Event-Triggered Reverse Attacks on Remote State Estimation
被引:2
|
作者:
Zhao, Xudong
论文数: 0引用数: 0
h-index: 0
机构:
Dalian Univ Technol, Key Lab Intelligent Control & Optimizat Ind Equipm, Minist Educ, Dalian 116024, Peoples R ChinaDalian Univ Technol, Key Lab Intelligent Control & Optimizat Ind Equipm, Minist Educ, Dalian 116024, Peoples R China
Zhao, Xudong
[1
]
Liu, Le
论文数: 0引用数: 0
h-index: 0
机构:
Dalian Univ Technol, Key Lab Intelligent Control & Optimizat Ind Equipm, Minist Educ, Dalian 116024, Peoples R ChinaDalian Univ Technol, Key Lab Intelligent Control & Optimizat Ind Equipm, Minist Educ, Dalian 116024, Peoples R China
Liu, Le
[1
]
Basin, Michael V.
论文数: 0引用数: 0
h-index: 0
机构:
Autonomous Univ Nuevo Leon, Sch Phys & Math Sci, San Nicolas De Los Garza 66455, Nuevo Leon, MexicoDalian Univ Technol, Key Lab Intelligent Control & Optimizat Ind Equipm, Minist Educ, Dalian 116024, Peoples R China
Basin, Michael V.
[2
]
Fei, Zhongyang
论文数: 0引用数: 0
h-index: 0
机构:
Dalian Univ Technol, Key Lab Intelligent Control & Optimizat Ind Equipm, Minist Educ, Dalian 116024, Peoples R ChinaDalian Univ Technol, Key Lab Intelligent Control & Optimizat Ind Equipm, Minist Educ, Dalian 116024, Peoples R China
Fei, Zhongyang
[1
]
机构:
[1] Dalian Univ Technol, Key Lab Intelligent Control & Optimizat Ind Equipm, Minist Educ, Dalian 116024, Peoples R China
[2] Autonomous Univ Nuevo Leon, Sch Phys & Math Sci, San Nicolas De Los Garza 66455, Nuevo Leon, Mexico
Security issues in cyber-physical systems have attracted increasing attention in recent years. In this article, a security problem in a remote estimation application is considered, where an attacker tries to degrade estimation performance via malicious attacks. In our scenario, a smart sensor transmits its innovation to a remote estimator with a residue-based false data detector. Instead of assuming that the attacker launches a consecutive man-in-the-middle attack, we consider the case with intermittent attacks. Reverse attack is a simple attack strategy, which enables an attacker to change signs of the innovation sequences. Therefore, owing to the abovementioned reasons, an event-triggered reverse attack strategy is proposed to degrade the system performance. First, the stealthiness of the event-triggered linear deception attack strategy is studied. Then, the evolution of the estimation error covariance is computed and the reverse attack is proven to be the optimal linear deception attack. We demonstrate that our event-triggered reverse attack is more destructive than a random reverse attack. Furthermore, a convex optimization problem is established to design event-triggered parameters. Comparisons of attack strategies are provided in a numerical example to validate the superiority of the reverse attack.
机构:
Hong Kong Univ Sci & Technol, Dept Elect & Comp Engn, Kowloon, Hong Kong, Peoples R ChinaHong Kong Univ Sci & Technol, Dept Elect & Comp Engn, Kowloon, Hong Kong, Peoples R China
Han, Duo
Mo, Yilin
论文数: 0引用数: 0
h-index: 0
机构:
CALTECH, Control & Dynam Syst Dept, Pasadena, CA 91125 USAHong Kong Univ Sci & Technol, Dept Elect & Comp Engn, Kowloon, Hong Kong, Peoples R China
Mo, Yilin
Wu, Junfeng
论文数: 0引用数: 0
h-index: 0
机构:
Hong Kong Univ Sci & Technol, Dept Elect & Comp Engn, Kowloon, Hong Kong, Peoples R ChinaHong Kong Univ Sci & Technol, Dept Elect & Comp Engn, Kowloon, Hong Kong, Peoples R China
Wu, Junfeng
Weerakkody, Sean
论文数: 0引用数: 0
h-index: 0
机构:
Carnegie Mellon Univ, Dept Elect & Comp Engn, Pittsburgh, PA 15213 USAHong Kong Univ Sci & Technol, Dept Elect & Comp Engn, Kowloon, Hong Kong, Peoples R China
Weerakkody, Sean
Sinopoli, Bruno
论文数: 0引用数: 0
h-index: 0
机构:
Carnegie Mellon Univ, Dept Elect & Comp Engn, Pittsburgh, PA 15213 USAHong Kong Univ Sci & Technol, Dept Elect & Comp Engn, Kowloon, Hong Kong, Peoples R China
Sinopoli, Bruno
Shi, Ling
论文数: 0引用数: 0
h-index: 0
机构:
Hong Kong Univ Sci & Technol, Dept Elect & Comp Engn, Kowloon, Hong Kong, Peoples R ChinaHong Kong Univ Sci & Technol, Dept Elect & Comp Engn, Kowloon, Hong Kong, Peoples R China
机构:
Hong Kong Univ Sci & Technol, Elect & Comp Engn, Kowloon, Hong Kong, Peoples R ChinaHong Kong Univ Sci & Technol, Elect & Comp Engn, Kowloon, Hong Kong, Peoples R China
Han, Duo
论文数: 引用数:
h-index:
机构:
Mo, Yilin
Wu, Junfeng
论文数: 0引用数: 0
h-index: 0
机构:
Hong Kong Univ Sci & Technol, Elect & Comp Engn, Kowloon, Hong Kong, Peoples R ChinaHong Kong Univ Sci & Technol, Elect & Comp Engn, Kowloon, Hong Kong, Peoples R China
Wu, Junfeng
Sinopoli, Bruno
论文数: 0引用数: 0
h-index: 0
机构:
Carnegie Mellon Univ, Elect & Comp Engn, Pittsburgh, PA 15213 USAHong Kong Univ Sci & Technol, Elect & Comp Engn, Kowloon, Hong Kong, Peoples R China
Sinopoli, Bruno
Shi, Ling
论文数: 0引用数: 0
h-index: 0
机构:
Hong Kong Univ Sci & Technol, Elect & Comp Engn, Kowloon, Hong Kong, Peoples R ChinaHong Kong Univ Sci & Technol, Elect & Comp Engn, Kowloon, Hong Kong, Peoples R China
Shi, Ling
[J].
2013 IEEE 52ND ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC),
2013,
: 6079
-
6084