On Information Fusion in Optimal Linear FDI Attacks Against Remote State Estimation

被引:6
作者
Zhou, Jing [1 ]
Shang, Jun [1 ]
Chen, Tongwen [1 ]
机构
[1] Univ Alberta, Dept Elect & Comp Engn, Edmonton, AB T6G 1H9, Canada
来源
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS | 2023年 / 10卷 / 04期
基金
加拿大自然科学与工程研究理事会;
关键词
Kalman filtering; remote state estimation; side information; False data injection (FDI) attacks; DATA-INJECTION ATTACKS; SYSTEMS; INPUT;
D O I
10.1109/TCNS.2023.3260041
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article studies the problem of false data injection (FDI) attacks against remote state estimation. The scenario that malicious attackers can intercept original data packets and also eavesdrop on some side information of system states with extra sensors is considered. To clarify a counterintuitive issue in existing work, a different innovation-based linear attack policy fusing all available information is proposed. First, the evolution of a posteriori estimation error covariance with FDI attacks is derived. Then, explicit solutions of optimal stealthy attack coefficients are obtained without solving optimization problems numerically. The condition under which there exist multiple optimal attacks is analyzed. In addition, an easy-to-check criterion for comparing two information fusion methods in scalar systems is given. Simulation results show that, compared with existing work, the proposed attack strategy can completely deceive the anomaly detector and cause more severe performance degradation in remote state estimation.
引用
收藏
页码:2085 / 2096
页数:12
相关论文
共 50 条
  • [31] Event-Based Optimal Stealthy False Data-Injection Attacks Against Remote State Estimation Systems
    Guo, Haibin
    Sun, Jian
    Pang, Zhong-Hua
    Liu, Guo-Ping
    IEEE TRANSACTIONS ON CYBERNETICS, 2023, 53 (10) : 6714 - 6724
  • [32] Resilient distributed estimation against FDI attacks: A correntropy-based approach
    Xia, Wei
    Zhang, Yuhan
    INFORMATION SCIENCES, 2023, 635 : 236 - 256
  • [33] Optimal Schedule of Secure Transmissions for Remote State Estimation Against Eavesdropping
    Wang, Le
    Cao, Xianghui
    Sun, Bowen
    Zhang, Heng
    Sun, Changyin
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (03) : 1987 - 1997
  • [34] Worst-Case Stealthy Innovation-Based Linear Attacks on Remote State Estimation Under Kullback-Leibler Divergence
    Shang, Jun
    Yu, Hao
    Chen, Tongwen
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2022, 67 (11) : 6082 - 6089
  • [35] Optimal Stealthy Attack With Side Information Against Remote State Estimation: A Corrupted Innovation-Based Strategy
    Mao, Li-Wei
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON CYBERNETICS, 2025, 55 (02) : 897 - 904
  • [36] Design of Linear Deception Attacks Against State Estimation in Multiplant Power Systems
    Ning, Chuanyi
    Hao, Fei
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2025, 12 (01): : 882 - 893
  • [37] Optimal stealthy switching location attacks against remote estimation in cyber-physical systems
    Li, Yi-Gang
    Yang, Guang-Hong
    NEUROCOMPUTING, 2021, 421 : 183 - 194
  • [38] Allocation of Eavesdropping Attacks for Multi-System Remote State Estimation
    Chang, Xiaoyan
    Peng, Lianghong
    Zhang, Suzhen
    SENSORS, 2024, 24 (03)
  • [39] A Survey on the Cyber Attacks Against Non-linear State Estimation in Smart Grids
    Wang, Jingxuan
    Hui, Lucas C. K.
    Yiu, S. M.
    Cui, Xingmin
    Wang, Eric Ke
    Fang, Junbin
    INFORMATION SECURITY AND PRIVACY, PT I, 2016, 9722 : 40 - 56
  • [40] Joint Admittance Perturbation and Meter Protection for Mitigating Stealthy FDI Attacks Against Power System State Estimation
    Liu, Chensheng
    Liang, Hao
    Chen, Tongwen
    Wu, Jing
    Long, Chengnian
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2020, 35 (02) : 1468 - 1478