Stealthy Noise Injection Attacks Against State Estimation in Interconnected Systems

被引:3
|
作者
Huo, Jian-Ru [1 ]
Li, Xiao-Jian [1 ,2 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Peoples R China
[2] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang 110819, Peoples R China
基金
中国国家自然科学基金;
关键词
Interconnected systems; Detectors; Covariance matrices; Estimation error; State estimation; Kalman filters; Security; local detector; attack design; convex optimization; state estimation;
D O I
10.1109/TCSII.2022.3233447
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This brief investigates the stealthy attack design problem for interconnected systems, where the aim of the attacker is to maximize the estimation error covariance of the centralized state estimator by injecting elaborately designed Gaussian noises into the compromised subsystem. The proposed attack strategy can achieve complete stealthiness for local detectors and keep a certain level of stealthiness for the centralized one simultaneously, which differs from the existing attack strategies for interconnected systems. Due to the nature of the attack model and interconnected systems, the stealthiness constraint is so complex that it is difficult to directly solve the formulated optimization problem to obtain the detailed attack strategy. To transform the stealthiness constraint, the eigenvalues of matrices are used to characterize the upper and lower bounds of the corresponding determinant, and then the closed-form optimal attack strategy is derived. Finally, a 1D network simulation example is provided to verify the developed results.
引用
收藏
页码:2042 / 2046
页数:5
相关论文
共 50 条
  • [1] Stealthy False Data Injection Attacks against State Estimation in Power Systems: Switching Network Topologies
    Wang, Shaocheng
    Ren, Wei
    2014 AMERICAN CONTROL CONFERENCE (ACC), 2014,
  • [2] Mitigating Stealthy False Data Injection Attacks Against State Estimation in Smart Grid
    Fan, Jingyao
    Khazbak, Youssef
    Tian, Jue
    Liu, Ting
    Cao, Guohong
    2018 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2018,
  • [3] Deep Adversary based Stealthy False Data Injection Attacks against AC state estimation
    Bhattacharjee, Arnab
    Mishra, Sukumar
    Verma, Ashu
    2022 IEEE PES 14TH ASIA-PACIFIC POWER AND ENERGY ENGINEERING CONFERENCE, APPEEC, 2022,
  • [4] Event-Based Optimal Stealthy False Data-Injection Attacks Against Remote State Estimation Systems
    Guo, Haibin
    Sun, Jian
    Pang, Zhong-Hua
    Liu, Guo-Ping
    IEEE TRANSACTIONS ON CYBERNETICS, 2023, 53 (10) : 6714 - 6724
  • [5] Stealthy switching attacks on sensors against state estimation in cyber-physical systems
    Huo, Jian-Ru
    Li, Xiao-Jian
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2023, 33 (02) : 1169 - 1183
  • [6] Deep Latent Space Clustering for Detection of Stealthy False Data Injection Attacks Against AC State Estimation in Power Systems
    Bhattacharjee, Arnab
    Mondal, Arnab Kumar
    Verma, Ashu
    Mishra, Sukumar
    Saha, Tapan K.
    IEEE TRANSACTIONS ON SMART GRID, 2023, 14 (03) : 2338 - 2351
  • [7] Optimal Stealthy Attacks With Energy Constraint Against Remote State Estimation
    Liu, Xuan
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON CYBERNETICS, 2024, 54 (06) : 3577 - 3587
  • [8] Optimal Stealthy Joint Attacks Against Distributed State Estimation in Cyber-Physical Systems
    Su, Guangzhen
    Liu, Kun
    Wang, Haojun
    Zhang, Qirui
    Xia, Yuanqing
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2024, 11 (03): : 1597 - 1609
  • [9] Stealthy false data injection attacks with resource constraints against multi-sensor estimation systems
    Guo, Haibin
    Sun, Jian
    Pang, Zhong-Hua
    ISA TRANSACTIONS, 2022, 127 : 32 - 40
  • [10] Optimal Linear Encryption Against Stealthy Attacks on Remote State Estimation
    Shang, Jun
    Chen, Maoyin
    Chen, Tongwen
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (08) : 3592 - 3607