Robust estimation in the presence of integrity attacks

  • Yilin Mo
  • , Bruno Sinopoli

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

8 Scopus citations

Abstract

We consider the estimation of a scalar state based on m measurements that can be potentially manipulated by an adversary. The attacker is assumed to have full knowledge about the true value of the state to be estimated and about the value of all the measurements. However, the attacker has limited resources and can only manipulate up to l of the m measurements. The problem is formulated as a minimax optimization, where one seeks to construct an optimal estimator that minimizes the "worst-case" mean squared error against all possible manipulations by the attacker. We show that if the attacker can manipulate at least half the measurements (l ≥ m/2), then the optimal worst-case estimator should ignore all measurements and be based solely on the a-priori information. We also provide the explicit form of the optimal symmetric estimator when the attacker can manipulate less than half the measurements (l < m/2), which is based on (m 2l)local estimators. We further prove that such an estimator can be reduced into simpler forms for two special cases, i.e., either the local estimator is monotone or m = 2l + 1. Finally we apply the proposed methodology in the case of i.i.d. Gaussian measurements.

Original languageEnglish
Title of host publication2013 IEEE 52nd Annual Conference on Decision and Control, CDC 2013
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages6085-6090
Number of pages6
ISBN (Print)9781467357173
DOIs
StatePublished - 2013
Event52nd IEEE Conference on Decision and Control, CDC 2013 - Florence, Italy
Duration: Dec 10 2013Dec 13 2013

Publication series

NameProceedings of the IEEE Conference on Decision and Control
ISSN (Print)0743-1546
ISSN (Electronic)2576-2370

Conference

Conference52nd IEEE Conference on Decision and Control, CDC 2013
Country/TerritoryItaly
CityFlorence
Period12/10/1312/13/13

Fingerprint

Dive into the research topics of 'Robust estimation in the presence of integrity attacks'. Together they form a unique fingerprint.

Cite this