On Information Fusion in Optimal Linear FDI Attacks Against Remote State Estimation

被引:6
作者
Zhou, Jing [1 ]
Shang, Jun [1 ]
Chen, Tongwen [1 ]
机构
[1] Univ Alberta, Dept Elect & Comp Engn, Edmonton, AB T6G 1H9, Canada
来源
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS | 2023年 / 10卷 / 04期
基金
加拿大自然科学与工程研究理事会;
关键词
Kalman filtering; remote state estimation; side information; False data injection (FDI) attacks; DATA-INJECTION ATTACKS; SYSTEMS; INPUT;
D O I
10.1109/TCNS.2023.3260041
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article studies the problem of false data injection (FDI) attacks against remote state estimation. The scenario that malicious attackers can intercept original data packets and also eavesdrop on some side information of system states with extra sensors is considered. To clarify a counterintuitive issue in existing work, a different innovation-based linear attack policy fusing all available information is proposed. First, the evolution of a posteriori estimation error covariance with FDI attacks is derived. Then, explicit solutions of optimal stealthy attack coefficients are obtained without solving optimization problems numerically. The condition under which there exist multiple optimal attacks is analyzed. In addition, an easy-to-check criterion for comparing two information fusion methods in scalar systems is given. Simulation results show that, compared with existing work, the proposed attack strategy can completely deceive the anomaly detector and cause more severe performance degradation in remote state estimation.
引用
收藏
页码:2085 / 2096
页数:12
相关论文
共 50 条
[41]   Consequence Analysis of Innovation-based Integrity Attacks with Side Information on Remote State Estimation [J].
Guo, Ziyang ;
Shi, Dawei ;
Johansson, Karl Henrik ;
Shi, Ling .
IFAC PAPERSONLINE, 2017, 50 (01) :8399-8404
[42]   Using Covert Topological Information for Defense Against Malicious Attacks on DC State Estimation [J].
Bi, Suzhi ;
Zhang, Ying Jun .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2014, 32 (07) :1471-1485
[43]   Optimal deception attacks on remote state estimators equipped with interval anomaly detectors [J].
Zhou, Jing ;
Shang, Jun ;
Chen, Tongwen .
AUTOMATICA, 2023, 148
[44]   Optimal DoS Attack Strategy against Remote State Estimation Over Lossy Networks [J].
Li, Menglin ;
Qin, Jiahu ;
Shi, Ling ;
Yu, Xinghuo ;
Gao, Huijun .
2017 29TH CHINESE CONTROL AND DECISION CONFERENCE (CCDC), 2017, :909-914
[45]   Optimal Stealthy Attack With Side Information Under the Energy Constraint on Remote State Estimation [J].
Dong, Sheng-Sheng ;
Li, Yi-Gang ;
Chen, Li ;
Zhang, Xiaoling .
INTERNATIONAL JOURNAL OF CONTROL AUTOMATION AND SYSTEMS, 2024, 22 (09) :2723-2733
[46]   Hierarchical Average Fusion With GM-PHD Filters Against FDI and DoS Attacks [J].
Yang, Hao ;
Li, Tiancheng ;
Yan, Junkun ;
Elvira, Victor .
IEEE SIGNAL PROCESSING LETTERS, 2024, 31 :934-938
[47]   Worst-Case Innovation-Based Integrity Attacks With Side Information on Remote State Estimation [J].
Guo, Ziyang ;
Shi, Dawei ;
Johansson, Karl Henrik ;
Shi, Ling .
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2019, 6 (01) :48-59
[48]   Single-dimensional encryption against innovation-based stealthy attacks on remote state estimation [J].
Shang, Jun ;
Zhou, Jing ;
Chen, Tongwen .
AUTOMATICA, 2022, 136
[49]   Secure Distributed State Estimation for Sequentially Interconnected CPSs Under FDI Attacks [J].
Zhou, Jing ;
Chen, Bo ;
Li, Tongxiang ;
Qiu, Xiang ;
Yu, Li .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2024, 71 (04) :2454-2458
[50]   Information-based stealthy attacks against distributed state estimation over sensor networks [J].
Wang, Yichao ;
Jin, Kaijing ;
Ye, Dan .
NEUROCOMPUTING, 2025, 618