Resilient Reinforcement in Secure State Estimation Against Sensor Attacks With A Priori Information

被引:33
作者
Shinohara, Takumi [1 ]
Namerikawa, Toru [1 ]
Qu, Zhihua [2 ]
机构
[1] Keio Univ, Dept Syt Design Engn, Yokohama, Kanagawa 2238522, Japan
[2] Univ Cent Florida, Dept Elect & Comp Engn, Orlando, FL 32816 USA
关键词
Secure state estimation; sensor attacks; system security; CYBER-PHYSICAL SYSTEMS; RECOVERY; DESIGN;
D O I
10.1109/TAC.2019.2904438
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent control systems severe depend on information technology infrastructures, especially the Internet of things (IoT) devices, which create many opportunities for the interaction between the physical world and cyberspace. Due to the tight connection, however, cyber attacks have the potential to generate evil consequences for the physical entities, and therefore, securing control systems is a vital issue to be addressed for building smart societies. To this end, this paper especially deals with the state estimation problem in the presence of malicious sensor attacks. Unlike the existing work, in this paper, we consider the problem with a priori information of the state to be estimated. Specifically, we address three prior knowledge-the sparsity information, $ (\alpha, \bar{n}_0)$-sparsity information, and side information, and in each scenario, we show that the state can be reconstructed even if more sensors are compromised. This implies that the prior information reinforces the system resilience against malicious sensor attacks. Then, an estimator under sensor attacks considering the information is developed and, under a certain condition, the estimator can be relaxed into a tractable convex optimization problem. Further, we extend this analysis to systems in the presence of measurement noises, and it is shown that the prior information reduces the state-estimation error caused by the noise. The numerical simulations in a diffusion process finally illustrate the reinforcement and error-reduction results with the information.
引用
收藏
页码:5024 / 5038
页数:15
相关论文
共 46 条
[1]  
[Anonymous], 2009, P WORKSH FUT DIR CYB
[2]   Decoding by linear programming [J].
Candes, EJ ;
Tao, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2005, 51 (12) :4203-4215
[3]   Dynamic Attack Detection in Cyber-Physical Systems With Side Initial State Information [J].
Chen, Yuan ;
Kar, Soummya ;
Moura, Jose M. F. .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2017, 62 (09) :4618-4624
[4]  
Chong MS, 2015, P AMER CONTR CONF, P2439, DOI 10.1109/ACC.2015.7171098
[5]  
Crank J., 1979, The Mathematics of Diffusion
[6]   Stable recovery of sparse overcomplete representations in the presence of noise [J].
Donoho, DL ;
Elad, M ;
Temlyakov, VN .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2006, 52 (01) :6-18
[7]   Optimally sparse representation in general (nonorthogonal) dictionaries via l1 minimization [J].
Donoho, DL ;
Elad, M .
PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA, 2003, 100 (05) :2197-2202
[8]   Adaptive Control of Quadrotor UAVs: A Design Trade Study With Flight Evaluations [J].
Dydek, Zachary T. ;
Annaswamy, Anuradha M. ;
Lavretsky, Eugene .
IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2013, 21 (04) :1400-1406
[9]   Block-Sparse Recovery via Convex Optimization [J].
Elhamifar, Ehsan ;
Vidal, Rene .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2012, 60 (08) :4094-4107
[10]   Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks [J].
Fawzi, Hamza ;
Tabuada, Paulo ;
Diggavi, Suhas .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2014, 59 (06) :1454-1467