A Novel Attack Detection for Linear Systems With Unknown-But-Bounded Noises

被引:12
作者
Liu, Hao [1 ]
Wang, Shaodong [1 ]
Niu, Ben [2 ]
Li, Yuzhe [3 ]
机构
[1] Shenyang Aerosp Univ, Sch Automat, Shenyang 110136, Peoples R China
[2] Shandong Normal Univ, Sch Informat Sci & Engn, Jinan 250014, Peoples R China
[3] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang 110004, Peoples R China
来源
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS | 2022年 / 52卷 / 07期
基金
中国国家自然科学基金;
关键词
Symmetric matrices; State estimation; System performance; Stochastic processes; Security; Optimization; Noise measurement; Linear parameter-varying (LPV) systems; state estimation; unknown-but-bounded (UBB) noises; GUARANTEED STATE ESTIMATION; ZONOTOPES;
D O I
10.1109/TSMC.2021.3090150
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article proposes a novel attack detection approach based on zonotopes for linear parameter-varying (LPV) systems with unknown-but-bounded (UBB) noises. The following three types of attacks are considered: 1) denial-of-service (DoS) attacks; 2) replay attacks (RAs); and 3) false-data-injection (FDI) attacks. In order to reduce the conservativeness, a free-weighting matrix is introduced, which can be computed by solving an optimization problem. Moreover, the radius of the intersection zonotope can be guaranteed to be limited as well. Furthermore, it is not necessary to acquire the knowledge about the specific type of attack in advance. Finally, a numerical example is given to illustrate the validity of the given method.
引用
收藏
页码:4223 / 4232
页数:10
相关论文
共 25 条
[1]   Guaranteed state estimation by zonotopes [J].
Alamo, T ;
Bravo, JM ;
Camacho, EF .
AUTOMATICA, 2005, 41 (06) :1035-1043
[2]   Cyber-physical systems and their security issues [J].
Alguliyev, Rasim ;
Imamverdiyev, Yadigar ;
Sukhostat, Lyudmila .
COMPUTERS IN INDUSTRY, 2018, 100 :212-223
[3]  
Ben-Israel A., 1974, GEN INVERSES THEORY
[4]   Recursive state bounding by parallelotopes [J].
Chisci, L ;
Garulli, A ;
Zappa, G .
AUTOMATICA, 1996, 32 (07) :1049-1055
[5]  
Combastel C., 2003, 2003 European control conference (ECC), P2589, DOI DOI 10.23919/ECC.2003.7085991
[6]   Zonotopes and Kalman observers: Gain optimality under distinct uncertainty paradigms and robust convergence [J].
Combastel, Christophe .
AUTOMATICA, 2015, 55 :265-273
[7]   A survey on security control and attack detection for industrial cyber-physical systems [J].
Ding, Derui ;
Han, Qing-Long ;
Xiang, Yang ;
Ge, Xiaohua ;
Zhang, Xian-Ming .
NEUROCOMPUTING, 2018, 275 :1674-1683
[8]   Stuxnet and the Future of Cyber War [J].
Farwell, James P. ;
Rohozinski, Rafal .
SURVIVAL, 2011, 53 (01) :23-40
[9]   State estimation under false data injection attacks: Security analysis and system protection [J].
Hu, Liang ;
Wang, Zidong ;
Han, Qing-Long ;
Liu, Xiaohui .
AUTOMATICA, 2018, 87 :176-183
[10]   Statistical Approach to Detection of Attacks for Stochastic Cyber-Physical Systems [J].
Marelli, Damian ;
Sui, Tianju ;
Fu, Minyue ;
Lu, Renquan .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (02) :849-856