Secure state estimation via robust optimization for nonlinear cyber-physical systems

被引:0
作者
Chen, Lexin [1 ]
Li, Yongming [1 ]
Tong, Shaocheng [1 ]
机构
[1] Liaoning Univ Technol, Coll Sci, Jinzhou 121001, Peoples R China
基金
中国国家自然科学基金;
关键词
attack and defense strategies; cyber-physical systems; Nash equilibrium; robust optimization algorithm; sensor attacks; Wasserstein ambiguity sets; SENSOR; OBSERVERS;
D O I
10.1002/oca.3096
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article proposes secure state estimation for cyber-physical systems against sensor attacks. The attack and defense strategies are established via additional historical data, and the defender aims to reduce the estimation error maximally while the attacker aims to degrade the system performance maximally. The algorithm is implemented in the Nash equilibrium framework where the defender first designs the defense strategy and then the attacker designs corresponding attack parameters to launch attacks. Then, a robust optimization problem is formulated using Wasserstein ambiguity sets, which turn out to be equivalent to a convex program. A novel secure observer is proposed, where the attack estimation is used to mitigate attacks. Moreover, the detector is to monitor system behavior and detects the existence of sensor attacks. Finally, simulation results and comparative results illustrate the effectiveness of the defense strategy. The attack and defense strategies are established via additional historical data, and the defender aims to reduce the estimation error maximally while the attacker aims to degrade the system performance maximally.Then, a robust optimization problem is formulated in the Nash equilibrium framework using Wasserstein ambiguity sets. Then, a novel secure observer is proposed, where the attack estimation is used to mitigate attacks.image
引用
收藏
页码:1182 / 1198
页数:17
相关论文
共 24 条
[1]   Secure State Estimation Against Sparse Sensor Attacks With Adaptive Switching Mechanism [J].
An, Liwei ;
Yang, Guang-Hong .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2018, 63 (08) :2596-2603
[2]   Distributed Secure State Estimation and Control for CPSs Under Sensor Attacks [J].
Ao, Wei ;
Song, Yongduan ;
Wen, Changyun .
IEEE TRANSACTIONS ON CYBERNETICS, 2020, 50 (01) :259-269
[3]  
Bertsekas DP, 2009, CONVEX OPTIMIZATION
[4]   Observer-Based Adaptive Fuzzy Consensus Control of Nonlinear Multi-Agent Systems Encountering Deception Attacks [J].
Chen, Lexin ;
Tong, Shaocheng .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (02) :1808-1818
[5]   Neural network adaptive consensus control for nonlinear multi-agent systems encountered sensor attacks [J].
Chen, Lexin ;
Li, Yongming ;
Tong, Shaocheng .
INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE, 2023, 54 (12) :2536-2550
[6]   Robust adaptive control for nonlinear cyber-physical systems with FDI attacks via attack estimation [J].
Chen, Lexin ;
Li, Yongming ;
Tong, Shaocheng .
INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2023, 33 (15) :9299-9316
[7]   Cooperative Data-Driven Distributionally Robust Optimization [J].
Cherukuri, Ashish ;
Cortes, Jorge .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2020, 65 (10) :4400-4407
[8]   Data-driven distributionally robust optimization using the Wasserstein metric: performance guarantees and tractable reformulations [J].
Esfahani, Peyman Mohajerin ;
Kuhn, Daniel .
MATHEMATICAL PROGRAMMING, 2018, 171 (1-2) :115-166
[9]   Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks [J].
Fawzi, Hamza ;
Tabuada, Paulo ;
Diggavi, Suhas .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2014, 59 (06) :1454-1467
[10]   Worst-case stealthy innovation-based linear attack on remote state estimation [J].
Guo, Ziyang ;
Shi, Dawei ;
Johansson, Karl Henrik ;
Shi, Ling .
AUTOMATICA, 2018, 89 :117-124