Resilient and secure remote monitoring for a class of cyber-physical systems against attacks

被引:64
作者
Ge, Xiaohua [1 ]
Han, Qing-Long [1 ]
Zhang, Xian-Ming [1 ]
Ding, Derui [1 ]
Yang, Fuwen [2 ]
机构
[1] Swinburne Univ Technol, Sch Software & Elect Engn, Melbourne, Vic 3122, Australia
[2] Griffith Univ, Griffith Sch Engn & Built Environm, Gold Coast, NSW 4222, Australia
基金
澳大利亚研究理事会;
关键词
Cyber-physical system; Resilient monitoring; Attack detection; Ellipsoidal estimation; Water supply distribution system; False data injection attack; Covert attack; GUARANTEED STATE ESTIMATION; NETWORKED CONTROL-SYSTEMS; DESIGN;
D O I
10.1016/j.ins.2019.10.057
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper is concerned with the resilient and secure remote monitoring of a cyber-physical system of a discrete time-varying state-space form against attacks. The specific statistical characteristic, magnitude, occurring place and time of the attack signals are not required during the monitor design and attack detection procedures. First, an optimal ellipsoidal state prediction and estimation method is delicately developed in such a way that the recursively computed prediction ellipsoid and estimate ellipsoid can both guarantee the containment of the true system state at each time step regardless of the unknown but bounded input signal. It is expected that the two ellipsoids can resist certain attacks as the calculated state prediction and state estimate are sets in state-space rather than single pointwise vectors, thus potentially enhancing the resilience of the remote monitoring system. Second, a set-based evaluation mechanism in combination with a remedy measure are proposed to provide timely detection of certain attacks. Furthermore, a numerically efficient algorithm is established to achieve resilience and attack detection of the remote monitoring system. Finally, it is shown through several case studies on a water supply distribution system that the proposed methods can provide quantitative analysis and evaluation of the potential consequences of various attacks on the remote monitoring system. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页码:1592 / 1605
页数:14
相关论文
共 43 条
[1]   Guaranteed state estimation by zonotopes [J].
Alamo, T ;
Bravo, JM ;
Camacho, EF .
AUTOMATICA, 2005, 41 (06) :1035-1043
[2]  
[Anonymous], P 2013 AM CONTR C WA
[3]  
[Anonymous], HACKER 2O ATTACK CIT
[4]  
[Anonymous], 2016, Analysis of the Cyber Attack on the Ukrainian Power Grid
[5]   Reliable localization using set-valued nonlinear filters [J].
Calafiore, G .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2005, 35 (02) :189-197
[6]  
Cardenas Alvaro A., 2008, 2008 28th International Conference on Distributed Computing Systems Workshops (ICDCS Workshops), P495, DOI 10.1109/ICDCS.Workshops.2008.40
[7]   Recursive state bounding by parallelotopes [J].
Chisci, L ;
Garulli, A ;
Zappa, G .
AUTOMATICA, 1996, 32 (07) :1049-1055
[8]  
De Persis C., 2014, IFAC P, P134, DOI DOI 10.3182/20140824-6-ZA-1003.02184
[9]   A Survey on Model-Based Distributed Control and Filtering for Industrial Cyber-Physical Systems [J].
Ding, Derui ;
Han, Qing-Long ;
Wang, Zidong ;
Ge, Xiaohua .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (05) :2483-2499
[10]   Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks [J].
Ding, Derui ;
Wang, Zidong ;
Ho, Daniel W. C. ;
Wei, Guoliang .
AUTOMATICA, 2017, 78 :231-240