Worst-case analysis of innovation-based linear attack on remote state estimation with resource constraint

In this paper, a security problem in remote estimation scenario is studied. We consider a multi-sensor system where each sensor transmits its local innovation to a remote estimator through a wireless communication network. A centralized residue-based detection criterion is adopted to monitor system anomalies. We propose a linear attack strategy and present the corresponding feasibility constraints to guarantee stealthiness. For a resource-limited attacker, who is able to listen to all the channels while only launches an attack on one sensor at each time instant, we investigate which sensor should be attacked and what strategy should be used such that the remote estimation error covariance is maximized. A closed-form expression of the optimal linear attack strategy is obtained. Simulation examples are provided to illustrate the theoretical results.

[1]  R. K. Mehra,et al.  Correspondence item: An innovations approach to fault detection and diagnosis in dynamic systems , 1971 .

[2]  Ling Shi,et al.  Optimal Denial-of-Service Attack Scheduling With Energy Constraint , 2015, IEEE Transactions on Automatic Control.

[3]  Karl Henrik Johansson,et al.  A secure control framework for resource-limited adversaries , 2012, Autom..

[4]  S. Shankar Sastry,et al.  Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[5]  Robert J. Elliott,et al.  On Finite-State Stochastic Modeling and Secure Estimation of Cyber-Physical Systems , 2017, IEEE Transactions on Automatic Control.

[6]  Bruno Sinopoli,et al.  Integrity Data Attacks in Power Market Operations , 2011, IEEE Transactions on Smart Grid.

[7]  Sandeep K. S. Gupta,et al.  Special Issue on Cyber-Physical Systems [Scanning the Issue] , 2012, Proc. IEEE.

[8]  Tamer Basar,et al.  Optimal control in the presence of an intelligent jammer with limited actions , 2010, 49th IEEE Conference on Decision and Control (CDC).

[9]  Panganamala Ramana Kumar,et al.  Cyber–Physical Systems: A Perspective at the Centennial , 2012, Proceedings of the IEEE.

[10]  Ling Shi,et al.  Optimal Linear Cyber-Attack on Remote State Estimation , 2017, IEEE Transactions on Control of Network Systems.

[11]  Bruno Sinopoli,et al.  Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[12]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2011, TSEC.

[13]  Syed Hassan Ahmed,et al.  Cyber Physical System: Architecture, applications and research challenges , 2013, 2013 IFIP Wireless Days (WD).

[14]  Ling Shi,et al.  Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach , 2015, IEEE Transactions on Automatic Control.

[15]  S. Shankar Sastry,et al.  Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.

[16]  Mohamed Darouach,et al.  Event-based state estimation of linear dynamic systems with unknown exogenous inputs , 2016, Autom..

[17]  Karl Henrik Johansson,et al.  Optimal power flow: Closing the loop over corrupted data , 2012, 2012 American Control Conference (ACC).

[18]  Lang Tong,et al.  Subspace Methods for Data Attack on State Estimation: A Data Driven Approach , 2014, IEEE Transactions on Signal Processing.

[19]  Sinem Coleri Ergen,et al.  ZigBee/IEEE 802.15.4 Summary , 2004 .