Vulnerability analysis of distributed state estimation under joint deception attacks

被引:5
|
作者
Wang, Haojun [1 ]
Liu, Kun [1 ]
Han, Dongyu [1 ]
Xia, Yuanqing [1 ]
机构
[1] Beijing Inst Technol, Sch Automat, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Vulnerability analysis; Joint deception attacks; Distributed state estimation; Resource constraints; CYBER-PHYSICAL SYSTEMS; STEALTHY; PERFORMANCE;
D O I
10.1016/j.automatica.2023.111274
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper is concerned with the vulnerability of distributed state estimation under joint deception attacks. We first consider that all the output measurements and state estimations can be corrupted by attackers. The necessary and sufficient condition for the vulnerability of distributed state estimation under the joint attacks is provided. The attack sequence is designed to degrade the performance of distributed state estimation while being stealthy. We further consider that the attackers have resource constraints, which means that only a part of output measurements or state estimations can be attacked. The vulnerability conditions are proposed for distributed state estimation under the joint deception attacks with resource constraints and the corresponding sparse attack sequences are designed. Finally, a numerical example is provided to verify the effectiveness of theoretical results. (c) 2023 Elsevier Ltd. All rights reserved.
引用
收藏
页数:8
相关论文
共 50 条
  • [21] Reconstruction of measurements in state estimation strategy against deception attacks for cyber physical systems
    Li Q.
    Xu B.
    Li S.
    Liu Y.
    Cui D.
    Control Theory and Technology, 2018, 16 (01) : 1 - 13
  • [22] Malicious Attacks on State Estimation Against Distributed Control Systems
    Lu, An-Yang
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2020, 65 (09) : 3911 - 3918
  • [23] Resilient Distributed Estimation: Exponential Convergence under Sensor Attacks
    Chen, Yuan
    Kar, Soummya
    Moura, Jose M. F.
    2018 IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2018, : 7275 - 7282
  • [24] Distributed Secure State Estimation for Cyber-Physical Systems Under False Data Injection Attacks
    Zhang, Xin-Yu
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (05): : 4443 - 4455
  • [25] Vulnerability analysis of cyber physical systems under the false alarm cyber attacks
    Tu, Haicheng
    Xia, Yongxiang
    Chen, Xi
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2022, 599
  • [26] Distributed resilient fusion estimation for resource-limited CPSs under hybrid attacks
    Tao, Fei
    Ye, Dan
    INFORMATION SCIENCES, 2023, 648
  • [27] Event-Triggered Distributed State Estimation for Cyber-Physical Systems Under DoS Attacks
    Liu, Yan
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON CYBERNETICS, 2022, 52 (05) : 3620 - 3631
  • [28] Distributed Joint Attack Detection and Secure State Estimation
    Forti, Nicola
    Battistelli, Giorgio
    Chisci, Luigi
    Li, Suqi
    Wang, Bailu
    Sinopoli, Bruno
    IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS, 2018, 4 (01): : 96 - 110
  • [29] State estimation under false data injection attacks: Security analysis and system protection
    Hu, Liang
    Wang, Zidong
    Han, Qing-Long
    Liu, Xiaohui
    AUTOMATICA, 2018, 87 : 176 - 183
  • [30] Distributed Resilient State Estimation for Nonlinear Systems Against Sensor Attacks
    Liu, Yan
    Li, Tao
    Zheng, Bo-Chao
    Shen, Mouquan
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (03) : 3639 - 3649