Clustering-based detection algorithm of remote state estimation under stealthy innovation-based attacks with historical data

This paper investigates a security issue in cyber–physical systems (CPSs) concerning the performance of a multi-sensor remote state estimation under a novel attack called “Optimal Stealthy Innovation-Based Attacks with Historical Data”. The attacker is able to launch a linear attack to modify sensor...

Full description

Saved in:
Bibliographic Details
Published inNeurocomputing (Amsterdam) Vol. 616; p. 128942
Main Authors Chen, Shan, Ni, Yuqing, Huang, Lingying, Luan, Xiaoli, Liu, Fei
Format Journal Article
LanguageEnglish
Published Elsevier B.V 01.02.2025
Subjects
Online AccessGet full text
ISSN0925-2312
DOI10.1016/j.neucom.2024.128942

Cover

More Information
Summary:This paper investigates a security issue in cyber–physical systems (CPSs) concerning the performance of a multi-sensor remote state estimation under a novel attack called “Optimal Stealthy Innovation-Based Attacks with Historical Data”. The attacker is able to launch a linear attack to modify sensor measurements. The objective of the attacker is to maximize the deterioration of estimation performance while ensuring they remain undetected by the χ2 detector. To counteract this new type of attack, a remote state estimator equipped with a detection mechanism that utilizes a Gaussian mixture model (GMM) is employed. We derive the error covariances for the remote state estimator with and without a GMM detection mechanism in a recursive manner under Optimal Stealthy Innovation-Based Attacks with Historical Data. The experimental results demonstrate the superiority of the GMM detection mechanism. However, it is observed that the estimation performance of the GMM-based system deteriorates as the system dimension increases. In order to address this issue, we propose two dimensionality reduction methods, namely kernel principal component analysis (KPCA) and variational autoencoder (VAE), to enhance the estimation performance. Finally, the results are illustrated via the simulation examples. •Improving state estimation performance via GMM-based methods against deception attacks.•Error covariances with and without GMM methods under stealthy attacks are derived.•To improve GMM detection in high dimensions, KPCA and VAE are integrated for reduction.
ISSN:0925-2312
DOI:10.1016/j.neucom.2024.128942