Optimal Linear Encryption Against Stealthy Attacks on Remote State Estimation

被引:32
|
作者
Shang, Jun [1 ]
Chen, Maoyin [2 ]
Chen, Tongwen [1 ]
机构
[1] Univ Alberta, Dept Elect & Comp Engn, Edmonton, AB T6G 1H9, Canada
[2] Tsinghua Univ, Dept Automat, Beijing 100084, Peoples R China
基金
加拿大自然科学与工程研究理事会; 中国国家自然科学基金;
关键词
Encryption; State estimation; Detectors; Intelligent sensors; Estimation error; Cyber-physical systems; optimal encryption; remote state estimation; stealthy attacks; FALSE-DATA INJECTION; INTEGRITY ATTACKS; CONTROL-SYSTEMS;
D O I
10.1109/TAC.2020.3024143
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Defending against malicious attacks has become increasingly important in various cyber-physical systems. This article presents an encryption-based countermeasure against stealthy attacks on remote state estimation. Smart sensors transmit data to a remote estimator through a wireless communication network, in which data packets can be intercepted and compromised by attackers. The remote end is equipped with a false data detector that monitors the system. To avoid being detected, the attack should follow the stealthiness constraint. A linear encryption scheme is proposed to reduce the influence of potential stealthy attacks. For arbitrary linear encryption, the worst-case linear attack that yields the largest estimation error is derived. Accordingly, the optimal linear encryption, which minimizes the worst-case estimation error, is designed based on the Stackelberg game analysis. The above optimal strategies are considered in both the complete and partial measurement information scenarios for the attacker. Moreover, the generalization to nonlinear encryption strategies is also discussed. Comparisons of attack and encryption strategies through numerical examples are provided to illustrate the theoretical results.
引用
收藏
页码:3592 / 3607
页数:16
相关论文
共 50 条
  • [1] Optimal Stealthy Attacks With Energy Constraint Against Remote State Estimation
    Liu, Xuan
    Yang, Guang-Hong
    [J]. IEEE TRANSACTIONS ON CYBERNETICS, 2024, 54 (06) : 3577 - 3587
  • [2] Single-dimensional encryption against innovation-based stealthy attacks on remote state estimation
    Shang, Jun
    Zhou, Jing
    Chen, Tongwen
    [J]. AUTOMATICA, 2022, 136
  • [3] Optimal Stealthy Linear Man-in-the-Middle Attacks With Resource Constraints on Remote State Estimation
    Zhang, Yingwen
    Peng, Zhaoxia
    Wen, Guoguang
    Wang, Jinhuan
    Huang, Tingwen
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2024, 54 (01): : 445 - 456
  • [4] Measurement-Based Optimal Stealthy Attacks on Remote State Estimation
    Li, Pengyu
    Ye, Dan
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 3365 - 3374
  • [5] Nonlinear stealthy attacks on remote state estimation☆
    Shang, Jun
    Zhou, Jing
    Chen, Tongwen
    [J]. AUTOMATICA, 2024, 167
  • [6] Optimal design and allocation of stealthy attacks against remote state estimation for cyber-physical systems
    Liu, Xuan
    Yang, Guang-Hong
    [J]. INFORMATION SCIENCES, 2024, 676
  • [7] On Information Fusion in Optimal Linear FDI Attacks Against Remote State Estimation
    Zhou, Jing
    Shang, Jun
    Chen, Tongwen
    [J]. IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2023, 10 (04): : 2085 - 2096
  • [8] Optimal Stealthy Linear-Attack Schedules on Remote State Estimation
    Zhang, Junhui
    Sun, Jitao
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2021, 69 : 2807 - 2817
  • [9] Optimal Stealthy Linear Attack on Remote State Estimation With Side Information
    Ye, Dan
    Yang, Bing
    Zhang, Tian-Yu
    [J]. IEEE SYSTEMS JOURNAL, 2022, 16 (01): : 1499 - 1507
  • [10] Linear Encryption Against Eavesdropping on Remote State Estimation
    Shang, Jun
    Chen, Tongwen
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2023, 68 (07) : 4413 - 4419