The vulnerability of distributed state estimator under stealthy attacks

被引:27
作者
Sui, Tianju
Sun, Xi-Ming [1 ]
机构
[1] Dalian Univ Technol, Key Lab Intelligent Control & Optimizat Ind Equip, Minist Educ, Dalian, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Cyber-physical systems; Distributed state estimation; Security; Stealthy attacks; CYBER-PHYSICAL SYSTEMS; SECURITY;
D O I
10.1016/j.automatica.2021.109869
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper focuses on a spatially large linear system with a distributed array of sensors, each of which offers partial state measurements. Suppose that each sensor runs a distributed state estimator and they may be suffering either partially or fully manipulated stealthy attacks. A partially manipulated attack can inject data to replace the measurements from an infected sensor. While, a fully manipulated attack can totally control the infected sensor including its computation and transmission. Moreover, an attack on sensor is called stealthy if it produces bounded changes in the detection residue. We will study both the impacts of partially and fully manipulated stealthy attacks on the distributed state estimator. Correspondingly, a distributed state estimation system is called vulnerable if one of its local estimate can be destabilized by a stealthy attack. Considering both static and dynamic systems, we will provide four necessary and sufficient conditions for the vulnerability of static/dynamic system under partially/fully manipulated stealthy attacks. Numerical examples are given to illustrate the theoretical results. (C) 2021 Elsevier Ltd. All rights reserved.
引用
收藏
页数:12
相关论文
共 50 条
  • [41] Joint interval estimation of state and fault for networked control systems under stealthy attacks
    Li J.
    Jiang S.
    Pan F.
    Kongzhi yu Juece/Control and Decision, 2023, 38 (12): : 3418 - 3426
  • [42] Energy efficient management for distributed state estimation under DoS attacks
    Lei, Hongyi
    Yang, Wen
    Yu, Yan
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2022, 32 (04) : 1941 - 1959
  • [43] Secure Output-Feedback Control of Transportation Cyber-Physical Systems for Emergency Medical Services Under Stealthy Attacks
    Lv, Jianhui
    Slowik, Adam
    Li, Keqin
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2024,
  • [44] Security Analysis for Autonomous Ground Vehicle Under Stealthy Sensor Attacks
    Peng, Zhaoxia
    Zhang, Yingwen
    Wen, Guoguang
    Wang, Jinhuan
    Huang, Tingwen
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (09) : 12426 - 12437
  • [45] Distributed Secure State Estimation and Control for CPSs Under Sensor Attacks
    Ao, Wei
    Song, Yongduan
    Wen, Changyun
    IEEE TRANSACTIONS ON CYBERNETICS, 2020, 50 (01) : 259 - 269
  • [46] Robust Stealthy Attacks Based on Uncertain Costs and Labeled Finite Automata With Inputs
    Ammour, Rabah
    Amari, Said
    Brenner, Leonardo
    Demongodin, Isabel
    Lefebvre, Dimitri
    IEEE ROBOTICS AND AUTOMATION LETTERS, 2023, 8 (05) : 2732 - 2739
  • [47] How to Secure Distributed Filters Under Sensor Attacks
    He, Xingkang
    Ren, Xiaoqiang
    Sandberg, Henrik
    Johansson, Karl Henrik
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2022, 67 (06) : 2843 - 2856
  • [48] Optimal design and allocation of stealthy attacks against remote state estimation for cyber-physical systems
    Liu, Xuan
    Yang, Guang-Hong
    INFORMATION SCIENCES, 2024, 676
  • [49] Optimal encryption strategy for cyber-physical systems against stealthy attacks with energy constraints: A Stackelberg game approach
    Liu, Xuan
    Yang, Guang-Hong
    INFORMATION SCIENCES, 2022, 610 : 674 - 693
  • [50] Secure Interval Estimation for Event-Triggered Cyber-Physical Systems Under Stealthy Attacks
    Wang, Xudong
    Wang, Guoqi
    Fei, Zhongyang
    Li, Zhe
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2024, 11 (02): : 648 - 657