Distributed Secure State Estimation for Cyber-Physical Systems Under False Data Injection Attacks

被引:0
作者
Zhang, Xin-Yu [1 ]
Yang, Guang-Hong [1 ,2 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Peoples R China
[2] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang 110819, Peoples R China
来源
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING | 2024年 / 11卷 / 05期
基金
中国国家自然科学基金;
关键词
Cyber-physical systems; distributed Kalman filtering; false data injection attacks; security;
D O I
10.1109/TNSE.2024.3419801
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
This paper studies the distributed secure state estimation problem for cyber-physical systems subjected to false data injection attacks. A novel distributed framework is proposed for remote state estimation based on distributed Kalman filtering technology, where the sensors gather neighboring measurement information and send it and local estimation to remote estimators through wireless channels. At the remote end, each estimator is equipped with a threshold-based protector. Compared with the existing results, the proposed protectors are advantageous in terms of saving calculation time. The optimal Kalman gain and the convergence of error covariance are provided under two different attack modes. Finally, a numerical simulation is conducted to verify the effectiveness of state estimation.
引用
收藏
页码:4443 / 4455
页数:13
相关论文
共 36 条
[1]   Security of interdependent and identical networked control systems [J].
Amin, Saurabh ;
Schwartz, Galina A. ;
Sastry, S. Shankar .
AUTOMATICA, 2013, 49 (01) :186-192
[2]   Secure Fusion Estimation for Bandwidth Constrained Cyber-Physical Systems Under Replay Attacks [J].
Chen, Bo ;
Ho, Daniel W. C. ;
Hu, Guoqiang ;
Yu, Li .
IEEE TRANSACTIONS ON CYBERNETICS, 2018, 48 (06) :1862-1876
[3]   Data-Driven Practical Cooperative Output Regulation Under Actuator Faults and DoS Attacks [J].
Deng, Chao ;
Gao, Weinan ;
Wen, Changyun ;
Chen, Zhiyong ;
Wang, Wei .
IEEE TRANSACTIONS ON CYBERNETICS, 2023, 53 (11) :7417-7428
[4]   A multi-channel transmission schedule for remote state estimation under DoS attacks [J].
Ding, Kemi ;
Li, Yuzhe ;
Quevedo, Daniel E. ;
Dey, Subhrakanti ;
Shi, Ling .
AUTOMATICA, 2017, 78 :194-201
[5]   Security of SCADA Systems Against Cyber-Physical Attacks [J].
Do, Van Long ;
Fillatre, Lionel ;
Nikiforov, Igor ;
Willett, Peter .
IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE, 2017, 32 (05) :28-45
[6]   Distributed Attack Detection and Secure Estimation of Networked Cyber-Physical Systems Against False Data Injection Attacks and Jamming Attacks [J].
Guan, Yanpeng ;
Ge, Xiaohua .
IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS, 2018, 4 (01) :48-59
[7]   Optimal Linear Cyber-Attack on Remote State Estimation [J].
Guo, Ziyang ;
Shi, Dawei ;
Johansson, Karl Henrik ;
Shi, Ling .
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2017, 4 (01) :4-13
[8]   Cyber-Physical Systems Security-A Survey [J].
Humayed, Abdulmalik ;
Lin, Jingqiang ;
Li, Fengjun ;
Luo, Bo .
IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (06) :1802-1831
[9]   An Intrusion Detection Method Based on Self-Generated Coding Technology for Stealthy False Data Injection Attacks in Train-Ground Communication Systems [J].
Kong, Xiang-Yu ;
Yang, Guang-Hong .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2023, 70 (08) :8468-8476
[10]  
Lee EA, 2008, ISORC 2008: 11TH IEEE SYMPOSIUM ON OBJECT/COMPONENT/SERVICE-ORIENTED REAL-TIME DISTRIBUTED COMPUTING - PROCEEDINGS, P363, DOI 10.1109/ISORC.2008.25