Optimal deception attacks on remote state estimators equipped with interval anomaly detectors

被引:13
|
作者
Zhou, Jing [1 ]
Shang, Jun [1 ]
Chen, Tongwen [1 ]
机构
[1] Univ Alberta, Dept Elect & Comp Engn, Edmonton, AB, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Deception attacks; Kalman filters; Remote state estimation; Anomaly detectors; DATA-INJECTION ATTACKS; PERFORMANCE;
D O I
10.1016/j.automatica.2022.110723
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper studies the problem of optimal deception attacks on remote state estimation, where an interval chi(2) detector is deployed to reveal anomalies. The information-based attack policy that can bypass the anomaly detector and cause the maximum estimation quality degradation is derived. For both attacks with strict and relaxed stealthiness, the optimal compromised measurements can be designed with three steps: obtain the minimum mean-square error estimation of the prediction error, de-correlate the estimate with historical compromised innovations, and design the compromised innovation as an optimal linear transformation. All available information for attackers is fully utilized for performance maximization while the stealthiness constraint is satisfied precisely to deceive the anomaly detector. The attack effect depends on both the amount of online information and the duration of detection interval. Contrary to well-studied innovation-based attacks using static linear combinations, the information-based deception policy is shown to be generated by a linear time-varying system, whose coefficients can be completely determined offline. The optimality of the proposed attack is verified with numerical examples and comparative studies. (c) 2022 Elsevier Ltd. All rights reserved.
引用
收藏
页数:14
相关论文
共 27 条
  • [21] Optimal stealthy integrity attacks on remote state estimation: The maximum utilization of historical data
    Shang, Jun
    Chen, Tongwen
    Automatica, 2021, 128
  • [22] Optimal Stealthy Linear Man-in-the-Middle Attacks With Resource Constraints on Remote State Estimation
    Zhang, Yingwen
    Peng, Zhaoxia
    Wen, Guoguang
    Wang, Jinhuan
    Huang, Tingwen
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2024, 54 (01): : 445 - 456
  • [23] Transmission scheduling for privacy-optimal encryption against eavesdropping attacks on remote state estimation
    Wang, Le
    Cao, Xianghui
    Zhang, Heng
    Sun, Changyin
    Zheng, Wei Xing
    AUTOMATICA, 2022, 137
  • [24] Optimal Privacy-Preserving Transmission Schedule Against Eavesdropping Attacks on Remote State Estimation
    Zou, Jiaying
    Liu, Hanxiao
    Liu, Chun
    Ren, Xiaoqiang
    Wang, Xiaofan
    IEEE CONTROL SYSTEMS LETTERS, 2024, 8 : 538 - 543
  • [25] Optimal innovation-based attacks against remote state estimation with side information and historical data
    Shan, Hua-Sheng
    Li, Yi-Gang
    An, Liwei
    INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE, 2025, 56 (03) : 544 - 560
  • [26] Optimal design and allocation of stealthy attacks against remote state estimation for cyber-physical systems
    Liu, Xuan
    Yang, Guang-Hong
    INFORMATION SCIENCES, 2024, 676
  • [27] Event-Based Optimal Stealthy False Data-Injection Attacks Against Remote State Estimation Systems
    Guo, Haibin
    Sun, Jian
    Pang, Zhong-Hua
    Liu, Guo-Ping
    IEEE TRANSACTIONS ON CYBERNETICS, 2023, 53 (10) : 6714 - 6724