SMT-Based Observer Design for Cyber-Physical Systems under Sensor Attacks

被引:51
作者
Shoukry, Yasser [1 ,2 ]
Chong, Michelle [3 ]
Wakaiki, Masashi [4 ]
Nuzzo, Pierluigi [5 ]
Sangiovanni-Vincentelli, Alberto [1 ]
Seshia, Sanjit A. [1 ]
Hespanha, Joao P. [6 ]
Tabuada, Paulo [7 ]
机构
[1] Univ Calif Berkeley, Dept Elect Engn & Comp Sci, Cory Hall, Berkeley, CA 94720 USA
[2] UC Los Angeles, Los Angeles, CA 90095 USA
[3] Lund Univ, Dept Automat Control, Ole Romers Vag 1, S-22363 Lund, Sweden
[4] Kobe Univ, Grad Sch Syst Informat, Nada Ku, 1-1 Rokkodai, Kobe, Hyogo 6578501, Japan
[5] Univ Southern Calif, Dept Elect Engn, 3740 McClintock Ave, Los Angeles, CA 90089 USA
[6] Univ Calif Santa Barbara, Dept Elect & Comp Engn, Harold Frank Hall, Santa Barbara, CA 93106 USA
[7] Univ Calif Los Angeles, Dept Elect Engn, 56-125B Engn 4 Bldg, Los Angeles, CA 90095 USA
关键词
Secure state estimation; satisfiability modulo theory; secure cyber-physical systems;
D O I
10.1145/3078621
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
We introduce a scalable observer architecture, which can efficiently estimate the states of a discrete-time linear-time-invariant system whose sensors are manipulated by an attacker, and is robust to measurement noise. Given an upper bound on the number of attacked sensors, we build on previous results on necessary and sufficient conditions for state estimation, and propose a novel Multi-Modal Luenberger (MML) observer based on efficient Satisfiability Modulo Theory (SMT) solving. We present two techniques to reduce the complexity of the estimation problem. As a first strategy, instead of a bank of distinct observers, we use a family of filters sharing a single dynamical equation for the states, but different output equations, to generate estimates corresponding to different subsets of sensors. Such an architecture can reduce the memory usage of the observer from an exponential to a linear function of the number of sensors. We then develop an efficient SMT-based decision procedure that is able to reason about the estimates of the MML observer to detect at runtime which sets of sensors are attack-free, and use them to obtain a correct state estimate. Finally, we discuss two optimization-based algorithms that can efficiently select the observer parameters with the goal of minimizing the sensitivity of the estimates with respect to sensor noise. We provide proofs of convergence for our estimation algorithm and report simulation results to compare its runtime performance with alternative techniques. We show that our algorithm scales well for large systems (including up to 5,000 sensors) for which many previously proposed algorithms are not implementable due to excessive memory and time requirements. Finally, we illustrate the effectiveness of our approach, both in terms of resiliency to attacks and robustness to noise, on the design of large-scale power distribution networks.
引用
收藏
页数:27
相关论文
共 26 条
[1]  
Chong M. S., 2014, AM CONTR C ACC 15, P2439
[2]   Minimal state-space realization in linear system theory: An overview [J].
Schutter, B.De .
Journal of Computational and Applied Mathematics, 2000, 121 (01) :331-354
[3]   ON THE DISCRETE-TIME BOUNDED REAL LEMMA WITH APPLICATION IN THE CHARACTERIZATION OF STATIC STATE FEEDBACK H-INFINITY CONTROLLERS [J].
DESOUZA, CE ;
XIE, LH .
SYSTEMS & CONTROL LETTERS, 1992, 18 (01) :61-71
[4]   A cone complementarity linearization algorithm for static output-feedback and related problems [J].
ElGhaoui, L ;
Oustry, F ;
AitRami, M .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 1997, 42 (08) :1171-1176
[5]   Doubly Robust Smoothing of Dynamical Processes via Outlier Sparsity Constraints [J].
Farahmand, Shahrokh ;
Giannakis, Georgios B. ;
Angelosante, Daniele .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2011, 59 (10) :4529-4543
[6]   Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks [J].
Fawzi, Hamza ;
Tabuada, Paulo ;
Diggavi, Suhas .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2014, 59 (06) :1454-1467
[7]   Stuxnet: Dissecting a Cyberwarfare Weapon [J].
Langner, Ralph .
IEEE SECURITY & PRIVACY, 2011, 9 (03) :49-51
[8]  
Le Berre D., 2010, J SATISFIABILITY BOO, V7, P59
[9]   Finite data-rate feedback stabilization of switched and hybrid linear systems [J].
Liberzon, Daniel .
AUTOMATICA, 2014, 50 (02) :409-420
[10]  
Liu Y, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P21