Reach Set-based Attack Resilient State Estimation against Omniscient Adversaries

被引:0
作者
Shinohara, Takumi [1 ]
Namerikawa, Toni [1 ]
机构
[1] Keio Univ, Dept Syst Design Engn, Kohoku Ku, 3-14-1 Hiyoshi, Yokohama, Kanagawa 2238522, Japan
来源
2018 ANNUAL AMERICAN CONTROL CONFERENCE (ACC) | 2018年
关键词
CYBER-PHYSICAL SYSTEMS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider the problem of secure state estimation in an adversarial environment with the presence of bounded noises. We assume the adversary has the knowledge of the healthy measurements and system parameters. To countervail the dangerous attacker, the problem is given as a min-max optimization, that is, the system operator seeks an estimator which minimizes the worst-case estimation error due to the manipulation by the attacker. On the proposed estimator, the estimation error is bounded at all times even if the system removing an arbitrary set of 2l sensors is not observable, where l is the number of the compromised sensors. To this end, taking the reach set of the system into account, we first show the feasible set of the state can be represented as a union of polytopes, and the optimal estimate is given as the Chebyshev center of the union. Then, for calculating the optimal state estimate, we provide a convex optimization problem that utilizes the vertices of the union. Additionally, the upper bound of the worst-case estimation error is derived theoretically, and we also show a rigorous analytical bound under a certain condition. The attacked sensor identification algorithm is further provided. A simple numerical example finally shows to illustrate the effectiveness of the proposed estimator.
引用
收藏
页码:5813 / 5818
页数:6
相关论文
共 25 条
  • [1] AMIR D, 1978, PAC J MATH, V77, P1
  • [2] [Anonymous], 2008, LECT NOTES CONTROL I
  • [3] [Anonymous], 2017, CVX MATLAB SOFTWARE
  • [4] Set invariance in control
    Blanchini, F
    [J]. AUTOMATICA, 1999, 35 (11) : 1747 - 1767
  • [5] Boyd L., 2004, CONVEX OPTIMIZATION
  • [6] Chong MS, 2015, P AMER CONTR CONF, P2439, DOI 10.1109/ACC.2015.7171098
  • [7] Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks
    Fawzi, Hamza
    Tabuada, Paulo
    Diggavi, Suhas
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2014, 59 (06) : 1454 - 1467
  • [8] Herceg M, 2013, 2013 EUROPEAN CONTROL CONFERENCE (ECC), P502
  • [9] Kerrigan E., 2000, THESIS
  • [10] Cyber-Physical Systems: A Perspective at the Centennial
    Kim, Kyoung-Dae
    Kumar, P. R.
    [J]. PROCEEDINGS OF THE IEEE, 2012, 100 : 1287 - 1308