TY - JOUR
T1 - Stealthy Insider Attack on Stochastic Event-Triggered Scheduler
T2 - Dealing With Non-Gaussian Components
AU - Deng, Yahan
AU - Yu, Hao
AU - Li, Yuzhe
N1 - Publisher Copyright:
© 2005-2012 IEEE.
PY - 2024
Y1 - 2024
N2 - This article considers malicious attacks on a stochastic event-based state estimation where a smart sensor equipped with the standard Kalman filter is utilized to transmit the local estimate. A novel attack strategy called stealthy insider attack is proposed, which can compromise remote state estimation by hacking the scheduler, reversing the triggering condition, and tampering with the schedule parameter. The discovery of the complete Gaussian crater (CGC) distribution is significant for analyzing various properties of the innovation under the stochastic event-triggered scheme (ETS). An extended CGC distribution is developed to explore the probability distribution of innovation sequences with successive packet losses, and a closed-form expression is derived for the estimation error covariance under attack. Furthermore, to bypass the communication rate detector, a method is presented for tampering with the schedule parameter based on the ergodicity of the underlying Markov chain. Finally, two numerical simulations demonstrate the efficacy of the proposed attack strategy in diminishing the estimation performance of the remote estimator.
AB - This article considers malicious attacks on a stochastic event-based state estimation where a smart sensor equipped with the standard Kalman filter is utilized to transmit the local estimate. A novel attack strategy called stealthy insider attack is proposed, which can compromise remote state estimation by hacking the scheduler, reversing the triggering condition, and tampering with the schedule parameter. The discovery of the complete Gaussian crater (CGC) distribution is significant for analyzing various properties of the innovation under the stochastic event-triggered scheme (ETS). An extended CGC distribution is developed to explore the probability distribution of innovation sequences with successive packet losses, and a closed-form expression is derived for the estimation error covariance under attack. Furthermore, to bypass the communication rate detector, a method is presented for tampering with the schedule parameter based on the ergodicity of the underlying Markov chain. Finally, two numerical simulations demonstrate the efficacy of the proposed attack strategy in diminishing the estimation performance of the remote estimator.
KW - Cyber-physical systems
KW - event-triggered scheduling
KW - remote state estimation
KW - stealthy attack
UR - http://www.scopus.com/inward/record.url?scp=85198382415&partnerID=8YFLogxK
U2 - 10.1109/TIFS.2024.3427005
DO - 10.1109/TIFS.2024.3427005
M3 - Article
AN - SCOPUS:85198382415
SN - 1556-6013
VL - 19
SP - 6886
EP - 6895
JO - IEEE Transactions on Information Forensics and Security
JF - IEEE Transactions on Information Forensics and Security
ER -