False information injection attack on dynamic state estimation in multi-sensor systems

In this paper, the impact of false information injection is investigated for linear dynamic systems with multiple sensors. It is assumed that the system is unaware of the existence of false information and the adversary is trying to maximize the negative effect of the false information on the Kalman filter's estimation performance. We mathematically characterize the false information attack under different conditions. For the adversary, many closed-form results for the optimal attack strategies that maximize the Kalman filter's estimation error are theoretically derived. It is shown that by choosing the optimal correlation coefficients among the bias noises, and allocating power optimally among sensors, the adversary could significantly increase the Kalman filter's estimation errors. To be concrete, a multi-sensor target tracking system with either position sensors or position and velocity sensors has been used as an example to illustrate the theoretical results.

[1]  L. Tong,et al.  Malicious Data Attacks on Smart Grid State Estimation: Attack Strategies and Countermeasures , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[2]  Pramod K. Varshney,et al.  Dynamic Bit Allocation for Object Tracking in Wireless Sensor Networks , 2011, IEEE Transactions on Signal Processing.

[3]  Ruixin Niu,et al.  Sparse attacking strategies in multi-sensor dynamic systems maximizing state estimation errors , 2016, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[4]  Ruixin Niu,et al.  A state estimation and malicious attack game in multi-sensor dynamic systems , 2015, 2015 18th International Conference on Information Fusion (Fusion).

[5]  Thiagalingam Kirubarajan,et al.  Estimation with Applications to Tracking and Navigation , 2001 .

[6]  Lang Tong,et al.  Subspace Methods for Data Attack on State Estimation: A Data Driven Approach , 2014, IEEE Transactions on Signal Processing.

[7]  Ruixin Niu,et al.  System state estimation in the presence of false information injection , 2012, 2012 IEEE Statistical Signal Processing Workshop (SSP).

[8]  Lang Tong,et al.  Data framing attack on state estimation with unknown network parameters , 2013, 2013 Asilomar Conference on Signals, Systems and Computers.

[9]  Ruixin Niu,et al.  False information detection with minimum mean squared errors for Bayesian estimation , 2015, 2015 49th Annual Conference on Information Sciences and Systems (CISS).

[10]  Erik Blasch,et al.  Performance Measures of Covariance and Information Matrices in Resource Management for Target State Estimation , 2012, IEEE Transactions on Aerospace and Electronic Systems.

[11]  Liyan Jia,et al.  On the nonlinearity effects on malicious data attack on power system , 2012, 2012 IEEE Power and Energy Society General Meeting.

[12]  Pramod K. Varshney,et al.  Energy Aware Iterative Source Localization for Wireless Sensor Networks , 2010, IEEE Transactions on Signal Processing.

[13]  Ruixin Niu,et al.  Malicious attacks on state estimation in multi-sensor dynamic systems , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).

[14]  Yingning Peng,et al.  MIMO Radar Waveform Design in Colored Noise Based on Information Theory , 2010, IEEE Transactions on Signal Processing.

[15]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2009, CCS.

[16]  Peter B. Luh,et al.  The MIMO Radar and Jammer Games , 2012, IEEE Transactions on Signal Processing.

[17]  Hamed Mohsenian Rad,et al.  False data injection attacks with incomplete information against smart power grids , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[18]  Ruixin Niu,et al.  Optimal space-time attacks on system state estimation under a sparsity constraint , 2016, SPIE Defense + Security.

[19]  Chun Yang,et al.  Optimal Placement of Heterogeneous Sensors for Targets with Gaussian Priors , 2013, IEEE Transactions on Aerospace and Electronic Systems.

[20]  Lang Tong,et al.  Data Framing Attack on State Estimation , 2013, IEEE Journal on Selected Areas in Communications.

[21]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[22]  Lang Tong,et al.  Malicious data attack on real-time electricity market , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[23]  Y. Bar-Shalom,et al.  Multisensor target tracking performance with bias compensation , 2006, IEEE Transactions on Aerospace and Electronic Systems.