Clustering-based detection algorithm of remote state estimation under stealthy innovation-based attacks with historical data

被引:0
作者
Chen, Shan [1 ]
Ni, Yuqing [1 ]
Huang, Lingying [2 ]
Luan, Xiaoli [1 ]
Liu, Fei [1 ]
机构
[1] Jiangnan Univ, Sch Internet Things Engn, Key Lab Adv Proc Control Light Ind, Minist Educ, Wuxi, Peoples R China
[2] Nanyang Technol Univ, Ctr Syst Intelligence & Efficiency, Singapore, Singapore
基金
中国国家自然科学基金;
关键词
Cyber-physical systems security; Gaussian mixture model; Remote state estimation; Strictly stealthy attacks; Clustering; CYBER-PHYSICAL SYSTEMS; SECURITY;
D O I
10.1016/j.neucom.2024.128942
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper investigates a security issue in cyber-physical systems (CPSs) concerning the performance of a multi-sensor remote state estimation under a novel attack called "Optimal Stealthy Innovation-Based Attacks with Historical Data". The attacker is able to launch a linear attack to modify sensor measurements. The objective of the attacker is to maximize the deterioration of estimation performance while ensuring they remain undetected by the chi(2) detector. To counteract this new type of attack, a remote state estimator equipped with a detection mechanism that utilizes a Gaussian mixture model (GMM) is employed. We derive the error covariances for the remote state estimator with and without a GMM detection mechanism in a recursive manner under Optimal Stealthy Innovation-Based Attacks with Historical Data. The experimental results demonstrate the superiority of the GMM detection mechanism. However, it is observed that the estimation performance of the GMM-based system deteriorates as the system dimension increases. In order to address this issue, we propose two dimensionality reduction methods, namely kernel principal component analysis (KPCA) and variational autoencoder (VAE), to enhance the estimation performance. Finally, the results are illustrated via the simulation examples.
引用
收藏
页数:13
相关论文
共 31 条
  • [1] Alpcan T., 2010, Network Security: A Decision and Game-Theoretic Approach
  • [2] Data-Driven Coordinated Attack Policy Design Based on Adaptive L2-Gain Optimal Theory
    An, Liwei
    Yang, Guang-Hong
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2018, 63 (06) : 1850 - 1857
  • [3] On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds
    Bai, Cheng-Zong
    Gupta, Vijay
    Pasqualetti, Fabio
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2017, 62 (12) : 6641 - 6648
  • [4] Bai CZ, 2015, P AMER CONTR CONF, P195, DOI 10.1109/ACC.2015.7170734
  • [5] Cardenas Alvaro A., 2008, 2008 28th International Conference on Distributed Computing Systems Workshops (ICDCS Workshops), P495, DOI 10.1109/ICDCS.Workshops.2008.40
  • [6] Security Against False Data-Injection Attack in Cyber-Physical Systems
    Chattopadhyay, Arpan
    Mitra, Urbashi
    [J]. IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2020, 7 (02): : 1015 - 1027
  • [7] Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks
    Fawzi, Hamza
    Tabuada, Paulo
    Diggavi, Suhas
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2014, 59 (06) : 1454 - 1467
  • [8] Resilient control under Denial-of-Service: Robust design
    Feng, Shuai
    Tesi, Pietro
    [J]. AUTOMATICA, 2017, 79 : 42 - 51
  • [9] Secure State Estimation Against Integrity Attacks: A Gaussian Mixture Model Approach
    Guo, Ziyang
    Shi, Dawei
    Quevedo, Daniel E.
    Shi, Ling
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2019, 67 (01) : 194 - 207
  • [10] Worst-case stealthy innovation-based linear attack on remote state estimation
    Guo, Ziyang
    Shi, Dawei
    Johansson, Karl Henrik
    Shi, Ling
    [J]. AUTOMATICA, 2018, 89 : 117 - 124