Stealthy Noise Injection Attacks Against State Estimation in Interconnected Systems

被引:3
|
作者
Huo, Jian-Ru [1 ]
Li, Xiao-Jian [1 ,2 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Peoples R China
[2] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang 110819, Peoples R China
基金
中国国家自然科学基金;
关键词
Interconnected systems; Detectors; Covariance matrices; Estimation error; State estimation; Kalman filters; Security; local detector; attack design; convex optimization; state estimation;
D O I
10.1109/TCSII.2022.3233447
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This brief investigates the stealthy attack design problem for interconnected systems, where the aim of the attacker is to maximize the estimation error covariance of the centralized state estimator by injecting elaborately designed Gaussian noises into the compromised subsystem. The proposed attack strategy can achieve complete stealthiness for local detectors and keep a certain level of stealthiness for the centralized one simultaneously, which differs from the existing attack strategies for interconnected systems. Due to the nature of the attack model and interconnected systems, the stealthiness constraint is so complex that it is difficult to directly solve the formulated optimization problem to obtain the detailed attack strategy. To transform the stealthiness constraint, the eigenvalues of matrices are used to characterize the upper and lower bounds of the corresponding determinant, and then the closed-form optimal attack strategy is derived. Finally, a 1D network simulation example is provided to verify the developed results.
引用
收藏
页码:2042 / 2046
页数:5
相关论文
共 50 条
  • [21] Security design against stealthy attacks on power system state estimation: A formal approach
    Rahman, Mohammad Ashiqur
    Datta, Amarjit
    Al-Shaer, Ehab
    COMPUTERS & SECURITY, 2019, 84 : 301 - 317
  • [22] Modelling and Countermeasures of False Data Injection Attacks Against State Estimation in Power Systems
    Alayande, Akintunde Samson
    Nwulu, Nnamdi
    Bakare, Ayodeji Emmanuel
    PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON COMPUTATIONAL TECHNIQUES, ELECTRONICS AND MECHANICAL SYSTEMS (CTEMS), 2018, : 129 - 134
  • [23] Stealthy Attacks on Smart Grid PMU State Estimation
    Paudel, Sarita
    Smith, Paul
    Zseby, Tanja
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [24] Worst-Case Stealthy False-Data Injection Attacks on Remote State Estimation
    Zhou, Jing
    Shang, Jun
    Chen, Tongwen
    IECON 2021 - 47TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2021,
  • [25] Optimal completely stealthy attacks against remote estimation in cyber-physical systems
    Li, Yi-Gang
    Yang, Guang-Hong
    INFORMATION SCIENCES, 2022, 590 : 15 - 28
  • [26] Joint interval estimation of state and fault for networked control systems under stealthy attacks
    Li J.
    Jiang S.
    Pan F.
    Kongzhi yu Juece/Control and Decision, 2023, 38 (12): : 3418 - 3426
  • [27] Secure State Estimation Against Sensor Attacks in the Presence of Noise
    Mishra, Shaunak
    Shoukry, Yasser
    Karamchandani, Nikhil
    Diggavi, Suhas N.
    Tabuada, Paulo
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2017, 4 (01): : 49 - 59
  • [28] Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks
    Miao, Fei
    Zhu, Quanyan
    Pajic, Miroslav
    Pappas, George J.
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2017, 4 (01): : 106 - 117
  • [29] Information-based stealthy attacks against distributed state estimation over sensor networks
    Wang, Yichao
    Jin, Kaijing
    Ye, Dan
    NEUROCOMPUTING, 2025, 618
  • [30] Concurrent Receding Horizon Control and Estimation Against Stealthy Attacks
    Fotiadis, Filippos
    Vamvoudakis, Kyriakos. G.
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2023, 68 (06) : 3712 - 3719