Optimal Deception Attacks Against Remote State Estimation: An Information-Based Approach

被引:7
|
作者
Zhou, Jing [1 ]
Shang, Jun [1 ]
Chen, Tongwen [1 ]
机构
[1] Univ Alberta, Dept Elect & Comp Engn, Edmonton, AB T6G 1H9, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Deception attacks; dynamic linear sys-tems; information sets; remote state estimation; LINEAR ATTACK;
D O I
10.1109/TAC.2022.3200963
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article studies the problem of deception attacks against remote state estimation from an information perspective. The Kullback-Leibler divergence between the compromised innovation and nominal one is utilized as the stealthiness measure. Without presupposing a linear attack model, the optimal attack policy that can cause maximum performance loss and deceive the false data detector is derived. For both attacks with strict and relaxed stealthiness, the optimal compromised innovation, which is shown to be generated by a linear time-varying system, can be determined with two steps. First, the minimum mean-square error (MMSE) estimate of the prediction error is obtained using attackers' available information. Then, the faked innovation is designed as a linear transformation of the MMSE estimate. Within a unified framework, this separation principle enables handling more general attack scenarios, where the attacker may obtain more (or less) measurement data than the remote estimator. The optimality of the information-based strategy is verified by theoretical analysis, numerical examples, as well as comparative studies with existing methods.
引用
收藏
页码:3947 / 3962
页数:16
相关论文
共 50 条
  • [11] Event-Based State Estimation Against Deception Attacks: A Detection-Based Approach
    Zhao, Chang
    Lin, Hong
    Li, Yuman
    Liang, Shi
    Lam, James
    IEEE SENSORS JOURNAL, 2023, 23 (19) : 23020 - 23029
  • [12] Detection Against Linear Deception Attacks on Multi-Sensor Remote State Estimation
    Li, Yuzhe
    Shi, Ling
    Chen, Tongwen
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2018, 5 (03): : 846 - 856
  • [13] Side Information-Based Stealthy False Data Injection Attacks Against Multi-Sensor Remote Estimation
    Haibin Guo
    Zhong-Hua Pang
    Chao Li
    IEEE/CAA Journal of Automatica Sinica, 2024, 11 (04) : 1054 - 1056
  • [14] Side Information-Based Stealthy False Data Injection Attacks Against Multi-Sensor Remote Estimation
    Guo, Haibin
    Pang, Zhong-Hua
    Li, Chao
    IEEE-CAA JOURNAL OF AUTOMATICA SINICA, 2024, 11 (04) : 1054 - 1056
  • [15] Optimal Stealthy Attacks With Energy Constraint Against Remote State Estimation
    Liu, Xuan
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON CYBERNETICS, 2024, 54 (06) : 3577 - 3587
  • [16] Optimal Linear Encryption Against Stealthy Attacks on Remote State Estimation
    Shang, Jun
    Chen, Maoyin
    Chen, Tongwen
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (08) : 3592 - 3607
  • [17] Optimal Innovation-Based Deception Attack on Remote State Estimation
    Wu, Shuang
    Guo, Ziyang
    Shi, Dawei
    Johansson, Karl Henrik
    Shi, Ling
    2017 AMERICAN CONTROL CONFERENCE (ACC), 2017, : 3017 - 3022
  • [18] Measurement-Based Optimal Stealthy Attacks on Remote State Estimation
    Li, Pengyu
    Ye, Dan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 3365 - 3374
  • [19] Optimal acknowledgment signal attacks against remote estimation
    Yi, Guangmo
    Sun, Hui
    Yang, Yake
    JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2023, 360 (13): : 9844 - 9862
  • [20] Optimal DoS Attacks on Remote State Estimation with a Router
    Wang, Jiazheng
    Shi, Ling
    2018 IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2018, : 6384 - 6389