Attack and estimator design for multi-sensor systems with undetectable adversary

被引:30
作者
Song, Haiyu [1 ]
Shi, Peng [2 ]
Lim, Cheng-Chew [2 ]
Zhang, Wen-An [3 ]
Yu, Li [3 ]
机构
[1] Zhejiang Univ Finance & Econ, Coll Informat, Hangzhou 310018, Zhejiang, Peoples R China
[2] Univ Adelaide, Sch Elect & Elect Engn, Adelaide, SA, Australia
[3] Zhejiang Univ Technol, Dept Automat, Hangzhou 310023, Zhejiang, Peoples R China
基金
中国国家自然科学基金; 澳大利亚研究理事会;
关键词
Multi-sensor estimation; Network attack; Attacker design; Networked estimation system;
D O I
10.1016/j.automatica.2019.108545
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper investigates the state estimation problem for multi-sensor systems under undetectable attacks. The system outputs are transmitted to the estimator via a non-secure network in the presence of adversary. A necessary and sufficient condition is established for the scenario that the attacks are undetectable by the detector of the multi-sensor system. The attack parameters can be obtained by solving an optimization problem such that the attack can not only circumvent detection but also degrade the estimation performance. By considering the estimation error dynamics with uncertainties, an estimator redesign method is derived for the case that the estimator believes there may exist undetectable attacks in the communication network. An illustrative example is presented to demonstrate the effectiveness and potential of the proposed attacker design and estimator redesign techniques. (C) 2019 Elsevier Ltd. All rights reserved.
引用
收藏
页数:8
相关论文
共 26 条
[1]   Secure State Estimation Against Sparse Sensor Attacks With Adaptive Switching Mechanism [J].
An, Liwei ;
Yang, Guang-Hong .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2018, 63 (08) :2596-2603
[2]  
[Anonymous], 1994, LINEAR MATRIX INEQUA
[3]   On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds [J].
Bai, Cheng-Zong ;
Gupta, Vijay ;
Pasqualetti, Fabio .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2017, 62 (12) :6641-6648
[4]   Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs [J].
Bai, Cheng-Zong ;
Pasqualetti, Fabio ;
Gupta, Vijay .
AUTOMATICA, 2017, 82 :251-260
[5]   Distributed Kalman filtering for time-varying discrete sequential systems [J].
Chen, Bo ;
Hu, Guoqiang ;
Ho, Daniel W. C. ;
Yu, Li .
AUTOMATICA, 2019, 99 :228-236
[6]   Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks [J].
Ding, Derui ;
Wang, Zidong ;
Ho, Daniel W. C. ;
Wei, Guoliang .
AUTOMATICA, 2017, 78 :231-240
[7]   Distributed Secure Coordinated Control for Multiagent Systems Under Strategic Attacks [J].
Feng, Zhi ;
Wen, Guanghui ;
Hu, Guoqiang .
IEEE TRANSACTIONS ON CYBERNETICS, 2017, 47 (05) :1273-1284
[8]   FAULT DETECTION FOR TIME-DELAYED NETWORKED CONTROL SYSTEMS WITH SENSOR SATURATION AND RANDOMLY OCCURRING FAULTS [J].
Gao, Min ;
Jiang, Shun ;
Pan, Feng .
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2018, 14 (04) :1511-1525
[9]   Worst-case stealthy innovation-based linear attack on remote state estimation [J].
Guo, Ziyang ;
Shi, Dawei ;
Johansson, Karl Henrik ;
Shi, Ling .
AUTOMATICA, 2018, 89 :117-124
[10]   Optimal Linear Cyber-Attack on Remote State Estimation [J].
Guo, Ziyang ;
Shi, Dawei ;
Johansson, Karl Henrik ;
Shi, Ling .
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2017, 4 (01) :4-13