2018
DOI: 10.1016/j.automatica.2017.09.028
|View full text |Cite
|
Sign up to set email alerts
|

State estimation under false data injection attacks: Security analysis and system protection

Abstract: In this paper, the security issue in the state estimation problem is investigated for networked control systems. The communication channels between the sensors and the remote estimator are vulnerable to attacks from malicious adversaries. The false data injection attacks (FDIAs) are considered. We aim to find the so-called insecurity conditions under which the estimation system is insecure in the sense that there exist FDIAs that can bypass the anomaly detector but still lead to unbounded estimation errors. In… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
119
0
1

Year Published

2018
2018
2024
2024

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 338 publications
(120 citation statements)
references
References 23 publications
(33 reference statements)
0
119
0
1
Order By: Relevance
“…In [232], stealthy scenarios of sensor deception attacks in discrete-event systems are investigated through an insertion-deletion structure. Another example of such investigations is [233] where insecurity conditions that deception attacks remain undetected is studied. In [172], zero state inducing attacks (on A 2 ) are introduced where the output of the system with such attacks would remain the same as the case when initial conditions are zero, with the assumption that the initial conditions cannot be altered by the attackers.…”
Section: A Threat Assessmentmentioning
confidence: 99%
“…In [232], stealthy scenarios of sensor deception attacks in discrete-event systems are investigated through an insertion-deletion structure. Another example of such investigations is [233] where insecurity conditions that deception attacks remain undetected is studied. In [172], zero state inducing attacks (on A 2 ) are introduced where the output of the system with such attacks would remain the same as the case when initial conditions are zero, with the assumption that the initial conditions cannot be altered by the attackers.…”
Section: A Threat Assessmentmentioning
confidence: 99%
“…In [13,14], the time-delay attack was introduced, which illustrates that when the communication system is attacked and commands from controllers are delayed, some commands can not be executed in time and the disruption may occur. Besides that, false data injection in [19] can also cause false control from controllers. When false data is injected into the system, the false estimation may lead to false commands.…”
Section: Related Workmentioning
confidence: 99%
“…In the former one, anomaly diagnosis schemes are designed to reveal the existence of attack and trigger alarm and/or recovery mechanism. For example, the problem of revealing the existence of attacks or vulnerable part of the system that requires protection is considered in [12] and [13]. In the research about resilient algorithm design, researchers pursuit a design of secure system which has graceful performance degradation in the presence of attack.…”
Section: Introductionmentioning
confidence: 99%