A Resilient Distributed Kalman Filtering Under Bidirectional Stealthy Attack

被引:0
|
作者
Ding, Wenjie [1 ]
Yang, Wen [1 ]
Yang, Chao [1 ]
Ren, Xiaoqiang [2 ]
Wang, Xiaofan [2 ,3 ]
机构
[1] East China Univ Sci & Technol, Key Lab Smart Mfg Energy Chem Proc, Shanghai 200237, Peoples R China
[2] Shanghai Univ, Sch Mechatron Engn & Automat, Shanghai 200444, Peoples R China
[3] Shanghai Inst Technol, Sch Elect & Elect Engn, Shanghai 201418, Peoples R China
基金
中国国家自然科学基金;
关键词
Attack detection; bidirectional communication; distributed Kalman filtering; false data injection attack; LINEAR-ATTACK; INJECTION;
D O I
10.1109/LSP.2024.3353159
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
False data injection attacks are widely investigated to exploit the cyber-vulnerability of Cyber-Physical System. However, the existing attack policies only consider the cyber-vulnerability in the one-way communication channel. In this letter, a bidirectional stealthy false data injection attack is proposed to bypass the hostile data detector and degrade the estimation performance in the distributed Kalman filtering system. The stealthiness and the influence of the bidirectional stealthy attack is demonstrated by the theoretical analysis. Furthermore, the alternate transmission protocol is proposed to prevent the bidirectional stealthy attack policy. To remedy the protocol and improve the detection sensitivity, an attack detector with multiple factors is proposed. Besides, the choosing principle of the detection factors is analyzed. Simulation examples are presented to investigate the bidirectional stealthy attack and the developed estimator.
引用
收藏
页码:356 / 360
页数:5
相关论文
共 50 条
  • [21] Distributed Kalman Filtering With Adaptive Communication
    Selvi, Daniela
    Battistelli, Giorgio
    IEEE CONTROL SYSTEMS LETTERS, 2025, 9 : 15 - 20
  • [22] Convergence Results in Distributed Kalman Filtering
    Kar, Soummya
    Cui, Shuguang
    Poor, H. Vincent
    Moura, Jose M. F.
    2011 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2011, : 2500 - 2503
  • [23] Resilient Penalty Function Method for Distributed Constrained Optimization under Byzantine Attack
    Xu, Chentao
    Liu, Qingshan
    Huang, Tingwen
    INFORMATION SCIENCES, 2022, 596 : 362 - 379
  • [24] Resilient Penalty Function Method for Distributed Constrained Optimization under Byzantine Attack
    Xu, Chentao
    Liu, Qingshan
    Huang, Tingwen
    Information Sciences, 2022, 596 : 362 - 379
  • [25] Distributed filtering for nonlinear systems under false data injection attack
    Li, Li
    Yang, Huan
    Xia, Yuanqing
    Dai, Li
    AUTOMATICA, 2022, 145
  • [26] Distributed Kalman-filtering: Distributed optimization viewpoint
    Ryu, Kunhee
    Back, Juhoon
    2019 IEEE 58TH CONFERENCE ON DECISION AND CONTROL (CDC), 2019, : 2640 - 2645
  • [27] Stealthy Linear Deception Attacks against Kalman Filtering with Partially Secured Measurements
    Zhou, Jing
    Chen, Tongwen
    2023 62ND IEEE CONFERENCE ON DECISION AND CONTROL, CDC, 2023, : 827 - 832
  • [28] Distributed Kalman Filtering Under Two-Bitrate Periodic Coding Strategies
    Liu, Qinyuan
    Wang, Zidong
    Dong, Hongli
    Jiang, Changjun
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2024, 69 (12) : 8633 - 8646
  • [29] GMM-Based Distributed Kalman Filtering for Target Tracking Under Cyberattacks
    Luo, Jingxian
    Zhu, Hongbo
    IEEE SENSORS LETTERS, 2024, 8 (01)
  • [30] A Workflow for Distributed and Resilient Attack Graph Generation
    Palma, Alessandro
    Bonomi, Silvia
    2023 53RD ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS - SUPPLEMENTAL VOLUME, DSN-S, 2023, : 185 - 187