Attack-Resilient State Estimation for Noisy Dynamical Systems

被引:145
作者
Pajic, Miroslav [1 ]
Lee, Insup [2 ]
Pappas, George J. [3 ]
机构
[1] Duke Univ, Dept Elect & Comp Engn, Durham, NC 27708 USA
[2] Univ Penn, Dept Comp & Informat Sci, Philadelphia, PA 19014 USA
[3] Univ Pennsylvania, Dept Elect & Syst Engn, Philadelphia, PA 19014 USA
来源
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS | 2017年 / 4卷 / 01期
基金
美国国家科学基金会;
关键词
Attack-resilient state estimation; robustness of state estimators; cyberphysical systems security; linear systems; CYBER-PHYSICAL SYSTEMS; SPARSE SIGNALS; RECOVERY; STUXNET;
D O I
10.1109/TCNS.2016.2607420
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Several recent incidents have clearly illustrated the susceptibility of cyberphysical systems (CPS) to attacks, raising attention to security challenges in these systems. The tight interaction between information technology and the physical world has introduced new vulnerabilities that cannot be addressed with the use of standard cryptographic security techniques. Accordingly, the problem of state estimation in the presence of sensor and actuator attacks has attracted significant attention in the past. Unlike the existing work, in this paper, we consider the problem of attack-resilient state estimation in the presence of bounded-size noise. We focus on the most general model for sensor attacks where any signal can be injected via compromised sensors. Specifically, we present an l(0) -based state estimator that can be formulated as a mixed-integer linear program and its convex relaxation based on the l(1) norm. For both attack-resilient state estimators, we derive rigorous analytic bounds on the state-estimation errors caused by the presence of noise. Our analysis shows that the worst-case error is linear with the size of the noise and, thus, the attacker cannot exploit the noise to introduce unbounded state-estimation errors. Finally, we show how the l(0) and l(1) -based attack-resilient state estimators can be used for sound attack detection and identification; we provide conditions on the size of attack vectors that ensure correct identification of compromised sensors.
引用
收藏
页码:82 / 92
页数:11
相关论文
共 32 条
[1]  
[Anonymous], 2011, CHRISTIAN SCI MONITO
[2]  
Ardenas A., 2008, Proceedings of the 3rd conference on Hot topics in security, San Jose, CA, P1
[3]   Lessons from Stuxnet [J].
Chen, Thomas M. ;
Abu-Nimeh, Saeed .
COMPUTER, 2011, 44 (04) :91-93
[4]   Stable recovery of sparse overcomplete representations in the presence of noise [J].
Donoho, DL ;
Elad, M ;
Temlyakov, VN .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2006, 52 (01) :6-18
[5]  
Eldar Y C., 2012, COMPRESSED SENSING T, DOI [DOI 10.1017/CBO9780511794308.002, 10.1017/CBO9780511794308, DOI 10.1017/CBO9780511794308]
[6]   Block-Sparse Signals: Uncertainty Relations and Efficient Recovery [J].
Eldar, Yonina C. ;
Kuppinger, Patrick ;
Boelcskei, Helmut .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2010, 58 (06) :3042-3054
[7]   Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks [J].
Fawzi, Hamza ;
Tabuada, Paulo ;
Diggavi, Suhas .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2014, 59 (06) :1454-1467
[8]   Corrupted Sensing: Novel Guarantees for Separating Structured Signals [J].
Foygel, Rina ;
Mackey, Lester .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2014, 60 (02) :1223-1259
[9]  
Greenberg A, 2015, WIRED
[10]   Experimental Security Analysis of a Modern Automobile [J].
Koscher, Karl ;
Czeskis, Alexei ;
Roesner, Franziska ;
Patel, Shwetak ;
Kohno, Tadayoshi ;
Checkoway, Stephen ;
Mccoy, Damon ;
Kantor, Brian ;
Anderson, Danny ;
Shacham, Hovav ;
Savage, Stefan .
2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, :447-462