Stealthy Noise Injection Attacks Against State Estimation in Interconnected Systems

This brief investigates the stealthy attack design problem for interconnected systems, where the aim of the attacker is to maximize the estimation error covariance of the centralized state estimator by injecting elaborately designed Gaussian noises into the compromised subsystem. The proposed attack...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on circuits and systems. II, Express briefs Express briefs, 2023-06, Vol.70 (6), p.1-1
Hauptverfasser: Huo, Jian-Ru, Li, Xiao-Jian
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1
container_issue 6
container_start_page 1
container_title IEEE transactions on circuits and systems. II, Express briefs
container_volume 70
creator Huo, Jian-Ru
Li, Xiao-Jian
description This brief investigates the stealthy attack design problem for interconnected systems, where the aim of the attacker is to maximize the estimation error covariance of the centralized state estimator by injecting elaborately designed Gaussian noises into the compromised subsystem. The proposed attack strategy can achieve complete stealthiness for local detectors and keep a certain level of stealthiness for the centralized one simultaneously, which differs from the existing attack strategies for interconnected systems. Due to the nature of the attack model and interconnected systems, the stealthiness constraint is so complex that it is difficult to directly solve the formulated optimization problem to obtain the detailed attack strategy. To transform the stealthiness constraint, the eigenvalues of matrices are used to characterize the upper and lower bounds of the corresponding determinant, and then the closed-form optimal attack strategy is derived. Finally, a 1D network simulation example is provided to verify the developed results.
doi_str_mv 10.1109/TCSII.2022.3233447
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_2821075153</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10004716</ieee_id><sourcerecordid>2821075153</sourcerecordid><originalsourceid>FETCH-LOGICAL-c296t-4c109ad10c259d5895de2002472270e3df73014ff699889bc9117094efa9a7003</originalsourceid><addsrcrecordid>eNpNkD1PwzAQhi0EEqXwBxBDJOaU80fqeKyqApEqGFJmyzgXSGmdYrtD_z1u04Hpbnie-3gJuacwoRTU02peV9WEAWMTzjgXQl6QES2KMudS0ctjL1QupZDX5CaENQBTwNmI1HVEs4nfh-yt7wJmlVujjV3vslmMxv6EbPZlOhdiVkcTMVuE2G3NCehcoiN62zuXHGyy-hAibsMtuWrNJuDduY7Jx_NiNX_Nl-8v1Xy2zC1T05gLmy43DQXLCtUUpSoaZOkwIRmTgLxpJQcq2naqVFmqT6solaAEtkYZCcDH5HGYu_P97x5D1Ot-711aqVnJKMiCFjxRbKCs70Pw2OqdTy_4g6agj-HpU3j6GJ4-h5ekh0HqEPGfACAknfI_hKNqeA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2821075153</pqid></control><display><type>article</type><title>Stealthy Noise Injection Attacks Against State Estimation in Interconnected Systems</title><source>IEEE Electronic Library (IEL)</source><creator>Huo, Jian-Ru ; Li, Xiao-Jian</creator><creatorcontrib>Huo, Jian-Ru ; Li, Xiao-Jian</creatorcontrib><description>This brief investigates the stealthy attack design problem for interconnected systems, where the aim of the attacker is to maximize the estimation error covariance of the centralized state estimator by injecting elaborately designed Gaussian noises into the compromised subsystem. The proposed attack strategy can achieve complete stealthiness for local detectors and keep a certain level of stealthiness for the centralized one simultaneously, which differs from the existing attack strategies for interconnected systems. Due to the nature of the attack model and interconnected systems, the stealthiness constraint is so complex that it is difficult to directly solve the formulated optimization problem to obtain the detailed attack strategy. To transform the stealthiness constraint, the eigenvalues of matrices are used to characterize the upper and lower bounds of the corresponding determinant, and then the closed-form optimal attack strategy is derived. Finally, a 1D network simulation example is provided to verify the developed results.</description><identifier>ISSN: 1549-7747</identifier><identifier>EISSN: 1558-3791</identifier><identifier>DOI: 10.1109/TCSII.2022.3233447</identifier><identifier>CODEN: ITCSFK</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>attack design ; Constraint modelling ; convex optimization ; Covariance matrices ; Detectors ; Eigenvalues ; Estimation error ; Interconnected systems ; Kalman filters ; local detector ; Lower bounds ; Optimization ; Security ; State estimation ; Subsystems</subject><ispartof>IEEE transactions on circuits and systems. II, Express briefs, 2023-06, Vol.70 (6), p.1-1</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c296t-4c109ad10c259d5895de2002472270e3df73014ff699889bc9117094efa9a7003</citedby><cites>FETCH-LOGICAL-c296t-4c109ad10c259d5895de2002472270e3df73014ff699889bc9117094efa9a7003</cites><orcidid>0000-0002-5353-5207</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10004716$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/10004716$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Huo, Jian-Ru</creatorcontrib><creatorcontrib>Li, Xiao-Jian</creatorcontrib><title>Stealthy Noise Injection Attacks Against State Estimation in Interconnected Systems</title><title>IEEE transactions on circuits and systems. II, Express briefs</title><addtitle>TCSII</addtitle><description>This brief investigates the stealthy attack design problem for interconnected systems, where the aim of the attacker is to maximize the estimation error covariance of the centralized state estimator by injecting elaborately designed Gaussian noises into the compromised subsystem. The proposed attack strategy can achieve complete stealthiness for local detectors and keep a certain level of stealthiness for the centralized one simultaneously, which differs from the existing attack strategies for interconnected systems. Due to the nature of the attack model and interconnected systems, the stealthiness constraint is so complex that it is difficult to directly solve the formulated optimization problem to obtain the detailed attack strategy. To transform the stealthiness constraint, the eigenvalues of matrices are used to characterize the upper and lower bounds of the corresponding determinant, and then the closed-form optimal attack strategy is derived. Finally, a 1D network simulation example is provided to verify the developed results.