A Resilient Distributed Kalman Filtering Under Bidirectional Stealthy Attack

被引:0
|
作者
Ding, Wenjie [1 ]
Yang, Wen [1 ]
Yang, Chao [1 ]
Ren, Xiaoqiang [2 ]
Wang, Xiaofan [2 ,3 ]
机构
[1] East China Univ Sci & Technol, Key Lab Smart Mfg Energy Chem Proc, Shanghai 200237, Peoples R China
[2] Shanghai Univ, Sch Mechatron Engn & Automat, Shanghai 200444, Peoples R China
[3] Shanghai Inst Technol, Sch Elect & Elect Engn, Shanghai 201418, Peoples R China
基金
中国国家自然科学基金;
关键词
Attack detection; bidirectional communication; distributed Kalman filtering; false data injection attack; LINEAR-ATTACK; INJECTION;
D O I
10.1109/LSP.2024.3353159
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
False data injection attacks are widely investigated to exploit the cyber-vulnerability of Cyber-Physical System. However, the existing attack policies only consider the cyber-vulnerability in the one-way communication channel. In this letter, a bidirectional stealthy false data injection attack is proposed to bypass the hostile data detector and degrade the estimation performance in the distributed Kalman filtering system. The stealthiness and the influence of the bidirectional stealthy attack is demonstrated by the theoretical analysis. Furthermore, the alternate transmission protocol is proposed to prevent the bidirectional stealthy attack policy. To remedy the protocol and improve the detection sensitivity, an attack detector with multiple factors is proposed. Besides, the choosing principle of the detection factors is analyzed. Simulation examples are presented to investigate the bidirectional stealthy attack and the developed estimator.
引用
收藏
页码:356 / 360
页数:5
相关论文
共 50 条
  • [1] Resilient Distributed State Estimation Under Stealthy Attack
    Lv, Yujiao
    Lu, Jianquan
    Liu, Yang
    Lou, Jungang
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 3254 - 3263
  • [2] Resilient Consensus-Based Distributed Filtering: Convergence Analysis Under Stealthy Attacks
    Huang, Jiahao
    Tang, Yang
    Yang, Wen
    Li, Fangfei
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (07) : 4878 - 4888
  • [3] Distributed Secondary Resilient Controller Design for Islanded AC Microgrids Under Stealthy Frequency Sensor Attack
    Guo, Fanghong
    Huang, Zhen
    Wu, Jinhui
    Li, Zhuocheng
    Liu, Shan
    Xing, Lantao
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2024, : 6203 - 6214
  • [4] An attack-resilient distributed extended Kalman consensus filtering algorithm with applications to multi-UAV tracking problems
    Hu, Yuru
    Li, Wangyan
    Wu, Lifeng
    Yu, Zhensheng
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2024, 25 (08) : 1110 - 1122
  • [5] Distributed Kalman Filtering Under Model Uncertainty
    Zorzi, Mattia
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2020, 7 (02): : 990 - 1001
  • [6] Stealthy attacks and attack-resilient interval observers?
    Degue, Kwassi Holali
    Le Ny, Jerome
    Efimov, Denis
    AUTOMATICA, 2022, 146
  • [7] Distributed fusion Kalman filtering under binary sensors
    Zhang, Yuchen
    Chen, Bo
    Yu, Li
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2020, 30 (06) : 2570 - 2578
  • [8] DISTRIBUTED KALMAN FILTERING
    Das, Subhro
    Moura, Jose M. F.
    2013 PROCEEDINGS OF THE 21ST EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO), 2013,
  • [9] Event-Triggered Distributed Cubature Kalman Filtering Algorithm With Stealthy Attacks Over Sensor Networks
    Ma, Yinping
    Ma, Zhoujian
    Li, Yinya
    Liang, Yuan
    IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS, 2025, 11 : 124 - 135
  • [10] An approach for distributed Kalman filtering
    Quirino, R.B.
    Bottura, C.P.
    Controle y Automacao, 2001, 12 (01): : 19 - 28