Vulnerability analysis of distributed state estimation under joint deception attacks

被引:5
作者
Wang, Haojun [1 ]
Liu, Kun [1 ]
Han, Dongyu [1 ]
Xia, Yuanqing [1 ]
机构
[1] Beijing Inst Technol, Sch Automat, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Vulnerability analysis; Joint deception attacks; Distributed state estimation; Resource constraints; CYBER-PHYSICAL SYSTEMS; STEALTHY; PERFORMANCE;
D O I
10.1016/j.automatica.2023.111274
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper is concerned with the vulnerability of distributed state estimation under joint deception attacks. We first consider that all the output measurements and state estimations can be corrupted by attackers. The necessary and sufficient condition for the vulnerability of distributed state estimation under the joint attacks is provided. The attack sequence is designed to degrade the performance of distributed state estimation while being stealthy. We further consider that the attackers have resource constraints, which means that only a part of output measurements or state estimations can be attacked. The vulnerability conditions are proposed for distributed state estimation under the joint deception attacks with resource constraints and the corresponding sparse attack sequences are designed. Finally, a numerical example is provided to verify the effectiveness of theoretical results. (c) 2023 Elsevier Ltd. All rights reserved.
引用
收藏
页数:8
相关论文
共 50 条
  • [31] Deception Attacks on Remote Estimation With Disclosure and Disruption Resources
    Li, Yuzhe
    Yang, Yake
    Zhao, Zhengen
    Zhou, Jing
    Quevedo, Daniel E.
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2023, 68 (07) : 4096 - 4112
  • [32] Vulnerability analysis for a class of nonlinear cyber-physical systems under stealthy attacks
    Zhang, Qirui
    Dai, Wei
    Yang, Chunyu
    Chen, Xinkai
    AUTOMATICA, 2024, 167
  • [33] Resilient Event-Triggered Distributed State Estimation for Nonlinear Systems Against DoS Attacks
    Liu, Yan
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON CYBERNETICS, 2022, 52 (09) : 9076 - 9089
  • [34] Distributed state estimation-based secondary control of island microgrid under false data injection attacks
    Yang, Fan
    Gong, Xiaoxiao
    Shao, Yinlong
    Li, Dongdong
    Zhang, Mingzhe
    Zhao, Jian
    TRANSACTIONS OF THE INSTITUTE OF MEASUREMENT AND CONTROL, 2024, 46 (14) : 2677 - 2686
  • [35] Sampled-data distributed state estimation with multiple transmission channels under denial-of-service attacks
    Gao, Rui
    Yang, Guang-Hong
    APPLIED MATHEMATICS AND COMPUTATION, 2022, 429
  • [36] Globally Stealthy Attacks Against Distributed State Estimation in Smart Grid
    Xu, Shaojie
    Ye, Dan
    Li, Guangdi
    Yang, Dongsheng
    IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2024, : 1353 - 1363
  • [37] Distributed Krein space-based attack detection over sensor networks under deception attacks
    Ge, Xiaohua
    Han, Qing-Long
    Zhong, Maiying
    Zhang, Xian-Ming
    AUTOMATICA, 2019, 109
  • [38] Optimal innovation-based deception attacks with side information against remote state estimation in cyber-physical systems
    Li, Yi-Gang
    Yang, Guang-Hong
    NEUROCOMPUTING, 2022, 500 : 461 - 470
  • [39] Secure state estimation for systems under mixed cyber-attacks: Security and performance analysis
    Lin, Hong
    Lam, James
    Wang, Zheng
    INFORMATION SCIENCES, 2021, 546 : 943 - 960
  • [40] Detection of False Data Injection Attacks in Distributed State Estimation of Power Networks
    Obata, Sho
    Kobayashi, Koichi
    Yamashita, Yuh
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2023, E106A (05) : 729 - 735