Lasso-based state estimation for cyber-physical systems under sensor attacks

被引:0
作者
Cerone, V. [1 ]
Fosson, S. M. [1 ]
Regruto, D. [1 ]
Ripa, F. [1 ]
机构
[1] Politecn Torino, Dept Control & Comp Engn, Turin, Italy
关键词
Cyber-physical systems; sensor attacks; secure state estimation; sparse optimization; Lasso; Luenberger-like observers; THRESHOLDING ALGORITHM; SPARSE REPRESENTATIONS; SHRINKAGE; SELECTION;
D O I
10.1016/j.ifacol.2024.08.522
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The development of algorithms for secure state estimation in vulnerable cyber-physical systems has been gaining attention in the last years. A consolidated assumption is that an adversary can tamper a relatively small number of sensors. In the literature, block-sparsity methods exploit this prior information to recover the attack locations and the state of the system. In this paper, we propose an alternative, Lasso-based approach and we analyse its effectiveness. In particular, we theoretically derive conditions that guarantee successful attack/state recovery, independently of established time sparsity patterns. Furthermore, we develop a sparse state observer, by starting from the iterative soft thresholding algorithm for Lasso, to perform online estimation. Through several numerical experiments, we compare the proposed methods to the state-of-the-art algorithms. Copyright (c) 2024 The Authors.
引用
收藏
页码:163 / 168
页数:6
相关论文
共 22 条
[1]   A Fast Iterative Shrinkage-Thresholding Algorithm for Linear Inverse Problems [J].
Beck, Amir ;
Teboulle, Marc .
SIAM JOURNAL ON IMAGING SCIENCES, 2009, 2 (01) :183-202
[2]  
Cerone V., 2020, 2020 59th IEEE Conference on Decision and Control (CDC), P396, DOI 10.1109/CDC42340.2020.9304508
[3]   Fast sparse optimization via adaptive shrinkage [J].
Cerone, Vito ;
Fosson, Sophie M. ;
Regruto, Diego .
IFAC PAPERSONLINE, 2023, 56 (02) :10390-10395
[4]   An iterative thresholding algorithm for linear inverse problems with a sparsity constraint [J].
Daubechies, I ;
Defrise, M ;
De Mol, C .
COMMUNICATIONS ON PURE AND APPLIED MATHEMATICS, 2004, 57 (11) :1413-1457
[5]   Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks [J].
Fawzi, Hamza ;
Tabuada, Paulo ;
Diggavi, Suhas .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2014, 59 (06) :1454-1467
[6]  
Foucart S., 2013, ser. Applied and Numerical Harmonic Analysis, DOI DOI 10.1007/978-0-8176-4948-7
[7]   Recovery of exact sparse representations in the presence of bounded noise [J].
Fuchs, JJ .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2005, 51 (10) :3601-3608
[8]   On sparse representations in arbitrary redundant bases [J].
Fuchs, JJ .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2004, 50 (06) :1341-1344
[9]  
Hastie T., 2015, Statistical learning with sparsity, V143, P143, DOI [10.1201/b18401, DOI 10.1201/B18401]
[10]  
Imhotep-SMT, 2015, GitHub repository