TY - JOUR
T1 - Secure State Estimation Against Integrity Attacks
T2 - A Gaussian Mixture Model Approach
AU - Guo, Ziyang
AU - Shi, Ling
AU - Quevedo, Daniel E.
AU - Shi, Dawei
N1 - Publisher Copyright:
© 2012 IEEE.
PY - 2019/1/1
Y1 - 2019/1/1
N2 - We consider the problem of estimating the state of a linear time-invariant Gaussian system using N sensors, where a subset of the sensors can potentially be compromised by an adversary. In this case, locating the compromised sensors is of crucial importance for obtaining an accurate state estimate. Inspired by the clustering algorithm in machine learning, we propose a Gaussian-mixture-model-based (GMM-based) detection mechanism. It clusters the local state estimate autonomously and provides a belief for each sensor, based on which measurements from different sensors can be fused accordingly. When a subset of the sensors are under the optimal innovation-based deception attacks, we derive the remote estimation error covariance recursions under different detection mechanisms, e.g., distributed χ 2 false-data detector, centralized 2 false-data detector, and GMM-based detection algorithm. The performance of the proposed GMM-based detection algorithm is further evaluated through average belief in the same attack scenario. Moreover, we discuss applications of GMM-based detection algorithm on other attack scenarios, e.g., false-data injection attack, replay attack, and ϵ-Stealthy attack. Simulation examples are provided to demonstrate the developed results.
AB - We consider the problem of estimating the state of a linear time-invariant Gaussian system using N sensors, where a subset of the sensors can potentially be compromised by an adversary. In this case, locating the compromised sensors is of crucial importance for obtaining an accurate state estimate. Inspired by the clustering algorithm in machine learning, we propose a Gaussian-mixture-model-based (GMM-based) detection mechanism. It clusters the local state estimate autonomously and provides a belief for each sensor, based on which measurements from different sensors can be fused accordingly. When a subset of the sensors are under the optimal innovation-based deception attacks, we derive the remote estimation error covariance recursions under different detection mechanisms, e.g., distributed χ 2 false-data detector, centralized 2 false-data detector, and GMM-based detection algorithm. The performance of the proposed GMM-based detection algorithm is further evaluated through average belief in the same attack scenario. Moreover, we discuss applications of GMM-based detection algorithm on other attack scenarios, e.g., false-data injection attack, replay attack, and ϵ-Stealthy attack. Simulation examples are provided to demonstrate the developed results.
KW - Gaussian mixture model
KW - Secure sate estimation
KW - clustering
KW - integrity attack
UR - http://www.scopus.com/inward/record.url?scp=85055869887&partnerID=8YFLogxK
U2 - 10.1109/TSP.2018.2879037
DO - 10.1109/TSP.2018.2879037
M3 - Article
AN - SCOPUS:85055869887
SN - 1053-587X
VL - 67
SP - 194
EP - 207
JO - IEEE Transactions on Signal Processing
JF - IEEE Transactions on Signal Processing
IS - 1
M1 - 8519325
ER -