Security Analysis of Distributed Consensus Filtering Under Replay Attacks

被引:13
作者
Huang, Jiahao [1 ]
Yang, Wen [1 ]
Ho, Daniel W. C. [2 ]
Li, Fangfei [3 ]
Tang, Yang [1 ]
机构
[1] East China Univ Sci & Technol, Key Lab Smart Mfg Energy Chem Proc, Minist Educ, Shanghai 200237, Peoples R China
[2] City Univ Hong Kong, Dept Math, Hong Kong, Peoples R China
[3] East China Univ Sci & Technol, Dept Math, Shanghai 200237, Peoples R China
关键词
Sensors; Security; Estimation error; Control systems; Covariance matrices; Detectors; Wireless sensor networks; Cyber security; cyber-physical systems (CPSs); distributed consensus filtering; replay attack; CYBER-PHYSICAL SYSTEMS; RESILIENT CONSENSUS; ACTIVATION;
D O I
10.1109/TCYB.2022.3209820
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This work studies the security of consensus-based distributed filtering under the replay attack, which can freely select a part of sensors and modify their measurements into previously recorded ones. We analyze the performance degradation of distributed estimation caused by the replay attack, and utilize the Kullback-Leibler (K-L) divergence to quantify the attack stealthiness. Specifically, for a stable system, we prove that under any replay attack, the estimation error is not only bounded, but also can re-enter the steady state. In that case, we prove that the replay attack is ? -stealthy, where ? can be calculated based on two Lyapunov equations. On the other hand, for an unstable system, we prove that the trace of estimation error covariance is lower bounded by an exponential function, which indicates that the estimation error may diverge due to the attack. In view of this, we provide a sufficient condition to ensure that any replay attack is detectable. Furthermore, we analyze the case that the adversary starts to attack only if the current measurement is close to a previously recorded one. Finally, we verify the theoretical results via several numerical simulations.
引用
收藏
页码:3526 / 3539
页数:14
相关论文
共 41 条
[1]  
Ahmed SH, 2013, IFIP WIREL DAY
[2]   Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs [J].
Bai, Cheng-Zong ;
Pasqualetti, Fabio ;
Gupta, Vijay .
AUTOMATICA, 2017, 82 :251-260
[3]  
Boem F, 2017, IEEE DECIS CONTR P, DOI 10.1109/CDC.2017.8264562
[4]   Resilient Distributed Estimation: Sensor Attacks [J].
Chen, Yuan ;
Kar, Soummya ;
Moura, Jose M. F. .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2019, 64 (09) :3772-3779
[5]   An Improved Homogeneous Polynomial Approach for Adaptive Sliding-Mode Control of Markov Jump Systems With Actuator Faults [J].
Du, Chenglong ;
Li, Fanbiao ;
Yang, Chunhua .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2020, 65 (03) :955-969
[6]   Optimal periodic watermarking schedule for replay attack detection in cyber-physical systems [J].
Fang, Chongrong ;
Qi, Yifei ;
Cheng, Peng ;
Zheng, Wei Xing .
AUTOMATICA, 2020, 112
[7]   Stuxnet and the Future of Cyber War [J].
Farwell, James P. ;
Rohozinski, Rafal .
SURVIVAL, 2011, 53 (01) :23-40
[8]   Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks [J].
Fawzi, Hamza ;
Tabuada, Paulo ;
Diggavi, Suhas .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2014, 59 (06) :1454-1467
[9]   Resilient Control for Cyber-Physical Systems Subject to Replay Attacks [J].
Franze, Giuseppe ;
Tedesco, Francesco ;
Lucia, Walter .
IEEE CONTROL SYSTEMS LETTERS, 2019, 3 (04) :984-989
[10]   An Analysis on Optimal Attack Schedule Based on Channel Hopping Scheme in Cyber-Physical Systems [J].
Gan, Ruimeng ;
Xiao, Yue ;
Shao, Jinliang ;
Qin, Jiahu .
IEEE TRANSACTIONS ON CYBERNETICS, 2021, 51 (02) :994-1003