{"title":"最坏情况完整性攻击与部分安全测量的弹性状态估计","authors":"Jing Zhou;Jun Shang;Tongwen Chen","doi":"10.1109/TCNS.2025.3534459","DOIUrl":null,"url":null,"abstract":"This article examines the problem of optimal deception attacks against state estimation with partially secured measurements, where smart sensors transmit innovation sequences to the remote end for information fusion. Due to resource limitations or defensive countermeasures, the adversary can only modify data packets transmitted through unreliable channels. Meanwhile, the attack should be synthesized with sophistication to deceive an anomaly detector. To investigate the vulnerabilities of such estimation systems without feedback links and enhance security performance, the optimal attack policy is derived by formulating and explicitly solving a convex optimization problem, with the goal of maximizing the sum of estimation errors. Subsequently, a novel attack detection and resilient state estimation algorithm is proposed to ensure an acceptable level of estimation accuracy. The theoretical performance metrics, including false alarm rates for the proposed detector, are provided. Finally, the effectiveness of the results is confirmed through numerical examples.","PeriodicalId":56023,"journal":{"name":"IEEE Transactions on Control of Network Systems","volume":"12 2","pages":"1769-1779"},"PeriodicalIF":5.0000,"publicationDate":"2025-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Worst-Case Integrity Attacks and Resilient State Estimation With Partially Secured Measurements\",\"authors\":\"Jing Zhou;Jun Shang;Tongwen Chen\",\"doi\":\"10.1109/TCNS.2025.3534459\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This article examines the problem of optimal deception attacks against state estimation with partially secured measurements, where smart sensors transmit innovation sequences to the remote end for information fusion. Due to resource limitations or defensive countermeasures, the adversary can only modify data packets transmitted through unreliable channels. Meanwhile, the attack should be synthesized with sophistication to deceive an anomaly detector. To investigate the vulnerabilities of such estimation systems without feedback links and enhance security performance, the optimal attack policy is derived by formulating and explicitly solving a convex optimization problem, with the goal of maximizing the sum of estimation errors. Subsequently, a novel attack detection and resilient state estimation algorithm is proposed to ensure an acceptable level of estimation accuracy. The theoretical performance metrics, including false alarm rates for the proposed detector, are provided. Finally, the effectiveness of the results is confirmed through numerical examples.\",\"PeriodicalId\":56023,\"journal\":{\"name\":\"IEEE Transactions on Control of Network Systems\",\"volume\":\"12 2\",\"pages\":\"1769-1779\"},\"PeriodicalIF\":5.0000,\"publicationDate\":\"2025-01-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Control of Network Systems\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10854816/\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Control of Network Systems","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10854816/","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
Worst-Case Integrity Attacks and Resilient State Estimation With Partially Secured Measurements
This article examines the problem of optimal deception attacks against state estimation with partially secured measurements, where smart sensors transmit innovation sequences to the remote end for information fusion. Due to resource limitations or defensive countermeasures, the adversary can only modify data packets transmitted through unreliable channels. Meanwhile, the attack should be synthesized with sophistication to deceive an anomaly detector. To investigate the vulnerabilities of such estimation systems without feedback links and enhance security performance, the optimal attack policy is derived by formulating and explicitly solving a convex optimization problem, with the goal of maximizing the sum of estimation errors. Subsequently, a novel attack detection and resilient state estimation algorithm is proposed to ensure an acceptable level of estimation accuracy. The theoretical performance metrics, including false alarm rates for the proposed detector, are provided. Finally, the effectiveness of the results is confirmed through numerical examples.
期刊介绍:
The IEEE Transactions on Control of Network Systems is committed to the timely publication of high-impact papers at the intersection of control systems and network science. In particular, the journal addresses research on the analysis, design and implementation of networked control systems, as well as control over networks. Relevant work includes the full spectrum from basic research on control systems to the design of engineering solutions for automatic control of, and over, networks. The topics covered by this journal include: Coordinated control and estimation over networks, Control and computation over sensor networks, Control under communication constraints, Control and performance analysis issues that arise in the dynamics of networks used in application areas such as communications, computers, transportation, manufacturing, Web ranking and aggregation, social networks, biology, power systems, economics, Synchronization of activities across a controlled network, Stability analysis of controlled networks, Analysis of networks as hybrid dynamical systems.