共 50 条
Vulnerability analysis of distributed state estimation under joint deception attacks
被引:5
作者:
Wang, Haojun
[1
]
Liu, Kun
[1
]
Han, Dongyu
[1
]
Xia, Yuanqing
[1
]
机构:
[1] Beijing Inst Technol, Sch Automat, Beijing, Peoples R China
来源:
基金:
中国国家自然科学基金;
关键词:
Vulnerability analysis;
Joint deception attacks;
Distributed state estimation;
Resource constraints;
CYBER-PHYSICAL SYSTEMS;
STEALTHY;
PERFORMANCE;
D O I:
10.1016/j.automatica.2023.111274
中图分类号:
TP [自动化技术、计算机技术];
学科分类号:
0812 ;
摘要:
This paper is concerned with the vulnerability of distributed state estimation under joint deception attacks. We first consider that all the output measurements and state estimations can be corrupted by attackers. The necessary and sufficient condition for the vulnerability of distributed state estimation under the joint attacks is provided. The attack sequence is designed to degrade the performance of distributed state estimation while being stealthy. We further consider that the attackers have resource constraints, which means that only a part of output measurements or state estimations can be attacked. The vulnerability conditions are proposed for distributed state estimation under the joint deception attacks with resource constraints and the corresponding sparse attack sequences are designed. Finally, a numerical example is provided to verify the effectiveness of theoretical results. (c) 2023 Elsevier Ltd. All rights reserved.
引用
收藏
页数:8
相关论文
共 50 条