{"title":"Inversion Attack and Countermeasure for Event-Based Sensor Schedule in Remote State Estimation","authors":"Qiulin Xu;Junlin Xiong","doi":"10.1109/TCNS.2024.3487656","DOIUrl":null,"url":null,"abstract":"This article investigates a novel attack strategy, called inversion attack, against event scheduling that is used in remote state estimation. The scenario is that sensors transmit innovations to remote estimators, and event-based schedulers are equipped to save energy. Unlike the existing powerful cyber-attacks, the inversion attack is proposed for attackers with very limited capabilities. We demonstrate that a malicious attacker can degrade system performance simply by directly injecting an inverter into the event scheduler without any system knowledge. The stealthiness of the inversion attack is quantified by two types of failure detectors. To mitigate the attack effect, we further construct an alternative estimator as a countermeasure, based on which a defense strategy is designed for systems at risk of inversion attacks. Simulation examples are provided to validate the obtained results.","PeriodicalId":56023,"journal":{"name":"IEEE Transactions on Control of Network Systems","volume":"12 1","pages":"450-460"},"PeriodicalIF":4.0000,"publicationDate":"2024-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Control of Network Systems","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10737441/","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
This article investigates a novel attack strategy, called inversion attack, against event scheduling that is used in remote state estimation. The scenario is that sensors transmit innovations to remote estimators, and event-based schedulers are equipped to save energy. Unlike the existing powerful cyber-attacks, the inversion attack is proposed for attackers with very limited capabilities. We demonstrate that a malicious attacker can degrade system performance simply by directly injecting an inverter into the event scheduler without any system knowledge. The stealthiness of the inversion attack is quantified by two types of failure detectors. To mitigate the attack effect, we further construct an alternative estimator as a countermeasure, based on which a defense strategy is designed for systems at risk of inversion attacks. Simulation examples are provided to validate the obtained results.
期刊介绍:
The IEEE Transactions on Control of Network Systems is committed to the timely publication of high-impact papers at the intersection of control systems and network science. In particular, the journal addresses research on the analysis, design and implementation of networked control systems, as well as control over networks. Relevant work includes the full spectrum from basic research on control systems to the design of engineering solutions for automatic control of, and over, networks. The topics covered by this journal include: Coordinated control and estimation over networks, Control and computation over sensor networks, Control under communication constraints, Control and performance analysis issues that arise in the dynamics of networks used in application areas such as communications, computers, transportation, manufacturing, Web ranking and aggregation, social networks, biology, power systems, economics, Synchronization of activities across a controlled network, Stability analysis of controlled networks, Analysis of networks as hybrid dynamical systems.