Security Analysis of Distributed Consensus Filtering Under Replay Attacks

被引:13
作者
Huang, Jiahao [1 ]
Yang, Wen [1 ]
Ho, Daniel W. C. [2 ]
Li, Fangfei [3 ]
Tang, Yang [1 ]
机构
[1] East China Univ Sci & Technol, Key Lab Smart Mfg Energy Chem Proc, Minist Educ, Shanghai 200237, Peoples R China
[2] City Univ Hong Kong, Dept Math, Hong Kong, Peoples R China
[3] East China Univ Sci & Technol, Dept Math, Shanghai 200237, Peoples R China
关键词
Sensors; Security; Estimation error; Control systems; Covariance matrices; Detectors; Wireless sensor networks; Cyber security; cyber-physical systems (CPSs); distributed consensus filtering; replay attack; CYBER-PHYSICAL SYSTEMS; RESILIENT CONSENSUS; ACTIVATION;
D O I
10.1109/TCYB.2022.3209820
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This work studies the security of consensus-based distributed filtering under the replay attack, which can freely select a part of sensors and modify their measurements into previously recorded ones. We analyze the performance degradation of distributed estimation caused by the replay attack, and utilize the Kullback-Leibler (K-L) divergence to quantify the attack stealthiness. Specifically, for a stable system, we prove that under any replay attack, the estimation error is not only bounded, but also can re-enter the steady state. In that case, we prove that the replay attack is ? -stealthy, where ? can be calculated based on two Lyapunov equations. On the other hand, for an unstable system, we prove that the trace of estimation error covariance is lower bounded by an exponential function, which indicates that the estimation error may diverge due to the attack. In view of this, we provide a sufficient condition to ensure that any replay attack is detectable. Furthermore, we analyze the case that the adversary starts to attack only if the current measurement is close to a previously recorded one. Finally, we verify the theoretical results via several numerical simulations.
引用
收藏
页码:3526 / 3539
页数:14
相关论文
共 41 条
[11]   Asynchronous Distributed Finite-Time H∞ Filtering in Sensor Networks With Hidden Markovian Switching and Two-Channel Stochastic Attacks [J].
Gong, Cheng ;
Zhu, Guopu ;
Shi, Peng ;
Agarwal, Ramesh K. .
IEEE TRANSACTIONS ON CYBERNETICS, 2022, 52 (03) :1502-1514
[12]  
Gray R.M., 1990, ENTROPY INFORM THEOR
[13]   Worst-case stealthy innovation-based linear attack on remote state estimation [J].
Guo, Ziyang ;
Shi, Dawei ;
Johansson, Karl Henrik ;
Shi, Ling .
AUTOMATICA, 2018, 89 :117-124
[14]   Optimal Linear Cyber-Attack on Remote State Estimation [J].
Guo, Ziyang ;
Shi, Dawei ;
Johansson, Karl Henrik ;
Shi, Ling .
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2017, 4 (01) :4-13
[15]  
He XK, 2019, IEEE DECIS CONTR P, P5344, DOI 10.1109/CDC40024.2019.9029701
[16]  
Hosseinzadeh M, 2019, ANN ALLERTON CONF, P712, DOI [10.1109/ALLERTON.2019.8919762, 10.1109/allerton.2019.8919762]
[17]   Secure remote state estimation against linear man-in-the-middle attacks using watermarking [J].
Huang, Jiahao ;
Ho, Daniel W. C. ;
Li, Fangfei ;
Yang, Wen ;
Tang, Yang .
AUTOMATICA, 2020, 121
[18]   Resilient Consensus-Based Distributed Filtering: Convergence Analysis Under Stealthy Attacks [J].
Huang, Jiahao ;
Tang, Yang ;
Yang, Wen ;
Li, Fangfei .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (07) :4878-4888
[19]   The Performance and Limitations of ε-Stealthy Attacks on Higher Order Systems [J].
Kung, Enoch ;
Dey, Subhrakanti ;
Shi, Ling .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2017, 62 (02) :941-947
[20]   Detection Against Linear Deception Attacks on Multi-Sensor Remote State Estimation [J].
Li, Yuzhe ;
Shi, Ling ;
Chen, Tongwen .
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2018, 5 (03) :846-856