{"title":"微电网微分私有分布式控制的假噪声攻击检测","authors":"Feng Ye , Xianghui Cao , Lin Cai , Mo-Yuen Chow","doi":"10.1016/j.automatica.2025.112387","DOIUrl":null,"url":null,"abstract":"<div><div>Privacy preserving in distributed control is getting more attention, and differential privacy (DP) is the common tool to protect data privacy, in which additive noise is applied in the algorithm function. However, DP can be leveraged by false noise (FN) attacks because attack vectors can be disguised as artificial noise in DP. FN attacks are a concern as the stealth attacks are hard to detect. Moreover, DP in distributed control makes FN attack detection more difficult. Hence, detecting FN attacks in privacy-preserving distributed control is critical and challenging. In this paper, taking distributed energy management systems as the control object, we propose a novel peer-to-peer attack detection approach, named False Noise Attack Detection (FNAD). In FNAD, each device observes the power decisions of its neighbors based on the data from its two-hop neighbors, estimates the power decisions of its neighbors by a Kalman filter, and updates the detection index of each neighbor according to the residues of the Kalman filter at each iteration. The detection index is developed based on information entropy, without any prior knowledge of the FN attacks. If a device’s detection index is out of well-defined thresholds, its neighbors can perform a majority vote to decide whether it is malicious. We theoretically prove the detection effect of FNAD against three representative attacks in the literature and analyze the advantages of FNAD compared with the traditional methods. The effectiveness of FNAD is demonstrated by extensive simulations.</div></div>","PeriodicalId":55413,"journal":{"name":"Automatica","volume":"179 ","pages":"Article 112387"},"PeriodicalIF":5.9000,"publicationDate":"2025-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"False Noise Attack Detection for differentially-private distributed control of microgrids\",\"authors\":\"Feng Ye , Xianghui Cao , Lin Cai , Mo-Yuen Chow\",\"doi\":\"10.1016/j.automatica.2025.112387\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>Privacy preserving in distributed control is getting more attention, and differential privacy (DP) is the common tool to protect data privacy, in which additive noise is applied in the algorithm function. However, DP can be leveraged by false noise (FN) attacks because attack vectors can be disguised as artificial noise in DP. FN attacks are a concern as the stealth attacks are hard to detect. Moreover, DP in distributed control makes FN attack detection more difficult. Hence, detecting FN attacks in privacy-preserving distributed control is critical and challenging. In this paper, taking distributed energy management systems as the control object, we propose a novel peer-to-peer attack detection approach, named False Noise Attack Detection (FNAD). In FNAD, each device observes the power decisions of its neighbors based on the data from its two-hop neighbors, estimates the power decisions of its neighbors by a Kalman filter, and updates the detection index of each neighbor according to the residues of the Kalman filter at each iteration. The detection index is developed based on information entropy, without any prior knowledge of the FN attacks. If a device’s detection index is out of well-defined thresholds, its neighbors can perform a majority vote to decide whether it is malicious. We theoretically prove the detection effect of FNAD against three representative attacks in the literature and analyze the advantages of FNAD compared with the traditional methods. The effectiveness of FNAD is demonstrated by extensive simulations.</div></div>\",\"PeriodicalId\":55413,\"journal\":{\"name\":\"Automatica\",\"volume\":\"179 \",\"pages\":\"Article 112387\"},\"PeriodicalIF\":5.9000,\"publicationDate\":\"2025-05-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Automatica\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S000510982500281X\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Automatica","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S000510982500281X","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
False Noise Attack Detection for differentially-private distributed control of microgrids
Privacy preserving in distributed control is getting more attention, and differential privacy (DP) is the common tool to protect data privacy, in which additive noise is applied in the algorithm function. However, DP can be leveraged by false noise (FN) attacks because attack vectors can be disguised as artificial noise in DP. FN attacks are a concern as the stealth attacks are hard to detect. Moreover, DP in distributed control makes FN attack detection more difficult. Hence, detecting FN attacks in privacy-preserving distributed control is critical and challenging. In this paper, taking distributed energy management systems as the control object, we propose a novel peer-to-peer attack detection approach, named False Noise Attack Detection (FNAD). In FNAD, each device observes the power decisions of its neighbors based on the data from its two-hop neighbors, estimates the power decisions of its neighbors by a Kalman filter, and updates the detection index of each neighbor according to the residues of the Kalman filter at each iteration. The detection index is developed based on information entropy, without any prior knowledge of the FN attacks. If a device’s detection index is out of well-defined thresholds, its neighbors can perform a majority vote to decide whether it is malicious. We theoretically prove the detection effect of FNAD against three representative attacks in the literature and analyze the advantages of FNAD compared with the traditional methods. The effectiveness of FNAD is demonstrated by extensive simulations.
期刊介绍:
Automatica is a leading archival publication in the field of systems and control. The field encompasses today a broad set of areas and topics, and is thriving not only within itself but also in terms of its impact on other fields, such as communications, computers, biology, energy and economics. Since its inception in 1963, Automatica has kept abreast with the evolution of the field over the years, and has emerged as a leading publication driving the trends in the field.
After being founded in 1963, Automatica became a journal of the International Federation of Automatic Control (IFAC) in 1969. It features a characteristic blend of theoretical and applied papers of archival, lasting value, reporting cutting edge research results by authors across the globe. It features articles in distinct categories, including regular, brief and survey papers, technical communiqués, correspondence items, as well as reviews on published books of interest to the readership. It occasionally publishes special issues on emerging new topics or established mature topics of interest to a broad audience.
Automatica solicits original high-quality contributions in all the categories listed above, and in all areas of systems and control interpreted in a broad sense and evolving constantly. They may be submitted directly to a subject editor or to the Editor-in-Chief if not sure about the subject area. Editorial procedures in place assure careful, fair, and prompt handling of all submitted articles. Accepted papers appear in the journal in the shortest time feasible given production time constraints.