Secure estimation against non-fixed channel attacks in cyber-physical systems

被引:4
作者
Zhou, Jing [1 ,2 ]
Chen, Bo [1 ,2 ,3 ]
Li, Tongxiang [1 ,2 ]
Yu, Li [1 ,2 ]
机构
[1] Zhejiang Univ Technol, Dept Automat, Hangzhou, Peoples R China
[2] Zhejiang Prov United Key Lab Embedded Syst, Hangzhou, Peoples R China
[3] Zhejiang Univ Technol, Dept Automat, Hangzhou 310023, Peoples R China
基金
中国国家自然科学基金;
关键词
cyber-physical systems; false data injection attacks; secure estimation; STATE ESTIMATION; SENSOR ATTACKS; OBSERVERS;
D O I
10.1002/rnc.6481
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article studies the secure estimation problem for cyber-physical systems (CPSs) with sparse attacks and noises. Instead of fixed attacked sensor channels, the malicious attack investigated in this work is s$$ s $$-sparse and the set of attacked sensor channels is time-varying. A novel l1$$ {l}_1 $$-minimization based on QR decomposition, rather than minimizing the row support of the attack matrix directly, is designed to reconstruct malicious attacks. Furthermore, considering that the presence of Gaussian noises may produce estimation errors, a secure conservative estimation method based on Kalman filter is proposed to estimate the consolidated signal consisting of sparse attacks and measurement noises. Moreover, it is proved that robustness of the proposed estimation algorithm can be guaranteed with the upper bound of estimation error covariance. An illustrative example is utilized to show the effectiveness of the proposed methods.
引用
收藏
页码:2496 / 2507
页数:12
相关论文
共 24 条
[1]   Distributed secure state estimation for cyber-physical systems under sensor attacks [J].
An, Liwei ;
Yang, Guang-Hong .
AUTOMATICA, 2019, 107 :526-538
[2]   Secure State Estimation Against Sparse Sensor Attacks With Adaptive Switching Mechanism [J].
An, Liwei ;
Yang, Guang-Hong .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2018, 63 (08) :2596-2603
[3]  
[Anonymous], 1979, Prentice-Hall Information and System Sciences Series
[4]  
Bouffard P., 2012, Tech. Rep. UCB/EECS-2012-241
[5]   Decoding by linear programming [J].
Candes, EJ ;
Tao, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2005, 51 (12) :4203-4215
[6]   Secure Fusion Estimation for Bandwidth Constrained Cyber-Physical Systems Under Replay Attacks [J].
Chen, Bo ;
Ho, Daniel W. C. ;
Hu, Guoqiang ;
Yu, Li .
IEEE TRANSACTIONS ON CYBERNETICS, 2018, 48 (06) :1862-1876
[7]   Secure State Estimation and Control of Cyber-Physical Systems: A Survey [J].
Ding, Derui ;
Han, Qing-Long ;
Ge, Xiaohua ;
Wang, Jun .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2021, 51 (01) :176-190
[8]   Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks [J].
Fawzi, Hamza ;
Tabuada, Paulo ;
Diggavi, Suhas .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2014, 59 (06) :1454-1467
[9]   Joint attack detection and secure state estimation of cyber-physical systems [J].
Forti, Nicola ;
Battistelli, Giorgio ;
Chisci, Luigi ;
Sinopoli, Bruno .
INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2020, 30 (11) :4303-4330
[10]   Fusion-Based FDI Attack Detection in Cyber-Physical Systems [J].
Gao, Lingjie ;
Chen, Bo ;
Yu, Li .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2020, 67 (08) :1487-1491