4.4 Article

Secure state estimation for cyber-physical systems under sparse data injection attacks: a switched counteraction approach

期刊

INTERNATIONAL JOURNAL OF CONTROL
卷 95, 期 4, 页码 963-974

出版社

TAYLOR & FRANCIS LTD
DOI: 10.1080/00207179.2020.1833249

关键词

Secure state estimation; sparse data injection attacks; cyber-physical systems; switched systems; counteraction principle; set cover approach

资金

  1. National Natural Science Foundation of China [62033005, 61525303, 61773131]
  2. Australian Research Council [DP170102644]
  3. National Key Research and Development Program of China [2019YFB1312000]
  4. National High-Level University Construction Program - China Scholarship Council [202006120091]
  5. State Grid Heilongjiang Electric Power Company Ltd.

向作者/读者索取更多资源

This paper presents defense strategies based on switched counteraction principle to protect the secure state estimation (SSE) of Cyber-Physical Systems (CPSs) from sparse data injection (DI) attacks. The physical layer is modeled using a hybrid mechanism and malicious injections are excluded through adaptively switched counteraction searching. The proposed design methods are demonstrated to be effective and promising through numerical examples.
Cyber-Physical Systems (CPSs), with the intrinsical vulnerability of the cyber layer, are always suffering from malicious data injection (DI) attacks. In this paper, switched counteraction principle based defense strategies are designed for secure state estimation (SSE) of CPSs under sparse DI attacks. Firstly, the physical layer is modelled by a hybrid mechanism, based on which malicious injections are excluded by implementing adaptively switched counteraction searching. Sufficient conditions are established to ensure the feasibility of SSE design. Next, by set cover approach, a defence strategy is presented to further relax the computation burden caused by combinational brute force search. Two numerical examples are given to illustrate the effectiveness and potential of the proposed design methods.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.4
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Automation & Control Systems

A state-feedback Nash equilibrium for the general Target-Attacker-Defender differential game of degree in arbitrary dimensions

Kamal Mammadov, Cheng-Chew Lim, Peng Shi

Summary: In this manuscript, we formulate the general Target-Attacker-Defender differential game in both continuous-time and discrete-time turn-based variants in n-dimensional Euclidean space. The objective of the Attackers is to get as close as possible to the Target before collision with the Defender, while the Target and Defender coordinate to achieve the opposite. We consider the most general setting for this zero-sum differential game, where the agents can move at different speeds, and prove the Nash equilibrium strategies in the discrete-time turn-based variant.

INTERNATIONAL JOURNAL OF CONTROL (2022)

Article Automation & Control Systems

Distributed L2-L∞ consensus of multi-agent systems under asynchronous switching topologies

Ting Shi, Peng Shi, Liping Zhang

Summary: This paper investigates the leader-following consensus problem for general linear multi-agent systems under external disturbances. The communication topologies are time-varying and switched from a finite set. A switched control system is introduced to model these topologies, and the weighted L-2 - L-infinity performance is analyzed. A topology-dependent controller is designed based on local information from the neighbors. Conditions are developed for the existence of a control protocol that achieves the leader-following consensus with a certain level of weighted L-2 - L-infinity performance. The design algorithm is formulated as a set of linear matrix inequalities (LMIs), and a numerical example is provided to demonstrate the effectiveness of the proposed consensus algorithm.

INTERNATIONAL JOURNAL OF CONTROL (2022)

Article Automation & Control Systems

Dynamic event-triggered approach for networked control systems under denial of service attacks

Ning Zhao, Peng Shi, Wen Xing

Summary: This article introduces a resilient event-triggered communication mechanism to address the issues of network congestion and redundant communication caused by DoS attacks in networked control systems. By adjusting the threshold parameter in the event-triggered condition, designing an event-driven control protocol, and constructing a new switched NCS model, the exponential stability and Script capital L-2-gain performance of the system are ensured. Additionally, a co-design scheme for the parameters in the event-triggered condition and controller gain is provided for improved system performance.

INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL (2021)

Article Automation & Control Systems

Variational Adaptive Kalman Filter With Gaussian-Inverse-Wishart Mixture Distribution

Yulong Huang, Yonggang Zhang, Peng Shi, Jonathon Chambers

Summary: This article introduces a new variational adaptive Kalman filter using a Gaussian-inverse-Wishart mixture distribution for linear systems with partially unknown state and measurement noise covariance matrices. By establishing a hierarchical Gaussian model, the system state vector and noise covariance matrices are jointly estimated. Examples are provided to demonstrate the effectiveness and potential of this new filtering design technique.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2021)

Article Engineering, Electrical & Electronic

Robust Formation Control for Multi-Agent Systems: A Reference Correction Based Approach

Yang Fei, Peng Shi, Cheng-Chew Lim

Summary: This paper studies the formation control problem for second-order multi-agent systems with practical issues like mismatched uncertainties and obstacle avoidance. A reference correction algorithm based sliding mode control scheme is proposed to tackle the challenges, and both disturbance observer and artificial potential field are implemented to address obstacle avoidance with the existence of mismatched uncertainties. The effectiveness of obstacle avoidance and boundedness of position tracking error are verified by Lyapunov stability theory in the end.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS (2021)

Article Engineering, Electrical & Electronic

Disturbance-Observer-Based Terminal Sliding Mode Control for Linear Traction System With Prescribed Performance

Bo Ding, Dezhi Xu, Bin Jiang, Peng Shi, Weilin Yang

Summary: This article proposes a terminal sliding mode control strategy for the speed tracking problem of permanent-magnet linear synchronous traction systems in urban rail transit, utilizing a nonlinear disturbance observer (NDO) and prescribed performance method. The system design combines prescribed performance control, terminal sliding mode control with backstepping, and disturbance estimation using NDO for feedforward compensation, demonstrating effectiveness and advantages through computer simulations and experiments in dSPACE.

