Stealthy Noise Injection Attacks Against State Estimation in Interconnected Systems

被引:3
|
作者
Huo, Jian-Ru [1 ]
Li, Xiao-Jian [1 ,2 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Peoples R China
[2] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang 110819, Peoples R China
基金
中国国家自然科学基金;
关键词
Interconnected systems; Detectors; Covariance matrices; Estimation error; State estimation; Kalman filters; Security; local detector; attack design; convex optimization; state estimation;
D O I
10.1109/TCSII.2022.3233447
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This brief investigates the stealthy attack design problem for interconnected systems, where the aim of the attacker is to maximize the estimation error covariance of the centralized state estimator by injecting elaborately designed Gaussian noises into the compromised subsystem. The proposed attack strategy can achieve complete stealthiness for local detectors and keep a certain level of stealthiness for the centralized one simultaneously, which differs from the existing attack strategies for interconnected systems. Due to the nature of the attack model and interconnected systems, the stealthiness constraint is so complex that it is difficult to directly solve the formulated optimization problem to obtain the detailed attack strategy. To transform the stealthiness constraint, the eigenvalues of matrices are used to characterize the upper and lower bounds of the corresponding determinant, and then the closed-form optimal attack strategy is derived. Finally, a 1D network simulation example is provided to verify the developed results.
引用
收藏
页码:2042 / 2046
页数:5
相关论文
共 50 条
  • [21] Effects of Switching Network Topologies on Stealthy False Data Injection Attacks Against State Estimation in Power Networks
    Wang, Shaocheng
    Ren, Wei
    Al-Saggaf, Ubaid M.
    IEEE SYSTEMS JOURNAL, 2017, 11 (04): : 2640 - 2651
  • [22] False Data Injection Attacks against State Estimation in Electric Power Grids
    Liu, Yao
    Ning, Peng
    Reiter, Michael K.
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2011, 14 (01)
  • [23] Secure Distributed State Estimation for Sequentially Interconnected CPSs Under FDI Attacks
    Zhou, Jing
    Chen, Bo
    Li, Tongxiang
    Qiu, Xiang
    Yu, Li
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2024, 71 (04) : 2454 - 2458
  • [24] Optimal Stealthy Innovation-Based Attacks With Historical Data in Cyber-Physical Systems
    Li, Yi-Gang
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2021, 51 (06): : 3401 - 3411
  • [25] False Data Injection Attacks Against State Estimation in Multiphase and Unbalanced Smart Distribution Systems
    Zhuang, Peng
    Deng, Ruilong
    Liang, Hao
    IEEE TRANSACTIONS ON SMART GRID, 2019, 10 (06) : 6000 - 6013
  • [26] A class of stealthy attacks on remote state estimation with intermittent observation
    Lv, Yujiao
    Lu, Jianquan
    Liu, Yang
    Zhang, Lingzhong
    INFORMATION SCIENCES, 2023, 639
  • [27] A Highly Discriminative Detector Against False Data Injection Attacks in AC State Estimation
    Cheng, Gang
    Lin, Yuzhang
    Zhao, Junbo
    Yan, Jun
    IEEE TRANSACTIONS ON SMART GRID, 2022, 13 (03) : 2318 - 2330
  • [28] Data-Driven Detection of Stealthy False Data Injection Attack Against Power System State Estimation
    Chen, Chunyu
    Wang, Yunpeng
    Cui, Mingjian
    Zhao, Junbo
    Bi, Wenjun
    Chen, Yang
    Zhang, Xiao
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (12) : 8467 - 8476
  • [29] Optimal Stealthy Attack With Side Information Against Remote State Estimation: A Corrupted Innovation-Based Strategy
    Mao, Li-Wei
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON CYBERNETICS, 2025, 55 (02) : 897 - 904
  • [30] Blind False Data Injection Attacks Against State Estimation Based on Matrix Reconstruction
    Yang, Haosen
    He, Xing
    Wang, Ziqiang
    Qiu, Robert C.
    Ai, Qian
    IEEE TRANSACTIONS ON SMART GRID, 2022, 13 (04) : 3174 - 3187