TY - GEN
T1 - Worst-case analysis of joint attack detection and resilient state estimation
AU - Forti, Nicola
AU - Battistelli, Giorgio
AU - Chisci, Luigi
AU - Sinopoli, Bruno
N1 - Publisher Copyright:
© 2017 IEEE.
PY - 2017/6/28
Y1 - 2017/6/28
N2 - This work investigates the effects of signal attacks possibly combined with network deception attacks injecting fake measurements on stochastic cyber-physical systems. The goal of the attacker is to maximize the estimation error based on the information available about the system and the measurement models, preferably without being detected. This problem is formulated following a worst-case approach characterizing the maximum degradation the attacker can induce at each time instant when a Bayesian filter developed within the random finite set (RFS) framework is employed for simultaneous attack detection and resilient state estimation. A novel concept of error which captures the switching (Bernoulli) nature of the signal attack is proposed as an appropriate distance measure for joint detection-estimation. Furthermore, the notion of stealthiness is introduced in order to derive attack policies useful to synthesize undetectable perturbations that can deceive a Maximum Aposteriori Probability (MAP) detector implemented for security.
AB - This work investigates the effects of signal attacks possibly combined with network deception attacks injecting fake measurements on stochastic cyber-physical systems. The goal of the attacker is to maximize the estimation error based on the information available about the system and the measurement models, preferably without being detected. This problem is formulated following a worst-case approach characterizing the maximum degradation the attacker can induce at each time instant when a Bayesian filter developed within the random finite set (RFS) framework is employed for simultaneous attack detection and resilient state estimation. A novel concept of error which captures the switching (Bernoulli) nature of the signal attack is proposed as an appropriate distance measure for joint detection-estimation. Furthermore, the notion of stealthiness is introduced in order to derive attack policies useful to synthesize undetectable perturbations that can deceive a Maximum Aposteriori Probability (MAP) detector implemented for security.
KW - Bayesian state estimation
KW - Cyber-physical systems
KW - integrity attacks
KW - stealthy attacks
UR - https://www.scopus.com/pages/publications/85046148151
U2 - 10.1109/CDC.2017.8263663
DO - 10.1109/CDC.2017.8263663
M3 - Conference contribution
AN - SCOPUS:85046148151
T3 - 2017 IEEE 56th Annual Conference on Decision and Control, CDC 2017
SP - 182
EP - 188
BT - 2017 IEEE 56th Annual Conference on Decision and Control, CDC 2017
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 56th IEEE Annual Conference on Decision and Control, CDC 2017
Y2 - 12 December 2017 through 15 December 2017
ER -