Secure State Estimation Against Sparse Sensor Attacks With Adaptive Switching Mechanism

被引:173
作者
An, Liwei [1 ]
Yang, Guang-Hong [1 ,2 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Liaoning, Peoples R China
[2] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang 110819, Liaoning, Peoples R China
基金
中国国家自然科学基金;
关键词
Adaptive switching mechanism; cyber-physical systems (CPSs); linear matrix inequalities (LMIs); sparse sensor attacks; DENIAL-OF-SERVICE; CONTROL-SYSTEMS; OBSERVERS;
D O I
10.1109/TAC.2017.2766759
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper investigates the problem of secure state estimation for cyber-physical systems modeled by continuous or discrete-time linear systems when some sensors are corrupted by an attacker. A novel state observer is proposed with adaptive switching mechanism. Attack tolerance principle is established based on adaptively truncating the injection channels of attacks. To implement it, a switching function matrix is introduced into the observer design. Driven by a well-defined performance index, the switching function matrix automatically reaches and remains in the desired entry mode and turns off the input channels of attacks. Based on the equivalence between s-strong detectability of the observation error system and 2s-sparse detectability of the original system, the observation error system is proven to be asymptotically stable even under the cyber attacks. Compared with the existing complex static batch optimization algorithms, the proposed adaptive observer can be derived only by offline solving a set of simple linear matrix inequalities. Simulation examples are given to illustrate the estimation performance and the computational efficiency of the proposed method.
引用
收藏
页码:2596 / 2603
页数:8
相关论文
共 23 条
[1]  
Amin S, 2009, LECT NOTES COMPUT SC, V5469, P31, DOI 10.1007/978-3-642-00602-9_3
[2]  
[Anonymous], 2007, CRITICAL INFRASTRUCT
[3]   Adaptive cyber-physical system attack detection and reconstruction with application to power systems [J].
Ao, Wei ;
Song, Yongdong ;
Wen, Changyun .
IET CONTROL THEORY AND APPLICATIONS, 2016, 10 (12) :1458-1468
[4]   Decoding by linear programming [J].
Candes, EJ ;
Tao, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2005, 51 (12) :4203-4215
[5]  
Cardenas A., 2008, HOTSEC, P1
[6]  
Chong MS, 2015, P AMER CONTR CONF, P2439, DOI 10.1109/ACC.2015.7171098
[7]   Stuxnet and the Future of Cyber War [J].
Farwell, James P. ;
Rohozinski, Rafal .
SURVIVAL, 2011, 53 (01) :23-40
[8]   Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks [J].
Fawzi, Hamza ;
Tabuada, Paulo ;
Diggavi, Suhas .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2014, 59 (06) :1454-1467
[9]   Unknown Input Observer-Based Robust Fault Estimation for Systems Corrupted by Partially Decoupled Disturbances [J].
Gao, Zhiwei ;
Liu, Xiaoxu ;
Chen, Michael Z. Q. .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2016, 63 (04) :2537-2547
[10]   A NOTE ON DENIAL-OF-SERVICE IN OPERATING-SYSTEMS [J].
GLIGOR, VD .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1984, 10 (03) :320-324