{"title":"Actuator and Sensor Attacks Against Multisensor State Estimation With Round-Robin Protocol","authors":"Kaijing Jin;Dan Ye","doi":"10.1109/TII.2025.3528546","DOIUrl":null,"url":null,"abstract":"In this article, we focus on the security issue of multisensor state estimation under actuator and sensor attacks. Due to the limitation of network bandwidth, we consider a scenario where the sensor data is transmitted following a round-robin protocol. If attacks can access all actuator and sensor channels, the necessary and sufficient conditions for the existence of joint attacks are presented. In this case, the attacks can cause the estimation to diverge while the corrupted innovation remains the same as that of the healthy system. When the attacked actuator or sensor channels are constrained, the existence of such a joint attack is investigated by taking into account the kernel space of system matrices. If only the sensor data are compromised, there is no strictly stealthy sensor attack, and we discuss the existence of sensor attacks with a relaxed stealthiness. The simulations are carried out on an autonomous aircraft system and an IEEE 6-bus power system to verify the effectiveness of the developed theoretical results.","PeriodicalId":13301,"journal":{"name":"IEEE Transactions on Industrial Informatics","volume":"21 5","pages":"3636-3644"},"PeriodicalIF":9.9000,"publicationDate":"2025-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Industrial Informatics","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10859163/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
In this article, we focus on the security issue of multisensor state estimation under actuator and sensor attacks. Due to the limitation of network bandwidth, we consider a scenario where the sensor data is transmitted following a round-robin protocol. If attacks can access all actuator and sensor channels, the necessary and sufficient conditions for the existence of joint attacks are presented. In this case, the attacks can cause the estimation to diverge while the corrupted innovation remains the same as that of the healthy system. When the attacked actuator or sensor channels are constrained, the existence of such a joint attack is investigated by taking into account the kernel space of system matrices. If only the sensor data are compromised, there is no strictly stealthy sensor attack, and we discuss the existence of sensor attacks with a relaxed stealthiness. The simulations are carried out on an autonomous aircraft system and an IEEE 6-bus power system to verify the effectiveness of the developed theoretical results.
期刊介绍:
The IEEE Transactions on Industrial Informatics is a multidisciplinary journal dedicated to publishing technical papers that connect theory with practical applications of informatics in industrial settings. It focuses on the utilization of information in intelligent, distributed, and agile industrial automation and control systems. The scope includes topics such as knowledge-based and AI-enhanced automation, intelligent computer control systems, flexible and collaborative manufacturing, industrial informatics in software-defined vehicles and robotics, computer vision, industrial cyber-physical and industrial IoT systems, real-time and networked embedded systems, security in industrial processes, industrial communications, systems interoperability, and human-machine interaction.