Vulnerability analysis of distributed state estimation under joint deception attacks

被引:5
|
作者
Wang, Haojun [1 ]
Liu, Kun [1 ]
Han, Dongyu [1 ]
Xia, Yuanqing [1 ]
机构
[1] Beijing Inst Technol, Sch Automat, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Vulnerability analysis; Joint deception attacks; Distributed state estimation; Resource constraints; CYBER-PHYSICAL SYSTEMS; STEALTHY; PERFORMANCE;
D O I
10.1016/j.automatica.2023.111274
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper is concerned with the vulnerability of distributed state estimation under joint deception attacks. We first consider that all the output measurements and state estimations can be corrupted by attackers. The necessary and sufficient condition for the vulnerability of distributed state estimation under the joint attacks is provided. The attack sequence is designed to degrade the performance of distributed state estimation while being stealthy. We further consider that the attackers have resource constraints, which means that only a part of output measurements or state estimations can be attacked. The vulnerability conditions are proposed for distributed state estimation under the joint deception attacks with resource constraints and the corresponding sparse attack sequences are designed. Finally, a numerical example is provided to verify the effectiveness of theoretical results. (c) 2023 Elsevier Ltd. All rights reserved.
引用
收藏
页数:8
相关论文
共 50 条
  • [31] Distributed Multi-Kernel Maximum Correntropy State-Constrained Kalman Filter Under Deception Attacks
    Wang, Guoqing
    Zhu, Zhaolei
    Yang, Chunyu
    Ma, Lei
    Dai, Wei
    Chen, Xinkai
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2025, 12 (01): : 533 - 546
  • [32] Defensive deception against reactive jamming attacks in remote state estimation
    Ding, Kemi
    Ren, Xiaoqiang
    Quevedo, Daniel E.
    Dey, Subhrakanti
    Shi, Ling
    AUTOMATICA, 2020, 113
  • [33] Optimal Stealthy Joint Attacks Against Distributed State Estimation in Cyber-Physical Systems
    Su, Guangzhen
    Liu, Kun
    Wang, Haojun
    Zhang, Qirui
    Xia, Yuanqing
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2024, 11 (03): : 1597 - 1609
  • [34] Fusion estimation in clustering sensor networks under stochastic deception attacks
    Song, Haiyu
    Hong, Zhen
    Song, Hongbo
    Zhang, Wen-An
    INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE, 2018, 49 (10) : 2257 - 2266
  • [35] State estimation for distributed cyber-physical power systems under data attacks
    Li, Yining
    Wu, Jing
    Li, Shaoyuan
    INTERNATIONAL JOURNAL OF MODELLING IDENTIFICATION AND CONTROL, 2016, 26 (04) : 317 - 323
  • [36] Event-Triggered Distributed State Estimation for Multiagent Systems Under DoS Attacks
    Sun, Yuan-Cheng
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON CYBERNETICS, 2022, 52 (07) : 6901 - 6910
  • [37] Distributed State and Fault Estimation for Cyber-Physical Systems Under DoS Attacks
    Limei Liang
    Rong Su
    Haotian Xu
    IEEE/CAA Journal of Automatica Sinica, 2025, 12 (01) : 261 - 263
  • [38] Distributed secure state estimation for cyber-physical systems under sensor attacks
    An, Liwei
    Yang, Guang-Hong
    AUTOMATICA, 2019, 107 : 526 - 538
  • [39] Distributed State and Fault Estimation for Cyber-Physical Systems Under DoS Attacks
    Liang, Limei
    Su, Rong
    Xu, Haotian
    IEEE-CAA JOURNAL OF AUTOMATICA SINICA, 2025, 12 (01) : 261 - 263
  • [40] Probability-Guaranteed Distributed Secure Estimation for Nonlinear Systems over Sensor Networks under Deception Attacks on Innovations
    Ma, Lifeng
    Wang, Zidong
    Chen, Yun
    Yi, Xiaojian
    IEEE Transactions on Signal and Information Processing over Networks, 2021, 7 : 465 - 477