42 research outputs found

    Brief Survey on Attack Detection Methods for Cyber-Physical Systems

    Get PDF

    Event-triggered state observers for sparse sensor noise/attacks

    Get PDF
    This paper describes two algorithms for state reconstruction from sensor measurements that are corrupted with sparse, but otherwise arbitrary, 'noise.' These results are motivated by the need to secure cyber-physical systems against a malicious adversary that can arbitrarily corrupt sensor measurements. The first algorithm reconstructs the state from a batch of sensor measurements while the second algorithm is able to incorporate new measurements as they become available, in the spirit of a Luenberger observer. A distinguishing point of these algorithms is the use of event-triggered techniques to improve the computational performance of the proposed algorithms

    Cyberattack Detection for Converter-Based Distributed dc Microgrids: Observer-Based Approaches

    Get PDF

    Distributed fault detection and estimation in cyber-physical systems subject to actuator faults

    Get PDF
    The fault detection and estimation problems for the physical layer network in the cyber-physical systems with unknown external disturbances are investigated in this study. Both bias fault and loss of efficiency scenarios are considered for the actuators. Based on the adaptive threshold method and sliding mode observer approach, a distributed fault detection observer (DFDO) is constructed for each physical layer node to detect the occurrence of actuator faults. Then a relative global estimation error system is defined for the distributed fault estimation observer (DFEO). Compared with the existing results, the proposed DFEO can provide the estimation for not only the actuator bias faults but also the actuatorsโ€™ efficiency factors under the impact of exogenous disturbance with two gain dynamic update processes. Finally, the feasibility and effectiveness of the given DFDO and the DFEO are examined by Lyapunov stability method and the simulation results

    Characterization of Multi-Channel Denial-of-Service and Full-Scale Denial-of-Service

    Full text link
    Over the past decades, interest in enhancing the safety of cyber-physical systems (CPSs) has risen. The systems and control research society has recognised that the embedded closed-loop in integrated systems may be damaged if attackers can execute a successful malicious attack. This article examines the resilient control problem for CPSs with numerous transmission channels under Denial-of-Service (DoS). First, a partial observer technique is developed in response to the Multi-Channel DoS (MCDoS) condition. The changing frequency of MCDoS is characterized while maintaining the Global Asymptotic Stability (GAS) of the closed loop system. The partial observer is modified then to reduce the effect of the changing frequency of MCDoS in the system. Then a resilient event-based feedback control scheme is developed to address the Full-Scale DoS (FSDoS). We depict the changing frequency of MCDoS and the frequency and duration of FSDoS, allowing the feedback system's Global Asymptotic Stability (GAS) to be maintained. We regard event-based controllers for which a minimal inter-sample time is precisely formulated in response to the existence of digital channels

    State of the art of cyber-physical systems security: An automatic control perspective

    Get PDF
    Cyber-physical systems are integrations of computation, networking, and physical processes. Due to the tight cyber-physical coupling and to the potentially disrupting consequences of failures, security here is one of the primary concerns. Our systematic mapping study sheds light on how security is actually addressed when dealing with cyber-physical systems from an automatic control perspective. The provided map of 138 selected studies is defined empirically and is based on, for instance, application fields, various system components, related algorithms and models, attacks characteristics and defense strategies. It presents a powerful comparison framework for existing and future research on this hot topic, important for both industry and academia

    ์™ธ๋ถ€ ๊ณต๊ฒฉ์œผ๋กœ๋ถ€ํ„ฐ ์ž์œจ ๋ณต์› ๊ฐ€๋Šฅํ•œ ์ œ์–ด ์‹œ์Šคํ…œ: ์„ผ์„œ ๊ณต๊ฒฉ์— ์•ˆ์ „ํ•œ ์ƒํƒœ ์ถ”์ • ๊ธฐ๋ฒ•

