Malicious Attacks on State Estimation Against Distributed Control Systems

被引:34
作者
Lu, An-Yang [1 ]
Yang, Guang-Hong [1 ,2 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Peoples R China
[2] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang 110819, Peoples R China
基金
中国国家自然科学基金;
关键词
Nickel; State estimation; Decentralized control; Detectors; Resilience; Simulation; Attack design; cyber-physical systems; distributed control systems (DSCs); false data injection attacks; state estimation; CYBER-PHYSICAL SYSTEMS;
D O I
10.1109/TAC.2019.2949877
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article investigates malicious attacks against distributed control systems. The objective of this article is to analyze the potential attack mechanisms, which worsen the estimation performance through compromising partial communication links. Two regimes of attacks (perfect and nonperfect attacks) are considered. First, a necessary and sufficient condition for the existence of perfect attack is provided in the form of null space. Based on the obtained conditions, a perfect attack design strategy is proposed. Second, for the case that the adversary cannot compromise enough communication links to implement the perfect attack, an offline nonperfect attack design strategy is proposed. Besides, by intercepting the system measurements, an online nonperfect attack design strategy is provided to enlarge the influence of the designed attacks. Finally, the simulation results demonstrate the correctness and effectiveness of the proposed conditions and methods.
引用
收藏
页码:3911 / 3918
页数:8
相关论文
共 27 条
  • [1] Data-Driven Coordinated Attack Policy Design Based on Adaptive L2-Gain Optimal Theory
    An, Liwei
    Yang, Guang-Hong
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2018, 63 (06) : 1850 - 1857
  • [2] An Improved Threshold-Based Channel Selection Scheme for Wireless Communication Systems
    Bithas, Petros S.
    Rontogiannis, Athanasios A.
    Karagiannidis, George K.
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (02) : 1531 - 1546
  • [3] Distributed Covariance Intersection Fusion Estimation for Cyber-Physical Systems With Communication Constraints
    Chen, Bo
    Hu, Guoqiang
    Ho, Daniel W. C.
    Yu, Li
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2016, 61 (12) : 4020 - 4026
  • [4] Cyber-Physical Attacks With Control Objectives
    Chen, Yuan
    Kar, Soummya
    Moura, Jose M. F.
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2018, 63 (05) : 1418 - 1425
  • [5] A Cyber-Physical Control Framework for Transient Stability in Smart Grids
    Farraj, Abdallah
    Hammad, Eman
    Kundur, Deepa
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (02) : 1205 - 1215
  • [6] Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks
    Fawzi, Hamza
    Tabuada, Paulo
    Diggavi, Suhas
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2014, 59 (06) : 1454 - 1467
  • [7] Distributed Economic Dispatch for Smart Grids With Random Wind Power
    Guo, Fanghong
    Wen, Changyun
    Mao, Jianfeng
    Song, Yong-Duan
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2016, 7 (03) : 1572 - 1583
  • [8] Reliable Control Policy of Cyber-Physical Systems Against a Class of Frequency-Constrained Sensor and Actuator Attacks
    Huang, Xin
    Dong, Jiuxiang
    [J]. IEEE TRANSACTIONS ON CYBERNETICS, 2018, 48 (12) : 3432 - 3439
  • [9] Subspace Methods for Data Attack on State Estimation: A Data Driven Approach
    Kim, Jinsub
    Tong, Lang
    Thomas, Robert J.
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2015, 63 (05) : 1102 - 1114
  • [10] On Topology Attack of a Smart Grid: Undetectable Attacks and Countermeasures
    Kim, Jinsub
    Tong, Lang
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (07) : 1294 - 1305