Linear Attacks Against Remote State Estimation: Performance Analysis Under an Encryption Scheme

被引:4
作者
Liu, Hanxiao [1 ,2 ]
Ni, Yuqing [3 ]
Wang, Xiaofan [1 ,2 ]
Xie, Lihua [4 ]
机构
[1] Shanghai Univ, Sch Future Technol, Shanghai 200444, Peoples R China
[2] Shanghai Univ, Inst Artificial Intelligence, Shanghai 200444, Peoples R China
[3] Jiangnan Univ, Sch Internet Things Engn, Wuxi 214000, Peoples R China
[4] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore
来源
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS | 2024年 / 11卷 / 04期
基金
中国国家自然科学基金;
关键词
Encryption; State estimation; Watermarking; Technological innovation; Detectors; Performance analysis; Noise measurement; Encryption scheme; linear attacks; performance analysis; state estimation; CONTROL-SYSTEMS; INTEGRITY ATTACKS; SECURITY;
D O I
10.1109/TCNS.2024.3355059
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article is concerned with the performance analysis of innovation-based remote state estimation with an encryption scheme under linear attacks. We investigate performances from the perspectives of both the system defender and the malicious attacker. For the system defender, we begin by detailing the design of an encryption mechanism that achieves an optimal tradeoff between the estimation performance and the detection probability. Subsequently, we explore two scenarios where the attacker is aware of the existence of the proposed scheme. In these scenarios, we formulate the problems of seeking optimal linear attack strategies as convex optimization problems, and semidefinite programming is employed to find their numerical solutions. In particular, a closed-form expression of the worst-case attacks is obtained when the attacker can observe the system state through its own sensor deployment. Moreover, we conduct a comparative analysis between these two scenarios and prove that the worst-case attack strategies have their respective advantages and disadvantages under different cases. Finally, some numerical examples are given to illustrate the theoretical results.
引用
收藏
页码:1812 / 1824
页数:13
相关论文
共 30 条
[1]  
[Anonymous], 2019, COMPUT FRAUD SECUR, P4
[2]  
[Anonymous], 2004, Smart Environments: Technologies, Protocols, and Applications
[3]   On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds [J].
Bai, Cheng-Zong ;
Gupta, Vijay ;
Pasqualetti, Fabio .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2017, 62 (12) :6641-6648
[4]  
Bai CZ, 2015, P AMER CONTR CONF, P195, DOI 10.1109/ACC.2015.7170734
[5]   A method to integrate and classify normal distributions [J].
Das, Abhranil ;
Geisler, Wilson S. .
JOURNAL OF VISION, 2021, 21 (10)
[6]   Worst-Case Innovation-Based Integrity Attacks With Side Information on Remote State Estimation [J].
Guo, Ziyang ;
Shi, Dawei ;
Johansson, Karl Henrik ;
Shi, Ling .
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2019, 6 (01) :48-59
[7]   Worst-case stealthy innovation-based linear attack on remote state estimation [J].
Guo, Ziyang ;
Shi, Dawei ;
Johansson, Karl Henrik ;
Shi, Ling .
AUTOMATICA, 2018, 89 :117-124
[8]   Optimal Linear Cyber-Attack on Remote State Estimation [J].
Guo, Ziyang ;
Shi, Dawei ;
Johansson, Karl Henrik ;
Shi, Ling .
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2017, 4 (01) :4-13
[9]   Secure remote state estimation against linear man-in-the-middle attacks using watermarking [J].
Huang, Jiahao ;
Ho, Daniel W. C. ;
Li, Fangfei ;
Yang, Wen ;
Tang, Yang .
AUTOMATICA, 2020, 121
[10]   The Performance and Limitations of ε-Stealthy Attacks on Higher Order Systems [J].
Kung, Enoch ;
Dey, Subhrakanti ;
Shi, Ling .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2017, 62 (02) :941-947