4.7 Article

State Estimation Under Joint False Data Injection Attacks: Dealing With Constraints and Insecurity

期刊

IEEE TRANSACTIONS ON AUTOMATIC CONTROL
卷 67, 期 12, 页码 6745-6753

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TAC.2021.3131145

关键词

False data injection attack; joint attacks; resource constraints; security; state estimation

资金

  1. Natural Science Foundation of Jiangsu Province of China [BK20180367]
  2. National Natural Science Foundation of China [62173087, 61933007, 61873148, 61803082]
  3. Fundamental Research Funds for the Central Universities of China
  4. Southeast University of China
  5. Alexander von Humboldt Foundation of Germany
  6. Russian Ministry of Science and Education [075-15-2020-808.]

向作者/读者索取更多资源

This article addresses the security issues in the state estimation problem for a networked control system (NCS) by proposing a new model of joint false data injection (FDI) attack and providing easy-to-implement algorithms. By investigating the sparsity of the attack vectors, necessary conditions for insecurity under different attack scenarios are derived. The effectiveness of the proposed FDI attacks is verified through numerical examples.
This article is concerned with the security issue in the state estimation problem for a networked control system (NCS). A new model of joint false data injection (FDI) attack is established wherein attacks are injected to both the remote estimator and the communication channels. Such a model is general that includes most existing FDI attack models as special cases. The joint FDI attacks are subjected to limited access and/or resource constraints, and this gives rise to a few attack scenarios to be examined one by one. Our objective is to establish the so-called insecurity conditions under which there exists an attack sequence capable of driving the estimation bias to infinity while bypassing the anomaly detector. By resorting to the generalized inverse theory, necessary and sufficient conditions are derived for the insecurity under different attack scenarios. Subsequently, easy-to-implement algorithms are proposed to generate attack sequences on insecure NCSs with respect to different attack scenarios. In particular, by using a matrix splitting technique, the constraint-induced sparsity of the attack vectors is dedicatedly investigated. Finally, several numerical examples are presented to verify the effectiveness of the proposed FDI attacks.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据