{"title":"Distributed Secure State Estimation Against Stealthy Attacks","authors":"Yan Yu;Wen Yang;Hongbo Yuan;Longyu Li;Chao Yang","doi":"10.1109/LSP.2025.3564886","DOIUrl":null,"url":null,"abstract":"This paper investigates the issue of False Data Injection (FDI) attacks within distributed state estimation. In the network, each sensor transmits its state estimate to neighboring nodes. Based on the detection variables inherent to distributed systems, we construct a covert attack strategy to bypass data detectors and degrade the estimation performance of the system. Furthermore, we propose an enhanced stealthy attack strategy, which aims to prevent interference from the attacks of neighboring edges that otherwise counteract against each other. To improve the detection rate of attacks, a detector with a dynamic coding strategy is designed to secure data transmission. The destructiveness of the stealthy attacks and the effectiveness of the detection mechanism are demonstrated through numerical examples.","PeriodicalId":13154,"journal":{"name":"IEEE Signal Processing Letters","volume":"32 ","pages":"1930-1934"},"PeriodicalIF":3.2000,"publicationDate":"2025-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Signal Processing Letters","FirstCategoryId":"5","ListUrlMain":"https://ieeexplore.ieee.org/document/10978032/","RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0
Abstract
This paper investigates the issue of False Data Injection (FDI) attacks within distributed state estimation. In the network, each sensor transmits its state estimate to neighboring nodes. Based on the detection variables inherent to distributed systems, we construct a covert attack strategy to bypass data detectors and degrade the estimation performance of the system. Furthermore, we propose an enhanced stealthy attack strategy, which aims to prevent interference from the attacks of neighboring edges that otherwise counteract against each other. To improve the detection rate of attacks, a detector with a dynamic coding strategy is designed to secure data transmission. The destructiveness of the stealthy attacks and the effectiveness of the detection mechanism are demonstrated through numerical examples.
期刊介绍:
The IEEE Signal Processing Letters is a monthly, archival publication designed to provide rapid dissemination of original, cutting-edge ideas and timely, significant contributions in signal, image, speech, language and audio processing. Papers published in the Letters can be presented within one year of their appearance in signal processing conferences such as ICASSP, GlobalSIP and ICIP, and also in several workshop organized by the Signal Processing Society.