×

Observer-based detection and identification of sensor attacks in networked CPSs. (English) Zbl 1448.93111

Summary: This paper presents several observer-based detection and identification strategies to characterize sensor attacks for descriptor type cyber-physical systems (CPSs). In contrast to recent works we do not consider state estimators relying on centralized paradigms, but propose distributed and decentralized state estimators to characterize sensor attacks. We also show a set of sufficient conditions to ensure exponential convergence of the estimation errors in the absence of malicious attacks, along with a bound on the convergence rates. We then design algorithms to solve the attack detection and identification problem for a large-scale CPS. Finally, a series of numerical experiments are performed on the IEEE-6 and 118 bus power systems.

MSC:

93B53 Observers
93B30 System identification
93B70 Networked control
93C83 Control/observation systems involving computers (process control, etc.)

Software:

MATPOWER
Full Text: DOI

References:

[1] Anguluri, R.; Katewa, V.; Pasqualetti, F., Centralized versus decentralized detection of attacks in stochastic interconnected systems, IEEE Transactions on Automatic Control (2019)
[2] Belikov, J.; Levron, Y., A sparse minimal-order dynamic model of power networks based on dq0 signals, IEEE Transactions on Power Systems, 33, 1, 1059-1067 (2017)
[3] Berger, T.; Reis, T.; Trenn, S., Observability of linear differential-algebraic systems: A survey, (Surveys in differential-algebraic equations (vol. IV) (2017), Springer), 161-219 · Zbl 1402.93060
[4] Cardenas, A. A., Amin, S., & Sastry, S. (2008). Secure control: Towards survivable cyber-physical systems. In 28th international conference on distributed computing systems workshops (pp. 495-500).
[5] Chong, M. S., Wakaiki, M., & Hespanha, J. P. (2015). Observability of linear systems under adversarial attacks. In American control conference (pp. 2439-2444).
[6] Chowdhury, N. R., Negi, N., & Chakrabortty, A. (2019). A new cyber-secure countermeasure for LTI systems under DoS attacks. In Mediterranean conference on control and automation (pp. 304-309).
[7] Dai, L., Singular control systems (vol. 118) (1989), Springer · Zbl 0669.93034
[8] Datta, S., Small signal stability criteria for descriptor form power network model, International Journal of Control, 1-9 (2018)
[9] Duan, G.-R., Analysis and design of descriptor linear systems (vol. 23) (2010), Springer Science & Business Media · Zbl 1227.93001
[10] Finn, J., Nuzzo, P., & Sangiovanni-Vincentelli, A. (2015). A mixed discrete-continuous optimization scheme for cyber-physical system architecture exploration. In IEEE/ACM international conference on computer-aided design (pp. 216-223).
[11] Gross, T. B., Trenn, S., & Wirsen, A. (2014). Topological solvability and index characterizations for a common DAE power system model. In IEEE conference on control applications (pp. 9-14).
[12] Han, W.; Trentelman, H. L.; Wang, Z.; Shen, Y., A simple approach to distributed observer design for linear systems, IEEE Transactions on Automatic Control, 64, 1, 329-336 (2018) · Zbl 1423.93065
[13] Huck, C.; Jansen, L.; Tischendorf, C., A topology based discretization of PDAEs describing water transportation networks, Proceedings in Applied Mathematics and Mechanics, 14, 1, 923-924 (2014)
[14] Kelarestaghi, K. B.; Heaslip, K.; Khalilikhah, M.; Fuentes, A.; Fessmann, V., Intelligent transportation system security: Hacked message signs, SAE International Journal of Transportation Cybersecurity and Privacy, 1, 75-90 (2018), 11-01-02-0004
