Optimal innovation-based attacks against remote state estimation with side information and historical data

被引:0
|
作者
Shan, Hua-Sheng [1 ]
Li, Yi-Gang [1 ]
An, Liwei [2 ]
机构
[1] Shenyang Univ Technol, Sch Artificial Intelligence, Shenyang 110870, Peoples R China
[2] Northeastern Univ, Coll Informat Sci & Engn, Shenyang, Peoples R China
基金
中国国家自然科学基金;
关键词
Cyber-physical systems; remote state estimation; false data injection attacks; Kullback-Leibler divergence; historical data; side information; DATA-INJECTION ATTACKS; CONTROL-SYSTEMS; INTEGRITY ATTACKS; SECURITY;
D O I
10.1080/00207721.2024.2395931
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This work investigates the attack strategy design problem of the false data injection attack against the cyber-physical system. Distinct from the relevant results which utilise the current intercepted data or additionally consider side information, a more universal attack model is proposed which combines historical data and side information with the current intercepted data to synergistically deteriorate the system estimation performance. In order to quantify the impact resulting from the proposed attack strategy, the optimisation objective is characterised by deriving the error covariance matrix under the attacks, which becomes more intricate since the proposed attack model introduces more decision variables and coupled terms. Take the stealthiness which is characterised by Kullback-Leibler divergence as the constraints, the problem investigated in this work is equivalently transformed into the constrained multi-variable non-convex optimisation problems, which are not able to be solved directly by the methods in the relevant results. By utilising the Lagrange multiplier method, the structural characteristic of the optimal mean and the optimal covariance which only related to the Lagrange multiplier are derived, such that the optimal distribution of the modified innovation is able to be obtained by a simple search procedure. Following that, the design of the optimal attack strategy is completed by using semi-definite programming to derive the optimal attack matrices. Finally, the simulation examples are given such that the validity of the results is verified.
引用
收藏
页码:544 / 560
页数:17
相关论文
共 50 条
  • [41] On Innovation-Based Triggering for Event-Based Nonlinear State Estimation Using the Particle Filter
    Ruuskanen, Johan
    Cervin, Anton
    2020 EUROPEAN CONTROL CONFERENCE (ECC 2020), 2020, : 1401 - 1408
  • [42] ON MINIMAX ESTIMATION IN THE PRESENCE OF SIDE INFORMATION ABOUT REMOTE DATA
    AHLSWEDE, R
    BURNASHEV, MV
    ANNALS OF STATISTICS, 1990, 18 (01): : 141 - 171
  • [43] Optimal Jamming Power Allocation Against Remote State Estimation
    Zhang, Heng
    Qi, Yifei
    Wu, Junfeng
    2017 AMERICAN CONTROL CONFERENCE (ACC), 2017, : 1660 - 1665
  • [44] Optimal DoS Attack Policy Against Remote State Estimation
    Zhang, Heng
    Cheng, Peng
    Shi, Ling
    Chen, Jiming
    2013 IEEE 52ND ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2013, : 5444 - 5449
  • [45] Optimal Attack Energy Allocation against Remote State Estimation
    Peng, Lianghong
    Shi, Ling
    Cao, Xianghui
    Sun, Changyin
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2018, 63 (07) : 2199 - 2205
  • [46] Optimal Resilient Defense Strategy Against False Data Injection Attacks on Power System State Estimation
    Khatibi, Mohammad
    Ahmed, Sara
    2018 IEEE POWER & ENERGY SOCIETY INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE (ISGT), 2018,
  • [47] Blind False Data Injection Attacks Against State Estimation Based on Matrix Reconstruction
    Yang, Haosen
    He, Xing
    Wang, Ziqiang
    Qiu, Robert C.
    Ai, Qian
    IEEE TRANSACTIONS ON SMART GRID, 2022, 13 (04) : 3174 - 3187
  • [48] Priority-Based Protection Against the Malicious Data Injection Attacks on State Estimation
    Khanna, Kush
    Panigrahi, Bijaya Ketan
    Joshi, Anupam
    IEEE SYSTEMS JOURNAL, 2020, 14 (02): : 1945 - 1952
  • [49] A Secure Encoding Mechanism Against Deception Attacks on Multisensor Remote State Estimation
    Zhou, Jiayu
    Ding, Wenjie
    Yang, Wen
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1959 - 1969
  • [50] Information-based stealthy attacks against distributed state estimation over sensor networks
    Wang, Yichao
    Jin, Kaijing
    Ye, Dan
    NEUROCOMPUTING, 2025, 618