Vulnerability Analysis of Distributed State Estimator Under False Data Injection Attacks

被引:6
作者
Li, Pengyu [1 ]
Ye, Dan [1 ,2 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Peoples R China
[2] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang 110819, Peoples R China
基金
中国国家自然科学基金;
关键词
Cyber-physical systems; distributed state estimation; vulnerability; false data injection attacks;
D O I
10.1109/TIFS.2024.3396634
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper focuses on the vulnerability and strict vulnerability of distributed state estimators under false data injection (FDI) attacks, where adversaries aim to exert unbounded effects on the estimation error dynamics by injecting malicious data into sensor nodes, communication links, or both. In particular, a distributed system is characterized as vulnerable (or strictly vulnerable) if there exists an unbounded FDI attack that leads to bounded changes (or no changes) in residuals. By utilizing invertibility theory and carefully designed attack sequences, we establish the conditions for systems to be (strictly) vulnerable, based on different attack scenarios. Additionally, we provide a comparative analysis to evaluate the varying impact of different attacks on system security. Finally, a three-area grid system model is presented to illustrate the validity of the theoretical results.
引用
收藏
页码:5235 / 5244
页数:10
相关论文
共 26 条
[1]   Co-Estimation of State and FDI Attacks and Attack Compensation Control for Multi-Area Load Frequency Control Systems Under FDI and DoS Attacks [J].
Chen, Xiaoli ;
Hu, Songlin ;
Li, Yu ;
Yue, Dong ;
Dou, Chunxia ;
Ding, Lei .
IEEE TRANSACTIONS ON SMART GRID, 2022, 13 (03) :2357-2368
[2]   Distributed Krein space-based attack detection over sensor networks under deception attacks [J].
Ge, Xiaohua ;
Han, Qing-Long ;
Zhong, Maiying ;
Zhang, Xian-Ming .
AUTOMATICA, 2019, 109
[3]   Defending False Data Injection on State Estimation Over Fading Wireless Channels [J].
Ghosh, Saptarshi ;
Bhatnagar, Manav R. ;
Saad, Walid ;
Panigrahi, Bijaya K. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 :1424-1439
[4]   Optimal Linear Cyber-Attack on Remote State Estimation [J].
Guo, Ziyang ;
Shi, Dawei ;
Johansson, Karl Henrik ;
Shi, Ling .
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2017, 4 (01) :4-13
[5]   Detection and Performance Compensation for Linear ?-Stealthy Attacks in Cyber-Physical Systems [J].
Li, Pengyu ;
Ye, Dan .
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2023, 10 (03) :1338-1349
[6]   Measurement-Based Optimal Stealthy Attacks on Remote State Estimation [J].
Li, Pengyu ;
Ye, Dan .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 :3365-3374
[7]   Distributed Model-Based Control and Scheduling for Load Frequency Regulation of Smart Grids Over Limited Bandwidth Networks [J].
Liu, Shichao ;
Liu, Peter Xiaoping .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (05) :1814-1823
[8]   Distributed state estimation for renewable energy microgrids with sensor saturations [J].
Qu, Bogang ;
Wang, Zidong ;
Shen, Bo ;
Dong, Hongli .
AUTOMATICA, 2021, 131
[9]   INVERTIBILITY OF LINEAR TIME-INVARIANT DYNAMICAL SYSTEMS [J].
SAIN, MK ;
MASSEY, JL .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 1969, AC14 (02) :141-+
[10]   Optimal Linear Encryption Against Stealthy Attacks on Remote State Estimation [J].
Shang, Jun ;
Chen, Maoyin ;
Chen, Tongwen .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (08) :3592-3607