4.7 Article

Design of False Data Injection Attack on Distributed Process Estimation

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TIFS.2022.3146078

关键词

Attack design; distributed estimation; CPS security; false data injection attack; Kalman-consensus filter; stochastic approximation

资金

  1. Professional Development Allowance (PDA) of IIT Delhi
  2. I-Hub Foundation for Cobotics (IHFC)
  3. Office of Naval research (ONR) [N00014-15-1-2550]
  4. NSF [CCF-1817200, CCF-2008927]
  5. Army Research Office (ARO) [W911NF1910269]
  6. DOE [DE-SC0021417]
  7. Swedish Research Council [2018-04359]
  8. ONR [503400-78050]
  9. Ericsson Research Foundation
  10. Swedish Research Council [2018-04359] Funding Source: Swedish Research Council
  11. U.S. Department of Defense (DOD) [W911NF1910269] Funding Source: U.S. Department of Defense (DOD)
  12. U.S. Department of Energy (DOE) [DE-SC0021417] Funding Source: U.S. Department of Energy (DOE)
  13. Vinnova [2018-04359] Funding Source: Vinnova

向作者/读者索取更多资源

This study examines the design of false data injection attacks on a distributed cyber-physical system, utilizing a stochastic process with linear dynamics and Gaussian noise. The attack involves manipulating sensor observations and messages among agent nodes to steer estimates towards a specified value while maintaining attack detection probability constraints.
Herein, design of false data injection attack on a distributed cyber-physical system is considered. A stochastic process with linear dynamics and Gaussian noise is measured by multiple agent nodes, each equipped with multiple sensors. The agent nodes form a multi-hop network among themselves. Each agent node computes an estimate of the process by using its sensor observation and messages obtained from neighboring nodes, via Kalman-consensus filtering. An external attacker, capable of arbitrarily manipulating the sensor observations of some or all agent nodes, injects errors into those sensor observations. The goal of the attacker is to steer the estimates at the agent nodes as close as possible to a pre-specified value, while respecting a constraint on the attack detection probability. To this end, a constrained optimization problem is formulated to find the optimal parameter values of a certain class of linear attacks. The parameters of linear attack are learnt on-line via a combination of stochastic approximation based update of a Lagrange multiplier, and an optimization technique involving either the Karush-Kuhn-Tucker (KKT) conditions or online stochastic gradient descent. The problem turns out to be convex for some special cases. Desired convergence of the proposed algorithms are proved by exploiting the convexity and properties of stochastic approximation algorithms. Finally, numerical results demonstrate the efficacy of the attack.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据