The vulnerability of distributed state estimator under stealthy attacks

被引:26
|
作者
Sui, Tianju
Sun, Xi-Ming [1 ]
机构
[1] Dalian Univ Technol, Key Lab Intelligent Control & Optimizat Ind Equip, Minist Educ, Dalian, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Cyber-physical systems; Distributed state estimation; Security; Stealthy attacks; CYBER-PHYSICAL SYSTEMS; SECURITY;
D O I
10.1016/j.automatica.2021.109869
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper focuses on a spatially large linear system with a distributed array of sensors, each of which offers partial state measurements. Suppose that each sensor runs a distributed state estimator and they may be suffering either partially or fully manipulated stealthy attacks. A partially manipulated attack can inject data to replace the measurements from an infected sensor. While, a fully manipulated attack can totally control the infected sensor including its computation and transmission. Moreover, an attack on sensor is called stealthy if it produces bounded changes in the detection residue. We will study both the impacts of partially and fully manipulated stealthy attacks on the distributed state estimator. Correspondingly, a distributed state estimation system is called vulnerable if one of its local estimate can be destabilized by a stealthy attack. Considering both static and dynamic systems, we will provide four necessary and sufficient conditions for the vulnerability of static/dynamic system under partially/fully manipulated stealthy attacks. Numerical examples are given to illustrate the theoretical results. (C) 2021 Elsevier Ltd. All rights reserved.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] Optimal Linear Encryption Against Stealthy Attacks on Remote State Estimation
    Shang, Jun
    Chen, Maoyin
    Chen, Tongwen
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (08) : 3592 - 3607
  • [32] A Formal Model for Verifying Stealthy Attacks on State Estimation in Power Grids
    Rahman, Mohammad Ashiqur
    Al-Shaer, Ehab
    Rahman, Md Ashfaqur
    2013 IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM), 2013, : 414 - 419
  • [33] Evaluating Resilience of Grid Load Predictions under Stealthy Adversarial Attacks
    Zhou, Xingyu
    Li, Yi
    Barreto, Carlos A.
    Li, Jiani
    Volgyesi, Peter
    Neema, Himanshu
    Koutsoukos, Xenofon
    2019 RESILIENCE WEEK (RWS), 2019, : 206 - 212
  • [34] Security Analysis for Autonomous Ground Vehicle Under Stealthy Sensor Attacks
    Peng, Zhaoxia
    Zhang, Yingwen
    Wen, Guoguang
    Wang, Jinhuan
    Huang, Tingwen
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (09) : 12426 - 12437
  • [35] Resilient Synchronization of Pulse-Coupled Oscillators under Stealthy Attacks
    Iori, Yugo
    Ishii, Hideaki
    IFAC PAPERSONLINE, 2021, 54 (14): : 424 - 429
  • [36] Stealthy Attacks on Pheromone Swarming
    Kelly, Janiece
    Richter, Seth
    Guirguis, Mina
    2013 IEEE INTERNATIONAL MULTI-DISCIPLINARY CONFERENCE ON COGNITIVE METHODS IN SITUATION AWARENESS AND DECISION SUPPORT (COGSIMA), 2013, : 301 - 308
  • [37] Resilient Synchronization of Pulse-Coupled Oscillators Under Stealthy Attacks
    Iori, Yugo
    Ishii, Hideaki
    IEEE OPEN JOURNAL OF CONTROL SYSTEMS, 2024, 3 : 429 - 444
  • [38] Reachability Analysis of Cyber-Physical Systems Under Stealthy Attacks
    Zhang, Qirui
    Liu, Kun
    Pang, Zhonghua
    Xia, Yuanqing
    Liu, Tao
    IEEE TRANSACTIONS ON CYBERNETICS, 2022, 52 (06) : 4926 - 4934
  • [39] PDDL: Proactive Distributed Detection and Localization Against Stealthy Deception Attacks in DC Microgrids
    Liu, Mengxiang
    Zhao, Chengcheng
    Xia, Jinhui
    Deng, Ruilong
    Cheng, Peng
    Chen, Jiming
    IEEE TRANSACTIONS ON SMART GRID, 2023, 14 (01) : 714 - 731
  • [40] Stealthy false data injection attacks against distributed multi-agent systems
    Sun, Lucheng
    Wu, Tiejun
    Yi, Yang
    Wang, Qin
    Zhang, Ya
    INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE, 2024,