Optimal filter design for cyber-physical systems under stealthy hybrid attacks

被引:14
作者
Li, Yuman [1 ]
Lin, Hong [2 ]
Lam, James [1 ]
机构
[1] Univ Hong Kong, Dept Mech Engn, Pokfulam Rd, Hong Kong, Peoples R China
[2] Shenzhen Polytech, Inst Intelligence Sci & Engn, Shenzhen, Peoples R China
关键词
cyber-physical systems; optimal filter; optimal linear filter; stability; stealthy hybrid attacks; NETWORKED CONTROL-SYSTEMS; SECURE ESTIMATION; CONVERGENCE; STABILITY;
D O I
10.1002/rnc.5351
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article studies the optimal filtering problem for cyber-physical systems under stealthy hybrid cyber-attacks. Due to the stealthiness of cyber-attacks, the optimal filter (OF) consists of an exponentially increasing number of terms, which makes it computationally infeasible in practice. To address this computational issue, an optimal linear filter (OLF) is developed with its estimation performance fairly close to the optimal one. Furthermore, for a system under the stealthy hybrid cyber-attacks, it is proved that when the system is stable, the exponentially increasing number of terms remain bounded, making the OF stable; and that the OLF is stable if and only if the system is stable. Finally, numerical examples are employed to illustrate the effectiveness of the proposed two filters.
引用
收藏
页码:1340 / 1357
页数:18
相关论文
共 39 条
[1]  
[Anonymous], 2012, Optimal Filtering
[2]  
Chen B., 2017, IEEE T SYST MAN CYB, V49, P455, DOI DOI 10.1109/TSMC.2017.2697450
[3]   Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks [J].
Ding, Derui ;
Wang, Zidong ;
Ho, Daniel W. C. ;
Wei, Guoliang .
AUTOMATICA, 2017, 78 :231-240
[4]   Deception-based Sensor Scheduling for Remote Estimation under DoS Attacks [J].
Ding, Kemi ;
Ren, Xiaoqiang ;
Shi, Ling .
IFAC PAPERSONLINE, 2016, 49 (22) :169-174
[5]   ADMM-Based Distributed State Estimation of Smart Grid Under Data Deception and Denial of Service Attacks [J].
Du, Dajun ;
Li, Xue ;
Li, Wenting ;
Chen, Rui ;
Fei, Minrui ;
Wu, Lei .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2019, 49 (08) :1698-1711
[6]   Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks [J].
Fawzi, Hamza ;
Tabuada, Paulo ;
Diggavi, Suhas .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2014, 59 (06) :1454-1467
[7]   Joint attack detection and secure state estimation of cyber-physical systems [J].
Forti, Nicola ;
Battistelli, Giorgio ;
Chisci, Luigi ;
Sinopoli, Bruno .
INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2020, 30 (11) :4303-4330
[8]   Sensor attack detection for cyber-physical systems based on frequency domain partition [J].
Gu, Cao-Yuan ;
Zhu, Jun-Wei ;
Zhang, Wen-An ;
Yu, Li .
IET CONTROL THEORY AND APPLICATIONS, 2020, 14 (11) :1452-1466
[9]   Distributed Attack Detection and Secure Estimation of Networked Cyber-Physical Systems Against False Data Injection Attacks and Jamming Attacks [J].
Guan, Yanpeng ;
Ge, Xiaohua .
IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS, 2018, 4 (01) :48-59
[10]   State estimation under false data injection attacks: Security analysis and system protection [J].
Hu, Liang ;
Wang, Zidong ;
Han, Qing-Long ;
Liu, Xiaohui .
AUTOMATICA, 2018, 87 :176-183