4.7 Article

Security analysis and defense strategy of distributed filtering under false data injection attacks

期刊

AUTOMATICA
卷 138, 期 -, 页码 -

出版社

PERGAMON-ELSEVIER SCIENCE LTD
DOI: 10.1016/j.automatica.2021.110151

关键词

Distributed estimation; False data injection attacks; Security analysis; Protection strategy

资金

  1. National Natural Science Foundation of China [62122026, 61973123, 61873106, 62121004]
  2. Natural Science Foundation of Jiangsu Province for Distinguished Young Scholars, China [BK20200049]
  3. NSW Cyber Security Network in Australia [P00025091]
  4. Programme of Introducing Talents of Discipline to Universities (the 111 Project), China [B17017]
  5. Shuguang Program by Shanghai Education Development Foundation, China
  6. Shanghai Municipal Education Commission, China
  7. Fundamental Research Funds for the Central Universities, China

向作者/读者索取更多资源

This paper investigates the distributed state estimation for multi-sensor networks under false data injection attacks. It first considers the chi(2) detector for detecting the authenticity of transmitted data and derives a necessary and sufficient condition for the insecurity of the distributed estimation system. It then proposes an algorithm for generating false data and a new protection strategy to ensure the security of the distributed estimator.
This paper investigates the distributed state estimation for multi-sensor networks under false data injection attacks. The well-known chi(2) detector is first considered for detecting the authenticity of the transmitted data. A necessary and sufficient condition for the insecurity of the distributed estimation system is derived under which the hostile attacks can bypass the false data detector and degrade the estimation performance. Moreover, an algorithm for generating false data is provided to keep the attack stealthy. In order to overcome the detection vulnerability, a new protection strategy is proposed to ensure that the distributed estimator is secure under false data injection attacks. It is worth emphasizing that the strategy adopts a stochastic rule instead of a fixed threshold to detect suspicious data, which effectively avoids the occurrence of the truncated Gaussian distribution. A simulation example of moving vehicle is presented to demonstrate the effectiveness of the developed approaches. (C)& nbsp;2022 Elsevier Ltd. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据