Stealthy Noise Injection Attacks Against State Estimation in Interconnected Systems

被引:3
|
作者
Huo, Jian-Ru [1 ]
Li, Xiao-Jian [1 ,2 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Peoples R China
[2] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang 110819, Peoples R China
基金
中国国家自然科学基金;
关键词
Interconnected systems; Detectors; Covariance matrices; Estimation error; State estimation; Kalman filters; Security; local detector; attack design; convex optimization; state estimation;
D O I
10.1109/TCSII.2022.3233447
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This brief investigates the stealthy attack design problem for interconnected systems, where the aim of the attacker is to maximize the estimation error covariance of the centralized state estimator by injecting elaborately designed Gaussian noises into the compromised subsystem. The proposed attack strategy can achieve complete stealthiness for local detectors and keep a certain level of stealthiness for the centralized one simultaneously, which differs from the existing attack strategies for interconnected systems. Due to the nature of the attack model and interconnected systems, the stealthiness constraint is so complex that it is difficult to directly solve the formulated optimization problem to obtain the detailed attack strategy. To transform the stealthiness constraint, the eigenvalues of matrices are used to characterize the upper and lower bounds of the corresponding determinant, and then the closed-form optimal attack strategy is derived. Finally, a 1D network simulation example is provided to verify the developed results.
引用
收藏
页码:2042 / 2046
页数:5
相关论文
共 50 条
  • [41] Stealthy Attack Against Distributed State Estimation for Cyber-Physical Systems
    Wang, Jie
    Liu, Yun
    Yuan, Hongbo
    Yang, Wen
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2025, 35 (03) : 1091 - 1099
  • [42] Analysis of Stealthy False Data Injection Attacks Against Networked Control Systems:Three Case Studies
    PANG Zhonghua
    FU Yuan
    GUO Haibin
    SUN Jian
    JournalofSystemsScience&Complexity, 2023, 36 (04) : 1407 - 1422
  • [43] Analysis of Stealthy False Data Injection Attacks Against Networked Control Systems: Three Case Studies
    Pang, Zhonghua
    Fu, Yuan
    Guo, Haibin
    Sun, Jian
    JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2023, 36 (04) : 1407 - 1422
  • [44] Partial grid false data injection attacks against state estimation
    Margossian, Harag
    Sayed, Mohammad Ali
    Fawaz, Wissam
    Nakad, Zahi
    INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2019, 110 : 623 - 629
  • [45] Single-dimensional encryption against innovation-based stealthy attacks on remote state estimation
    Shang, Jun
    Zhou, Jing
    Chen, Tongwen
    AUTOMATICA, 2022, 136
  • [46] Improved Stealthy False Data Injection Attacks in Networked Control Systems
    Ning, Chuanyi
    Xi, Zhiyu
    IEEE SYSTEMS JOURNAL, 2024, 18 (01): : 505 - 515
  • [47] Measurement-Based Optimal Stealthy Attacks on Remote State Estimation
    Li, Pengyu
    Ye, Dan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 3365 - 3374
  • [48] Malicious Attacks on State Estimation Against Distributed Control Systems
    Lu, An-Yang
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2020, 65 (09) : 3911 - 3918
  • [49] Detection of Stealthy False Data Injection Attacks Against Cyber-Physical Systems: A Stochastic Coding Scheme
    Guo, Haibin
    Pang, Zhonghua
    Sun, Jian
    Li, Jun
    JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2022, 35 (05) : 1668 - 1684
  • [50] Detection of Stealthy False Data Injection Attacks Against Cyber-Physical Systems: A Stochastic Coding Scheme
    GUO Haibin
    PANG Zhonghua
    SUN Jian
    LI Jun
    Journal of Systems Science & Complexity, 2022, 35 (05) : 1668 - 1684