Title£ºOptimal Linear Cyber-Attack on Remote State Estimation£¨Ô¶³Ì״̬¹À¼ÆÖеÄ×îÓÅÏßÐÔ¹¥»÷ÎÊÌ⣩
»ã±¨ÈË£ºÊ©Á裬Ïã¸Û¿Æ¼¼´óѧ½ÌÊÚ
Abstract:We consider malicious cyber attacks in a remote state estimation pplication where a smart sensor node transmits data to a remote estimator equipped with a false data detector. It is assumed that all the sensor data can be observed and modified by the malicious attacker and a residue-based detection algorithm is used at the remote side to detect data anomalies. We propose a linear deception attack strategy and resent the corresponding feasibility constraint which guarantees that the attacker is able to successfully inject false data without being detected. The evolution of the estimation error covariance at the remote estimator is derived and the degradation of system performance under the proposed linear attack policy is analyzed. Furthermore, we obtain a closed-form expression of the optimal attack strategy among all linear attacks. Comparison of attack strategies through simulated examples is provided.
Ó×ÎÒ¼òÀú£º
Ê©Á裬Ïã¸Û¿Æ¼¼´óѧ½ÌÊÚ¡£2002ÄêÔÚÏã¸Û¿Æ¼¼´óѧµç×Ó¼°µç»ú¹¤³Ìϵ»ñ¹¤Ñ§Ñ§Ê¿Ñ§Î»£¬ 2008ÄêÔÚ¼ÓÖÝÀí¹¤Ñ§Ôº¶¯Á¦Óë½ÚÔìϵͳϵ»ñ²©Ê¿Ñ§Î», ²¢ÓÚͬÄê10Ô²ÎÓëÏã¸Û¿Æ¼¼´óѧµç×Ó¼°ÍÆËã»ú¹¤³ÌϵÈÎÖúÀí½ÌÊÚ¡£ËûµÄ×êÑÐÐËÖÂÔ̺¬¶ÔÎïÀíÐÅϢϵͳµÄ½¨Ä£ºÍ½ÚÔ죬ÒÔ¼°´«¸ÐÆ÷Êý¾Ýµ÷¶ÈºÍÈںϵȡ£Ê©Áè½ÌÊÚÔÚ¹ú¼Ê³ÛÃû½ÚÔìºÍÐźŴ¦ÖÃÆÚ¿¯£¬Ô̺¬IEEE Transactions on Automatic Control, Automatica£¬ÒÔ¼°IEEE Transactions on Signal ProcessingÉϰ䷢ÂÛÎij¬¹ý30ÓàÆª£¬ÂÛÎı»ÒýÓýü900´Î¡£ËûÖ÷³ÖÁ˶àÏîÓÉÏã¸Û×êÑÐÔÞÖú¾ÖÔÞÖúµÄÏîÄ¿£¬²¢Ö÷³ÖÁ˳¬¹ý8ÏîÓÉÏã¸Û¿Æ¼¼´óѧÔÞÖúµÄÏîÄ¿¡£Ä¿Ç°£¬ËûÊÇIFAC ÍøÂçϵͳרί»á»áÔ±£¬ÏÖÈÎÏã¸Û×Ô¶¯½ÚÔìѧ»áµÄÃØÊ飬²¢µ£ÈÎÁ˶à¸ö³ÛÃû¹ú¼Ê»áÒéµÄ±àίºÍ·Ö»áÖ÷ϯ¡£