×

Secure state estimation for systems under mixed cyber-attacks: security and performance analysis. (English) Zbl 1478.93680

Summary: We study the state estimation for cyber-physical systems (CPSs) whose communication channels are subject to mixed denial-of-service (DoS) and false data injection (FDI) attacks. Cyber-attacks compromise the security and privacy of sensor and communication information. Unlike systems subject to only one single type of attacks (either DoS or FDI attacks), systems under mixed attacks will make the implementation of the optimal state estimation infeasible. We first obtain the optimal estimator for CPSs under mixed cyber-attacks. The optimal estimator consists of an exponentially growing number of components, and thus its computation effort exponentially grows in time. To efficiently compute the optimal estimate, we propose an approximate estimator by using the generalized pseudo-Bayesian algorithm. We prove that for a stable system, both the optimal estimator and the proposed approximate estimator are secure; and theoretically characterize the boundedness of the distance between the optimal and the approximate estimates. A simulation example is presented to illustrate the effectiveness of the proposed methods in guaranteeing secure state estimation when the privacy of sensor and communication information is at the risk of mixed cyber-attacks.

MSC:

93E10 Estimation and detection in stochastic control theory
93B70 Networked control
93C83 Control/observation systems involving computers (process control, etc.)
93C55 Discrete-time control/observation systems
93C05 Linear systems in control theory
PDFBibTeX XMLCite
Full Text: DOI

References:

