Clustering-based detection algorithm of remote state estimation under stealthy innovation-based attacks with historical data
This paper investigates a security issue in cyber–physical systems (CPSs) concerning the performance of a multi-sensor remote state estimation under a novel attack called “Optimal Stealthy Innovation-Based Attacks with Historical Data”. The attacker is able to launch a linear attack to modify sensor...
Saved in:
| Published in | Neurocomputing (Amsterdam) Vol. 616; p. 128942 |
|---|---|
| Main Authors | , , , , |
| Format | Journal Article |
| Language | English |
| Published |
Elsevier B.V
01.02.2025
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 0925-2312 |
| DOI | 10.1016/j.neucom.2024.128942 |
Cover
| Summary: | This paper investigates a security issue in cyber–physical systems (CPSs) concerning the performance of a multi-sensor remote state estimation under a novel attack called “Optimal Stealthy Innovation-Based Attacks with Historical Data”. The attacker is able to launch a linear attack to modify sensor measurements. The objective of the attacker is to maximize the deterioration of estimation performance while ensuring they remain undetected by the χ2 detector. To counteract this new type of attack, a remote state estimator equipped with a detection mechanism that utilizes a Gaussian mixture model (GMM) is employed. We derive the error covariances for the remote state estimator with and without a GMM detection mechanism in a recursive manner under Optimal Stealthy Innovation-Based Attacks with Historical Data. The experimental results demonstrate the superiority of the GMM detection mechanism. However, it is observed that the estimation performance of the GMM-based system deteriorates as the system dimension increases. In order to address this issue, we propose two dimensionality reduction methods, namely kernel principal component analysis (KPCA) and variational autoencoder (VAE), to enhance the estimation performance. Finally, the results are illustrated via the simulation examples.
•Improving state estimation performance via GMM-based methods against deception attacks.•Error covariances with and without GMM methods under stealthy attacks are derived.•To improve GMM detection in high dimensions, KPCA and VAE are integrated for reduction. |
|---|---|
| ISSN: | 0925-2312 |
| DOI: | 10.1016/j.neucom.2024.128942 |