Vulnerability analysis of distributed state estimation under joint deception attacks

被引:5
|
作者
Wang, Haojun [1 ]
Liu, Kun [1 ]
Han, Dongyu [1 ]
Xia, Yuanqing [1 ]
机构
[1] Beijing Inst Technol, Sch Automat, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Vulnerability analysis; Joint deception attacks; Distributed state estimation; Resource constraints; CYBER-PHYSICAL SYSTEMS; STEALTHY; PERFORMANCE;
D O I
10.1016/j.automatica.2023.111274
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper is concerned with the vulnerability of distributed state estimation under joint deception attacks. We first consider that all the output measurements and state estimations can be corrupted by attackers. The necessary and sufficient condition for the vulnerability of distributed state estimation under the joint attacks is provided. The attack sequence is designed to degrade the performance of distributed state estimation while being stealthy. We further consider that the attackers have resource constraints, which means that only a part of output measurements or state estimations can be attacked. The vulnerability conditions are proposed for distributed state estimation under the joint deception attacks with resource constraints and the corresponding sparse attack sequences are designed. Finally, a numerical example is provided to verify the effectiveness of theoretical results. (c) 2023 Elsevier Ltd. All rights reserved.
引用
收藏
页数:8
相关论文
共 50 条
  • [41] State Estimation Under Joint False Data Injection Attacks: Dealing With Constraints and Insecurity
    Xu, Wenying
    Wang, Zidong
    Hu, Liang
    Kurths, Juergen
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2022, 67 (12) : 6745 - 6753
  • [42] Joint interval estimation of state and fault for networked control systems under stealthy attacks
    Li J.
    Jiang S.
    Pan F.
    Kongzhi yu Juece/Control and Decision, 2023, 38 (12): : 3418 - 3426
  • [43] Distributed State Estimation for State-Saturated Power Systems under Denial-of-Service Attacks
    Chen, Wei
    Wang, Xueli
    Mao, Jingyang
    Ding, Derui
    16TH IEEE INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION, ROBOTICS AND VISION (ICARCV 2020), 2020, : 824 - 829
  • [44] Probability-Guaranteed Distributed Secure Estimation for Nonlinear Systems Over Sensor Networks Under Deception Attacks on Innovations
    Ma, Lifeng
    Wang, Zidong
    Chen, Yun
    Yi, Xiaojian
    IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS, 2021, 7 : 465 - 477
  • [45] Distributed Maximum Correntropy Filtering for Stochastic Nonlinear Systems Under Deception Attacks
    Song, Haifang
    Ding, Derui
    Dong, Hongli
    Han, Qing-Long
    IEEE TRANSACTIONS ON CYBERNETICS, 2022, 52 (05) : 3733 - 3744
  • [46] A Watermarking Strategy Against Linear Deception Attacks on Remote State Estimation Under K-L Divergence
    Wang, Di
    Huang, Jiahao
    Tang, Yang
    Li, Fangfei
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (05) : 3273 - 3281
  • [47] Filter-based secure state estimation for linear time-varying systems under deception attacks
    Liu, Xinghua
    Wang, Yuanzhe
    2018 CHINESE AUTOMATION CONGRESS (CAC), 2018, : 2164 - 2168
  • [48] Detection of Data Integrity Attacks in Distributed State Estimation
    Xia, Yuanyuan
    Su, Shuangping
    Su, Housheng
    Zhang, Xinting
    Luo, Weijie
    Yang, Wen
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2021, 51 (12): : 7735 - 7744
  • [49] Distributed Sparse Undetectable Attacks Against State Estimation
    An, Liwei
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2022, 9 (01): : 463 - 473
  • [50] Towards invariant extended Kalman filter-based resilient distributed state estimation for moving robots over mobile sensor networks under deception attacks
    Zhang, Cong
    Qin, Jiahu
    Yan, Chengzhen
    Shi, Yang
    Wang, Yaonan
    Li, Man
    AUTOMATICA, 2024, 159