[1] Ahn, C. K.; Shi, P.; Shmaliy, Y.; Liu, F., Bayesian state estimation for Markovian jump systems: employing recursive steps and pseudocodes, IEEE Systems, Man, and Cybernetics Magazine, 5, 2, 27-36 (2019)
[2] Anderson, B. D.O.; Moore, J. B., Optimal Filtering (1979), Prentice-Hall: Prentice-Hall Englewood Cliffs · Zbl 0688.93058
[3] Bar-Shalom, Y.; Daum, F.; Huang, J., The probabilistic data association filter, IEEE Control Systems Magazine, 29, 6, 82-100 (2009) · Zbl 1395.93527
[4] Chen, W.; Ding, D.; Dong, H.; Wei, G., Distributed resilient filtering for power systems subject to denial-of-service attacks, IEEE Transactions on Systems, Man, and Cybernetics: Systems (2019)
[5] Ding, D.; Wang, Z.; Ho, D. W.C.; Wei, G., Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks, Automatica, 78, 231-240 (2017) · Zbl 1357.93096
[6] Ding, K.; Li, Y.; Quevedo, D. E.; Dey, S.; Shi, L., A multi-channel transmission schedule for remote state estimation under DoS attacks, Automatica, 78, 194-201 (2017) · Zbl 1357.93097
[7] Du, D.; Li, X.; Li, W.; Chen, R.; Fei, M.; Wu, L., ADMM-based distributed state estimation of smart grid under data deception and denial of service attacks, IEEE Transactions on Systems, Man, and Cybernetics: Systems, 49, 8, 1698-1711 (2019)
[8] Eustace, R.; Woodyatt, B.; Merrington, G.; Runacres, A., Fault signatures obtained from fault implant tests on an f404 engine, Journal of Engineering for Gas Turbines and Power, 116, 1, 178-183 (1994)
[9] Fawzi, H.; Tabuada, P.; Diggavi, S., Secure estimation and control for cyber-physical systems under adversarial attacks, IEEE Transactions on Automatic control, 59, 6, 1454-1467 (2014) · Zbl 1360.93201
[10] Ge, H.; Yue, D.; Xie, X.; Deng, S.; Dou, C., A unified modeling of muti-sources cyber-attacks with uncertainties for cps security control, Journal of the Franklin Institute (2019)
[11] Ge, X.; Han, Q.-L.; Zhang, X.-M.; Ding, D.; Yang, F., Resilient and secure remote monitoring for a class of cyber-physical systems against attacks, Information Sciences, 512, 1592-1605 (2020) · Zbl 1461.93183
[12] Ge, X.; Han, Q.-L.; Zhang, X.-M.; Ding, L.; Yang, F., Distributed event-triggered estimation over sensor networks: a survey, IEEE Transactions on Cybernetics, 50, 3, 1306-1320 (2019)
[13] Ge, X.; Han, Q.-L.; Zhong, M.; Zhang, X.-M., Distributed Krein space-based attack detection over sensor networks under deception attacks, Automatica, 109, Article 108557 pp. (2019) · Zbl 1429.93135
[14] Gu, C.-Y.; Zhu, J.-W.; Zhang, W.-A.; Yu, L., Sensor attack detection for cyber-physical systems based on frequency domain partition, IET Control Theory & Applications, 14, 11, 1452-1466 (2020)
[15] Guan, Y.; Ge, X., Distributed attack detection and secure estimation of networked cyber-physical systems against false data injection attacks and jamming attacks, IEEE Transactions on Signal and Information Processing over Networks, 4, 1, 48-59 (2017)
[16] N. Hashemi, J. Ruths, Co-design for performance and security: Geometric tools, https://arxiv.org/abs/2006.08739, 2020.
[17] Hu, L.; Wang, Z.; Han, Q.-L.; Liu, X., State estimation under false data injection attacks: security analysis and system protection, Automatica, 87, 176-183 (2018) · Zbl 1378.93119
[18] S. Hu, D. Yue, X. Chen, Z. Cheng, X. Xie, Resilient \(H_\infty\) filtering for event-triggered networked systems under nonperiodic DoS jamming attacks, IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2019.
[19] Kotecha, J. H.; Djuric, P. M., Gaussian sum particle filtering, IEEE Transactions on Signal Processing, 51, 10, 2602-2612 (2003) · Zbl 1369.94196
[20] Li, L.; Yang, H.; Xia, Y.; Yang, H., State estimation for linear systems with unknown input and random false data injection attack, IET Control Theory & Applications, 13, 6, 823-831 (2019)
[21] Li, Y.; Quevedo, D. E.; Dey, S.; Shi, L., SINR-based DoS attack on remote state estimation: a game-theoretic approach, IEEE Transactions on Control of Network Systems, 4, 3, 632-642 (2016) · Zbl 1507.93229
[22] Li, Y.; Shi, L.; Cheng, P.; Chen, J.; Quevedo, D. E., Jamming attacks on remote state estimation in cyber-physical systems: a game-theoretic approach, IEEE Transactions on Automatic Control, 60, 10, 2831-2836 (2015) · Zbl 1360.93674
[23] Li, Y.-G.; Yang, G.-H., Optimal stealthy false data injection attacks in cyber-physical systems, Information Sciences, 481, 474-490 (2019) · Zbl 1451.94030
[24] Li, Y.-G.; Yang, G.-H., Optimal deception attacks against remote state estimation in cyber-physical systems, Journal of the Franklin Institute, 357, 3, 1832-1852 (2020) · Zbl 1430.93141
