The vulnerability of distributed state estimator under stealthy attacks

被引:27
作者
Sui, Tianju
Sun, Xi-Ming [1 ]
机构
[1] Dalian Univ Technol, Key Lab Intelligent Control & Optimizat Ind Equip, Minist Educ, Dalian, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Cyber-physical systems; Distributed state estimation; Security; Stealthy attacks; CYBER-PHYSICAL SYSTEMS; SECURITY;
D O I
10.1016/j.automatica.2021.109869
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper focuses on a spatially large linear system with a distributed array of sensors, each of which offers partial state measurements. Suppose that each sensor runs a distributed state estimator and they may be suffering either partially or fully manipulated stealthy attacks. A partially manipulated attack can inject data to replace the measurements from an infected sensor. While, a fully manipulated attack can totally control the infected sensor including its computation and transmission. Moreover, an attack on sensor is called stealthy if it produces bounded changes in the detection residue. We will study both the impacts of partially and fully manipulated stealthy attacks on the distributed state estimator. Correspondingly, a distributed state estimation system is called vulnerable if one of its local estimate can be destabilized by a stealthy attack. Considering both static and dynamic systems, we will provide four necessary and sufficient conditions for the vulnerability of static/dynamic system under partially/fully manipulated stealthy attacks. Numerical examples are given to illustrate the theoretical results. (C) 2021 Elsevier Ltd. All rights reserved.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] Risk Assessment for Connected Vehicles Under Stealthy Attacks on Vehicle-to-Vehicle Networks
    Yang, Tianci
    Murguia, Carlos
    Lv, Chen
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (12) : 13627 - 13638
  • [32] Distributed secure state estimation for cyber-physical systems under sensor attacks
    An, Liwei
    Yang, Guang-Hong
    AUTOMATICA, 2019, 107 : 526 - 538
  • [33] Interval Observer Design Under Stealthy Attacks and Improved Event-Triggered Protocols
    Li, Xin
    Wei, Guoliang
    Ding, Derui
    IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS, 2020, 6 : 570 - 579
  • [34] Security Allocation in Networked Control Systems Under Stealthy Attacks
    Nguyen, Anh Tung
    Teixeira, Andre M. H.
    Medvedev, Alexander
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2025, 12 (01): : 216 - 227
  • [35] Distributed Resilient Energy Management for Seaport Microgrid Against Stealthy Attacks With Limited Security Defense Resource
    Teng, Fei
    Zhang, Xin
    Li, Tieshan
    Shan, Qihe
    Chen, C. L. Philip
    Li, Yushuai
    IEEE TRANSACTIONS ON CYBERNETICS, 2025, 55 (02) : 917 - 926
  • [36] Worst-Case Stealthy Innovation-Based Linear Attacks on Remote State Estimation Under Kullback-Leibler Divergence
    Shang, Jun
    Yu, Hao
    Chen, Tongwen
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2022, 67 (11) : 6082 - 6089
  • [37] A Periodic Dynamic Encoding Mechanism for Stealthy Attack Detection in Distributed State Estimation
    Ding, Kun
    Yang, Wen
    Liu, Yun
    Luo, Yue
    Chen, Jialing
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2024,
  • [38] Stealthy Attack Against Distributed State Estimation for Cyber-Physical Systems
    Wang, Jie
    Liu, Yun
    Yuan, Hongbo
    Yang, Wen
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2025, 35 (03) : 1091 - 1099
  • [39] Stealthy Noise Injection Attacks Against State Estimation in Interconnected Systems
    Huo, Jian-Ru
    Li, Xiao-Jian
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2023, 70 (06) : 2042 - 2046
  • [40] Measurement-Based Optimal Stealthy Attacks on Remote State Estimation
    Li, Pengyu
    Ye, Dan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 3365 - 3374