Vulnerability analysis of distributed state estimation under joint deception attacks

被引:5
作者
Wang, Haojun [1 ]
Liu, Kun [1 ]
Han, Dongyu [1 ]
Xia, Yuanqing [1 ]
机构
[1] Beijing Inst Technol, Sch Automat, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Vulnerability analysis; Joint deception attacks; Distributed state estimation; Resource constraints; CYBER-PHYSICAL SYSTEMS; STEALTHY; PERFORMANCE;
D O I
10.1016/j.automatica.2023.111274
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper is concerned with the vulnerability of distributed state estimation under joint deception attacks. We first consider that all the output measurements and state estimations can be corrupted by attackers. The necessary and sufficient condition for the vulnerability of distributed state estimation under the joint attacks is provided. The attack sequence is designed to degrade the performance of distributed state estimation while being stealthy. We further consider that the attackers have resource constraints, which means that only a part of output measurements or state estimations can be attacked. The vulnerability conditions are proposed for distributed state estimation under the joint deception attacks with resource constraints and the corresponding sparse attack sequences are designed. Finally, a numerical example is provided to verify the effectiveness of theoretical results. (c) 2023 Elsevier Ltd. All rights reserved.
引用
收藏
页数:8
相关论文
共 50 条
  • [41] Detection of False Data Injection Attacks in Distributed State Estimation of Power Networks
    Obata, Sho
    Kobayashi, Koichi
    Yamashita, Yuh
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2023, E106A (05) : 729 - 735
  • [42] Distributed Secure State Estimation Against Sparse Attacks: A Sensor Clustering Approach
    Lei, Xuqiang
    Wen, Guanghui
    Wang, Shuai
    2023 62ND ANNUAL CONFERENCE OF THE SOCIETY OF INSTRUMENT AND CONTROL ENGINEERS, SICE, 2023, : 973 - 978
  • [43] Attack Detection and Distributed Filtering for State-Saturated Systems Under Deception Attack
    Li, Li
    Yang, Huan
    Xia, Yuanqing
    Zhu, Cui
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2021, 8 (04): : 1918 - 1929
  • [44] Distributed Secure Filtering for Discrete-Time Systems Under Round-Robin Protocol and Deception Attacks
    Liu, Kun
    Guo, Hang
    Zhang, Qirui
    Xia, Yuanqing
    IEEE TRANSACTIONS ON CYBERNETICS, 2020, 50 (08) : 3571 - 3580
  • [45] Secure Distributed Finite-Time Filtering for Positive Systems Over Sensor Networks Under Deception Attacks
    Xiao, Shunyuan
    Han, Qing-Long
    Ge, Xiaohua
    Zhang, Yijun
    IEEE TRANSACTIONS ON CYBERNETICS, 2020, 50 (03) : 1220 - 1229
  • [46] Resilient Distributed Estimation: Sensor Attacks
    Chen, Yuan
    Kar, Soummya
    Moura, Jose M. F.
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2019, 64 (09) : 3772 - 3779
  • [47] Security Analysis of Distributed Consensus Filtering Under Replay Attacks
    Huang, Jiahao
    Yang, Wen
    Ho, Daniel W. C.
    Li, Fangfei
    Tang, Yang
    IEEE TRANSACTIONS ON CYBERNETICS, 2024, 54 (06) : 3526 - 3539
  • [48] Fast state estimation under sensor attacks: A sensor categorization approach
    An, Liwei
    Yang, Guang-Hong
    AUTOMATICA, 2022, 142
  • [49] How to Secure Distributed Filters Under Sensor Attacks
    He, Xingkang
    Ren, Xiaoqiang
    Sandberg, Henrik
    Johansson, Karl Henrik
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2022, 67 (06) : 2843 - 2856
  • [50] A secure state estimation algorithm for nonlinear systems under sensor attacks
    Chong, Michelle S.
    Sandberg, Henrik
    Hespanha, Joao P.
    2020 59TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2020, : 5743 - 5748