How to Secure Distributed Filters Under Sensor Attacks

被引:30
作者
He, Xingkang [1 ,2 ]
Ren, Xiaoqiang [3 ]
Sandberg, Henrik [1 ,2 ]
Johansson, Karl Henrik [1 ,2 ]
机构
[1] KTH Royal Inst Technol, Sch Elect Engn & Comp Sci, Div Decis & Control Syst, S-11428 Stockholm, Sweden
[2] KTH Royal Inst Technol, Digital Futures, S-11428 Stockholm, Sweden
[3] Shanghai Univ, Sch Mechatron Engn & Automat, Shanghai 200444, Peoples R China
基金
瑞典研究理事会; 国家重点研发计划;
关键词
Detectors; Estimation error; Technological innovation; Observers; Robustness; Observability; Upper bound; Attack detection; distributed state estimation; false-data injection attack; sensor attacks; CYBER-PHYSICAL SYSTEMS; STATE ESTIMATION;
D O I
10.1109/TAC.2021.3092603
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, we study how to secure distributed filters for linear time-invariant systems with bounded noise under false-data injection attacks. A malicious attacker is able to arbitrarily manipulate the observations for a time-varying and unknown subset of the sensors. We first propose a recursive distributed filter consisting of two steps at each update. The first step employs a saturation-like scheme, which gives a small gain if the innovation is large corresponding to a potential attack. The second step is a consensus operation of state estimates among neighboring sensors. We prove the estimation error is upper bounded if the filter parameters satisfy a condition. We further analyze the feasibility of the condition and connect it to sparse observability in the centralized case. When the attacked sensor set is known to be time-invariant, the secured filter is modified by adding an online local attack detector. The detector is able to identify the attacked sensors whose observation innovations are larger than the detection thresholds. Also, with more attacked sensors being detected, the thresholds will adaptively adjust to reduce the space of the stealthy attack signals. The resilience of the secured filter with detection is verified by an explicit relationship between the upper bound of the estimation error and the number of detected attacked sensors. Moreover, for the noise-free case, we prove that the state estimate of each sensor asymptotically converges to the system state under certain conditions. Numerical simulations are provided to illustrate the developed results.
引用
收藏
页码:2843 / 2856
页数:14
相关论文
共 33 条
[1]   Distributed secure state estimation for cyber-physical systems under sensor attacks [J].
An, Liwei ;
Yang, Guang-Hong .
AUTOMATICA, 2019, 107 :526-538
[2]   Consensus-Based Linear and Nonlinear Filtering [J].
Battistelli, G. ;
Chisci, L. ;
Mugnai, G. ;
Farina, A. ;
Graziano, A. .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2015, 60 (05) :1410-1415
[3]  
Blanchard P, 2017, ADV NEUR IN, V30
[4]  
Boem F, 2017, IEEE DECIS CONTR P, DOI 10.1109/CDC.2017.8264562
[5]   Distributed Dimensionality Reduction Fusion Estimation for Cyber-Physical Systems Under DoS Attacks [J].
Chen, Bo ;
Ho, Daniel W. C. ;
Zhang, Wen-An ;
Yu, Li .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2019, 49 (02) :455-468
[6]   Resilient Distributed Estimation: Sensor Attacks [J].
Chen, Yuan ;
Kar, Soummya ;
Moura, Jose M. F. .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2019, 64 (09) :3772-3779
[7]   Resilient Distributed Parameter Estimation With Heterogeneous Data [J].
Chen, Yuan ;
Kar, Soummya ;
Moura, Jose M. E. .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2019, 67 (19) :4918-4933
[8]  
Chong MS, 2015, P AMER CONTR CONF, P2439, DOI 10.1109/ACC.2015.7171098
[9]   Detection and mitigation of biasing attacks on distributed estimation networks [J].
Deghat, Mohammad ;
Ugrinovskii, Valery ;
Shames, Iman ;
Langbort, Cedric .
AUTOMATICA, 2019, 99 :369-381
[10]   Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks [J].
Fawzi, Hamza ;
Tabuada, Paulo ;
Diggavi, Suhas .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2014, 59 (06) :1454-1467