4.7 Article

Design of False Data Injection Attack on Distributed Process Estimation

Journal

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TIFS.2022.3146078

Keywords

Attack design; distributed estimation; CPS security; false data injection attack; Kalman-consensus filter; stochastic approximation

Funding

  1. Professional Development Allowance (PDA) of IIT Delhi
  2. I-Hub Foundation for Cobotics (IHFC)
  3. Office of Naval research (ONR) [N00014-15-1-2550]
  4. NSF [CCF-1817200, CCF-2008927]
  5. Army Research Office (ARO) [W911NF1910269]
  6. DOE [DE-SC0021417]
  7. Swedish Research Council [2018-04359]
  8. ONR [503400-78050]
  9. Ericsson Research Foundation
  10. Swedish Research Council [2018-04359] Funding Source: Swedish Research Council
  11. U.S. Department of Defense (DOD) [W911NF1910269] Funding Source: U.S. Department of Defense (DOD)
  12. U.S. Department of Energy (DOE) [DE-SC0021417] Funding Source: U.S. Department of Energy (DOE)
  13. Vinnova [2018-04359] Funding Source: Vinnova

Ask authors/readers for more resources

This study examines the design of false data injection attacks on a distributed cyber-physical system, utilizing a stochastic process with linear dynamics and Gaussian noise. The attack involves manipulating sensor observations and messages among agent nodes to steer estimates towards a specified value while maintaining attack detection probability constraints.
Herein, design of false data injection attack on a distributed cyber-physical system is considered. A stochastic process with linear dynamics and Gaussian noise is measured by multiple agent nodes, each equipped with multiple sensors. The agent nodes form a multi-hop network among themselves. Each agent node computes an estimate of the process by using its sensor observation and messages obtained from neighboring nodes, via Kalman-consensus filtering. An external attacker, capable of arbitrarily manipulating the sensor observations of some or all agent nodes, injects errors into those sensor observations. The goal of the attacker is to steer the estimates at the agent nodes as close as possible to a pre-specified value, while respecting a constraint on the attack detection probability. To this end, a constrained optimization problem is formulated to find the optimal parameter values of a certain class of linear attacks. The parameters of linear attack are learnt on-line via a combination of stochastic approximation based update of a Lagrange multiplier, and an optimization technique involving either the Karush-Kuhn-Tucker (KKT) conditions or online stochastic gradient descent. The problem turns out to be convex for some special cases. Desired convergence of the proposed algorithms are proved by exploiting the convexity and properties of stochastic approximation algorithms. Finally, numerical results demonstrate the efficacy of the attack.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available