State Estimation Under Sparse Sensor Attacks: A Constrained Set Partitioning Approach

被引:26
作者
An, Liwei [1 ]
Yang, Guang-Hong [1 ,2 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Liaoning, Peoples R China
[2] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang 110819, Liaoning, Peoples R China
基金
中国国家自然科学基金;
关键词
Cyber-physical systems (CPSs); linear matrix inequality (LMI); set partitioning; sparse attack; state estimation; CYBER-PHYSICAL SYSTEMS;
D O I
10.1109/TAC.2018.2885063
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
State estimation from the sparsely corrupted measurements, a combinatorial problem, has been addressed by brute force search or convex relaxations in the literature. However, the computational efficiency and estimation correctness of these methods cannot be simultaneously guaranteed. This paper studies how to relieve the computational complexity on the premise of the estimation correctness. A novel algorithm based on a constrained set partitioning approach is presented. The computational efforts are alleviated by drastically reducing the search space, and the estimation correctness is guaranteed in terms of the existence of a solution for a set of linear matrix inequalities. The theoretical results are substantiated by simulating two numerical examples.
引用
收藏
页码:3861 / 3868
页数:8
相关论文
共 21 条
[1]   Secure State Estimation Against Sparse Sensor Attacks With Adaptive Switching Mechanism [J].
An, Liwei ;
Yang, Guang-Hong .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2018, 63 (08) :2596-2603
[2]  
[Anonymous], 1998, HDB COMBINATORIAL OP, DOI DOI 10.1007/978-1-4613-0303-9
[3]  
Chang Y. H., 2015, ARXIV151203853
[4]   Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems [J].
Chen, Yuan ;
Kar, Soummya ;
Moura, Jose M. F. .
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2018, 5 (03) :1157-1168
[5]  
Chong MS, 2015, P AMER CONTR CONF, P2439, DOI 10.1109/ACC.2015.7171098
[6]   Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks [J].
Fawzi, Hamza ;
Tabuada, Paulo ;
Diggavi, Suhas .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2014, 59 (06) :1454-1467
[7]   Stability and stabilization of continuous-time switched linear systems [J].
Geromel, Jose C. ;
Colaneri, Patrizio .
SIAM JOURNAL ON CONTROL AND OPTIMIZATION, 2006, 45 (05) :1915-1930
[8]   Optimal Linear Cyber-Attack on Remote State Estimation [J].
Guo, Ziyang ;
Shi, Dawei ;
Johansson, Karl Henrik ;
Shi, Ling .
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2017, 4 (01) :4-13
[9]   On Redundant Observability: From Security Index to Attack Detection and Resilient State Estimation [J].
Lee, Chanhwa ;
Shim, Hyungbo ;
Eun, Yongsoon .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2019, 64 (02) :775-782
[10]   A new modeling and solution approach for the set-partitioning problem [J].
Lewis, Mark ;
Kochenberger, Gary ;
Alidaee, Bahram .
COMPUTERS & OPERATIONS RESEARCH, 2008, 35 (03) :807-813