2,053 research outputs found

    Interval Observers for Secure Estimation in Cyber-Physical Systems

    Get PDF
    International audienceStealthy attacks on the sensors and actuators embedded in cyber-physical systems could hinder the safe operation of these systems if the state estimators monitoring them cannot detect such attacks in time. In this paper, we study stealthy attacks in the framework of interval observers. We consider two classes of attacks: when a malicious agent compromises the sensors and when it is able to alter the system's actuators. For each type of attack, we design a dedicated interval observer for the system's state and we construct bounds for the attack signal. We investigate the ability of such interval observer to provide accurate estimates when the system is under the attack. Numerical simulations for a lateral model of an aircraft illustrate the capabilities of the synthesized observers

    Detection of replay attacks in CPSs using observer-based signature compensation

    Get PDF
    © 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.This paper presents a replay attack detection method that addresses the performance loss of watermarking-based approaches. The proposed method injects a sinusoidal signal that affects a subset, chosen at random, of the system outputs. The presence of the signal in each one of the outputs is estimated by means of independent observers and its effect is compensated in the control loop. When a system output is affected by a replay attack, the loss of feedback of the associated observer destabilizes the signal estimation, leading to an exponential increase of the estimation error up to a threshold, above which the estimated signal compensation in the control loop is disabled. This event triggers the detection of a replay attack over the output corresponding to the disrupted observer. The effectiveness of the method is demonstrated using results obtained with a quadruple-tank system simulator.Peer ReviewedPostprint (author's final draft

    Detection of Sensor Attack and Resilient State Estimation for Uniformly Observable Nonlinear Systems having Redundant Sensors

    Full text link
    This paper presents a detection algorithm for sensor attacks and a resilient state estimation scheme for a class of uniformly observable nonlinear systems. An adversary is supposed to corrupt a subset of sensors with the possibly unbounded signals, while the system has sensor redundancy. We design an individual high-gain observer for each measurement output so that only the observable portion of the system state is obtained. Then, a nonlinear error correcting problem is solved by collecting all the information from those partial observers and exploiting redundancy. A computationally efficient, on-line monitoring scheme is presented for attack detection. Based on the attack detection scheme, an algorithm for resilient state estimation is provided. The simulation results demonstrate the effectiveness of the proposed algorithm

    A Multi-Observer Based Estimation Framework for Nonlinear Systems under Sensor Attacks

    Full text link
    We address the problem of state estimation and attack isolation for general discrete-time nonlinear systems when sensors are corrupted by (potentially unbounded) attack signals. For a large class of nonlinear plants and observers, we provide a general estimation scheme, built around the idea of sensor redundancy and multi-observer, capable of reconstructing the system state in spite of sensor attacks and noise. This scheme has been proposed by others for linear systems/observers and here we propose a unifying framework for a much larger class of nonlinear systems/observers. Using the proposed estimator, we provide an isolation algorithm to pinpoint attacks on sensors during sliding time windows. Simulation results are presented to illustrate the performance of our tools.Comment: arXiv admin note: text overlap with arXiv:1806.0648

    An Unknown Input Multi-Observer Approach for Estimation and Control under Adversarial Attacks

    Full text link
    We address the problem of state estimation, attack isolation, and control of discrete-time linear time-invariant systems under (potentially unbounded) actuator and sensor false data injection attacks. Using a bank of unknown input observers, each observer leading to an exponentially stable estimation error (in the attack-free case), we propose an observer-based estimator that provides exponential estimates of the system state in spite of actuator and sensor attacks. Exploiting sensor and actuator redundancy, the estimation scheme is guaranteed to work if a sufficiently small subset of sensors and actuators are under attack. Using the proposed estimator, we provide tools for reconstructing and isolating actuator and sensor attacks; and a control scheme capable of stabilizing the closed-loop dynamics by switching off isolated actuators. Simulation results are presented to illustrate the performance of our tools.Comment: arXiv admin note: substantial text overlap with arXiv:1811.1015

    Comparing Kalman Filters and Observers for Power System Dynamic State Estimation with Model Uncertainty and Malicious Cyber Attacks

    Full text link
    Kalman filters and observers are two main classes of dynamic state estimation (DSE) routines. Power system DSE has been implemented by various Kalman filters, such as the extended Kalman filter (EKF) and the unscented Kalman filter (UKF). In this paper, we discuss two challenges for an effective power system DSE: (a) model uncertainty and (b) potential cyber attacks. To address this, the cubature Kalman filter (CKF) and a nonlinear observer are introduced and implemented. Various Kalman filters and the observer are then tested on the 16-machine, 68-bus system given realistic scenarios under model uncertainty and different types of cyber attacks against synchrophasor measurements. It is shown that CKF and the observer are more robust to model uncertainty and cyber attacks than their counterparts. Based on the tests, a thorough qualitative comparison is also performed for Kalman filter routines and observers.Comment: arXiv admin note: text overlap with arXiv:1508.0725

    An Unknown Input Multi-Observer Approach for Estimation, Attack Isolation, and Control of LTI Systems under Actuator Attacks

    Get PDF
    We address the problem of state estimation, attack isolation, and control for discrete-time Linear Time Invariant (LTI) systems under (potentially unbounded) actuator false data injection attacks. Using a bank of Unknown Input Observers (UIOs), each observer leading to an exponentially stable estimation error in the attack-free case, we propose an estimator that provides exponential estimates of the system state and the attack signals when a sufficiently small number of actuators are attacked. We use these estimates to control the system and isolate actuator attacks. Simulations results are presented to illustrate the performance of the results

    Distributed estimation techniques forcyber-physical systems

    Get PDF
    Nowadays, with the increasing use of wireless networks, embedded devices and agents with processing and sensing capabilities, the development of distributed estimation techniques has become vital to monitor important variables of the system that are not directly available. Numerous distributed estimation techniques have been proposed in the literature according to the model of the system, noises and disturbances. One of the main objectives of this thesis is to search all those works that deal with distributed estimation techniques applied to cyber-physical systems, system of systems and heterogeneous systems, through using systematic review methodology. Even though systematic reviews are not the common way to survey a topic in the control community, they provide a rigorous, robust and objective formula that should not be ignored. The presented systematic review incorporates and adapts the guidelines recommended in other disciplines to the field of automation and control and presents a brief description of the different phases that constitute a systematic review. Undertaking the systematic review many gaps were discovered: it deserves to be remarked that some estimators are not applied to cyber-physical systems, such as sliding mode observers or set-membership observers. Subsequently, one of these particular techniques was chosen, set-membership estimator, to develop new applications for cyber-physical systems. This introduces the other objectives of the thesis, i.e. to present two novel formulations of distributed set-membership estimators. Both estimators use a multi-hop decomposition, so the dynamics of the system is rewritten to present a cascaded implementation of the distributed set-membership observer, decoupling the influence of the non-observable modes to the observable ones. So each agent must find a different set for each sub-space, instead of a unique set for all the states. Two different approaches have been used to address the same problem, that is, to design a guaranteed distributed estimation method for linear full-coupled systems affected by bounded disturbances, to be implemented in a set of distributed agents that need to communicate and collaborate to achieve this goal
    corecore