4.6 Article

Optimal Linear Cyber-Attack on Remote State Estimation

Journal

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TCNS.2016.2570003

Keywords

Cyber-physical systems; deception attack; remote state estimation; security

Funding

  1. Hong Kong Research Grants Council General Research Fund (RGC GRF) [16209114]
  2. Natural Science Foundation of China [61503027]
  3. Knut and Alice Wallenberg Foundation
  4. Swedish Research Council

Ask authors/readers for more resources

Recent years have witnessed the surge of interest of security issues in cyber-physical systems. In this paper, we consider malicious cyber attacks in a remote state estimation application where a smart sensor node transmits data to a remote estimator equipped with a false data detector. It is assumed that all the sensor data can be observed and modified by the malicious attacker and a residue-based detection algorithm is used at the remote side to detect data anomalies. We propose a linear deception attack strategy and present the corresponding feasibility constraint which guarantees that the attacker is able to successfully inject false data without being detected. The evolution of the estimation error covariance at the remote estimator is derived and the degradation of system performance under the proposed linear attack policy is analyzed. Furthermore, we obtain a closed-form expression of the optimal attack strategy among all linear attacks. Comparison of attack strategies through simulated examples are provided to illustrate the theoretical results.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available