4.7 Article

Secure state estimation for systems under mixed cyber-attacks: Security and performance analysis

Journal

INFORMATION SCIENCES
Volume 546, Issue -, Pages 943-960

Publisher

ELSEVIER SCIENCE INC
DOI: 10.1016/j.ins.2020.08.124

Keywords

Approximate estimator; Cyber-attacks; Cyber-physical systems; Optimal estimator; Security

Funding

  1. Natural Science Key Research Foundation of Universities of Guangdong Province [2019GZDXM004]
  2. GRF HKU [17200918]
  3. National Natural Science Foundation of China [61973259]
  4. Open Research Project of the State Key Laboratory of Industrial Control Technology, Zhejiang University, China [ICT20092]

Ask authors/readers for more resources

The study focuses on state estimation for cyber-physical systems under mixed denial-of-service (DoS) and false data injection (FDI) attacks. An optimal estimator with exponentially growing components is obtained, but an approximate estimator using the generalized pseudo-Bayesian algorithm is proposed for efficient computation. Both the optimal estimator and the proposed approximate estimator are proven to be secure for stable systems, with boundedness theoretically characterized between the two estimates.
We study the state estimation for cyber-physical systems (CPSs) whose communication channels are subject to mixed denial-of-service (DoS) and false data injection (FDI) attacks. Cyber-attacks compromise the security and privacy of sensor and communication information. Unlike systems subject to only one single type of attacks (either DoS or FDI attacks), systems under mixed attacks will make the implementation of the optimal state estimation infeasible. We first obtain the optimal estimator for CPSs under mixed cyberattacks. The optimal estimator consists of an exponentially growing number of components, and thus its computation effort exponentially grows in time. To efficiently compute the optimal estimate, we propose an approximate estimator by using the generalized pseudo-Bayesian algorithm. We prove that for a stable system, both the optimal estimator and the proposed approximate estimator are secure; and theoretically characterize the boundedness of the distance between the optimal and the approximate estimates. A simulation example is presented to illustrate the effectiveness of the proposed methods in guaranteeing secure state estimation when the privacy of sensor and communication information is at the risk of mixed cyber-attacks. (c) 2020 Elsevier Inc. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available