Secure State Estimation for Cyber-Physical Systems Under Sensor Attacks: A Satisfiability Modulo Theory Approach

被引:199
作者
Shoukry, Yasser [1 ]
Nuzzo, Pierluigi [2 ]
Puggelli, Alberto [3 ]
Sangiovanni-Vincentelli, Alberto L. [4 ]
Seshia, Sanjit A. [4 ]
Tabuada, Paulo [1 ]
机构
[1] Univ Calif Los Angeles, Elect Engn Dept, Los Angeles, CA 90095 USA
[2] Univ Southern Calif, Dept Elect Engn, Los Angeles, CA 90007 USA
[3] Lion Semicond Inc, Technol, San Francisco, CA 94107 USA
[4] Univ Calif Berkeley, Dept Elect Engn & Comp Sci, Berkeley, CA 94720 USA
基金
美国国家科学基金会;
关键词
Secure cyber-physical systems; secure state estimation; sensor attacks; satisfiability modulo theories;
D O I
10.1109/TAC.2017.2676679
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure state estimation is the problem of estimating the state of a dynamical system from a set of noisy and adversarially corrupted measurements. Intrinsically a combinatorial problem, secure state estimation has been traditionally addressed either by brute force search, suffering from scalability issues, or via convex relaxations, using algorithms that can terminate in polynomial time but are not necessarily sound. In this paper, we present a novel algorithm that uses a satisfiability modulo theory approach to harness the complexity of secure state estimation. We leverage results from formal methods over real numbers to provide guarantees on the soundness and completeness of our algorithm. Moreover, we discuss its scalability properties, by providing upper bounds on the runtime performance. Numerical simulations support our arguments by showing an order of magnitude decrease in execution time with respect to alternative techniques. Finally, the effectiveness of the proposed algorithm is demonstrated by applying it to the problem of controlling an unmanned ground vehicle.
引用
收藏
页码:4917 / 4932
页数:16
相关论文
共 33 条
  • [1] [Anonymous], 2015, GITH RESP
  • [2] [Anonymous], 2006, DIAGNOSIS FAULT TOLE
  • [3] [Anonymous], 2010, CVX: Matlab software for disciplined convex programming (web page and software)
  • [4] [Anonymous], 2009, HDB SATISFIABILITY
  • [5] Bai CZ, 2014, P AMER CONTR CONF, P3029, DOI 10.1109/ACC.2014.6859155
  • [6] Brown CW, 2007, ISSAC 2007: PROCEEDINGS OF THE 2007 INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND ALGEBRAIC COMPUTATION, P54
  • [7] Chang Y. H., 2015, ARXIV151203853
  • [8] Chong MS, 2015, P AMER CONTR CONF, P2439, DOI 10.1109/ACC.2015.7171098
  • [9] Collins GE, 1976, SIGSAM B, V10, P10, DOI [10.1145/1093390.1093393, DOI 10.1145/1093390.1093393]
  • [10] Doubly Robust Smoothing of Dynamical Processes via Outlier Sparsity Constraints
    Farahmand, Shahrokh
    Giannakis, Georgios B.
    Angelosante, Daniele
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2011, 59 (10) : 4529 - 4543