Clustering-based detection algorithm of remote state estimation under stealthy innovation-based attacks with historical data

被引:0
作者
Chen, Shan [1 ]
Ni, Yuqing [1 ]
Huang, Lingying [2 ]
Luan, Xiaoli [1 ]
Liu, Fei [1 ]
机构
[1] Jiangnan Univ, Sch Internet Things Engn, Key Lab Adv Proc Control Light Ind, Minist Educ, Wuxi, Peoples R China
[2] Nanyang Technol Univ, Ctr Syst Intelligence & Efficiency, Singapore, Singapore
基金
中国国家自然科学基金;
关键词
Cyber-physical systems security; Gaussian mixture model; Remote state estimation; Strictly stealthy attacks; Clustering; CYBER-PHYSICAL SYSTEMS; SECURITY;
D O I
10.1016/j.neucom.2024.128942
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper investigates a security issue in cyber-physical systems (CPSs) concerning the performance of a multi-sensor remote state estimation under a novel attack called "Optimal Stealthy Innovation-Based Attacks with Historical Data". The attacker is able to launch a linear attack to modify sensor measurements. The objective of the attacker is to maximize the deterioration of estimation performance while ensuring they remain undetected by the chi(2) detector. To counteract this new type of attack, a remote state estimator equipped with a detection mechanism that utilizes a Gaussian mixture model (GMM) is employed. We derive the error covariances for the remote state estimator with and without a GMM detection mechanism in a recursive manner under Optimal Stealthy Innovation-Based Attacks with Historical Data. The experimental results demonstrate the superiority of the GMM detection mechanism. However, it is observed that the estimation performance of the GMM-based system deteriorates as the system dimension increases. In order to address this issue, we propose two dimensionality reduction methods, namely kernel principal component analysis (KPCA) and variational autoencoder (VAE), to enhance the estimation performance. Finally, the results are illustrated via the simulation examples.
引用
收藏
页数:13
相关论文
共 31 条
  • [31] Secure State Estimation for Artificial Neural Networks With Unknown-But-Bounded Noises: A Homomorphic Encryption Scheme
    Zhu, Kaiqun
    Wang, Zidong
    Ding, Derui
    Dong, Hongli
    Xu, Cheng-Zhong
    [J]. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2024, : 1 - 12