Distributed $H_\infty$ Estimation Resilient to Biasing Attacks
نویسندگان
چکیده
منابع مشابه
Resilient Distributed $H_\infty$ Estimation via Dynamic Rejection of Biasing Attacks
We consider the distributed $H_\infty$ estimation problem with additional requirement of resilience to biasing attacks. An attack scenario is considered where an adversary misappropriates some of the observer nodes and injects biasing signals into observer dynamics. Using a dynamic modelling of biasing attack inputs, a novel distributed state estimation algorithm is proposed which involves feed...
متن کاملResilient Configuration of Distribution System versus False Data Injection Attacks Against State Estimation
State estimation is used in power systems to estimate grid variables based on meter measurements. Unfortunately, power grids are vulnerable to cyber-attacks. Reducing cyber-attacks against state estimation is necessary to ensure power system safe and reliable operation. False data injection (FDI) is a type of cyber-attack that tampers with measurements. This paper proposes network reconfigurati...
متن کاملResilient Distributed State Estimation for LTI Systems
Consider a linear time-invariant (LTI) dynamical system monitored by a network of sensors, modeled as nodes of an underlying directed communication graph. We study the problem of collaboratively estimating the state of the system when certain nodes are compromised by adversarial attacks. Specifically, we consider a Byzantine adversary model, where a compromised node possesses complete knowledge...
متن کاملSoftware Watermarking Resilient to Debugging Attacks
In 2006, Gaurav Gupta and Josef Pieprzyk presented an attack on the branch-based software watermarking scheme proposed by Ginger Myles and Hongxia Jin in 2005. The software watermarking model is based on replacing jump instructions or unconditional branch statements (UBS) by calls to a ngerprint branch function (FBF) that computes the correct target address of the UBS as a function of the gen...
متن کاملBiasing power traces to improve correlation in power analysis attacks
In this paper, we present a selection method of power traces to improve the efficiency of power analysis attacks. The proposed method improves the correlation factor by biasing distribution of power traces. The biasing is to select a subset from many traces. We demonstrate our method through correlation power analysis (CPA) experiments using two different devices. The results clearly show that ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Control of Network Systems
سال: 2020
ISSN: 2325-5870,2372-2533
DOI: 10.1109/tcns.2019.2924192