Online Deception Attack against Remote State Estimation

Abstract Security issue has become a new hotspot in cyber-physical systems (CPS) research field in recent years due to the vulnerability of CPS to security threats. This paper focuses on stealthy deception attack in remote state estimation, which is one typical attack in CPS. From the standpoint of deception attacker, we investigates how to design proper deception attack strategy to degrade the state estimation quality with communication rate constraint. We design an online attack strategy and prove that the proposed attack strategy can degrade the estimation quality. To study the effectiveness of the proposed strategy, we analyze the cost deviation, which depicts the difference between the estimation quality with and without the proposed attack strategy. Our results show that the cost deviation will be maximum when the communication rate is 0.75. A numerical example is presented to demonstrate the main results.

[1]  Ling Shi,et al.  Time and Event-based Sensor Scheduling for Networks with Limited Communication Resources , 2011 .

[2]  Ling Shi,et al.  How Can Online Schedules Improve Communication and Estimation Tradeoff? , 2013, IEEE Transactions on Signal Processing.

[3]  Paulo Tabuada,et al.  Minimax control for cyber-physical systems under network packet scheduling attacks , 2013, HiCoNS '13.

[4]  Clay Wilson Cybersecurity and Cyber Weapons: Is Nonproliferation Possible? , 2013 .

[5]  Liuqing Yang,et al.  Intelligent transportation spaces: vehicles, traffic, communications, and beyond , 2010, IEEE Communications Magazine.

[6]  Ling Shi,et al.  Sensor data scheduling for optimal state estimation with communication energy constraint , 2011, Autom..

[7]  Thomas Novak,et al.  Safety- and Security-Critical Services in Building Automation and Control Systems , 2010, IEEE Transactions on Industrial Electronics.

[8]  Ling Shi,et al.  Optimal DoS attack policy against remote state estimation , 2013, 52nd IEEE Conference on Decision and Control.

[9]  B. Anderson,et al.  Detectability and Stabilizability of Time-Varying Discrete-Time Linear Systems , 1981 .

[10]  Kameshwar Poolla,et al.  Systems and Control Opportunities in the Integration of Renewable Energy into the Smart Grid , 2011 .

[11]  Bruno Sinopoli,et al.  Challenges for Securing Cyber Physical Systems , 2009 .

[12]  Ling Shi,et al.  Optimal Denial-of-Service attack scheduling against linear quadratic Gaussian control , 2014, 2014 American Control Conference.

[13]  C. Lanczos,et al.  A Precision Approximation of the Gamma Function , 1964 .

[14]  Anand D. Sarwate,et al.  Signal Processing and Machine Learning with Differential Privacy: Algorithms and Challenges for Continuous Data , 2013, IEEE Signal Processing Magazine.

[15]  Mikhail J. Atallah,et al.  A Survey of Anti-Tamper Technologies , 2004 .

[16]  Ling Shi,et al.  Event-Based Sensor Data Scheduling: Trade-Off Between Communication Rate and Estimation Quality , 2013, IEEE Transactions on Automatic Control.

[17]  T. Kavitha,et al.  Security Vulnerabilities In Wireless Sensor Networks: A Survey , 2010 .

[18]  Sencun Zhu,et al.  Sensor node compromise detection: the location perspective , 2007, IWCMC.