Secure Estimation in the Presence of Integrity Attacks
Title | Secure Estimation in the Presence of Integrity Attacks |
Publication Type | Journal Article |
Year of Publication | 2015 |
Authors | Yilin Mo, Sinopoli, B. |
Journal | Automatic Control, IEEE Transactions on |
Volume | 60 |
Pagination | 1145-1151 |
Date Published | April |
ISSN | 0018-9286 |
Keywords | a-priori information, Cost function, cryptography, Estimation, explicit analysis, Fault tolerance, Gaussian measurements, Gaussian processes, integrity attack presence, local estimators, measurement value, minimax optimization, minimax techniques, minimisation, monotone estimator, optimal worst-case estimator, Robustness, scalar state estimation, secure estimation, security, Sensors, state estimation, symmetric estimator, true state value, Vectors, worst-case expected cost minimization |
Abstract | We consider the estimation of a scalar state based on m measurements that can be potentially manipulated by an adversary. The attacker is assumed to have full knowledge about the true value of the state to be estimated and about the value of all the measurements. However, the attacker has limited resources and can only manipulate up to l of the m measurements. The problem is formulated as a minimax optimization, where one seeks to construct an optimal estimator that minimizes the "worst-case" expected cost against all possible manipulations by the attacker. We show that if the attacker can manipulate at least half the measurements (l m/2), then the optimal worst-case estimator should ignore all measurements and be based solely on the a-priori information. We provide the explicit form of the optimal estimator when the attacker can manipulate less than half the measurements (l <; m/2), which is based on (m2l) local estimators. We further prove that such an estimator can be reduced into simpler forms for two special cases, i.e., either the estimator is symmetric and monotone or m = 2l + 1. Finally we apply the proposed methodology in the case of Gaussian measurements. |
DOI | 10.1109/TAC.2014.2350231 |
Citation Key | 6881627 |
- minimisation
- worst-case expected cost minimization
- Vectors
- true state value
- symmetric estimator
- state estimation
- sensors
- security
- secure estimation
- scalar state estimation
- Robustness
- optimal worst-case estimator
- monotone estimator
- a-priori information
- minimax techniques
- minimax optimization
- measurement value
- local estimators
- integrity attack presence
- Gaussian processes
- Gaussian measurements
- fault tolerance
- explicit analysis
- estimation
- Cryptography
- Cost function