Stealthy Noise Injection Attacks Against State Estimation in Interconnected Systems

被引:3
|
作者
Huo, Jian-Ru [1 ]
Li, Xiao-Jian [1 ,2 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Peoples R China
[2] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang 110819, Peoples R China
基金
中国国家自然科学基金;
关键词
Interconnected systems; Detectors; Covariance matrices; Estimation error; State estimation; Kalman filters; Security; local detector; attack design; convex optimization; state estimation;
D O I
10.1109/TCSII.2022.3233447
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This brief investigates the stealthy attack design problem for interconnected systems, where the aim of the attacker is to maximize the estimation error covariance of the centralized state estimator by injecting elaborately designed Gaussian noises into the compromised subsystem. The proposed attack strategy can achieve complete stealthiness for local detectors and keep a certain level of stealthiness for the centralized one simultaneously, which differs from the existing attack strategies for interconnected systems. Due to the nature of the attack model and interconnected systems, the stealthiness constraint is so complex that it is difficult to directly solve the formulated optimization problem to obtain the detailed attack strategy. To transform the stealthiness constraint, the eigenvalues of matrices are used to characterize the upper and lower bounds of the corresponding determinant, and then the closed-form optimal attack strategy is derived. Finally, a 1D network simulation example is provided to verify the developed results.
引用
收藏
页码:2042 / 2046
页数:5
相关论文
共 50 条
  • [41] Resilient Distributed State Estimation Under Stealthy Attack
    Lv, Yujiao
    Lu, Jianquan
    Liu, Yang
    Lou, Jungang
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 3254 - 3263
  • [42] Modelling False Data Injection Attacks Against Non-linear State Estimation in AC Power Systems
    Nayak, Jay
    Al-Anbagi, Irfan
    8TH INTERNATIONAL CONFERENCE ON SMART GRID (ICSMARTGRID2020), 2020, : 37 - 42
  • [43] Information-based stealthy attacks against distributed state estimation over sensor networks
    Wang, Yichao
    Jin, Kaijing
    Ye, Dan
    NEUROCOMPUTING, 2025, 618
  • [44] Optimal stealthy false data injection attacks in cyber-physical systems
    Li, Yi-Gang
    Yang, Guang-Hong
    INFORMATION SCIENCES, 2019, 481 : 474 - 490
  • [45] Concurrent Receding Horizon Control and Estimation Against Stealthy Attacks
    Fotiadis, Filippos
    Vamvoudakis, Kyriakos. G.
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2023, 68 (06) : 3712 - 3719
  • [46] Distributed Sparse Undetectable Attacks Against State Estimation
    An, Liwei
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2022, 9 (01): : 463 - 473
  • [47] Reachability Analysis of Cyber-Physical Systems Under Stealthy Attacks
    Zhang, Qirui
    Liu, Kun
    Pang, Zhonghua
    Xia, Yuanqing
    Liu, Tao
    IEEE TRANSACTIONS ON CYBERNETICS, 2022, 52 (06) : 4926 - 4934
  • [48] A Secure Encoding Mechanism Against Deception Attacks on Multisensor Remote State Estimation
    Zhou, Jiayu
    Ding, Wenjie
    Yang, Wen
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1959 - 1969
  • [49] False Data Injection Attacks with Local Topology Information against Linear State Estimation
    Sun, Ying
    Li, Wen-Tai
    Song, Wentu
    Yuen, Chau
    2015 IEEE INNOVATIVE SMART GRID TECHNOLOGIES - ASIA (ISGT ASIA), 2015,
  • [50] A Case Study on Implementing False Data Injection Attacks Against Nonlinear State Estimation
    Konstantinou, Charalambos
    Maniatakos, Michail
    CPS-SPC'16: PROCEEDINGS OF THE 2ND ACM WORKSHOP ON CYBER-PHYSICAL SYSTEMS SECURITY & PRIVACY, 2016, : 81 - 91