The Vulnerability Analysis of Remote Estimation With Batch-Data Detectors Against Integrity Attacks

The vulnerability analysis of remote state estimation with batch-data detectors is investigated in this article. The considered scenario is that sensors measure the process state and transmit measurements to the remote end via wireless networks, where the yielded innovation may be altered by an adve...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on automatic control Vol. 69; no. 5; pp. 3096 - 3111
Main Authors Yang, Yake, Li, Yuzhe, Shi, Yang, Quevedo, Daniel E.
Format Journal Article
LanguageEnglish
Published New York IEEE 01.05.2024
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:The vulnerability analysis of remote state estimation with batch-data detectors is investigated in this article. The considered scenario is that sensors measure the process state and transmit measurements to the remote end via wireless networks, where the yielded innovation may be altered by an adversary in an affine form. At the remote end, a detector utilizing batch statistics is deployed to detect anomalies. In this setup, finding the worst-case estimation performance degradation during a detection interval is formulated as a nonconvex optimization problem on the Stiefel manifold with linear equation constraints, which is generally hard to tackle. Such a problem is addressed by introducing new optimization variables, and structural expressions of attack strategies in worst-case are proposed. Then, by means of Riemannian optimization tools, we provide additional properties for such attack strategies in a scalar sensor by solving a boundary trust region subproblem. Furthermore, analytical attack strategies in worst-case are derived under the case where a sequence of contaminated innovation covariances has been determined. A necessary condition of the existence of attack strategies in worst-case for the attacker with symmetric attack parameter matrices is also presented. Finally, two numerical examples in multisensor and a scalar sensor are conducted to demonstrate the validity of results developed.
ISSN:0018-9286
1558-2523
DOI:10.1109/TAC.2023.3332013