Worst-Case Stealthy False-Data Injection Attacks on Remote State Estimation

被引:0
作者
Zhou, Jing [1 ]
Shang, Jun [1 ]
Chen, Tongwen [1 ]
机构
[1] Univ Alberta, Dept Elect & Comp Engn, Edmonton, AB, Canada
来源
IECON 2021 - 47TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY | 2021年
基金
加拿大自然科学与工程研究理事会;
关键词
Anomaly detectors; false-data injection attacks; remote state estimation; LINEAR ATTACK;
D O I
10.1109/IECON48115.2021.9589353
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper studies the problem of false-data injection attacks on remote state estimation. In contrast to existing work that presupposed linear attack models, the optimal information-based attack policy that can cause the maximum estimation quality degradation and deceive the interval chi(2) detector is obtained. The scenarios that attackers have different information sets from the remote estimator are studied in a unified framework. It is shown that, with the given information set, there does not exist another attack policy outperforms the proposed one. The result in this work reduces to the optimal innovation-based linear attack in a special case. The optimality of the information-based strategy is verified by theoretical analysis and numerical examples.
引用
收藏
页数:6
相关论文
共 20 条
  • [1] Cyber Security of Water SCADA Systems-Part I: Analysis and Experimentation of Stealthy Deception Attacks
    Amin, Saurabh
    Litrico, Xavier
    Sastry, Shankar
    Bayen, Alexandre M.
    [J]. IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2013, 21 (05) : 1963 - 1970
  • [2] [Anonymous], 2012, OPTIMAL FILTERING SE
  • [3] On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds
    Bai, Cheng-Zong
    Gupta, Vijay
    Pasqualetti, Fabio
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2017, 62 (12) : 6641 - 6648
  • [4] Security Against False Data-Injection Attack in Cyber-Physical Systems
    Chattopadhyay, Arpan
    Mitra, Urbashi
    [J]. IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2020, 7 (02): : 1015 - 1027
  • [5] Cyber-Physical Attacks With Control Objectives
    Chen, Yuan
    Kar, Soummya
    Moura, Jose M. F.
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2018, 63 (05) : 1418 - 1425
  • [6] Remote State Estimation in the Presence of an Active Eavesdropper
    Ding, Kemi
    Ren, Xiaoqiang
    Leong, Alex S.
    Quevedo, Daniel E.
    Shi, Ling
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (01) : 229 - 244
  • [7] Worst-Case Innovation-Based Integrity Attacks With Side Information on Remote State Estimation
    Guo, Ziyang
    Shi, Dawei
    Johansson, Karl Henrik
    Shi, Ling
    [J]. IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2019, 6 (01): : 48 - 59
  • [8] Worst-case stealthy innovation-based linear attack on remote state estimation
    Guo, Ziyang
    Shi, Dawei
    Johansson, Karl Henrik
    Shi, Ling
    [J]. AUTOMATICA, 2018, 89 : 117 - 124
  • [9] Optimal Linear Cyber-Attack on Remote State Estimation
    Guo, Ziyang
    Shi, Dawei
    Johansson, Karl Henrik
    Shi, Ling
    [J]. IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2017, 4 (01): : 4 - 13
  • [10] State estimation under false data injection attacks: Security analysis and system protection
    Hu, Liang
    Wang, Zidong
    Han, Qing-Long
    Liu, Xiaohui
    [J]. AUTOMATICA, 2018, 87 : 176 - 183