Research on Secure State Estimation and Recovery Control for CPS under Stealthy Attacks

被引:0
作者
Yang, Biao [1 ]
Xin, Liang [1 ]
Long, Zhiqiang [1 ]
机构
[1] Natl Univ Def Technol, Coll Intelligence Sci & Technol, Changsha 410073, Peoples R China
基金
中国国家自然科学基金;
关键词
cyber-physical systems (CPSs); secure state estimation; recovery control; stealthy attacks; improved Kalman filter; internal model control (IMC); CYBER-PHYSICAL SYSTEMS; ACTUATOR;
D O I
10.3390/act12110427
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
As the application of cyber-physical systems (CPSs) becomes more and more widespread, its security is becoming a focus of attention. Currently, there has been much research on the security defense of the physical layer of the CPS. However, most of the research only focuses on one of the aspects, for example, attack detection, security state estimation, or recovery control. Obviously, the effectiveness of security defense targeting only one aspect is limited. Therefore, in this paper, a set of security defense processes is proposed for the case that a CPS containing multiple sensors is subject to three kinds of stealthy attacks (i.e., zero-dynamics attack, covert attack, and replay attack). Firstly, the existing attack detection method based on improved residuals is used to detect stealthy attacks. Secondly, based on the detection results, an optimal state estimation method based on improved Kalman filtering is proposed to estimate the actual state of the system. Then, based on the optimal state, internal model control (IMC) is introduced to complete the recovery control of the system. Finally, the proposed methods are integrated to give a complete security defense process, and the simulation is verified for three kinds of stealthy attacks. The simulation results show that the proposed methods are effective.
引用
收藏
页数:17
相关论文
共 50 条
[41]   Secure state estimation with disturbance rejection against switched sparse sensor attacks [J].
Sun, Qingdong ;
Yang, Guang-Hong ;
Dimirovski, Georgi Marko .
INFORMATION SCIENCES, 2024, 675
[42]   Secure state estimation for systems under mixed cyber-attacks: Security and performance analysis [J].
Lin, Hong ;
Lam, James ;
Wang, Zheng .
INFORMATION SCIENCES, 2021, 546 :943-960
[43]   Privacy-preserving secure state estimation of unmanned surface vessels under joint attacks [J].
Liu, Jin-Ming ;
Liu, Li ;
Hu, Xin ;
Zhang, Shu-Ning ;
Li, Yi-Hao ;
Wang, Zeng-Feng .
Kongzhi yu Juece/Control and Decision, 2025, 40 (07) :2326-2336
[44]   Optimal stealthy integrity attacks on remote state estimation: The maximum utilization of historical data [J].
Shang, Jun ;
Chen, Tongwen .
AUTOMATICA, 2021, 128
[45]   Secure state estimation for cyber-physical systems under sparse data injection attacks: a switched counteraction approach [J].
Ma, Renjie ;
Shi, Peng .
INTERNATIONAL JOURNAL OF CONTROL, 2022, 95 (04) :963-974
[46]   Stealthy switching attacks on sensors against state estimation in cyber-physical systems [J].
Huo, Jian-Ru ;
Li, Xiao-Jian .
INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2023, 33 (02) :1169-1183
[47]   Control Barrier Functions for Safe CPS Under Sensor Faults and Attacks [J].
Clark, Andrew ;
Li, Zhouchi ;
Zhang, Hongchao .
2020 59TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2020, :796-803
[48]   Distributed Adaptive State Estimation for CPSs Under Deception Attacks [J].
Liu, Yan ;
Yin, Tao ;
Fan, Sha ;
Deng, Chao ;
Zheng, Bo-Chao ;
Lin, Peng .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2025,
[49]   Clustering-based detection algorithm of remote state estimation under stealthy innovation-based attacks with historical data [J].
Chen, Shan ;
Ni, Yuqing ;
Huang, Lingying ;
Luan, Xiaoli ;
Liu, Fei .
NEUROCOMPUTING, 2025, 616
[50]   Distributed Secure State Estimation for Cyber-Physical Systems Under False Data Injection Attacks [J].
Zhang, Xin-Yu ;
Yang, Guang-Hong .
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (05) :4443-4455