Residual-Based False Data Injection Attacks Against Multi-Sensor Estimation Systems

This paper investigates the security issue of multi-sensor remote estimation systems. An optimal stealthy false data injection (FDI) attack scheme based on historical and current residuals, which only tampers with the measurement residuals of partial sensors due to limited attack resources, is propo...

Full description

Saved in:
Bibliographic Details
Published inIEEE/CAA journal of automatica sinica Vol. 10; no. 5; pp. 1181 - 1191
Main Authors Guo, Haibin, Sun, Jian, Pang, Zhong-Hua
Format Journal Article
LanguageEnglish
Published Piscataway Chinese Association of Automation (CAA) 01.05.2023
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Beijing Institute of Technology Chongqing Innovation Center,Chongqing 401120,China%Key Laboratory of Fieldbus Technology and Automation of Beijing,North China University of Technology,Beijing 100144
National Key Laboratory of Autonomous Intelligent Unmanned Systems,School of Automation,Beijing Institute of Technology,Beijing 100081,China%National Key Laboratory of Autonomous Intelligent Unmanned Systems,School of Automation,Beijing Institute of Technology,Beijing 100081,China
Subjects
Online AccessGet full text
ISSN2329-9266
2329-9274
DOI10.1109/JAS.2023.123441

Cover

More Information
Summary:This paper investigates the security issue of multi-sensor remote estimation systems. An optimal stealthy false data injection (FDI) attack scheme based on historical and current residuals, which only tampers with the measurement residuals of partial sensors due to limited attack resources, is proposed to maximally degrade system estimation performance. The attack stealthiness condition is given, and then the estimation error covariance in compromised state is derived to quantify the system performance under attack. The optimal attack strategy is obtained by solving several convex optimization problems which maximize the trace of the compromised estimation error covariance subject to the stealthiness condition. Moreover, due to the constraint of attack resources, the selection principle of the attacked sensor is provided to determine which sensor is attacked so as to hold the most impact on system performance. Finally, simulation results are presented to verify the theoretical analysis.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:2329-9266
2329-9274
DOI:10.1109/JAS.2023.123441