Optimal Deception Attacks Against Remote State Estimation: An Information-Based Approach

被引:8
作者
Zhou, Jing [1 ]
Shang, Jun [1 ]
Chen, Tongwen [1 ]
机构
[1] Univ Alberta, Dept Elect & Comp Engn, Edmonton, AB T6G 1H9, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Deception attacks; dynamic linear sys-tems; information sets; remote state estimation; LINEAR ATTACK;
D O I
10.1109/TAC.2022.3200963
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article studies the problem of deception attacks against remote state estimation from an information perspective. The Kullback-Leibler divergence between the compromised innovation and nominal one is utilized as the stealthiness measure. Without presupposing a linear attack model, the optimal attack policy that can cause maximum performance loss and deceive the false data detector is derived. For both attacks with strict and relaxed stealthiness, the optimal compromised innovation, which is shown to be generated by a linear time-varying system, can be determined with two steps. First, the minimum mean-square error (MMSE) estimate of the prediction error is obtained using attackers' available information. Then, the faked innovation is designed as a linear transformation of the MMSE estimate. Within a unified framework, this separation principle enables handling more general attack scenarios, where the attacker may obtain more (or less) measurement data than the remote estimator. The optimality of the information-based strategy is verified by theoretical analysis, numerical examples, as well as comparative studies with existing methods.
引用
收藏
页码:3947 / 3962
页数:16
相关论文
共 50 条
  • [11] Optimal Innovation-Based Deception Attack on Remote State Estimation
    Wu, Shuang
    Guo, Ziyang
    Shi, Dawei
    Johansson, Karl Henrik
    Shi, Ling
    2017 AMERICAN CONTROL CONFERENCE (ACC), 2017, : 3017 - 3022
  • [12] Optimal deception attacks on remote state estimators equipped with interval anomaly detectors
    Zhou, Jing
    Shang, Jun
    Chen, Tongwen
    AUTOMATICA, 2023, 148
  • [13] Deception Attacks on Remote Estimation With Disclosure and Disruption Resources
    Li, Yuzhe
    Yang, Yake
    Zhao, Zhengen
    Zhou, Jing
    Quevedo, Daniel E.
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2023, 68 (07) : 4096 - 4112
  • [14] Transmission scheduling for privacy-optimal encryption against eavesdropping attacks on remote state estimation
    Wang, Le
    Cao, Xianghui
    Zhang, Heng
    Sun, Changyin
    Zheng, Wei Xing
    AUTOMATICA, 2022, 137
  • [15] Optimal Privacy-Preserving Transmission Schedule Against Eavesdropping Attacks on Remote State Estimation
    Zou, Jiaying
    Liu, Hanxiao
    Liu, Chun
    Ren, Xiaoqiang
    Wang, Xiaofan
    IEEE CONTROL SYSTEMS LETTERS, 2024, 8 : 538 - 543
  • [16] Event-Based Optimal Stealthy False Data-Injection Attacks Against Remote State Estimation Systems
    Guo, Haibin
    Sun, Jian
    Pang, Zhong-Hua
    Liu, Guo-Ping
    IEEE TRANSACTIONS ON CYBERNETICS, 2023, 53 (10) : 6714 - 6724
  • [17] Design of Linear Deception Attacks Against State Estimation in Multiplant Power Systems
    Ning, Chuanyi
    Hao, Fei
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2025, 12 (01): : 882 - 893
  • [18] Optimal design and allocation of stealthy attacks against remote state estimation for cyber-physical systems
    Liu, Xuan
    Yang, Guang-Hong
    INFORMATION SCIENCES, 2024, 676
  • [19] Optimal Stealthy Linear Attack on Remote State Estimation With Side Information
    Ye, Dan
    Yang, Bing
    Zhang, Tian-Yu
    IEEE SYSTEMS JOURNAL, 2022, 16 (01): : 1499 - 1507
  • [20] Reconstruction of measurements in state estimation strategy against deception attacks for cyber physical systems
    Li Q.
    Xu B.
    Li S.
    Liu Y.
    Cui D.
    Control Theory and Technology, 2018, 16 (01) : 1 - 13