On Information Fusion in Optimal Linear FDI Attacks Against Remote State Estimation

被引:6
|
作者
Zhou, Jing [1 ]
Shang, Jun [1 ]
Chen, Tongwen [1 ]
机构
[1] Univ Alberta, Dept Elect & Comp Engn, Edmonton, AB T6G 1H9, Canada
来源
基金
加拿大自然科学与工程研究理事会;
关键词
Kalman filtering; remote state estimation; side information; False data injection (FDI) attacks; DATA-INJECTION ATTACKS; SYSTEMS; INPUT;
D O I
10.1109/TCNS.2023.3260041
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article studies the problem of false data injection (FDI) attacks against remote state estimation. The scenario that malicious attackers can intercept original data packets and also eavesdrop on some side information of system states with extra sensors is considered. To clarify a counterintuitive issue in existing work, a different innovation-based linear attack policy fusing all available information is proposed. First, the evolution of a posteriori estimation error covariance with FDI attacks is derived. Then, explicit solutions of optimal stealthy attack coefficients are obtained without solving optimization problems numerically. The condition under which there exist multiple optimal attacks is analyzed. In addition, an easy-to-check criterion for comparing two information fusion methods in scalar systems is given. Simulation results show that, compared with existing work, the proposed attack strategy can completely deceive the anomaly detector and cause more severe performance degradation in remote state estimation.
引用
收藏
页码:2085 / 2096
页数:12
相关论文
共 50 条
  • [31] Optimal Jamming Power Allocation Against Remote State Estimation
    Zhang, Heng
    Qi, Yifei
    Wu, Junfeng
    2017 AMERICAN CONTROL CONFERENCE (ACC), 2017, : 1660 - 1665
  • [32] Optimal DoS Attack Policy Against Remote State Estimation
    Zhang, Heng
    Cheng, Peng
    Shi, Ling
    Chen, Jiming
    2013 IEEE 52ND ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2013, : 5444 - 5449
  • [33] Optimal Attack Energy Allocation against Remote State Estimation
    Peng, Lianghong
    Shi, Ling
    Cao, Xianghui
    Sun, Changyin
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2018, 63 (07) : 2199 - 2205
  • [34] A Secure Encoding Mechanism Against Deception Attacks on Multisensor Remote State Estimation
    Zhou, Jiayu
    Ding, Wenjie
    Yang, Wen
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1959 - 1969
  • [35] Event-Based Optimal Stealthy False Data-Injection Attacks Against Remote State Estimation Systems
    Guo, Haibin
    Sun, Jian
    Pang, Zhong-Hua
    Liu, Guo-Ping
    IEEE TRANSACTIONS ON CYBERNETICS, 2023, 53 (10) : 6714 - 6724
  • [36] Optimal completely stealthy attacks against remote estimation in cyber-physical systems
    Li, Yi-Gang
    Yang, Guang-Hong
    INFORMATION SCIENCES, 2022, 590 : 15 - 28
  • [37] Optimal Stealthy Linear-Attack Schedules on Remote State Estimation
    Zhang, Junhui
    Sun, Jitao
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2021, 69 : 2807 - 2817
  • [38] Optimal Schedule of Secure Transmissions for Remote State Estimation Against Eavesdropping
    Wang, Le
    Cao, Xianghui
    Sun, Bowen
    Zhang, Heng
    Sun, Changyin
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (03) : 1987 - 1997
  • [39] Optimal stealthy integrity attacks on remote state estimation: The maximum utilization of historical data
    Shang, Jun
    Chen, Tongwen
    AUTOMATICA, 2021, 128
  • [40] Secure State Estimation: Optimal Guarantees against Sensor Attacks in the Presence of Noise
    Mishra, Shaunak
    Shoukry, Yasser
    Karamchandani, Nikhil
    Diggavi, Suhas
    Tabuada, Paulo
    2015 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2015, : 2929 - 2933