On Information Fusion in Optimal Linear FDI Attacks Against Remote State Estimation

被引:6
作者
Zhou, Jing [1 ]
Shang, Jun [1 ]
Chen, Tongwen [1 ]
机构
[1] Univ Alberta, Dept Elect & Comp Engn, Edmonton, AB T6G 1H9, Canada
来源
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS | 2023年 / 10卷 / 04期
基金
加拿大自然科学与工程研究理事会;
关键词
Kalman filtering; remote state estimation; side information; False data injection (FDI) attacks; DATA-INJECTION ATTACKS; SYSTEMS; INPUT;
D O I
10.1109/TCNS.2023.3260041
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article studies the problem of false data injection (FDI) attacks against remote state estimation. The scenario that malicious attackers can intercept original data packets and also eavesdrop on some side information of system states with extra sensors is considered. To clarify a counterintuitive issue in existing work, a different innovation-based linear attack policy fusing all available information is proposed. First, the evolution of a posteriori estimation error covariance with FDI attacks is derived. Then, explicit solutions of optimal stealthy attack coefficients are obtained without solving optimization problems numerically. The condition under which there exist multiple optimal attacks is analyzed. In addition, an easy-to-check criterion for comparing two information fusion methods in scalar systems is given. Simulation results show that, compared with existing work, the proposed attack strategy can completely deceive the anomaly detector and cause more severe performance degradation in remote state estimation.
引用
收藏
页码:2085 / 2096
页数:12
相关论文
共 50 条
  • [21] Optimal Stealthy Linear-Attack Schedules on Remote State Estimation
    Zhang, Junhui
    Sun, Jitao
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2021, 69 : 2807 - 2817
  • [22] Optimal stealthy integrity attacks on remote state estimation: The maximum utilization of historical data
    Shang, Jun
    Chen, Tongwen
    AUTOMATICA, 2021, 128
  • [23] Fusion Estimation for FDI Sensor Attacks in Distributed Systems
    Weng, Pindi
    Chen, Bo
    Dong, Shijian
    Yu, Li
    2020 IEEE 16TH INTERNATIONAL CONFERENCE ON CONTROL & AUTOMATION (ICCA), 2020, : 260 - 265
  • [24] Nonlinear stealthy attacks on remote state estimation☆
    Shang, Jun
    Zhou, Jing
    Chen, Tongwen
    AUTOMATICA, 2024, 167
  • [25] Measurement-Based Optimal Stealthy Attacks on Remote State Estimation
    Li, Pengyu
    Ye, Dan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 3365 - 3374
  • [26] Linear Encryption Against Eavesdropping on Remote State Estimation
    Shang, Jun
    Chen, Tongwen
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2023, 68 (07) : 4413 - 4419
  • [27] A Watermarking Strategy Against Linear Deception Attacks on Remote State Estimation Under K-L Divergence
    Wang, Di
    Huang, Jiahao
    Tang, Yang
    Li, Fangfei
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (05) : 3273 - 3281
  • [28] Optimal Linear Cyber-Attack on Remote State Estimation
    Guo, Ziyang
    Shi, Dawei
    Johansson, Karl Henrik
    Shi, Ling
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2017, 4 (01): : 4 - 13
  • [29] Optimal Attack Energy Allocation against Remote State Estimation
    Peng, Lianghong
    Shi, Ling
    Cao, Xianghui
    Sun, Changyin
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2018, 63 (07) : 2199 - 2205
  • [30] Optimal Jamming Power Allocation Against Remote State Estimation
    Zhang, Heng
    Qi, Yifei
    Wu, Junfeng
    2017 AMERICAN CONTROL CONFERENCE (ACC), 2017, : 1660 - 1665