The vulnerability of distributed state estimator under stealthy attacks

被引:27
|
作者
Sui, Tianju
Sun, Xi-Ming [1 ]
机构
[1] Dalian Univ Technol, Key Lab Intelligent Control & Optimizat Ind Equip, Minist Educ, Dalian, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Cyber-physical systems; Distributed state estimation; Security; Stealthy attacks; CYBER-PHYSICAL SYSTEMS; SECURITY;
D O I
10.1016/j.automatica.2021.109869
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper focuses on a spatially large linear system with a distributed array of sensors, each of which offers partial state measurements. Suppose that each sensor runs a distributed state estimator and they may be suffering either partially or fully manipulated stealthy attacks. A partially manipulated attack can inject data to replace the measurements from an infected sensor. While, a fully manipulated attack can totally control the infected sensor including its computation and transmission. Moreover, an attack on sensor is called stealthy if it produces bounded changes in the detection residue. We will study both the impacts of partially and fully manipulated stealthy attacks on the distributed state estimator. Correspondingly, a distributed state estimation system is called vulnerable if one of its local estimate can be destabilized by a stealthy attack. Considering both static and dynamic systems, we will provide four necessary and sufficient conditions for the vulnerability of static/dynamic system under partially/fully manipulated stealthy attacks. Numerical examples are given to illustrate the theoretical results. (C) 2021 Elsevier Ltd. All rights reserved.
引用
收藏
页数:12
相关论文
共 50 条
  • [21] Optimal Stealthy Attack to Remote Estimator for Estimation Error Regulation
    Chen, Tao
    Wang, Lei
    Liu, Zhitao
    Wang, Wenhai
    Su, Hongye
    2023 AMERICAN CONTROL CONFERENCE, ACC, 2023, : 1998 - 2003
  • [22] Design of Stealthy Deception Attacks With Partial System Knowledge
    Zhang, Qirui
    Liu, Kun
    Han, Dongyu
    Su, Guangzhen
    Xia, Yuanqing
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2023, 68 (02) : 1069 - 1076
  • [23] A class of stealthy attacks on remote state estimation with intermittent observation
    Lv, Yujiao
    Lu, Jianquan
    Liu, Yang
    Zhang, Lingzhong
    INFORMATION SCIENCES, 2023, 639
  • [24] Distributed Secure State Estimation Under Stochastic Linear Attacks
    Yang, Wen
    Luo, Weijie
    Zhang, Xinting
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (03): : 2036 - 2047
  • [25] Security Analysis of Distributed Consensus Filtering Under Replay Attacks
    Huang, Jiahao
    Yang, Wen
    Ho, Daniel W. C.
    Li, Fangfei
    Tang, Yang
    IEEE TRANSACTIONS ON CYBERNETICS, 2024, 54 (06) : 3526 - 3539
  • [26] Concurrent Receding Horizon Control and Estimation Against Stealthy Attacks
    Fotiadis, Filippos
    Vamvoudakis, Kyriakos. G.
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2023, 68 (06) : 3712 - 3719
  • [27] Worst-Case Stealthy Attacks on Stochastic Event-Based State Estimation
    Shang, Jun
    Yu, Hao
    Chen, Tongwen
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2022, 67 (04) : 2052 - 2059
  • [28] State estimation for distributed cyber-physical power systems under data attacks
    Li, Yining
    Wu, Jing
    Li, Shaoyuan
    INTERNATIONAL JOURNAL OF MODELLING IDENTIFICATION AND CONTROL, 2016, 26 (04) : 317 - 323
  • [29] Attack detection and security control for quadrotor under stealthy attacks
    Wu, Chengwei
    Zhu, Yupeng
    Xu, Lezhong
    Zhu, Hongming
    Zhang, Quanqi
    Zhu, Jiajing
    Yao, Weiran
    SYSTEMS & CONTROL LETTERS, 2025, 197
  • [30] Stealthy attacks against distributed state estimation of stochastic multi-agent systems under composite attack detection mechanisms
    Zhang, Dong-Yu
    Li, Xiao-Jian
    INFORMATION SCIENCES, 2024, 672