Attack-resilient state estimation with intermittent data authentication

نویسندگان

چکیده

Network-based attacks on control systems may alter sensor data delivered to the controller, effectively causing degradation in performance. As a result, having access accurate state estimates, even presence of measurements, is critical importance. In this work, we analyze performance resilient estimators (RSEs) when any subset sensors be compromised by stealthy attacker . Specifically, consider with well-known l 0 -based RSE and two commonly used sound intrusion detectors (IDs). For linear time-invariant plants bounded noise, define notion perfect attackability (PA) result unbounded estimation errors while remaining undetected employed ID (i.e., stealthy). We derive necessary sufficient PA conditions, showing that system can perfectly attackable if plant stable. While prevented use standard cryptographic mechanisms (e.g., message authentication) ensure integrity under network-based attacks, their continuous imposes significant communication computational overhead. Consequently, also study impact intermittent authentication has guarantees attacks. show messages from some are intermittently authenticated, could not errors.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Attack Resilient State Estimation for Vehicular Systems

DISCLAIMER The contents of this report reflect the views of the authors, who are responsible for the facts and the accuracy of the information presented herein. This document is disseminated under the sponsorship of the U.S. Department of Transportation's University Transportation Centers Program, in the interest of information exchange. The U.S. Government assumes no liability for the contents...

متن کامل

An Effective Attack-Resilient Kalman Filter-Based Approach for Dynamic State Estimation of Synchronous Machine

Kalman filtering has been widely considered for dynamic state estimation in smart grids. Despite its unique merits, the Kalman Filter (KF)-based dynamic state estimation can be undesirably influenced by cyber adversarial attacks that can potentially be launched against the communication links in the Cyber-Physical System (CPS). To enhance the security of KF-based state estimation, in this paper...

متن کامل

Resilient Configuration of Distribution System versus False Data Injection Attacks Against State Estimation

State estimation is used in power systems to estimate grid variables based on meter measurements. Unfortunately, power grids are vulnerable to cyber-attacks. Reducing cyber-attacks against state estimation is necessary to ensure power system safe and reliable operation. False data injection (FDI) is a type of cyber-attack that tampers with measurements. This paper proposes network reconfigurati...

متن کامل

Statistical Attack Resilient Data Hiding

In this paper, we propose a discrete cosine transform (DCT) based spread spectrum data-hiding algorithm that is resilient to statistical attacks. Unlike other spread spectrum based data-hiding algorithms, the proposed algorithm does not introduce a low-pass filtering effect in the histogram of the stego image. The distance between the center of gravity (CoG) as defined by [14] of the unmarked h...

متن کامل

Attack-Resilient Multitree Data Distribution Topologies

We consider a scenario of information broadcast where a source node distributes data in parallel over a fixed number of trees spanning over a large audience of nodes. The trees used for data dissemination are called distribution topology. Particular implementations of this scenario are peer-to-peer live streaming systems. Encoding data partially redundant, nodes are satisfied as long as they re...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Automatica

سال: 2022

ISSN: ['1873-2836', '0005-1098']

DOI: https://doi.org/10.1016/j.automatica.2021.110035