TY - JOUR
T1 - Watermarking-based protection strategy against stealthy integrity attack on distributed state estimation
AU - Zhou, Jiayu
AU - Yang, Wen
AU - Ding, Wenjie
AU - Zheng, Wei Xing
AU - Xu, Yong
N1 - Publisher Copyright:
© 2022 IEEE.
PY - 2023/1/1
Y1 - 2023/1/1
N2 - This article studies the security of distributed state estimation under data integrity attacks. Each sensor is equipped with a Kullback-Leibler (K-L) divergence detector to diagnose the authenticity of the received data. A necessary and sufficient condition for the insecurity of the distributed estimator is derived, in which the stealthy attack can evade the detector and degrade the estimation performance. Furthermore, an algorithm is proposed to generate stealthy attack sequences. To overcome the vulnerability, a data transmission strategy based on watermarking is proposed. The effect of the watermarking parameters on the attack in different scenarios is subsequently analyzed. It is proved that the K-L divergence detector can effectively distinguish the stealthy attack with the help of the proposed strategy, thereby ensuring the security of the distributed state estimator. Compared with traditional encryption mechanisms, the proposed strategy neither increases the computational complexity nor sacrifices the estimation performance in the absence of attacks. A simulation example is presented to demonstrate the effectiveness of the developed approach.
AB - This article studies the security of distributed state estimation under data integrity attacks. Each sensor is equipped with a Kullback-Leibler (K-L) divergence detector to diagnose the authenticity of the received data. A necessary and sufficient condition for the insecurity of the distributed estimator is derived, in which the stealthy attack can evade the detector and degrade the estimation performance. Furthermore, an algorithm is proposed to generate stealthy attack sequences. To overcome the vulnerability, a data transmission strategy based on watermarking is proposed. The effect of the watermarking parameters on the attack in different scenarios is subsequently analyzed. It is proved that the K-L divergence detector can effectively distinguish the stealthy attack with the help of the proposed strategy, thereby ensuring the security of the distributed state estimator. Compared with traditional encryption mechanisms, the proposed strategy neither increases the computational complexity nor sacrifices the estimation performance in the absence of attacks. A simulation example is presented to demonstrate the effectiveness of the developed approach.
KW - watermarking
KW - distributed state estimation
KW - security
KW - Data integrity attacks
UR - https://hdl.handle.net/1959.7/uws:70033
UR - http://www.scopus.com/inward/record.url?scp=85129645455&partnerID=8YFLogxK
U2 - 10.1109/TAC.2022.3171422
DO - 10.1109/TAC.2022.3171422
M3 - Article
SN - 0018-9286
VL - 68
SP - 628
EP - 635
JO - IEEE Transactions on Automatic Control
JF - IEEE Transactions on Automatic Control
IS - 1
ER -