On Information Fusion in Optimal Linear FDI Attacks Against Remote State Estimation

被引:6
|
作者
Zhou, Jing [1 ]
Shang, Jun [1 ]
Chen, Tongwen [1 ]
机构
[1] Univ Alberta, Dept Elect & Comp Engn, Edmonton, AB T6G 1H9, Canada
来源
基金
加拿大自然科学与工程研究理事会;
关键词
Kalman filtering; remote state estimation; side information; False data injection (FDI) attacks; DATA-INJECTION ATTACKS; SYSTEMS; INPUT;
D O I
10.1109/TCNS.2023.3260041
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article studies the problem of false data injection (FDI) attacks against remote state estimation. The scenario that malicious attackers can intercept original data packets and also eavesdrop on some side information of system states with extra sensors is considered. To clarify a counterintuitive issue in existing work, a different innovation-based linear attack policy fusing all available information is proposed. First, the evolution of a posteriori estimation error covariance with FDI attacks is derived. Then, explicit solutions of optimal stealthy attack coefficients are obtained without solving optimization problems numerically. The condition under which there exist multiple optimal attacks is analyzed. In addition, an easy-to-check criterion for comparing two information fusion methods in scalar systems is given. Simulation results show that, compared with existing work, the proposed attack strategy can completely deceive the anomaly detector and cause more severe performance degradation in remote state estimation.
引用
收藏
页码:2085 / 2096
页数:12
相关论文
共 50 条
  • [41] Optimal stealthy integrity attacks on remote state estimation: The maximum utilization of historical data
    Shang, Jun
    Chen, Tongwen
    Automatica, 2021, 128
  • [42] Nonlinear stealthy attacks on remote state estimation☆
    Shang, Jun
    Zhou, Jing
    Chen, Tongwen
    AUTOMATICA, 2024, 167
  • [43] Design of Linear Deception Attacks Against State Estimation in Multiplant Power Systems
    Ning, Chuanyi
    Hao, Fei
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2025, 12 (01): : 882 - 893
  • [44] Optimal Stealthy Attack With Side Information Against Remote State Estimation: A Corrupted Innovation-Based Strategy
    Mao, Li-Wei
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON CYBERNETICS, 2025, 55 (02) : 897 - 904
  • [45] State optimal estimation with nonstandard multi-sensor information fusion
    Wang, Jiong-Qi
    Zhou, Hai-Yin
    Zhao, De-Yong
    Wu, Yi
    Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2008, 30 (08): : 1415 - 1420
  • [46] False Data Attacks Against AC State Estimation With Incomplete Network Information
    Liu, Xuan
    Li, Zuyi
    IEEE TRANSACTIONS ON SMART GRID, 2017, 8 (05) : 2239 - 2248
  • [47] Resilient Reinforcement in Secure State Estimation Against Sensor Attacks With A Priori Information
    Shinohara, Takumi
    Namerikawa, Toru
    Qu, Zhihua
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2019, 64 (12) : 5024 - 5038
  • [48] Optimal linear estimation and data fusion
    Elliott, RJ
    Van der Hoek, J
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2006, 51 (04) : 686 - 689
  • [49] Optimal stealthy switching location attacks against remote estimation in cyber-physical systems
    Li Y.-G.
    Yang G.-H.
    Neurocomputing, 2021, 421 : 183 - 194
  • [50] Optimal stealthy switching location attacks against remote estimation in cyber-physical systems
    Li, Yi-Gang
    Yang, Guang-Hong
    NEUROCOMPUTING, 2021, 421 : 183 - 194