Optimal filter design for cyber-physical systems under stealthy hybrid attacks

被引:14
作者
Li, Yuman [1 ]
Lin, Hong [2 ]
Lam, James [1 ]
机构
[1] Univ Hong Kong, Dept Mech Engn, Pokfulam Rd, Hong Kong, Peoples R China
[2] Shenzhen Polytech, Inst Intelligence Sci & Engn, Shenzhen, Peoples R China
关键词
cyber-physical systems; optimal filter; optimal linear filter; stability; stealthy hybrid attacks; NETWORKED CONTROL-SYSTEMS; SECURE ESTIMATION; CONVERGENCE; STABILITY;
D O I
10.1002/rnc.5351
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article studies the optimal filtering problem for cyber-physical systems under stealthy hybrid cyber-attacks. Due to the stealthiness of cyber-attacks, the optimal filter (OF) consists of an exponentially increasing number of terms, which makes it computationally infeasible in practice. To address this computational issue, an optimal linear filter (OLF) is developed with its estimation performance fairly close to the optimal one. Furthermore, for a system under the stealthy hybrid cyber-attacks, it is proved that when the system is stable, the exponentially increasing number of terms remain bounded, making the OF stable; and that the OLF is stable if and only if the system is stable. Finally, numerical examples are employed to illustrate the effectiveness of the proposed two filters.
引用
收藏
页码:1340 / 1357
页数:18
相关论文
共 39 条
[11]   Distributed fuzzy filtering for load frequency control of non-linear interconnected power systems under cyber-physical attacks [J].
Hu, Zhijian ;
Liu, Shichao ;
Yang, Liu ;
Wu, Ligang .
IET CONTROL THEORY AND APPLICATIONS, 2020, 14 (04) :527-538
[12]   False data injection attack on consensus-based distributed estimation [J].
Lei, L. ;
Yang, W. ;
Yang, C. ;
Shi, H. B. .
INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2017, 27 (09) :1419-1432
[13]   State estimation for linear systems with unknown input and random false data injection attack [J].
Li, Li ;
Yang, Huan ;
Xia, Yuanqing ;
Yang, Hongjiu .
IET CONTROL THEORY AND APPLICATIONS, 2019, 13 (06) :823-831
[14]  
Li Y., 2016, IEEE T CONTR NETWORK, V4, P632
[15]   Optimal deception attacks against remote state estimation in cyber-physical systems [J].
Li, Yi-Gang ;
Yang, Guang-Hong .
JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2020, 357 (03) :1832-1852
[16]   Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach [J].
Li, Yuzhe ;
Shi, Ling ;
Cheng, Peng ;
Chen, Jiming ;
Quevedo, Daniel E. .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2015, 60 (10) :2831-2836
[17]   State estimation over non-acknowledgment networks with Markovian packet dropouts [J].
Lin, Hong ;
Lam, James ;
Wang, Zidong ;
Lam, Hak-Keung .
AUTOMATICA, 2019, 109
[18]   Interacting Multiple Model Estimator for Networked Control Systems: Stability, Convergence, and Performance [J].
Lin, Hong ;
Lam, James ;
Chen, Michael Z. Q. ;
Shu, Zhan ;
Wu, Zheng-Guang .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2019, 64 (03) :928-943
[19]   On stability and convergence of optimal estimation for networked control systems with dual packet losses without acknowledgment [J].
Lin, Hong ;
Su, Hongye ;
Chen, Michael Z. Q. ;
Shu, Zhan ;
Lu, Renquan ;
Wu, Zheng-Guang .
AUTOMATICA, 2018, 90 :81-90
[20]   Optimal Estimation and Control for Lossy Network: Stability, Convergence, and Performance [J].
Lin, Hong ;
Su, Hongye ;
Shi, Peng ;
Shu, Zhan ;
Lu, Renquan ;
Wu, Zheng-Guang .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2017, 62 (09) :4564-4579