Optimal Linear Cyber-Attack on Remote State Estimation

Ziyang Guo, Dawei Shi, Karl Henrik Johansson, Ling Shi

Research output: Contribution to journalArticlepeer-review

377 Citations (Scopus)

Abstract

Recent years have witnessed the surge of interest of security issues in cyber-physical systems. In this paper, we consider malicious cyber attacks in a remote state estimation application where a smart sensor node transmits data to a remote estimator equipped with a false data detector. It is assumed that all the sensor data can be observed and modified by the malicious attacker and a residue-based detection algorithm is used at the remote side to detect data anomalies. We propose a linear deception attack strategy and present the corresponding feasibility constraint which guarantees that the attacker is able to successfully inject false data without being detected. The evolution of the estimation error covariance at the remote estimator is derived and the degradation of system performance under the proposed linear attack policy is analyzed. Furthermore, we obtain a closed-form expression of the optimal attack strategy among all linear attacks. Comparison of attack strategies through simulated examples are provided to illustrate the theoretical results.

Original languageEnglish
Article number7470566
Pages (from-to)4-13
Number of pages10
JournalIEEE Transactions on Control of Network Systems
Volume4
Issue number1
DOIs
Publication statusPublished - Mar 2017

Keywords

  • Cyber-physical systems
  • deception attack
  • remote state estimation
  • security

Fingerprint

Dive into the research topics of 'Optimal Linear Cyber-Attack on Remote State Estimation'. Together they form a unique fingerprint.

Cite this