With the development of industrialization, the security issue of remote state estimation in cyber-physical systems (CPSs) has attracted widespread attention in recent years. This article studies the state estimation p...
详细信息
With the development of industrialization, the security issue of remote state estimation in cyber-physical systems (CPSs) has attracted widespread attention in recent years. This article studies the state estimation problem based on quantizedobservations and tampering attacks on partial channels of multisensor networks. Assuming the attacker knows the sending data and system parameters, we design an optimal attack strategy based on maximizing the state estimation error as an indicator. From the defender's perspective, when the attack strategy is known, we construct a compensation algorithm to reduce the error caused by the attack. When the attack strategy is unknown, we design an innovative attack strategy and system state joint estimation scheme. The defense scheme limits the attack strategy estimation error within a given range, while making the estimation performance of the system state almost the same as that without attack. The state estimators in the above attack and defense scenarios have been given and their performance is analyzed. Finally, the theoretical results are simulated and verified.
Aiming at the security problem of cyber physical system (CPS), this paper designs and evaluates a tampering attack detection scheme for remote state estimation with quantizedobservations. When the transmitted informa...
详细信息
Aiming at the security problem of cyber physical system (CPS), this paper designs and evaluates a tampering attack detection scheme for remote state estimation with quantizedobservations. When the transmitted information is quantized and the attacker randomly tampers it with a certain probability, we design a detection algorithm with a given error threshold based on the received data. Moreover, we proposes detection performance indexes, leakage detection rate and false detection rate, for the above algorithm, which are used to measure the algorithm performance to discriminate the tampered data, and further analyzes the impact of the attack strategy and the error threshold on performance indexes. Finally, simulations are designed to verify the theoretical results.
暂无评论