Vulnerability analysis of distributed state estimation under joint deception attacks

Haojun Wang, Kun Liu*, Dongyu Han, Yuanqing Xia

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

2 Citations (Scopus)

Abstract

This paper is concerned with the vulnerability of distributed state estimation under joint deception attacks. We first consider that all the output measurements and state estimations can be corrupted by attackers. The necessary and sufficient condition for the vulnerability of distributed state estimation under the joint attacks is provided. The attack sequence is designed to degrade the performance of distributed state estimation while being stealthy. We further consider that the attackers have resource constraints, which means that only a part of output measurements or state estimations can be attacked. The vulnerability conditions are proposed for distributed state estimation under the joint deception attacks with resource constraints and the corresponding sparse attack sequences are designed. Finally, a numerical example is provided to verify the effectiveness of theoretical results.

Original languageEnglish
Article number111274
JournalAutomatica
Volume157
DOIs
Publication statusPublished - Nov 2023

Keywords

  • Distributed state estimation
  • Joint deception attacks
  • Resource constraints
  • Vulnerability analysis

Fingerprint

Dive into the research topics of 'Vulnerability analysis of distributed state estimation under joint deception attacks'. Together they form a unique fingerprint.

Cite this