, 14(20): 4301−4309
    [17] Shi M, Guan X, Yiu K, Li B, Wu A. Further results on state estimation of multi-agent systems under homologous attacks. Automatica, 2024, 166: 111699 doi: 10.1016/j.automatica.2024.111699
    [18] Shi Y, Liu C, Wang Y. Asymptotically stable filter for MVU estimation of states and homologous unknown inputs in heterogeneous multiagent systems. IEEE Transactions on Automation Science and Engineering, 2022, 19(2): 884−894 doi: 10.1109/TASE.2021.3060075
    [19] 秦自兵, 钟雄, 张伟, 张政. GPS信号与特性分析的研究. 数字通信世界, 2024, 06(06): 12−14 doi: 10.3969/J.ISSN.1672-7274.2024.06.002

    Qin Zi-Bing, Zhong Xiong, Zhang Wei, Zhang Zheng. Research on GPS signal and characterization analysis. Digital Communication World, 2024, 06(06): 12−14 doi: 10.3969/J.ISSN.1672-7274.2024.06.002
    [20] Shi Y K, Wang Y Q, Tuo J Y. Distributed secure state estimation of multi-agent systems under homologous sensor attacks. IEEE/CAA Journal of Automatica Sinica, 2022, 10(1): 67−77
    [21] Shi Y, Liu C, Wang Y. Secure state estimation of multiagent systems with homologous attacks using average consensus. IEEE Transactions on Control of Network Systems, 2021, 8(3): 1293−1303
    [22] 张岱峰, 段海滨. 恶意攻击下基于分布式稀疏优化的安全状态估计. 自动化学报, 2021, 47(4): 813−824

    Zhang Dai-Feng, Duan Hai-Bin. Secure state estimation based on distributed sparse optimization under malicious attacks. Acta Automatica Sinica, 2021, 47(4): 813−824
    [23] Shi Y, Ma H, Tuo J, Wang Y. Event-triggered distributed secure state estimation for homologous sensor attacks. ISA Transactions, 2023, 143: 10−19 doi: 10.1016/j.isatra.2023.09.011
  • 加载中
计量
  • 文章访问数:  9
  • HTML全文浏览量:  9
  • 被引次数: 0
出版历程
  • 收稿日期:  2025-01-06
  • 录用日期:  2025-02-14
  • 网络出版日期:  2025-03-30

目录

    /

    返回文章
    返回