TY - GEN
T1 - Robust estimation in the presence of integrity attacks
AU - Mo, Yilin
AU - Sinopoli, Bruno
PY - 2013
Y1 - 2013
N2 - We consider the estimation of a scalar state based on m measurements that can be potentially manipulated by an adversary. The attacker is assumed to have full knowledge about the true value of the state to be estimated and about the value of all the measurements. However, the attacker has limited resources and can only manipulate up to l of the m measurements. The problem is formulated as a minimax optimization, where one seeks to construct an optimal estimator that minimizes the "worst-case" mean squared error against all possible manipulations by the attacker. We show that if the attacker can manipulate at least half the measurements (l ≥ m/2), then the optimal worst-case estimator should ignore all measurements and be based solely on the a-priori information. We also provide the explicit form of the optimal symmetric estimator when the attacker can manipulate less than half the measurements (l < m/2), which is based on (m 2l)local estimators. We further prove that such an estimator can be reduced into simpler forms for two special cases, i.e., either the local estimator is monotone or m = 2l + 1. Finally we apply the proposed methodology in the case of i.i.d. Gaussian measurements.
AB - We consider the estimation of a scalar state based on m measurements that can be potentially manipulated by an adversary. The attacker is assumed to have full knowledge about the true value of the state to be estimated and about the value of all the measurements. However, the attacker has limited resources and can only manipulate up to l of the m measurements. The problem is formulated as a minimax optimization, where one seeks to construct an optimal estimator that minimizes the "worst-case" mean squared error against all possible manipulations by the attacker. We show that if the attacker can manipulate at least half the measurements (l ≥ m/2), then the optimal worst-case estimator should ignore all measurements and be based solely on the a-priori information. We also provide the explicit form of the optimal symmetric estimator when the attacker can manipulate less than half the measurements (l < m/2), which is based on (m 2l)local estimators. We further prove that such an estimator can be reduced into simpler forms for two special cases, i.e., either the local estimator is monotone or m = 2l + 1. Finally we apply the proposed methodology in the case of i.i.d. Gaussian measurements.
UR - https://www.scopus.com/pages/publications/84902354466
U2 - 10.1109/CDC.2013.6760851
DO - 10.1109/CDC.2013.6760851
M3 - Conference contribution
AN - SCOPUS:84902354466
SN - 9781467357173
T3 - Proceedings of the IEEE Conference on Decision and Control
SP - 6085
EP - 6090
BT - 2013 IEEE 52nd Annual Conference on Decision and Control, CDC 2013
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 52nd IEEE Conference on Decision and Control, CDC 2013
Y2 - 10 December 2013 through 13 December 2013
ER -