Detection Against Linear Deception Attacks on Multi-Sensor Remote State Estimation

被引:209
作者
Li, Yuzhe [1 ]
Shi, Ling [2 ]
Chen, Tongwen [1 ]
机构
[1] Univ Alberta, Dept Elect & Comp Engn, Edmonton, AB, Canada
[2] Hong Kong Univ Sci & Technol, Dept Elect & Comp Engn, Kowloon, Hong Kong, Peoples R China
来源
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS | 2018年 / 5卷 / 03期
基金
加拿大自然科学与工程研究理事会;
关键词
Cyberphysical systems (CPS) security; detection theory; remote estimation; wireless sensors; SYSTEMS; COST;
D O I
10.1109/TCNS.2017.2648508
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a security problem in cyberphysical systems (CPS) is studied. A remote state estimation process using multiple sensors is considered. The measurement innovation packets from each sensor, which may be modified by a malicious attacker, are sent to a remote fusion center through wireless communication channels. To avoid being detected by typical bad data detectors at the remote estimator's side, the attacker would maintain the statistical properties of the measurements. Based on the information extracted from the trusted sensors and the correlations between the trusted sensors and the suspicious sensors, we propose three sequential data verification and fusion procedures for different detection information scenarios. The corresponding impacts of possible attacking patterns on the estimation performance under different detectors are analyzed explicitly. Simulations are provided to illustrate the developed results.
引用
收藏
页码:846 / 856
页数:11
相关论文
共 25 条
[1]  
Alpcan T., 2010, Network Security: A Decision and Game-Theoretic Approach
[2]  
ANDERSON B. D., 2012, Optimal Filtering
[3]   DETECTABILITY AND STABILIZABILITY OF TIME-VARYING DISCRETE-TIME LINEAR-SYSTEMS [J].
ANDERSON, BDO ;
MOORE, JB .
SIAM JOURNAL ON CONTROL AND OPTIMIZATION, 1981, 19 (01) :20-32
[4]  
Cardenas Alvaro A., 2008, 2008 28th International Conference on Distributed Computing Systems Workshops (ICDCS Workshops), P495, DOI 10.1109/ICDCS.Workshops.2008.40
[5]   SMART SENSORS IN INDUSTRY [J].
FAVENNEC, JM .
JOURNAL OF PHYSICS E-SCIENTIFIC INSTRUMENTS, 1987, 20 (09) :1087-1090
[6]   Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks [J].
Fawzi, Hamza ;
Tabuada, Paulo ;
Diggavi, Suhas .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2014, 59 (06) :1454-1467
[7]  
Guo Z., IEEE T CONTROL NETW, P1
[8]   A survey of recent results in networked control systems [J].
Hespanha, Joao P. ;
Naghshtabrizi, Payam ;
Xu, Yonggang .
PROCEEDINGS OF THE IEEE, 2007, 95 (01) :138-162
[9]   Gaussian particle filtering [J].
Kotecha, JH ;
Djuric, PA .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2003, 51 (10) :2592-2601
[10]  
Levy B.C., 2008, Principles of Signal Detection and Parameter Estimation