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ (๋ฐ•์‚ฌ)-- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› : ๊ณต๊ณผ๋Œ€ํ•™ ์ „๊ธฐยท์ปดํ“จํ„ฐ๊ณตํ•™๋ถ€, 2018. 2. ์‹ฌํ˜•๋ณด.Recent advances in computer and communication technologies make control systems more connected thanks to the developments in networked actuation and sensing devices. As this connectivity increases, the resulting large scale networked control systems, or the cyber-physical systems (CPS), are exposed and can be vulnerable to malicious attacks. In response to the crisis by the malicious adversaries, this dissertation presents sophisticated control algorithms which are more reliable even when some components of the feedback control systems are corrupted. Focusing especially on sensor attacks, security related problems on CPS are carefully analyzed and an attack-resilient state estimation scheme is proposed. First, the notion of redundant observability is introduced that explains in a unified manner existing security notions such as dynamic security index, attack detectability, and observability under attacks. The redundant observability is a key concept in this dissertation, and a system is said to be q-redundant observable if it is observable even after eliminating any q measurements. It has been shown that any q-sparse sensor attack is detectable if and only if the given linear time invariant (LTI) system is q-redundant observable. It is also equivalent to the condition that the system is observable under โŒŠq/2โŒ‹-sparse sensor attacks. Moreover, the dynamic security index, which is defined by the minimum number of attacks to be undetectable, can be computed as q + 1. In addition, the redundant detectability (or, asymptotic redundant observability), which is a weaker notion than the redundant observability, is also introduced. While the redundant observability does not care about the magnitudes of sensor attacks and does not mind whether the attacks are disruptive or not, the redundant detectability only deals with attacks that do not converge to zero as time goes on, so that it is more practical in the sense that it can only detect and correct the attacks that are actually harmful to the system. Next, a resilient state estimation scheme is proposed under two assumptions: โŒŠq/2โŒ‹-sparsity of attack vector and q-redundant detectability of the system. The proposed estimator consists of a bank of partial observers operating based on Kalman detectability decomposition and a decoder exploiting error correction techniques. The partial observers are either constructed by Luenberger observers or Kalman filters. The Luenberger observer guarantees the robustness with bounded disturbances/noises, while the Kalman filter shows the suboptimality in the sense of minimum variance with Garussian disturbances/noises. In terms of time complexity, an โ„“0 minimization problem in the decoder alleviates the computational efforts by reducing the search space to a finite set and by combining a detection algorithm to the optimization process. On the other hand, in terms of space complexity, the required memory is linear with the number of sensors by means of the decomposition used for constructing a bank of partial observers. This resilient state estimation scheme proposed for LTI systems, is further extended for a class of uniformly observable nonlinear systems. Based on the uniform observability decomposition, a high gain observer is constructed for each single measurement to estimate the observable sub-state and it constitutes the partial observer. Finally, the decoder solves a nonlinear error correcting problem by collecting all the information from the high gain observers and by exploiting redundancy.1 Introduction 1 1.1 Background 1 1.2 Research Objective and Contributions 5 1.3 Outline of the Dissertation 8 2 Error Correction over Reals and its Extensions 11 2.1 Error Correction over Reals and Compressed Sensing 11 2.2 Extension to Stacked Vector Case 16 2.2.1 Error Detectability and Error Correctability 16 2.2.2 Error Detection and Correction Scheme for Noiseless Case 20 2.2.3 Error Detection and Correction Scheme for Noisy Case 23 3 On Redundant Observability 41 3.1 Redundant Observability 42 3.1.1 Definition and Characterization 42 3.1.2 Relationship with Strong Observability 45 3.1.3 Redundant Unobservable Subspace 47 3.1.4 Asymptotic Redundant Observability 49 3.2 Attack Detectability and Dynamic Security Index 56 3.3 Observability under Sparse Sensor Attacks 65 4 Attack-Resilient State Estimation for Linear Systems 69 4.1 Problem Formulation 70 4.2 Components of Attack-Resilient Estimator and Their Functions 73 4.2.1 Partial Observer: Kalman Detectability Decomposition 73 4.2.2 Decoder: Error Correction for Stacked Vector 77 4.3 Design of Attack-Resilient State Estimator 78 4.3.1 Deterministic Estimator with Bounded Disturbance and Noise 79 4.3.2 Suboptimal Estimator with Gaussian Disturbance and Noise 85 4.4 Remarks on Proposed Attack-Resilient Estimator 93 4.4.1 Comparison with Fault Detection and Isolation 93 4.4.2 Analysis of Time and Space Complexity 95 4.5 Simulation Results: Three-Inertia System 96 5 Attack-Resilient State Estimation for Nonlinear Systems 101 5.1 Problem Formulation and Preliminaries 102 5.1.1 Problem Formulation 102 5.1.2 Bi-Lipschitz Function and Lipschitz Left Inverse 103 5.1.3 Nonlinear Error Detectability and Error Correctability 105 5.2 Uniformly Observable Nonlinear Systems for Any Input 108 5.2.1 Uniform Observability Decomposition 108 5.2.2 Design of High Gain Observer 111 5.3 Redundant Observability for Nonlinear Systems 112 5.4 Attack Detection and Resilient Estimation for Nonlinear Systems 115 5.4.1 Detection of Sensor Attacks 115 5.4.2 Attack-Resilient State Estimation 119 5.5 Simulation Results: Numerical Example 121 6 Conclusion 125 6.1 Summary 125 6.2 Future Works 127 Bibliography 129 ๊ตญ๋ฌธ์ดˆ๋ก 141Docto
    corecore