Distributed Asymptotic Secure Estimation for Cyber-Physical Systems Under Stealthy Attacks: An Interval Observer-Based Method

被引:0
作者
Li, Zhi-Hui [1 ]
Yang, Guang-Hong [2 ,3 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Peoples R China
[2] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Liaoning, Peoples R China
[3] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang 110819, Liaoning, Peoples R China
基金
中国国家自然科学基金;
关键词
Observers; Vectors; Nickel; Internet of Things; Cyber-physical systems; Training; Switches; Security; Performance evaluation; Lower bound; Cyber-physical systems (CPSs); distributed asymptotic estimation; interval observer; stealthy attacks; STATE ESTIMATION; DESIGN;
D O I
10.1109/JIOT.2025.3553545
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article focuses on the problem of distributed asymptotic secure estimation for cyber-physical systems (CPSs) under stealthy attacks and unknown but bounded process disturbance. First, interval observers based on two-point observers are constructed to produce upper and lower bounds for the attacks. Then, augmented systems with a resort to auxiliary variables are introduced, and algebraic relationships among augmented states, disturbance and attacks are obtained by interval estimations of the augmented system outputs. Further, from the algebraic relationships, distributed secure estimation, including distributed state estimation and stealthy attack reconstruction, is designed and achieves omniscience asymptotically. Compared with the existing results, a novel interval observer-based distributed estimation approach is proposed, which can realize simultaneous state estimation and attack reconstruction. Finally, a simulation example is presented to illustrate the effectiveness of the proposed distributed estimation strategy.
引用
收藏
页码:23627 / 23635
页数:9
相关论文
共 29 条
[21]   Centralized and Distributed Robust State Estimation Over Sensor Networks Using Elliptical Distribution [J].
Wang, Guoqing ;
Yang, Chunyu ;
Ma, Lei ;
Dai, Wei .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (21) :21825-21837
[22]   Actuator fault estimation observer design for discrete-time linear parameter-varying descriptor systems [J].
Wang, Zhenhua ;
Rodrigues, Mickael ;
Theilliol, Didier ;
Shen, Yi .
INTERNATIONAL JOURNAL OF ADAPTIVE CONTROL AND SIGNAL PROCESSING, 2015, 29 (02) :242-258
[23]   Distributed interval state estimation with l8-gain optimization for cyber-physical systems subject to bounded disturbance and random stealthy attacks [J].
Xie, Jiyang ;
Zhu, Shuqian ;
Zhang, Dawei .
ISA TRANSACTIONS, 2022, 127 :22-31
[24]   Attack Detection for Securing Cyber Physical Systems [J].
Yan, Weizhong ;
Mestha, Lalit K. ;
Abbaszadeh, Masoud .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) :8471-8481
[25]   Adversarial examples for replay attacks against CNN-based face recognition with anti-spoofing capability [J].
Zhang, Bowen ;
Tondi, Benedetta ;
Barni, Mauro .
COMPUTER VISION AND IMAGE UNDERSTANDING, 2020, 197
[26]   Reachability Analysis of Cyber-Physical Systems Under Stealthy Attacks [J].
Zhang, Qirui ;
Liu, Kun ;
Pang, Zhonghua ;
Xia, Yuanqing ;
Liu, Tao .
IEEE TRANSACTIONS ON CYBERNETICS, 2022, 52 (06) :4926-4934
[27]   False data injection attacks with complete stealthiness in cyber-physical systems: A self-generated approach [J].
Zhang, Tian-Yu ;
Ye, Dan .
AUTOMATICA, 2020, 120
[28]   Secure state estimation and attack reconstruction for cyber-physical system with intermediate and robust observer [J].
Zheng, Xiaoyi ;
Zhu, Zhen ;
Lu, Yan .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (05)
[29]   Asymptotic convergence unknown input observer design via interval observer [J].
Zhu, Fanglai ;
Fu, Yuhang ;
Dinh, Thach Ngoc .
AUTOMATICA, 2023, 147