Tampering Attack Detection for Remote State Estimation With Quantized Observations

被引:0
|
作者
Li, Mengqi [1 ,2 ]
Hu, Yanpeng [1 ,2 ]
Guo, Jin [1 ,2 ]
机构
[1] Univ Sci & Technol Beijing, Sch Automat & Elect Engn, Beijing 100083, Peoples R China
[2] Minist Educ, Key Lab Knowledge Automat Ind Proc, Beijing 100083, Peoples R China
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
Estimation; State estimation; Technological innovation; Detectors; Signal processing algorithms; Sensors; Cyberattack; Attack detection; binary quantized observations; data tampering; performance evaluation; state estimation; IDENTIFICATION; SECURITY;
D O I
10.1109/LSP.2024.3449242
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Aiming at the security problem of cyber physical system (CPS), this paper designs and evaluates a tampering attack detection scheme for remote state estimation with quantized observations. When the transmitted information is quantized and the attacker randomly tampers it with a certain probability, we design a detection algorithm with a given error threshold based on the received data. Moreover, we proposes detection performance indexes, leakage detection rate and false detection rate, for the above algorithm, which are used to measure the algorithm performance to discriminate the tampered data, and further analyzes the impact of the attack strategy and the error threshold on performance indexes. Finally, simulations are designed to verify the theoretical results.
引用
收藏
页码:2185 / 2189
页数:5
相关论文
共 50 条
  • [21] Optimal Stealthy Linear Attack on Remote State Estimation With Side Information
    Ye, Dan
    Yang, Bing
    Zhang, Tian-Yu
    IEEE SYSTEMS JOURNAL, 2022, 16 (01): : 1499 - 1507
  • [22] Energy-efficient DoS attack against remote state estimation
    Gan, Ruimeng
    Wang, Yangyang
    Xiao, Zhe
    Zhang, Heng
    Wang, Xin
    Yang, Ming
    INTERNET TECHNOLOGY LETTERS, 2022, 5 (04)
  • [23] Tampering Attack Detection in Analog to Feature Converter for Wearable Biosensor
    Tang, Xiaochen
    Liu, Shanshan
    Che, Wenjie
    Tang, Wei
    2022 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS 22), 2022, : 1150 - 1154
  • [24] An Efficient Approach for Tampering Attack Detection in WSN Using Blockchain
    Yasin, Muhammad Rehan
    Syed, Hassan Jamil
    Shuja, Junaid
    20TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC 2024, 2024, : 156 - 161
  • [25] State estimation for linear discrete-time systems with binary-valued quantized innovations against data tampering attacks
    Li, Mengqi
    Hu, Yanpeng
    Guo, Jin
    JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2024, 361 (08):
  • [26] A Bayesian approach to joint attack detection and resilient state estimation
    Forti, Nicola
    Battistelli, Giorgio
    Chisci, Luigi
    Sinopoli, Bruno
    2016 IEEE 55TH CONFERENCE ON DECISION AND CONTROL (CDC), 2016, : 1192 - 1198
  • [27] Interval State Estimation for Attack Detection Base on PQ decomposition
    Wen, Xichang
    Wang, Huaizhi
    Aziz, Saddam
    Jiang, Hui
    Peng, Jianchun
    INNOVATIVE SOLUTIONS FOR ENERGY TRANSITIONS, 2019, 158 : 6607 - 6612
  • [28] Kalman Filtering Based Interval State Estimation For Attack Detection
    Meng, Anjian
    Wang, Huaizhi
    Aziz, Saddam
    Peng, Jianchun
    Jiang, Hui
    INNOVATIVE SOLUTIONS FOR ENERGY TRANSITIONS, 2019, 158 : 6589 - 6594
  • [29] Spoofing Attack Detection for Radar Network System State Estimation
    Huang, Tianqi
    Wang, Buhong
    Lin, Dong
    CYBERSPACE SAFETY AND SECURITY, PT I, 2020, 11982 : 21 - 33
  • [30] Rollout approach to sensor scheduling for remote state estimation under integrity attack
    Liu, Hanxiao
    Li, Yuchao
    Johansson, Karl Henrik
    Martensson, Jonas
    Xie, Lihua
    AUTOMATICA, 2022, 144