Tampering Attack Detection for Remote State Estimation With Quantized Observations

被引:0
|
作者
Li, Mengqi [1 ,2 ]
Hu, Yanpeng [1 ,2 ]
Guo, Jin [1 ,2 ]
机构
[1] Univ Sci & Technol Beijing, Sch Automat & Elect Engn, Beijing 100083, Peoples R China
[2] Minist Educ, Key Lab Knowledge Automat Ind Proc, Beijing 100083, Peoples R China
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
Estimation; State estimation; Technological innovation; Detectors; Signal processing algorithms; Sensors; Cyberattack; Attack detection; binary quantized observations; data tampering; performance evaluation; state estimation; IDENTIFICATION; SECURITY;
D O I
10.1109/LSP.2024.3449242
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Aiming at the security problem of cyber physical system (CPS), this paper designs and evaluates a tampering attack detection scheme for remote state estimation with quantized observations. When the transmitted information is quantized and the attacker randomly tampers it with a certain probability, we design a detection algorithm with a given error threshold based on the received data. Moreover, we proposes detection performance indexes, leakage detection rate and false detection rate, for the above algorithm, which are used to measure the algorithm performance to discriminate the tampered data, and further analyzes the impact of the attack strategy and the error threshold on performance indexes. Finally, simulations are designed to verify the theoretical results.
引用
收藏
页码:2185 / 2189
页数:5
相关论文
共 50 条
  • [1] Fusion State Estimation of CPS Under Quantized Observations and Tampering Attacks
    Li, Mengqi
    Hu, Yanpeng
    Guo, Jin
    IEEE SENSORS JOURNAL, 2024, 24 (11) : 18232 - 18243
  • [2] Tampering attack detection for remote interval observer
    Chen, Tao
    Liu, Zhitao
    Su, Hongye
    JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2024, 361 (01): : 71 - 84
  • [3] Optimal Tampering Attack Strategy for FIR System Identification With Multi-Level Quantized Observations
    Liu, Wenke
    Jing, Fengwei
    Wang, Yinghui
    Guo, Jin
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2025, 35 (04) : 1437 - 1448
  • [4] Quickest detection of false data injection attack in remote state estimation
    Gupta, Akanshu
    Sikdar, Abhinava
    Chattopadhyay, Arpan
    2021 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2021, : 3068 - 3073
  • [5] Detection of data tampering attack in FIR system identification with binary-valued observations
    Jia, Ruizhe
    Su, Ruinan
    Yu, Peng
    Song, Yong
    Guo, Jin
    TRANSACTIONS OF THE INSTITUTE OF MEASUREMENT AND CONTROL, 2025, 47 (02) : 390 - 401
  • [6] An Optimal Linear Attack Strategy on Remote State Estimation
    Liu, Hanxiao
    Ni, Yuqing
    Xie, Lihua
    Johansson, Karl Henrik
    IFAC PAPERSONLINE, 2020, 53 (02): : 3527 - 3532
  • [7] Channel estimation with quantized observations
    Lok, TM
    Wei, VKW
    1998 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, 1998, : 333 - 333
  • [8] Optimal Attack Energy Allocation against Remote State Estimation
    Peng, Lianghong
    Shi, Ling
    Cao, Xianghui
    Sun, Changyin
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2018, 63 (07) : 2199 - 2205
  • [9] Optimal DoS Attack Policy Against Remote State Estimation
    Zhang, Heng
    Cheng, Peng
    Shi, Ling
    Chen, Jiming
    2013 IEEE 52ND ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2013, : 5444 - 5449
  • [10] An Event-Based Stealthy Attack on Remote State Estimation
    Cheng, Peng
    Yang, Zeyu
    Chen, Jiming
    Qi, Yifei
    Shi, Ling
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2020, 65 (10) : 4348 - 4355