IEEE TRANSACTIONS ON TRANSPORTATION ELECTRIFICATION (2021)

Article Engineering, Marine

Research on Multi-Energy Integrated Ship Energy Management System Based on Hierarchical Control Collaborative Optimization Strategy

Yuanjie Ren, Lanyong Zhang, Peng Shi, Ziqi Zhang

Summary: A hierarchical collaborative control energy management scheme is proposed for the propulsion system of hybrid electric ships. The scheme effectively solves the problems of steady-state oscillation and deviation from the tracking direction caused by volatility and uncertainty, achieving significant improvement.

JOURNAL OF MARINE SCIENCE AND ENGINEERING (2022)

Letter Automation & Control Systems

Resilient Event-Triggered Model Predictive Control for Adaptive Cruise Control Under Sensor Attacks

Zhijian Hu, Rong Su, Kai Zhang, Zeyuan Xu, Renjie Ma

IEEE-CAA JOURNAL OF AUTOMATICA SINICA (2023)

Article Automation & Control Systems

Sparse attack reconstruction for cyber-physical systems via descriptor reduced-order observer

Hongyan Yang, Renjie Ma

Summary: This paper focuses on enhancing the trustworthy estimation problem in wireless sensor networks under simultaneous malicious false data injection (FDI) attacks on sensor and actuator components. The research findings demonstrate that the proposed estimation scheme has better stability and security compared to existing methods.

NONLINEAR ANALYSIS-HYBRID SYSTEMS (2023)

Article Engineering, Electrical & Electronic

Adversarial FDI Attack Monitoring: Toward Secure Defense of Industrial Electronics

Renjie Ma, Zhijian Hu, Hongyan Yang, Yuchen Jiang, Mingyi Huo, Hao Luo, Rongni Yang

Summary: With the advancement of computational and communication resources, industrial electronics systems can now utilize networked structures to enable wireless remote control. However, due to the open nature of their cyberrealms, adversaries can eavesdrop on sensitive information and conduct insidious false data injection (FDI) attacks. In this article, different FDI attack monitoring architectures are introduced and their applicability and limitations are discussed. The significance of FDI attack monitoring in deploying secure defense control is also discussed, including the relationship between safety and security, methodologies for FDI attack-resilient control, and integration with information security and machine learning techniques. This review aims to provide insights for advancing the safety and reliability of cyberphysical systems (CPSs) through the retrospective analysis of representative results on FDI attack monitoring and control.

IEEE INDUSTRIAL ELECTRONICS MAGAZINE (2023)

Article Automation & Control Systems

Resilient Event-Triggered MPC for Load Frequency Regulation With Wind Turbines Under False Data Injection Attacks

Zhijian Hu, Rong Su, Keck-Voon Ling, Yao Guo, Renjie Ma

Summary: This paper investigates the applicability of integrating wind turbines into load frequency control (LFC) under an economic MPC framework. In the context of potential false data injection (FDI) attacks on vulnerable communication networks among different control areas, an intrusion detection unit is proposed to enhance resilience. Unlike existing works, this paper meticulously explores the relationships between alarming thresholds and key performance indicators (KPIs) to provide valuable references for power operators and managers. Additionally, an intensified event-triggered scheme is proposed to alleviate the computation burden of the MPC algorithm, considering incomplete and inaccurate modeling issues. Simulations validate the effectiveness and feasibility of the resilient event-triggered MPC strategy for frequency regulation under FDI attacks.

IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING (2023)

Article Engineering, Electrical & Electronic

A Novel Electronic Chip Detection Method Using Deep Neural Networks

Huiyan Zhang, Hao Sun, Peng Shi, Luis Ismael Minchala

Summary: This article proposes a novel chip detection method that combines attentional feature fusion and cosine nonlocal attention to effectively handle chip images with multiple classes or complex backgrounds. Experimental results demonstrate that the proposed method outperforms the benchmark method on a medium-scale dataset.

MACHINES (2022)

Article Remote Sensing

Robust Hierarchical Formation Control of Unmanned Aerial Vehicles via Neural-Based Observers

Yang Fei, Yuan Sun, Peng Shi

Summary: In this study, a hierarchical formation control strategy is used to address the robust formation control problem for a group of UAVs with system uncertainty. A sliding mode neural-based observer is constructed to estimate the nonlinear uncertainty in the UAV model, and sliding mode controllers and differentiators are designed to alleviate chattering in the control input. The proposed control scheme's effectiveness is validated through Lyapunov stability theory and numerical simulations on a multiple-UAV system.

DRONES (2022)

暂无数据