Worst-case analysis of joint attack detection and resilient state estimation

  • Nicola Forti
  • , Giorgio Battistelli
  • , Luigi Chisci
  • , Bruno Sinopoli

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

11 Scopus citations

Abstract

This work investigates the effects of signal attacks possibly combined with network deception attacks injecting fake measurements on stochastic cyber-physical systems. The goal of the attacker is to maximize the estimation error based on the information available about the system and the measurement models, preferably without being detected. This problem is formulated following a worst-case approach characterizing the maximum degradation the attacker can induce at each time instant when a Bayesian filter developed within the random finite set (RFS) framework is employed for simultaneous attack detection and resilient state estimation. A novel concept of error which captures the switching (Bernoulli) nature of the signal attack is proposed as an appropriate distance measure for joint detection-estimation. Furthermore, the notion of stealthiness is introduced in order to derive attack policies useful to synthesize undetectable perturbations that can deceive a Maximum Aposteriori Probability (MAP) detector implemented for security.

Original languageEnglish
Title of host publication2017 IEEE 56th Annual Conference on Decision and Control, CDC 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages182-188
Number of pages7
ISBN (Electronic)9781509028733
DOIs
StatePublished - Jun 28 2017
Event56th IEEE Annual Conference on Decision and Control, CDC 2017 - Melbourne, Australia
Duration: Dec 12 2017Dec 15 2017

Publication series

Name2017 IEEE 56th Annual Conference on Decision and Control, CDC 2017
Volume2018-January

Conference

Conference56th IEEE Annual Conference on Decision and Control, CDC 2017
Country/TerritoryAustralia
CityMelbourne
Period12/12/1712/15/17

Keywords

  • Bayesian state estimation
  • Cyber-physical systems
  • integrity attacks
  • stealthy attacks

Fingerprint

Dive into the research topics of 'Worst-case analysis of joint attack detection and resilient state estimation'. Together they form a unique fingerprint.

Cite this