TY - GEN
T1 - Optimal innovation-based deception attack on remote state estimation
AU - Wu, Shuang
AU - Guo, Ziyang
AU - Shi, Dawei
AU - Johansson, Karl Henrik
AU - Shi, Ling
N1 - Publisher Copyright:
© 2017 American Automatic Control Council (AACC).
PY - 2017/6/29
Y1 - 2017/6/29
N2 - The security issue in cyber-physical systems has attracted growing interests in the last decades. This paper considers how false data injection attack can degrade the estimation quality of a remote state estimation system. In this system, smart sensors measure a dynamic process and send preprocessed data through a communication network to a remote estimator to estimate the process. It is assumed that there are malicious attackers in the communication network, who are able to obtain and falsify all the data sent by the sensors. It is common that the remote estimator is equipped with a residue-based detector to detect potential attacks. We propose a class of deception attack and analyze its feasibility. We show that the proposed attack enables the attacker to inject false data into the remote estimator without being detected. We derive a criterion to judge the optimality of performance of this type of attack in the sense of maximizing the estimation error covariance. Furthermore, we find that a simple linear attack strategy, which flips the sign of intercepted signal, satisfies the optimality criterion. We present numerical examples to illustrate our theoretical results.
AB - The security issue in cyber-physical systems has attracted growing interests in the last decades. This paper considers how false data injection attack can degrade the estimation quality of a remote state estimation system. In this system, smart sensors measure a dynamic process and send preprocessed data through a communication network to a remote estimator to estimate the process. It is assumed that there are malicious attackers in the communication network, who are able to obtain and falsify all the data sent by the sensors. It is common that the remote estimator is equipped with a residue-based detector to detect potential attacks. We propose a class of deception attack and analyze its feasibility. We show that the proposed attack enables the attacker to inject false data into the remote estimator without being detected. We derive a criterion to judge the optimality of performance of this type of attack in the sense of maximizing the estimation error covariance. Furthermore, we find that a simple linear attack strategy, which flips the sign of intercepted signal, satisfies the optimality criterion. We present numerical examples to illustrate our theoretical results.
KW - Cyber-physical systems (CPS)
KW - deception attack
KW - remote state estimation
UR - https://www.scopus.com/pages/publications/85027007249
U2 - 10.23919/ACC.2017.7963410
DO - 10.23919/ACC.2017.7963410
M3 - Conference contribution
AN - SCOPUS:85027007249
T3 - Proceedings of the American Control Conference
SP - 3017
EP - 3022
BT - 2017 American Control Conference, ACC 2017
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2017 American Control Conference, ACC 2017
Y2 - 24 May 2017 through 26 May 2017
ER -