Vulnerability analysis of distributed state estimation under joint deception attacks

被引:5
|
作者
Wang, Haojun [1 ]
Liu, Kun [1 ]
Han, Dongyu [1 ]
Xia, Yuanqing [1 ]
机构
[1] Beijing Inst Technol, Sch Automat, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Vulnerability analysis; Joint deception attacks; Distributed state estimation; Resource constraints; CYBER-PHYSICAL SYSTEMS; STEALTHY; PERFORMANCE;
D O I
10.1016/j.automatica.2023.111274
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper is concerned with the vulnerability of distributed state estimation under joint deception attacks. We first consider that all the output measurements and state estimations can be corrupted by attackers. The necessary and sufficient condition for the vulnerability of distributed state estimation under the joint attacks is provided. The attack sequence is designed to degrade the performance of distributed state estimation while being stealthy. We further consider that the attackers have resource constraints, which means that only a part of output measurements or state estimations can be attacked. The vulnerability conditions are proposed for distributed state estimation under the joint deception attacks with resource constraints and the corresponding sparse attack sequences are designed. Finally, a numerical example is provided to verify the effectiveness of theoretical results. (c) 2023 Elsevier Ltd. All rights reserved.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Distributed State and Input Estimation Over Sensor Networks Under Deception Attacks
    Guo, Yongzhen
    Xia, Yuanqing
    IEEE ACCESS, 2023, 11 : 65418 - 65426
  • [2] Resilient Distributed State Estimation for LTI Systems Under Time-Varying Deception Attacks
    Zhang, Cong
    Qin, Jiahu
    Ma, Qichao
    Shi, Yang
    Li, Menglin
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2023, 10 (01): : 381 - 393
  • [3] The vulnerability of distributed state estimator under stealthy attacks
    Sui, Tianju
    Sun, Xi-Ming
    AUTOMATICA, 2021, 133
  • [4] Vulnerability Analysis of Distributed State Estimator Under False Data Injection Attacks
    Li, Pengyu
    Ye, Dan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 5235 - 5244
  • [5] ADMM-Based Distributed State Estimation of Smart Grid Under Data Deception and Denial of Service Attacks
    Du, Dajun
    Li, Xue
    Li, Wenting
    Chen, Rui
    Fei, Minrui
    Wu, Lei
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2019, 49 (08): : 1698 - 1711
  • [6] Distributed state estimation-based resilient controller design for IoT-enabled microgrids under deception attacks
    Ponnarasi, L.
    Pankajavalli, P. B.
    Lim, Yongdo
    Sakthivel, R.
    APPLIED ENERGY, 2024, 374
  • [7] State estimation of CPSs with deception attacks: Stability analysis and approximate computation
    Zhao, Chang
    Lam, James
    Lin, Hong
    NEUROCOMPUTING, 2021, 423 : 318 - 326
  • [8] Analysis of Network Vulnerability Under Joint Node and Link Attacks
    Li, Yongcheng
    Liu, Shumei
    Yu, Yao
    Cao, Ting
    2017 INTERNATIONAL SYMPOSIUM ON APPLICATION OF MATERIALS SCIENCE AND ENERGY MATERIALS (SAMSE 2017), 2018, 322
  • [9] Event-based distributed state estimation under deception attack
    Yang, Wen
    Lei, Li
    Yang, Chao
    NEUROCOMPUTING, 2017, 270 : 145 - 151
  • [10] Distributed Secure State Estimation Under Stochastic Linear Attacks
    Yang, Wen
    Luo, Weijie
    Zhang, Xinting
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (03): : 2036 - 2047