Convex Optimization Based State Estimation Against Sparse Integrity Attacks

被引:27
作者
Han, Duo [1 ]
Mo, Yilin [2 ,3 ]
Xie, Lihua [1 ]
机构
[1] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore
[2] Tsinghua Univ, Dept Automat, Beijing 100084, Peoples R China
[3] Tsinghua Univ, BNRist, Beijing 100084, Peoples R China
基金
新加坡国家研究基金会;
关键词
Cyber physical systems; estimation; optimization; security; SYSTEMS;
D O I
10.1109/TAC.2019.2891458
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider the problem of resilient state estimation in the presence of integrity attacks. There are m sensors monitoring the state and p of them are under attack. The sensory data collected by the compromised sensors can be manipulated arbitrarily by the attacker. The classical estimators, such as the least squares estimator, may not provide a reliable estimate under the so-called (p, m)-sparse attack. In this paper, we are not restricting our efforts to studying whether any specific estimator is resilient to the attack or not, but instead we aim to present some generic sufficient and necessary conditions for resilience by considering a general class of convex optimization based estimators. The sufficient and necessary conditions are shown to be tight, with a trivial gap. We further specialize our result to the scalar sensor measurements case and extend our framework to incorporate estimators with correlated cost function optimization. Experimental results tested on the IEEE 14-bus test system validate the theoretical analysis.
引用
收藏
页码:2383 / 2395
页数:13
相关论文
共 36 条
[1]  
Abdulkafi A. A., 2012, 2012 International Conference on Future Communication Networks (ICFCN), P1, DOI 10.1109/ICFCN.2012.6206866
[2]  
[Anonymous], 2018, Robust Statistics: Theory and Methods (with R)
[3]  
[Anonymous], 2009, Wiley Series in Probability and Statistics, DOI DOI 10.1002/9780470434697.CH7
[4]  
Ardenas A., 2008, Proceedings of the 3rd conference on Hot topics in security, San Jose, CA, P1
[5]   Stuxnet, the Real Start of Cyber Warfare? [J].
Chen, Thomas M. .
IEEE NETWORK, 2010, 24 (06) :2-3
[6]  
Christie R., 2018, UW POWER SYSTEMS TES
[7]  
Donoho D, 1983, FESTSCHRIFT EL LEHMA, P157
[8]  
Eldar Yonina C, 2012, Compressed Sensing: Theory and Applications
[9]   Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks [J].
Fawzi, Hamza ;
Tabuada, Paulo ;
Diggavi, Suhas .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2014, 59 (06) :1454-1467
[10]   Was Stuxnet an Act of War? Decoding a Cyberattack [J].
Fidler, David P. .
IEEE SECURITY & PRIVACY, 2011, 9 (04) :56-59