[25] Li, Y.-G.; Yang, G.-H., Worst-case \(∊\)-stealthy false data injection attacks in cyber-physical systems, Information Sciences, 515, 352-364 (2020) · Zbl 1461.93186
[26] Lin, H.; Lam, J.; Chen, M. Z.Q.; Shu, Z.; Wu, Z.-G., Interacting multiple model estimator for networked control systems: stability, convergence, and performance, IEEE Transactions on Automatic Control, 64, 3, 928-943 (2017) · Zbl 1482.93604
[27] Lin, H.; Lam, J.; Wang, Z.; Lam, H.-K., State estimation over non-acknowledgment networks with Markovian packet dropouts, Automatica, 109, Article 108484 pp. (2019) · Zbl 1429.93369
[28] Lin, H.; Su, H.; Chen, M. Z.; Shu, Z.; Lu, R.; Wu, Z.-G., On stability and convergence of optimal estimation for networked control systems with dual packet losses without acknowledgment, Automatica, 90, 81-90 (2018) · Zbl 1387.93155
[29] Lin, H.; Su, H.; Shi, P.; Shu, Z.; Lu, R.; Wu, Z.-G., Optimal estimation and control for lossy network: stability, convergence, and performance, IEEE Transactions on Automatic Control, 62, 9, 4564-4579 (2017) · Zbl 1390.93763
[30] Lin, H.; Su, H.; Shu, Z.; Wu, Z.-G.; Xu, Y., Optimal estimation in UDP-like networked control systems with intermittent inputs: stability analysis and suboptimal filter design, IEEE Transactions on Automatic Control, 61, 7, 1794-1809 (2016) · Zbl 1359.93466
[31] Liu, J.; Tian, E.; Xie, X.; Lin, H., Distributed event-triggered control for networked control systems with stochastic cyber-attacks, Journal of the Franklin Institute, 356, 17, 10260-10276 (2019) · Zbl 1425.93019
[32] Mazor, E.; Averbuch, A.; Bar-Shalom, Y.; Dayan, J., Interacting multiple model methods in target tracking: a survey, IEEE Transactions on Aerospace and Electronic Systems, 34, 1, 103-123 (1998)
[33] Mo, Y.; Sinopoli, B., On the performance degradation of cyber-physical systems under stealthy integrity attacks, IEEE Transactions on Automatic Control, 61, 9, 2618-2624 (2015) · Zbl 1359.93257
[34] Murguia, C.; Ruths, J., On model-based detectors for linear time-invariant stochastic systems under sensor attacks, IET Control Theory & Applications, 13, 8, 1051-1061 (2019) · Zbl 1432.93321
[35] Oke, G.; Loukas, G.; Gelenbe, E., Detecting denial of service attacks with Bayesian classifiers and the random neural network, (2007 IEEE International Fuzzy Systems Conference (2007), IEEE), 1-6
[36] Pitre, R. R.; Jilkov, V. P.; Li, X. R., A comparative study of multiple-model algorithms for maneuvering target tracking, (Signal Processing, Sensor Fusion, and Target Recognition XIV, vol. 5809 (2005), International Society for Optics and Photonics), 549-560
[37] Qu, H.; Zhao, J., Stabilisation of switched linear systems under denial of service, IET Control Theory & Applications, 14, 11, 1438-1444 (2020)
[38] Sanchez, H. S.; Rotondo, D.; Escobet, T.; Puig, V.; Saludes, J.; Quevedo, J., Detection of replay attacks in cyber-physical systems using a frequency-based signature, Journal of the Franklin Institute, 356, 5, 2798-2824 (2019) · Zbl 1411.93119
[39] Sun, H.; Peng, C.; Wang, Y.; Tian, Y.-C., Output-based resilient event-triggered control for networked control systems under denial of service attacks, IET Control Theory & Applications, 13, 16, 2521-2528 (2019)
[40] Wang, D.; Wang, Z.; Shen, B.; Alsaadi, F. E., Security-guaranteed filtering for discrete-time stochastic delayed systems with randomly occurring sensor saturations and deception attacks, International Journal of Robust and Nonlinear Control, 27, 7, 1194-1208 (2017) · Zbl 1369.93658
[41] Wang, Z.; Wang, D.; Shen, B.; Alsaadi, F. E., Centralized security-guaranteed filtering in multirate-sensor fusion under deception attacks, Journal of the Franklin Institute, 355, 1, 406-420 (2018) · Zbl 1380.93241
[42] Xie, B.; Peng, C.; Yang, M.; Kong, X.; Zhang, T., A novel trust-based false data detection method for power systems under false data injection attacks, Journal of the Franklin Institute (2019)
[43] Yang, C.; Yang, W.; Shi, H., DoS attack in centralised sensor network against state estimation, IET Control Theory & Applications, 12, 9, 1244-1253 (2018)
[44] Zhang, H.; Cheng, P.; Shi, L.; Chen, J., Optimal denial-of-service attack scheduling with energy constraint, IEEE Transactions on Automatic Control, 60, 11, 3023-3028 (2015) · Zbl 1360.68302
[45] Zhang, H.; Qi, Y.; Zhou, H.; Zhang, J.; Sun, J., Testing and defending methods against DoS attack in state estimation, Asian Journal of Control, 19, 4, 1295-1305 (2017) · Zbl 1370.93264
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.