Optimal Linear Cyber-Attack on Remote State Estimation

Ziyang Guo, Dawei Shi, Karl Henrik Johansson, Ling Shi

科研成果: 期刊稿件文章同行评审

389 引用 (Scopus)

摘要

Recent years have witnessed the surge of interest of security issues in cyber-physical systems. In this paper, we consider malicious cyber attacks in a remote state estimation application where a smart sensor node transmits data to a remote estimator equipped with a false data detector. It is assumed that all the sensor data can be observed and modified by the malicious attacker and a residue-based detection algorithm is used at the remote side to detect data anomalies. We propose a linear deception attack strategy and present the corresponding feasibility constraint which guarantees that the attacker is able to successfully inject false data without being detected. The evolution of the estimation error covariance at the remote estimator is derived and the degradation of system performance under the proposed linear attack policy is analyzed. Furthermore, we obtain a closed-form expression of the optimal attack strategy among all linear attacks. Comparison of attack strategies through simulated examples are provided to illustrate the theoretical results.

源语言英语
文章编号7470566
页(从-至)4-13
页数10
期刊IEEE Transactions on Control of Network Systems
4
1
DOI
出版状态已出版 - 3月 2017

指纹

探究 'Optimal Linear Cyber-Attack on Remote State Estimation' 的科研主题。它们共同构成独一无二的指纹。

引用此