A Resilient Distributed Kalman Filtering Under Bidirectional Stealthy Attack

被引:0
作者
Ding, Wenjie [1 ]
Yang, Wen [1 ]
Yang, Chao [1 ]
Ren, Xiaoqiang [2 ]
Wang, Xiaofan [2 ,3 ]
机构
[1] East China Univ Sci & Technol, Key Lab Smart Mfg Energy Chem Proc, Shanghai 200237, Peoples R China
[2] Shanghai Univ, Sch Mechatron Engn & Automat, Shanghai 200444, Peoples R China
[3] Shanghai Inst Technol, Sch Elect & Elect Engn, Shanghai 201418, Peoples R China
基金
中国国家自然科学基金;
关键词
Attack detection; bidirectional communication; distributed Kalman filtering; false data injection attack; LINEAR-ATTACK; INJECTION;
D O I
10.1109/LSP.2024.3353159
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
False data injection attacks are widely investigated to exploit the cyber-vulnerability of Cyber-Physical System. However, the existing attack policies only consider the cyber-vulnerability in the one-way communication channel. In this letter, a bidirectional stealthy false data injection attack is proposed to bypass the hostile data detector and degrade the estimation performance in the distributed Kalman filtering system. The stealthiness and the influence of the bidirectional stealthy attack is demonstrated by the theoretical analysis. Furthermore, the alternate transmission protocol is proposed to prevent the bidirectional stealthy attack policy. To remedy the protocol and improve the detection sensitivity, an attack detector with multiple factors is proposed. Besides, the choosing principle of the detection factors is analyzed. Simulation examples are presented to investigate the bidirectional stealthy attack and the developed estimator.
引用
收藏
页码:356 / 360
页数:5
相关论文
共 19 条
  • [1] Data Integrity Attack in Dynamic State Estimation of Smart Grid: Attack Model and Countermeasures
    An, Dou
    Zhang, Feiye
    Yang, Qingyu
    Zhang, Chengwei
    [J]. IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2022, 19 (03) : 1631 - 1644
  • [2] On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds
    Bai, Cheng-Zong
    Gupta, Vijay
    Pasqualetti, Fabio
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2017, 62 (12) : 6641 - 6648
  • [3] A Class of Nonlinear Kalman Filters Under a Generalized Measurement Model With False Data Injection Attacks
    Chen, Shanmou
    Zhang, Qiangqiang
    Lin, Dongyuan
    Wang, Shiyuan
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2022, 29 : 1187 - 1191
  • [4] Worst-case stealthy innovation-based linear attack on remote state estimation
    Guo, Ziyang
    Shi, Dawei
    Johansson, Karl Henrik
    Shi, Ling
    [J]. AUTOMATICA, 2018, 89 : 117 - 124
  • [5] Gupta S., 2014, International Journal of Computer Applications, V104, P1, DOI [10.5120/18267-9305, DOI 10.5120/18267-9305]
  • [6] Completely Stealthy FDI Attack Against State Estimation in Networked Control Systems
    Liu, Yifa
    Cheng, Long
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2023, 70 (03) : 1114 - 1118
  • [7] Analysis of Stealthy False Data Injection Attacks Against Networked Control Systems: Three Case Studies
    Pang, Zhonghua
    Fu, Yuan
    Guo, Haibin
    Sun, Jian
    [J]. JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2023, 36 (04) : 1407 - 1422
  • [8] Overloaded Branch Chains Induced by False Data Injection Attack in Smart Grid
    Peng, Da-Tian
    Dong, Jianmin
    Peng, Qinke
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2020, 27 : 426 - 430
  • [9] Detection of False Data Injection Attacks in Smart Grid Communication Systems
    Rawat, Danda B.
    Bajracharya, Chandra
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2015, 22 (10) : 1652 - 1656
  • [10] Integrity Data Attacks in Power Market Operations
    Xie, Le
    Mo, Yilin
    Sinopoli, Bruno
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2011, 2 (04) : 659 - 666