</description><subject>attack design</subject><subject>Constraint modelling</subject><subject>convex optimization</subject><subject>Covariance matrices</subject><subject>Detectors</subject><subject>Eigenvalues</subject><subject>Estimation error</subject><subject>Interconnected systems</subject><subject>Kalman filters</subject><subject>local detector</subject><subject>Lower bounds</subject><subject>Optimization</subject><subject>Security</subject><subject>State estimation</subject><subject>Subsystems</subject><issn>1549-7747</issn><issn>1558-3791</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpNkD1PwzAQhi0EEqXwBxBDJOaU80fqeKyqApEqGFJmyzgXSGmdYrtD_z1u04Hpbnie-3gJuacwoRTU02peV9WEAWMTzjgXQl6QES2KMudS0ctjL1QupZDX5CaENQBTwNmI1HVEs4nfh-yt7wJmlVujjV3vslmMxv6EbPZlOhdiVkcTMVuE2G3NCehcoiN62zuXHGyy-hAibsMtuWrNJuDduY7Jx_NiNX_Nl-8v1Xy2zC1T05gLmy43DQXLCtUUpSoaZOkwIRmTgLxpJQcq2naqVFmqT6solaAEtkYZCcDH5HGYu_P97x5D1Ot-711aqVnJKMiCFjxRbKCs70Pw2OqdTy_4g6agj-HpU3j6GJ4-h5ekh0HqEPGfACAknfI_hKNqeA</recordid><startdate>20230601</startdate><enddate>20230601</enddate><creator>Huo, Jian-Ru</creator><creator>Li, Xiao-Jian</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>L7M</scope><orcidid>https://orcid.org/0000-0002-5353-5207</orcidid></search><sort><creationdate>20230601</creationdate><title>Stealthy Noise Injection Attacks Against State Estimation in Interconnected Systems</title><author>Huo, Jian-Ru ; Li, Xiao-Jian</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c296t-4c109ad10c259d5895de2002472270e3df73014ff699889bc9117094efa9a7003</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>attack design</topic><topic>Constraint modelling</topic><topic>convex optimization</topic><topic>Covariance matrices</topic><topic>Detectors</topic><topic>Eigenvalues</topic><topic>Estimation error</topic><topic>Interconnected systems</topic><topic>Kalman filters</topic><topic>local detector</topic><topic>Lower bounds</topic><topic>Optimization</topic><topic>Security</topic><topic>State estimation</topic><topic>Subsystems</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Huo, Jian-Ru</creatorcontrib><creatorcontrib>Li, Xiao-Jian</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>IEEE transactions on circuits and systems. II, Express briefs</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Huo, Jian-Ru</au><au>Li, Xiao-Jian</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Stealthy Noise Injection Attacks Against State Estimation in Interconnected Systems</atitle><jtitle>IEEE transactions on circuits and systems. II, Express briefs</jtitle><stitle>TCSII</stitle><date>2023-06-01</date><risdate>2023</risdate><volume>70</volume><issue>6</issue><spage>1</spage><epage>1</epage><pages>1-1</pages><issn>1549-7747</issn><eissn>1558-3791</eissn><coden>ITCSFK</coden><abstract>This brief investigates the stealthy attack design problem for interconnected systems, where the aim of the attacker is to maximize the estimation error covariance of the centralized state estimator by injecting elaborately designed Gaussian noises into the compromised subsystem. The proposed attack strategy can achieve complete stealthiness for local detectors and keep a certain level of stealthiness for the centralized one simultaneously, which differs from the existing attack strategies for interconnected systems. Due to the nature of the attack model and interconnected systems, the stealthiness constraint is so complex that it is difficult to directly solve the formulated optimization problem to obtain the detailed attack strategy. To transform the stealthiness constraint, the eigenvalues of matrices are used to characterize the upper and lower bounds of the corresponding determinant, and then the closed-form optimal attack strategy is derived. Finally, a 1D network simulation example is provided to verify the developed results.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TCSII.2022.3233447</doi><tpages>1</tpages><orcidid>https://orcid.org/0000-0002-5353-5207</orcidid></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1549-7747
ispartof IEEE transactions on circuits and systems. II, Express briefs, 2023-06, Vol.70 (6), p.1-1
issn 1549-7747
1558-3791
language eng
recordid cdi_proquest_journals_2821075153
source IEEE Electronic Library (IEL)
subjects attack design
Constraint modelling
convex optimization
Covariance matrices
Detectors
Eigenvalues
Estimation error
Interconnected systems
Kalman filters
local detector
Lower bounds
Optimization
Security
State estimation
Subsystems
title Stealthy Noise Injection Attacks Against State Estimation in Interconnected Systems
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-31T02%3A01%3A11IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Stealthy%20Noise%20Injection%20Attacks%20Against%20State%20Estimation%20in%20Interconnected%20Systems&rft.jtitle=IEEE%20transactions%20on%20circuits%20and%20systems.%20II,%20Express%20briefs&rft.au=Huo,%20Jian-Ru&rft.date=2023-06-01&rft.volume=70&rft.issue=6&rft.spage=1&rft.epage=1&rft.pages=1-1&rft.issn=1549-7747&rft.eissn=1558-3791&rft.coden=ITCSFK&rft_id=info:doi/10.1109/TCSII.2022.3233447&rft_dat=%3Cproquest_RIE%3E2821075153%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2821075153&rft_id=info:pmid/&rft_ieee_id=10004716&rfr_iscdi=true