Optimal deception attacks on remote state estimators equipped with interval anomaly detectors

被引:13
|
作者
Zhou, Jing [1 ]
Shang, Jun [1 ]
Chen, Tongwen [1 ]
机构
[1] Univ Alberta, Dept Elect & Comp Engn, Edmonton, AB, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Deception attacks; Kalman filters; Remote state estimation; Anomaly detectors; DATA-INJECTION ATTACKS; PERFORMANCE;
D O I
10.1016/j.automatica.2022.110723
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper studies the problem of optimal deception attacks on remote state estimation, where an interval chi(2) detector is deployed to reveal anomalies. The information-based attack policy that can bypass the anomaly detector and cause the maximum estimation quality degradation is derived. For both attacks with strict and relaxed stealthiness, the optimal compromised measurements can be designed with three steps: obtain the minimum mean-square error estimation of the prediction error, de-correlate the estimate with historical compromised innovations, and design the compromised innovation as an optimal linear transformation. All available information for attackers is fully utilized for performance maximization while the stealthiness constraint is satisfied precisely to deceive the anomaly detector. The attack effect depends on both the amount of online information and the duration of detection interval. Contrary to well-studied innovation-based attacks using static linear combinations, the information-based deception policy is shown to be generated by a linear time-varying system, whose coefficients can be completely determined offline. The optimality of the proposed attack is verified with numerical examples and comparative studies. (c) 2022 Elsevier Ltd. All rights reserved.
引用
收藏
页数:14
相关论文
共 27 条
  • [1] Optimal Deception Attacks on Remote State Estimation with Heterogeneous Vulnerabilities
    Wei, Jinyuan
    Zhou, Jing
    Chen, Tongwen
    INTELLIGENT NETWORKED THINGS, CINT 2024, PT II, 2024, 2139 : 188 - 200
  • [2] Optimal Deception Attacks Against Remote State Estimation: An Information-Based Approach
    Zhou, Jing
    Shang, Jun
    Chen, Tongwen
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2023, 68 (07) : 3947 - 3962
  • [3] Optimal deception attacks against remote state estimation in cyber-physical systems
    Li, Yi-Gang
    Yang, Guang-Hong
    JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2020, 357 (03): : 1832 - 1852
  • [4] On scheduling of deception attacks for discrete-time networked systems equipped with attack detectors
    Ding, Derui
    Wei, Guoliang
    Zhang, Sunjie
    Liu, Yurong
    Alsaadi, Fuad E.
    NEUROCOMPUTING, 2017, 219 : 99 - 106
  • [5] Stochastic Detector Against Linear Deception Attacks on Remote State Estimation
    Li, Yuzhe
    Chen, Tongwen
    2016 IEEE 55TH CONFERENCE ON DECISION AND CONTROL (CDC), 2016, : 6291 - 6296
  • [6] Defensive deception against reactive jamming attacks in remote state estimation
    Ding, Kemi
    Ren, Xiaoqiang
    Quevedo, Daniel E.
    Dey, Subhrakanti
    Shi, Ling
    AUTOMATICA, 2020, 113
  • [7] A Secure Encoding Mechanism Against Deception Attacks on Multisensor Remote State Estimation
    Zhou, Jiayu
    Ding, Wenjie
    Yang, Wen
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1959 - 1969
  • [8] Optimal DoS Attacks on Remote State Estimation with a Router
    Wang, Jiazheng
    Shi, Ling
    2018 IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2018, : 6384 - 6389
  • [9] Distributed event-triggered state estimators design for sensor networked systems with deception attacks
    Liu, Jinliang
    Wei, Lili
    Xie, Xiangpeng
    Yue, Dong
    IET CONTROL THEORY AND APPLICATIONS, 2019, 13 (17): : 2783 - 2791
  • [10] Optimal innovation-based deception attacks with side information against remote state estimation in cyber-physical systems
    Li, Yi-Gang
    Yang, Guang-Hong
    NEUROCOMPUTING, 2022, 500 : 461 - 470