Resilient Consensus-Based Distributed Filtering: Convergence Analysis Under Stealthy Attacks

被引:43
作者
Huang, Jiahao [1 ]
Tang, Yang [1 ]
Yang, Wen [1 ]
Li, Fangfei [2 ]
机构
[1] East China Univ Sci & Technol, Key Lab Adv Control & Optimizat Chem Proc, Minist Educ, Shanghai 200237, Peoples R China
[2] East China Univ Sci & Technol, Dept Math, Shanghai 200237, Peoples R China
基金
中国国家自然科学基金;
关键词
Cyber-physical systems (CPSs); distributed estimation; security; stealthy attack; ENERGY MANAGEMENT ALGORITHM; CYBER-PHYSICAL SYSTEMS; FALSE DATA INJECTION; DATA INTEGRITY; STATE ESTIMATION; ACTIVATION;
D O I
10.1109/TII.2019.2960042
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, we consider the security problem for the consensus-based distributed state estimation. To resist the malicious attacker who can falsify the data transmitted through the wireless channel, each node equips with an attack defender, which is based on the measurement of its built-in sensor. Under the stealthy attack, which can deceive the defender, we investigate the resilience and convergence of the distributed estimation in two different attack scenarios. For the attack with enough communication resources, we provide a sufficient condition of the optimal attack to quantify the maximum estimation performance degradation. We also analyze the resilience of the worst case distributed estimation caused by the attacker. For the attack with limited resources, the optimal Kalman gain for each node is derived to maximize its estimation performance under the attack. We also give a sufficient condition to guarantee the convergence of the distributed estimation in this case. Finally, numerical simulations are provided to illustrate the effect of the defender on guaranteeing the resilience of sensor networks against attacks.
引用
收藏
页码:4878 / 4888
页数:11
相关论文
共 34 条
[1]  
Ahmed SH, 2013, IFIP WIREL DAY
[2]  
[Anonymous], [No title captured]
[3]   On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds [J].
Bai, Cheng-Zong ;
Gupta, Vijay ;
Pasqualetti, Fabio .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2017, 62 (12) :6641-6648
[4]   Resilient Distributed Estimation Through Adversary Detection [J].
Chen, Yuan ;
Kar, Soummya ;
Moura, Jose M. F. .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2018, 66 (09) :2455-2469
[5]   Dynamic Attack Detection in Cyber-Physical Systems With Side Initial State Information [J].
Chen, Yuan ;
Kar, Soummya ;
Moura, Jose M. F. .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2017, 62 (09) :4618-4624
[6]   False Data Injection on State Estimation in Power Systems-Attacks, Impacts, and Defense: A Survey [J].
Deng, Ruilong ;
Xiao, Gaoxi ;
Lu, Rongxing ;
Liang, Hao ;
Vasilakos, Athanasios V. .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2017, 13 (02) :411-423
[7]   A Survey on Model-Based Distributed Control and Filtering for Industrial Cyber-Physical Systems [J].
Ding, Derui ;
Han, Qing-Long ;
Wang, Zidong ;
Ge, Xiaohua .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (05) :2483-2499
[8]   A Resilient Consensus-Based Distributed Energy Management Algorithm Against Data Integrity Attacks [J].
Duan, Jie ;
Chow, Mo-Yuen .
IEEE TRANSACTIONS ON SMART GRID, 2019, 10 (05) :4729-4740
[9]   A Novel Data Integrity Attack on Consensus-Based Distributed Energy Management Algorithm Using Local Information [J].
Duan, Jie ;
Chow, Mo-Yuen .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (03) :1544-1553
[10]   On the Impact of Cyber Attacks on Data Integrity in Storage-Based Transient Stability Control [J].
Farraj, Abdallah ;
Hammad, Eman ;
Kundur, Deepa .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2017, 13 (06) :3322-3333