SECURE ESTIMATION AGAINST COMPLEX-VALUED ATTACKS

被引:0
|
作者
Mohammadi, Arash [1 ]
Plataniotis, Konstantinos N. [2 ]
机构
[1] Concordia Univ, Concordia Inst Informat Syst Engn, Montreal, PQ, Canada
[2] Univ Toronto, Elect & Comp Engn, Toronto, ON, Canada
关键词
Complex signals; Data injection attack; Statistical distance measures; Secure estimation; Widely linear model; STATE ESTIMATION;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Motivated by recent evolution of cutting-edge sensor technologies with complex-valued measurements, the paper exposes complex valued (non-circular) false data injection attacks. We propose an attack model where an adversary applies widely-linear transformations on the sensor measurements to introduce correlations between the real and imaginary parts of the reported observations. Existing state estimators and attack detectors assume the measurements to have statistical properties similar to real-valued signals making them highly vulnerable to such complex-valued attacks. As a countermeasure, we propose to transform the attack detection problem into the problem of comparing the statistical distance between the Gaussian representation of the innovation sequence under attack and its counterpart with the optimal profile. Our Monte Carlo simulations illustrate the destructive nature of complex-valued attacks and validate the effectiveness of the proposed detection concept.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] Diffusion ACNSAF Algorithm for Secure Distributed Estimation Under Complex-Valued Attacks
    Wen, Pengwei
    Zhang, Jiashu
    Zhang, Sheng
    Chen, Gao
    [J]. IEEE ACCESS, 2020, 8 (08): : 203168 - 203182
  • [2] Estimation of the modulus of a complex-valued quantity
    Oberto, L.
    Pennecchi, F.
    [J]. METROLOGIA, 2006, 43 (06) : 531 - 538
  • [3] Optimization and Estimation of Complex-Valued Signals
    Adali, Tuelay
    Schreier, Peter J.
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2014, 31 (05) : 112 - 128
  • [4] Predictive power estimation of complex-valued signals
    Huang, AP
    Laakso, TI
    Ovaska, SJ
    Hartimo, IO
    [J]. 38TH MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS, PROCEEDINGS, VOLS 1 AND 2, 1996, : 953 - 956
  • [5] Observer-based secure synchronization control of directed complex-valued dynamical networks under link attacks
    Liu, Mengxuan
    Liu, Jian
    Liang, Jianchao
    Sun, Yuangong
    Shu, Yanjun
    [J]. NONLINEAR DYNAMICS, 2024, 112 (14) : 12303 - 12318
  • [6] Complex-Valued adaptive networks based on entropy estimation
    Wang, Gang
    Xue, Rui
    Zhou, Chao
    Gong, Junjie
    [J]. SIGNAL PROCESSING, 2018, 149 : 124 - 134
  • [7] Long memory estimation for complex-valued time series
    Marina I. Knight
    Matthew A. Nunes
    [J]. Statistics and Computing, 2019, 29 : 517 - 536
  • [8] Complex-valued estimation of wind profile and wind power
    Goh, SL
    Popovic, DH
    Mandic, DP
    [J]. MELECON 2004: PROCEEDINGS OF THE 12TH IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE, VOLS 1-3, 2004, : 1037 - 1040
  • [9] Long memory estimation for complex-valued time series
    Knight, Marina I.
    Nunes, Matthew A.
    [J]. STATISTICS AND COMPUTING, 2019, 29 (03) : 517 - 536
  • [10] Motion estimation using a complex-valued wavelet transform
    Magarey, J
    Kingsbury, N
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 1998, 46 (04) : 1069 - 1084