{"title":"Stealthy Attacks With Historical Data on Distributed State Estimation","authors":"Jitao Xing;Dan Ye;Pengyu Li","doi":"10.1109/TIFS.2025.3564063","DOIUrl":null,"url":null,"abstract":"This paper addresses the problem of designing stealthy attacks on distributed estimation using historical data. The distributed sensors transmit innovations to remote state estimators and neighboring nodes, which attackers can intercept and tamper with. To bypass the configured false data detectors, the attack parameters must satisfy the stealthiness constraints. The determination of the optimal stealthy attack strategy is reformulated as a series of convex optimization problems. Additionally, a lower bound on the compromised estimation error covariance is derived, and analytical solutions for the suboptimal stealthy attack strategy that maximizes the bound are provided. These solutions are proven to be piecewise constant with smaller computational complexity. Finally, numerical simulations validate the theoretical results.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 ","pages":"4541-4550"},"PeriodicalIF":6.3000,"publicationDate":"2025-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Information Forensics and Security","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10976428/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0
Abstract
This paper addresses the problem of designing stealthy attacks on distributed estimation using historical data. The distributed sensors transmit innovations to remote state estimators and neighboring nodes, which attackers can intercept and tamper with. To bypass the configured false data detectors, the attack parameters must satisfy the stealthiness constraints. The determination of the optimal stealthy attack strategy is reformulated as a series of convex optimization problems. Additionally, a lower bound on the compromised estimation error covariance is derived, and analytical solutions for the suboptimal stealthy attack strategy that maximizes the bound are provided. These solutions are proven to be piecewise constant with smaller computational complexity. Finally, numerical simulations validate the theoretical results.
期刊介绍:
The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features