A class of stealthy attacks on remote state estimation with intermittent observation

被引:5
|
作者
Lv, Yujiao [1 ]
Lu, Jianquan [2 ,3 ]
Liu, Yang [4 ]
Zhang, Lingzhong [5 ]
机构
[1] Southeast Univ, Sch Cyber Sci & Engn, Nanjing 210096, Peoples R China
[2] Southeast Univ, Sch Math, Nanjing 210096, Peoples R China
[3] Linyi Univ, Sch Automat & Elect Engn, Linyi 276005, Peoples R China
[4] Zhejiang Normal Univ, Sch Math Sci, Jinhua 321004, Peoples R China
[5] Changshu Inst Technol, Sch Elect Engn & Automat, Changshu 215500, Peoples R China
基金
中国国家自然科学基金;
关键词
Network attack; Cyber-physical systems; State estimation;
D O I
10.1016/j.ins.2023.118964
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network attacks always threaten economic operations and personal privacy, which have resulted in severe and irreparable damage. Therefore, the investigation of network attacks is essential for network security. This paper concentrates on designing two stealthy attack strategies for remote state estimation with intermittent observations, where the attackers can select one of the designed stealthy attack strategies depending on their capabilities, available resources, and information. Furthermore, for real-time communication rates, a novel detector is introduced to determine if the system is compromised by attackers at each moment. Then, an algorithm for state estimation is derived under the proposed stealthy attack strategies. Furthermore, the attack parameters in the proposed attack strategies are discussed by applying linear matrix inequalities. Finally, a numerical example illustrates the effects of the detector and attack strategies.
引用
收藏
页数:11
相关论文
共 50 条
  • [11] Stealthy Attacks on Smart Grid PMU State Estimation
    Paudel, Sarita
    Smith, Paul
    Zseby, Tanja
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [12] Single-dimensional encryption against innovation-based stealthy attacks on remote state estimation
    Shang, Jun
    Zhou, Jing
    Chen, Tongwen
    AUTOMATICA, 2022, 136
  • [13] Optimal design and allocation of stealthy attacks against remote state estimation for cyber-physical systems
    Liu, Xuan
    Yang, Guang-Hong
    INFORMATION SCIENCES, 2024, 676
  • [14] Stealthy Noise Injection Attacks Against State Estimation in Interconnected Systems
    Huo, Jian-Ru
    Li, Xiao-Jian
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2023, 70 (06) : 2042 - 2046
  • [15] An Event-Based Stealthy Attack on Remote State Estimation
    Cheng, Peng
    Yang, Zeyu
    Chen, Jiming
    Qi, Yifei
    Shi, Ling
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2020, 65 (10) : 4348 - 4355
  • [16] A Formal Model for Verifying Stealthy Attacks on State Estimation in Power Grids
    Rahman, Mohammad Ashiqur
    Al-Shaer, Ehab
    Rahman, Md Ashfaqur
    2013 IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM), 2013, : 414 - 419
  • [17] Globally Stealthy Attacks Against Distributed State Estimation in Smart Grid
    Xu, Shaojie
    Ye, Dan
    Li, Guangdi
    Yang, Dongsheng
    IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2024, : 1 - 11
  • [18] Remote and Stealthy Fault Attacks on Virtualized FPGAs
    Krautter, Jonas
    Gnad, Dennis R. E.
    Tahoori, Mehdi B.
    PROCEEDINGS OF THE 2021 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2021), 2021, : 1632 - 1637
  • [19] Event-Based Optimal Stealthy False Data-Injection Attacks Against Remote State Estimation Systems
    Guo, Haibin
    Sun, Jian
    Pang, Zhong-Hua
    Liu, Guo-Ping
    IEEE TRANSACTIONS ON CYBERNETICS, 2023, 53 (10) : 6714 - 6724
  • [20] Optimal completely stealthy attacks against remote estimation in cyber-physical systems
    Li, Yi-Gang
    Yang, Guang-Hong
    INFORMATION SCIENCES, 2022, 590 : 15 - 28