On vulnerability of Kalman filtering with holistic estimation performance loss

被引:0
作者
Zhou, Jing [1 ]
Shang, Jun [2 ,3 ,4 ]
Chen, Tongwen [1 ]
机构
[1] Univ Alberta, Dept Elect & Comp Engn, Edmonton, AB T6G 1H9, Canada
[2] Tongji Univ, Shanghai Inst Intelligent Sci & Technol, Natl Key Lab Autonomous Intelligent Unmanned Syst, Shanghai 201210, Peoples R China
[3] Tongji Univ, Shanghai Inst Intelligent Sci & Technol, Frontiers Sci Ctr Intelligent Autonomous Syst, Shanghai 201210, Peoples R China
[4] Tongji Univ, Dept Control Sci & Engn, Shanghai 201804, Peoples R China
基金
加拿大自然科学与工程研究理事会; 中国国家自然科学基金;
关键词
Anomaly detectors; Deception attacks; Holistic performance; Kalman filters; Remote state estimation; CYBER-PHYSICAL SYSTEMS; ATTACKS;
D O I
10.1016/j.automatica.2024.111895
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article addresses the problem of optimal deception attacks against remote state estimation, where the measurement data is transmitted through an unreliable wireless channel. A malicious adversary can intercept and tamper with raw data to maximize estimation quality degradation and deceive chi(2) detectors. In contrast to prior studies that concentrate on greedy attack performance, we consider a more general scenario where attackers aim to maximize the sum of estimation errors within a fixed interval. It is demonstrated that the optimal attack policy, based on information-theoretic principles, is a linear combination of minimum mean-square error estimates of historical prediction errors. The combination coefficients are then obtained by solving a convex optimization problem. Furthermore, the proposed attack approach is extended to deceive multiple-step chi(2) detectors of varying widths with strict/relaxed stealthiness by slightly adjusting some linear equality constraints. The effectiveness of the proposed approach is validated through numerical examples and comparative studies with existing methods.
引用
收藏
页数:13
相关论文
共 27 条
  • [1] Cyber Security of Water SCADA Systems-Part I: Analysis and Experimentation of Stealthy Deception Attacks
    Amin, Saurabh
    Litrico, Xavier
    Sastry, Shankar
    Bayen, Alexandre M.
    [J]. IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2013, 21 (05) : 1963 - 1970
  • [2] Anderson B. D., 2005, Optimal Filtering
  • [3] Massive MIMO Systems With Non-Ideal Hardware: Energy Efficiency, Estimation, and Capacity Limits
    Bjornson, Emil
    Hoydis, Jakob
    Kountouris, Marios
    Debbah, Merouane
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2014, 60 (11) : 7112 - 7139
  • [4] Security Against False Data-Injection Attack in Cyber-Physical Systems
    Chattopadhyay, Arpan
    Mitra, Urbashi
    [J]. IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2020, 7 (02): : 1015 - 1027
  • [5] Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems
    Chen, Yuan
    Kar, Soummya
    Moura, Jose M. F.
    [J]. IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2018, 5 (03): : 1157 - 1168
  • [6] Secure State Estimation and Control of Cyber-Physical Systems: A Survey
    Ding, Derui
    Han, Qing-Long
    Ge, Xiaohua
    Wang, Jun
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2021, 51 (01): : 176 - 190
  • [7] Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks
    Fawzi, Hamza
    Tabuada, Paulo
    Diggavi, Suhas
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2014, 59 (06) : 1454 - 1467
  • [8] Worst-Case Innovation-Based Integrity Attacks With Side Information on Remote State Estimation
    Guo, Ziyang
    Shi, Dawei
    Johansson, Karl Henrik
    Shi, Ling
    [J]. IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2019, 6 (01): : 48 - 59
  • [9] Worst-case stealthy innovation-based linear attack on remote state estimation
    Guo, Ziyang
    Shi, Dawei
    Johansson, Karl Henrik
    Shi, Ling
    [J]. AUTOMATICA, 2018, 89 : 117 - 124
  • [10] Optimal Linear Cyber-Attack on Remote State Estimation
    Guo, Ziyang
    Shi, Dawei
    Johansson, Karl Henrik
    Shi, Ling
    [J]. IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2017, 4 (01): : 4 - 13