Worst-case analysis of innovation-based linear attack on remote state estimation with resource constraint

Ziyang Guo, Dawei Shi, Karl Henrik Johansson, Ling Shi

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

12 Citations (Scopus)

Abstract

In this paper, a security problem in remote estimation scenario is studied. We consider a multi-sensor system where each sensor transmits its local innovation to a remote estimator through a wireless communication network. A centralized residue-based detection criterion is adopted to monitor system anomalies. We propose a linear attack strategy and present the corresponding feasibility constraints to guarantee stealthiness. For a resource-limited attacker, who is able to listen to all the channels while only launches an attack on one sensor at each time instant, we investigate which sensor should be attacked and what strategy should be used such that the remote estimation error covariance is maximized. A closed-form expression of the optimal linear attack strategy is obtained. Simulation examples are provided to illustrate the theoretical results.

Original languageEnglish
Title of host publication2016 IEEE 55th Conference on Decision and Control, CDC 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages6303-6308
Number of pages6
ISBN (Electronic)9781509018376
DOIs
Publication statusPublished - 27 Dec 2016
Event55th IEEE Conference on Decision and Control, CDC 2016 - Las Vegas, United States
Duration: 12 Dec 201614 Dec 2016

Publication series

Name2016 IEEE 55th Conference on Decision and Control, CDC 2016

Conference

Conference55th IEEE Conference on Decision and Control, CDC 2016
Country/TerritoryUnited States
CityLas Vegas
Period12/12/1614/12/16

Keywords

  • Cyber-Physical System Security
  • Integrity Attack
  • Remote State Estimation

Fingerprint

Dive into the research topics of 'Worst-case analysis of innovation-based linear attack on remote state estimation with resource constraint'. Together they form a unique fingerprint.

Cite this