Online deception attack against remote state estimation

Heng Zhang, Peng Cheng, Junfeng Wu, Ling Shi, Jiming Chen

Research output: Chapter in Book/Conference Proceeding/ReportConference Paper published in a bookpeer-review

33 Citations (Scopus)

Abstract

Security issue has become a new hotspot in cyber-physical systems (CPS) research field in recent years due to the vulnerability of CPS to security threats. This paper focuses on stealthy deception attack in remote state estimation, which is one typical attack in CPS. From the standpoint of deception attacker, we investigates how to design proper deception attack strategy to degrade the state estimation quality with communication rate constraint. We design an online attack strategy and prove that the proposed attack strategy can degrade the estimation quality. To study the effectiveness of the proposed strategy, we analyze the cost deviation, which depicts the difference between the estimation quality with and without the proposed attack strategy. Our results show that the cost deviation will be maximum when the communication rate is 0.75. A numerical example is presented to demonstrate the main results.

Original languageEnglish
Title of host publication19th IFAC World Congress IFAC 2014, Proceedings
EditorsEdward Boje, Xiaohua Xia
PublisherIFAC Secretariat
Pages128-133
Number of pages6
ISBN (Electronic)9783902823625
DOIs
Publication statusPublished - 2014
Event19th IFAC World Congress on International Federation of Automatic Control, IFAC 2014 - Cape Town, South Africa
Duration: 24 Aug 201429 Aug 2014

Publication series

NameIFAC Proceedings Volumes (IFAC-PapersOnline)
Volume19
ISSN (Print)1474-6670

Conference

Conference19th IFAC World Congress on International Federation of Automatic Control, IFAC 2014
Country/TerritorySouth Africa
CityCape Town
Period24/08/1429/08/14

Bibliographical note

Publisher Copyright:
© IFAC.

Keywords

  • Cyber-Physical Systems
  • Secure
  • State estimation

Fingerprint

Dive into the research topics of 'Online deception attack against remote state estimation'. Together they form a unique fingerprint.

Cite this