Stealthy Noise Injection Attacks Against State Estimation in Interconnected Systems

被引:3
|
作者
Huo, Jian-Ru [1 ]
Li, Xiao-Jian [1 ,2 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Peoples R China
[2] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang 110819, Peoples R China
基金
中国国家自然科学基金;
关键词
Interconnected systems; Detectors; Covariance matrices; Estimation error; State estimation; Kalman filters; Security; local detector; attack design; convex optimization; state estimation;
D O I
10.1109/TCSII.2022.3233447
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This brief investigates the stealthy attack design problem for interconnected systems, where the aim of the attacker is to maximize the estimation error covariance of the centralized state estimator by injecting elaborately designed Gaussian noises into the compromised subsystem. The proposed attack strategy can achieve complete stealthiness for local detectors and keep a certain level of stealthiness for the centralized one simultaneously, which differs from the existing attack strategies for interconnected systems. Due to the nature of the attack model and interconnected systems, the stealthiness constraint is so complex that it is difficult to directly solve the formulated optimization problem to obtain the detailed attack strategy. To transform the stealthiness constraint, the eigenvalues of matrices are used to characterize the upper and lower bounds of the corresponding determinant, and then the closed-form optimal attack strategy is derived. Finally, a 1D network simulation example is provided to verify the developed results.
引用
收藏
页码:2042 / 2046
页数:5
相关论文
共 50 条
  • [11] Globally Stealthy Attacks Against Distributed State Estimation in Smart Grid
    Xu, Shaojie
    Ye, Dan
    Li, Guangdi
    Yang, Dongsheng
    IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2024, : 1 - 11
  • [12] Effects of Switching Network Topologies on Stealthy False Data Injection Attacks Against State Estimation in Power Networks
    Wang, Shaocheng
    Ren, Wei
    Al-Saggaf, Ubaid M.
    IEEE SYSTEMS JOURNAL, 2017, 11 (04): : 2640 - 2651
  • [13] Optimal design and allocation of stealthy attacks against remote state estimation for cyber-physical systems
    Liu, Xuan
    Yang, Guang-Hong
    INFORMATION SCIENCES, 2024, 676
  • [14] Nonlinear stealthy attacks on remote state estimation☆
    Shang, Jun
    Zhou, Jing
    Chen, Tongwen
    AUTOMATICA, 2024, 167
  • [15] False Data Injection Attacks Against State Estimation in Power Distribution Systems
    Deng, Ruilong
    Zhuang, Peng
    Liang, Hao
    IEEE TRANSACTIONS ON SMART GRID, 2019, 10 (03) : 2871 - 2881
  • [16] Online Detection of Stealthy False Data Injection Attacks in Power System State Estimation
    Ashok, Aditya
    Govindarasu, Manimaran
    Ajjarapu, Venkataramana
    IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (03) : 1636 - 1646
  • [17] Design of Stealthy Attacks Against Interval Estimation for Cyber-Physical Systems
    Li, Zhi-Hui
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (02): : 2215 - 2222
  • [18] Stealthy Deception Attacks Against SCADA Systems
    Kleinmann, Amit
    Amichay, Ori
    Wool, Avishai
    Tenenbaum, David
    Bar, Ofer
    Lev, Leonid
    COMPUTER SECURITY, 2017, 2018, 10683 : 93 - 109
  • [19] Stochastic Stealthy False Data Injection Attacks Against Cyber-Physical Systems
    Liu, Ruirui
    Yu, Hao
    Hao, Fei
    IEEE SYSTEMS JOURNAL, 2022, 16 (04): : 6009 - 6020
  • [20] Stealthy false data injection attacks against distributed multi-agent systems
    Sun, Lucheng
    Wu, Tiejun
    Yi, Yang
    Wang, Qin
    Zhang, Ya
    INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE, 2024,