Optimal deception attack on networked vehicular cyber physical systems

@article{Choraria2019OptimalDA,
  title={Optimal deception attack on networked vehicular cyber physical systems},
  author={Moulik Choraria and Arpan Chattopadhyay and Urbashi Mitra and Erik G. Str{\"o}m},
  journal={2019 53rd Asilomar Conference on Signals, Systems, and Computers},
  year={2019},
  pages={1131-1135}
}
Herein, design of false data injection attack on a distributed cyber-physical system is considered. A stochastic process with linear dynamics and Gaussian noise is measured by multiple agent nodes, each equipped with multiple sensors. The agent nodes form a multi-hop network among themselves. Each agent node computes an estimate of the process by using its sensor observations and messages obtained from neighbouring nodes, via Kalman-consensus filtering. An external attacker, capable of… 

Figures and Tables from this paper

Design of False Data Injection Attack on Distributed Process Estimation
TLDR
Herein, design of false data injection attack on a distributed cyber-physical system is considered and desired convergence of the proposed algorithms are proved by exploiting the convexity and properties of stochastic approximation algorithms.
Quickest detection of false data injection attack in remote state estimation
TLDR
The quickest attack detection problem for a known linear attack scheme is posed as a constrained Markov decision process in order to minimise the expected detection delay subject to a false alarm constraint.

References

SHOWING 1-10 OF 30 REFERENCES
Optimal Linear Cyber-Attack on Remote State Estimation
TLDR
This paper considers malicious cyber attacks in a remote state estimation application where a smart sensor node transmits data to a remote estimator equipped with a false data detector and proposes a linear deception attack strategy.
On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds
TLDR
A notion of attack stealthiness based on the Kullback–Leibler divergence measure is adopted and the worst case degradation induced by an attacker with a fixed stealthiness level is characterized, thereby proving tightness of the result.
Attack detection and secure estimation under false data injection attack in cyber-physical systems
TLDR
A novel detector to detect injection attack on an unknown sensor subset is developed, and an algorithm for secure estimation using a novel filtering and learning algorithm, where an optimal filter is learnt over time by using the sensor observations in order to filter out malicious sensor observations while retaining other sensor measurements.
Security Against False Data-Injection Attack in Cyber-Physical Systems
TLDR
This paper proposes a novel filtering and learning algorithm, where an optimal filter is learned over time by using the sensor observations in order to filter out malicious sensor observations while retaining other sensor measurements, for secure, remote estimation of a linear Gaussian process via observations at multiple sensors.
Detection Against Linear Deception Attacks on Multi-Sensor Remote State Estimation
TLDR
This paper proposes three sequential data verification and fusion procedures for different detection information scenarios and the corresponding impacts of possible attacking patterns on the estimation performance under different detectors are analyzed explicitly.
Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks
TLDR
A new simple characterization of the maximum number of attacks that can be detected and corrected as a function of the pair (A,C) of the system is given and it is shown that it is impossible to accurately reconstruct the state of a system if more than half the sensors are attacked.
Distributed detection of cyber-physical attacks in power networks: A waveform relaxation approach
TLDR
An entirely distributed detection filter which requires only local network knowledge and yet achieves guaranteed global performance is designed, which is based on a sparse residual filter in descriptor form.
Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems
This paper studies an attacker against a cyber-physical system (CPS) whose goal is to move the state of a CPS to a target state while ensuring that his or her probability of being detected does not
Secure State Estimation Against Sensor Attacks in the Presence of Noise
TLDR
A secure state estimation algorithm is proposed, and bounds on the achievable state estimation error are derived given an upper bound on the number of attacked sensors.
Attack-Resilient State Estimation for Noisy Dynamical Systems
TLDR
This paper focuses on the most general model for sensor attacks where any signal can be injected via compromised sensors, and presents an attack-resilient state estimator that can be formulated as a mixed-integer linear program and its convex relaxation based on the LaTeX norm.
...
...