A class of stealthy attacks on remote state estimation with intermittent observation

被引:5
|
作者
Lv, Yujiao [1 ]
Lu, Jianquan [2 ,3 ]
Liu, Yang [4 ]
Zhang, Lingzhong [5 ]
机构
[1] Southeast Univ, Sch Cyber Sci & Engn, Nanjing 210096, Peoples R China
[2] Southeast Univ, Sch Math, Nanjing 210096, Peoples R China
[3] Linyi Univ, Sch Automat & Elect Engn, Linyi 276005, Peoples R China
[4] Zhejiang Normal Univ, Sch Math Sci, Jinhua 321004, Peoples R China
[5] Changshu Inst Technol, Sch Elect Engn & Automat, Changshu 215500, Peoples R China
基金
中国国家自然科学基金;
关键词
Network attack; Cyber-physical systems; State estimation;
D O I
10.1016/j.ins.2023.118964
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network attacks always threaten economic operations and personal privacy, which have resulted in severe and irreparable damage. Therefore, the investigation of network attacks is essential for network security. This paper concentrates on designing two stealthy attack strategies for remote state estimation with intermittent observations, where the attackers can select one of the designed stealthy attack strategies depending on their capabilities, available resources, and information. Furthermore, for real-time communication rates, a novel detector is introduced to determine if the system is compromised by attackers at each moment. Then, an algorithm for state estimation is derived under the proposed stealthy attack strategies. Furthermore, the attack parameters in the proposed attack strategies are discussed by applying linear matrix inequalities. Finally, a numerical example illustrates the effects of the detector and attack strategies.
引用
收藏
页数:11
相关论文
共 50 条
  • [31] Online Detection of Stealthy False Data Injection Attacks in Power System State Estimation
    Ashok, Aditya
    Govindarasu, Manimaran
    Ajjarapu, Venkataramana
    IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (03) : 1636 - 1646
  • [32] Stealthy switching attacks on sensors against state estimation in cyber-physical systems
    Huo, Jian-Ru
    Li, Xiao-Jian
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2023, 33 (02) : 1169 - 1183
  • [33] Mitigating Stealthy False Data Injection Attacks Against State Estimation in Smart Grid
    Fan, Jingyao
    Khazbak, Youssef
    Tian, Jue
    Liu, Ting
    Cao, Guohong
    2018 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2018,
  • [34] Worst-Case Stealthy Innovation-Based Linear Attacks on Remote State Estimation Under Kullback-Leibler Divergence
    Shang, Jun
    Yu, Hao
    Chen, Tongwen
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2022, 67 (11) : 6082 - 6089
  • [35] DoS Attacks on Remote State Estimation With Asymmetric Information
    Ding, Kemi
    Ren, Xiaoqiang
    Quevedo, Daniel E.
    Dey, Subhrakanti
    Shi, Ling
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2019, 6 (02): : 653 - 666
  • [36] Security design against stealthy attacks on power system state estimation: A formal approach
    Rahman, Mohammad Ashiqur
    Datta, Amarjit
    Al-Shaer, Ehab
    COMPUTERS & SECURITY, 2019, 84 : 301 - 317
  • [37] Optimal DoS Attacks on Remote State Estimation with a Router
    Wang, Jiazheng
    Shi, Ling
    2018 IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2018, : 6384 - 6389
  • [38] Information-based stealthy attacks against distributed state estimation over sensor networks
    Wang, Yichao
    Jin, Kaijing
    Ye, Dan
    NEUROCOMPUTING, 2025, 618
  • [39] Deep Adversary based Stealthy False Data Injection Attacks against AC state estimation
    Bhattacharjee, Arnab
    Mishra, Sukumar
    Verma, Ashu
    2022 IEEE PES 14TH ASIA-PACIFIC POWER AND ENERGY ENGINEERING CONFERENCE, APPEEC, 2022,
  • [40] Optimal Stealthy Attack With Side Information Under the Energy Constraint on Remote State Estimation
    Dong, Sheng-Sheng
    Li, Yi-Gang
    Chen, Li
    Zhang, Xiaoling
    INTERNATIONAL JOURNAL OF CONTROL AUTOMATION AND SYSTEMS, 2024, 22 (09) : 2723 - 2733