Stealthy Noise Injection Attacks Against State Estimation in Interconnected Systems

被引:3
|
作者
Huo, Jian-Ru [1 ]
Li, Xiao-Jian [1 ,2 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Peoples R China
[2] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang 110819, Peoples R China
基金
中国国家自然科学基金;
关键词
Interconnected systems; Detectors; Covariance matrices; Estimation error; State estimation; Kalman filters; Security; local detector; attack design; convex optimization; state estimation;
D O I
10.1109/TCSII.2022.3233447
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This brief investigates the stealthy attack design problem for interconnected systems, where the aim of the attacker is to maximize the estimation error covariance of the centralized state estimator by injecting elaborately designed Gaussian noises into the compromised subsystem. The proposed attack strategy can achieve complete stealthiness for local detectors and keep a certain level of stealthiness for the centralized one simultaneously, which differs from the existing attack strategies for interconnected systems. Due to the nature of the attack model and interconnected systems, the stealthiness constraint is so complex that it is difficult to directly solve the formulated optimization problem to obtain the detailed attack strategy. To transform the stealthiness constraint, the eigenvalues of matrices are used to characterize the upper and lower bounds of the corresponding determinant, and then the closed-form optimal attack strategy is derived. Finally, a 1D network simulation example is provided to verify the developed results.
引用
收藏
页码:2042 / 2046
页数:5
相关论文
共 50 条
  • [1] Optimal Linear Encryption Against Stealthy Attacks on Remote State Estimation
    Shang, Jun
    Chen, Maoyin
    Chen, Tongwen
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (08) : 3592 - 3607
  • [2] Optimal Stealthy Joint Attacks Against Distributed State Estimation in Cyber-Physical Systems
    Su, Guangzhen
    Liu, Kun
    Wang, Haojun
    Zhang, Qirui
    Xia, Yuanqing
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2024, 11 (03): : 1597 - 1609
  • [3] Event-Based Optimal Stealthy False Data-Injection Attacks Against Remote State Estimation Systems
    Guo, Haibin
    Sun, Jian
    Pang, Zhong-Hua
    Liu, Guo-Ping
    IEEE TRANSACTIONS ON CYBERNETICS, 2023, 53 (10) : 6714 - 6724
  • [4] Stochastic Stealthy False Data Injection Attacks Against Cyber-Physical Systems
    Liu, Ruirui
    Yu, Hao
    Hao, Fei
    IEEE SYSTEMS JOURNAL, 2022, 16 (04): : 6009 - 6020
  • [5] Globally Stealthy Attacks Against Distributed State Estimation in Smart Grid
    Xu, Shaojie
    Ye, Dan
    Li, Guangdi
    Yang, Dongsheng
    IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2024, : 1353 - 1363
  • [6] False Data Injection Attacks Against State Estimation Without Knowledge of Estimators
    Lu, An-Yang
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2022, 67 (09) : 4529 - 4540
  • [7] Stealthy switching attacks on sensors against state estimation in cyber-physical systems
    Huo, Jian-Ru
    Li, Xiao-Jian
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2023, 33 (02) : 1169 - 1183
  • [8] Deep Latent Space Clustering for Detection of Stealthy False Data Injection Attacks Against AC State Estimation in Power Systems
    Bhattacharjee, Arnab
    Mondal, Arnab Kumar
    Verma, Ashu
    Mishra, Sukumar
    Saha, Tapan K.
    IEEE TRANSACTIONS ON SMART GRID, 2023, 14 (03) : 2338 - 2351
  • [9] Worst-Case Stealthy Attacks on Stochastic Event-Based State Estimation
    Shang, Jun
    Yu, Hao
    Chen, Tongwen
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2022, 67 (04) : 2052 - 2059
  • [10] Stealthy false data injection attacks with resource constraints against multi-sensor estimation systems
    Guo, Haibin
    Sun, Jian
    Pang, Zhong-Hua
    ISA TRANSACTIONS, 2022, 127 : 32 - 40