Stealthy Hacking and Secrecy of Controlled State Estimation Systems With Random Dropouts

被引:6
作者
Lu, Jingyi [1 ]
Quevedo, Daniel E. E. [2 ]
Gupta, Vijay [3 ]
Dey, Subhrakanti [4 ]
机构
[1] East China Univ Sci & Technol, Key Lab Smart Mfg Energy Chem Proc, Minist Educ, Shanghai 200237, Peoples R China
[2] Queensland Univ Technol QUT, Sch Elect Engn & Robot, Brisbane, Qld 4000, Australia
[3] Univ Notre Dame, Dept Elect Engn, Notre Dame, IN 46556 USA
[4] Maynooth Univ, Hamilton Inst, Maynooth W23F2K8, Kildare, Ireland
关键词
Bilevel programming; constrained Markov decision process; remote state estimation; stealthy attack; system security and privacy; DOS ATTACKS; SECURITY;
D O I
10.1109/TAC.2021.3131434
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We study the maximum information gain that an adversary may obtain through hacking without being detected. Consider a dynamical process observed by a sensor that transmits a local estimate of the system state to a remote estimator according to some reference transmission policy across a packet-dropping wireless channel equipped with acknowledgments (ACK). An adversary overhears the transmissions and proactively hijacks the sensor to reprogram its transmission policy. We define perfect secrecy as keeping the averaged expected error covariance bounded at the legitimate estimator and unbounded at the adversary. By analyzing the stationary distribution of the expected error covariance, we show that perfect secrecy can be attained for unstable systems only if the ACK channel has no packet dropouts. In other situations, we prove that independent of the reference policy and the detection methods, perfect secrecy is not attainable. For this scenario, we devise a Stackelberg game to derive the optimal defensive reference policy for the legitimate estimator and present a branch-and-bound algorithm with global optimality to solve the proposed game.
引用
收藏
页码:31 / 46
页数:16
相关论文
共 47 条
[1]   IDENTIFIABILITY OF PARAMETERS IN LATENT STRUCTURE MODELS WITH MANY OBSERVED VARIABLES [J].
Allman, Elizabeth S. ;
Matias, Catherine ;
Rhode, John A. .
ANNALS OF STATISTICS, 2009, 37 (6A) :3099-3132
[2]  
Altman E., 1999, Constrained Markov Decision Processes, V7
[3]   A SOLUTION METHOD FOR THE LINEAR STATIC STACKELBERG PROBLEM USING PENALTY-FUNCTIONS [J].
ANANDALINGAM, G ;
WHITE, DJ .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 1990, 35 (10) :1170-1173
[4]   Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs [J].
Bai, Cheng-Zong ;
Pasqualetti, Fabio ;
Gupta, Vijay .
AUTOMATICA, 2017, 82 :251-260
[5]  
Bai CZ, 2015, P AMER CONTR CONF, P195, DOI 10.1109/ACC.2015.7170734
[6]   COMPUTATIONAL DIFFICULTIES OF BILEVEL LINEAR-PROGRAMMING [J].
BENAYED, O ;
BLAIR, CE .
OPERATIONS RESEARCH, 1990, 38 (03) :556-560
[7]  
Boyd SP., 2004, Convex optimization, DOI 10.1017/CBO9780511804441
[8]  
Che PH, 2013, IEEE INT SYMP INFO, P2945, DOI 10.1109/ISIT.2013.6620765
[9]   An Event-Based Stealthy Attack on Remote State Estimation [J].
Cheng, Peng ;
Yang, Zeyu ;
Chen, Jiming ;
Qi, Yifei ;
Shi, Ling .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2020, 65 (10) :4348-4355
[10]  
Chong MS, 2019, 2019 18TH EUROPEAN CONTROL CONFERENCE (ECC), P968, DOI [10.23919/ecc.2019.8795652, 10.23919/ECC.2019.8795652]