[15] Kim, J., Lee, J. G., Lee, C., Shim, H., & Seo, J. H. (2018). Local identification of sensor attack and distributed resilient state estimation for linear systems. Conference on decision and control (pp. 2056-2061).
[16] Kim, J.; Lee, C.; Shim, H.; Eun, Y.; Seo, J. H., Detection of sensor attack and resilient state estimation for uniformly observable nonlinear systems having redundant sensors, IEEE Transactions on Automatic Control, 64, 3, 1162-1169 (2018) · Zbl 1482.93091
[17] Lee, C., Shim, H., & Eun, Y. (2015). Secure and robust state estimation under sensor attacks, measurement noises, and process disturbances: Observer-based combinatorial approach. In European control conference (pp. 1872-1877).
[18] Martín, F.; Soriano, E.; Cañas, J. M., Quantitative analysis of security in distributed robotic frameworks, Robotics and Autonomous Systems, 100, 95-107 (2018)
[19] Mazenc, F., Yang, S., & Akella, M. R. (2015). Output feedback, attitude dynamics, robustness. In European control conference (pp. 1249-1254).
[20] Mitra, A.; Sundaram, S., Distributed observers for LTI systems, IEEE Transactions on Automatic Control, 63, 11, 3689-3704 (2018) · Zbl 1423.93234
[21] Mitra, A.; Sundaram, S., Byzantine-resilient distributed observers for LTI systems, Automatica, 108, Article 108487 pp. (2019) · Zbl 1536.93292
[22] Pachpatte, B. G., Inequalities for Differential and Integral Equations (1997), Elsevier · Zbl 0879.34013
[23] Pasqualetti, F.; Dörfler, F.; Bullo, F., Attack detection and identification in cyber-physical systems, IEEE Transactions on Automatic Control, 58, 11, 2715-2729 (2013) · Zbl 1369.93675
[24] Pasqualetti, F., Dörfler, F., & Bullo, F. (2015). A divide-and-conquer approach to distributed attack identification. In IEEE Conference on Decision and Control (pp. 5801-5807).
[25] Pulgar-Painemal, H.; Wang, Y.; Silva-Saravia, H., On inertia distribution, inter-area oscillations and location of electronically-interfaced resources, IEEE Transactions on Power Systems, 33, 1, 995-1003 (2017)
[26] Sastry, S.; Bodson, M., Adaptive control: Stability, convergence and robustness (2011), Courier Corporation
[27] Shoukry, Y.; Tabuada, P., Event-triggered state observers for sparse sensor noise/attacks, IEEE Transactions on Automatic Control, 61, 8, 2079-2091 (2015) · Zbl 1359.93072
[28] Siljak, D. D., Decentralized control of complex systems (2011), Courier Corporation · Zbl 0728.93004
[29] Simko, G., Levendovszky, T., Maroti, M., & Sztipanovits, J. (2014). Towards a theory for cyber-physical systems modeling. In Proceedings of the 4th ACM SIGBED international workshop on design, modeling, and evaluation of cyber-physical systems (pp. 56-61).
[30] Sridhar, S.; Hahn, A.; Govindarasu, M., Cyber-physical system security for the electric power grid, Proceedings of the IEEE, 100, 1, 210-224 (2012)
[31] Wang, L.; Liu, J.; Morse, A. S.; Anderson, B., A distributed observer for a discrete-time linear system (2019), arXiv preprint arXiv:1903.05486
[32] Wang, L.; Morse, A. S., A distributed observer for a time-invariant linear system, IEEE Transactions on Automatic Control, 63, 7, 2123-2130 (2017) · Zbl 1423.93141
[33] Yang, T., Murguia, C., Kuijper, M., & Nešić, D. (2018). A multi-observer approach for attack detection and isolation of discrete-time nonlinear systems. In Australian & New Zealand control conference (pp. 346-351).
[34] Zimmerman, R. D.; Murillo-Sánchez, C. E.; Thomas, R. J., MATPOWER: Steady-state operations, planning, and analysis tools for power systems research and education, IEEE Transactions on power systems, 26, 1, 12-19 (2010)
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.