Attack-resilient state estimation with intermittent data authentication
نویسندگان
چکیده
Network-based attacks on control systems may alter sensor data delivered to the controller, effectively causing degradation in performance. As a result, having access accurate state estimates, even presence of measurements, is critical importance. In this work, we analyze performance resilient estimators (RSEs) when any subset sensors be compromised by stealthy attacker . Specifically, consider with well-known l 0 -based RSE and two commonly used sound intrusion detectors (IDs). For linear time-invariant plants bounded noise, define notion perfect attackability (PA) result unbounded estimation errors while remaining undetected employed ID (i.e., stealthy). We derive necessary sufficient PA conditions, showing that system can perfectly attackable if plant stable. While prevented use standard cryptographic mechanisms (e.g., message authentication) ensure integrity under network-based attacks, their continuous imposes significant communication computational overhead. Consequently, also study impact intermittent authentication has guarantees attacks. show messages from some are intermittently authenticated, could not errors.
منابع مشابه
Attack Resilient State Estimation for Vehicular Systems
DISCLAIMER The contents of this report reflect the views of the authors, who are responsible for the facts and the accuracy of the information presented herein. This document is disseminated under the sponsorship of the U.S. Department of Transportation's University Transportation Centers Program, in the interest of information exchange. The U.S. Government assumes no liability for the contents...
متن کاملAn Effective Attack-Resilient Kalman Filter-Based Approach for Dynamic State Estimation of Synchronous Machine
Kalman filtering has been widely considered for dynamic state estimation in smart grids. Despite its unique merits, the Kalman Filter (KF)-based dynamic state estimation can be undesirably influenced by cyber adversarial attacks that can potentially be launched against the communication links in the Cyber-Physical System (CPS). To enhance the security of KF-based state estimation, in this paper...
متن کاملResilient Configuration of Distribution System versus False Data Injection Attacks Against State Estimation
State estimation is used in power systems to estimate grid variables based on meter measurements. Unfortunately, power grids are vulnerable to cyber-attacks. Reducing cyber-attacks against state estimation is necessary to ensure power system safe and reliable operation. False data injection (FDI) is a type of cyber-attack that tampers with measurements. This paper proposes network reconfigurati...
متن کاملStatistical Attack Resilient Data Hiding
In this paper, we propose a discrete cosine transform (DCT) based spread spectrum data-hiding algorithm that is resilient to statistical attacks. Unlike other spread spectrum based data-hiding algorithms, the proposed algorithm does not introduce a low-pass filtering effect in the histogram of the stego image. The distance between the center of gravity (CoG) as defined by [14] of the unmarked h...
متن کاملAttack-Resilient Multitree Data Distribution Topologies
We consider a scenario of information broadcast where a source node distributes data in parallel over a fixed number of trees spanning over a large audience of nodes. The trees used for data dissemination are called distribution topology. Particular implementations of this scenario are peer-to-peer live streaming systems. Encoding data partially redundant, nodes are satisfied as long as they re...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Automatica
سال: 2022
ISSN: ['1873-2836', '0005-1098']
DOI: https://doi.org/10.1016/j.automatica.2021.110035