JOURNAL ARTICLE

Resilient Distributed State Estimation Under Stealthy Attack

Yujiao LvJianquan LuYang LiuJungang Lou

Year: 2022 Journal:   IEEE Transactions on Information Forensics and Security Vol: 17 Pages: 3254-3263   Publisher: Institute of Electrical and Electronics Engineers

Abstract

Network security issues are significant for cyber-physical systems while existing wireless networks are vulnerable to cyber-attacks. This paper proposes a novel detector for stealthy attacks in distributed consensus-based filtering, which has fewer objects to detect and thus can reduce the time consumption of the detector. Based on the proposed detector, we can analyze the estimated performance of the distributed estimator under a stealthy attack. The purpose of this study is to analyze the properties and performance of the estimator equipped with the proposed detector depending on the adversary's available resources. First, we study the sufficient condition for distributed state estimation to be resilient based on the assumption that the adversary has sufficient resources. With limited adversary resources, the optimal Kalman gain can be obtained by minimizing state estimation error covariance. Furthermore, a sufficient condition is presented to guarantee the convergence of the estimation error covariance in the estimator equipped with the proposed detector. Finally, a simulation example is provided to demonstrate the effect of the detector on the distributed estimator.

Keywords:
Computer science Detector Estimator Covariance Adversary Kalman filter Convergence (economics) State (computer science) Cyber-physical system Algorithm Computer security Artificial intelligence Mathematics Telecommunications Statistics

Metrics

32
Cited By
4.78
FWCI (Field Weighted Citation Impact)
29
Refs
0.94
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Smart Grid Security and Resilience
Physical Sciences →  Engineering →  Control and Systems Engineering
Distributed Control Multi-Agent Systems
Physical Sciences →  Computer Science →  Computer Networks and Communications
Security in Wireless Sensor Networks
Physical Sciences →  Computer Science →  Computer Networks and Communications

Related Documents

JOURNAL ARTICLE

A Resilient Distributed Kalman Filtering Under Bidirectional Stealthy Attack

Wenjie DingWen YangChao YangXiaoqiang RenXiaofan Wang

Journal:   IEEE Signal Processing Letters Year: 2024 Vol: 31 Pages: 356-360
JOURNAL ARTICLE

Stealthy Attack Against Distributed State Estimation for Cyber‐Physical Systems

Jie WangYun LiuHuaiyu YuanWen Yang

Journal:   International Journal of Robust and Nonlinear Control Year: 2024 Vol: 35 (3)Pages: 1091-1099
BOOK-CHAPTER

Secure State Estimation against Stealthy Attack

Yilin Mo

Year: 2016 Pages: 31-55
BOOK-CHAPTER

Secure State Estimation against Stealthy Attack

Yilin Mo

Year: 2016 Pages: 41-66
© 2026 ScienceGate Book Chapters — All rights reserved.