Sparse Actuator Attack Detection and Identification: A Data-Driven Approach

被引:17
作者
Zhao, Zhengen [1 ]
Xu, Yunsong [2 ]
Li, Yuzhe [3 ]
Zhao, Yu [4 ]
Wang, Bohui [5 ]
Wen, Guanghui [6 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Automat Engn, Nanjing 210016, Peoples R China
[2] Natl Univ Def Technol, Coll Intelligence Sci & Technol, Changsha 410073, Peoples R China
[3] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang 110004, Peoples R China
[4] Northwestern Polytech Univ, Sch Automat, Xian 710129, Peoples R China
[5] Xi An Jiao Tong Univ, Sch Cyber Sci & Engn, Xian 710129, Peoples R China
[6] Southeast Univ, Sch Math, Nanjing 211189, Peoples R China
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
Actuators; Additives; Sparse matrices; Data models; Security; Mathematical models; Dynamical systems; Actuator attacks; attack detection and identification; Cyber-physical systems; data-driven; sparse attacks; CYBER-PHYSICAL SYSTEMS; SENSOR; FRAMEWORK; OBSERVERS; CONSENSUS;
D O I
10.1109/TCYB.2023.3252570
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article aims to investigate the data-driven attack detection and identification problem for cyber-physical systems under sparse actuator attacks, by developing tools from subspace identification and compressive sensing theories. First, two sparse actuator attack models (additive and multiplicative) are formulated and the definitions of I/O sequence and data models are presented. Then, the attack detector is designed by identifying the stable kernel representation of cyber-physical systems, followed by the security analysis of data-driven attack detection. Moreover, two sparse recovery-based attack identification policies are proposed, with respect to sparse additive and multiplicative actuator attack models. These attack identification policies are realized by the convex optimization methods. Furthermore, the identifiability conditions of the presented identification algorithms are analyzed to evaluate the vulnerability of cyber-physical systems. Finally, the proposed methods are verified by the simulations on a flight vehicle system.
引用
收藏
页码:4054 / 4064
页数:11
相关论文
共 48 条
  • [1] Second-order cone programming
    Alizadeh, F
    Goldfarb, D
    [J]. MATHEMATICAL PROGRAMMING, 2003, 95 (01) : 3 - 51
  • [2] Detection of False-Data Injection Attacks in Cyber-Physical DC Microgrids
    Beg, Omar Ali
    Johnson, Taylor T.
    Davoudi, Ali
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2017, 13 (05) : 2693 - 2703
  • [3] Boyd S., 2004, CONVEX OPTIMIZATION, DOI 10.1017/CBO9780511804441
  • [4] Attack Identification for Nonlinear Systems Based on Sparse Optimization
    Braun, Sarah
    Albrecht, Sebastian
    Lucia, Sergio
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2022, 67 (12) : 6397 - 6412
  • [5] Stable signal recovery from incomplete and inaccurate measurements
    Candes, Emmanuel J.
    Romberg, Justin K.
    Tao, Terence
    [J]. COMMUNICATIONS ON PURE AND APPLIED MATHEMATICS, 2006, 59 (08) : 1207 - 1223
  • [6] A systems and control perspective of CPS security
    Dibaji, Seyed Mehran
    Pirani, Mohammad
    Flamholz, David Bezalel
    Annaswamy, Anuradha M.
    Johansson, Karl Henrik
    Chakrabortty, Aranya
    [J]. ANNUAL REVIEWS IN CONTROL, 2019, 47 : 394 - 411
  • [7] Secure State Estimation and Control of Cyber-Physical Systems: A Survey
    Ding, Derui
    Han, Qing-Long
    Ge, Xiaohua
    Wang, Jun
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2021, 51 (01): : 176 - 190
  • [8] Ding SX, 2014, ADV IND CONTROL, P1, DOI 10.1007/978-1-4471-6410-4
  • [9] Block-Sparse Signals: Uncertainty Relations and Efficient Recovery
    Eldar, Yonina C.
    Kuppinger, Patrick
    Boelcskei, Helmut
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2010, 58 (06) : 3042 - 3054
  • [10] Stuxnet and the Future of Cyber War
    Farwell, James P.
    Rohozinski, Rafal
    [J]. SURVIVAL, 2011, 53 (01) : 23 - 40