190 research outputs found
Event-triggered state observers for sparse sensor noise/attacks
This paper describes two algorithms for state reconstruction from sensor measurements that are corrupted with sparse, but otherwise arbitrary, 'noise.' These results are motivated by the need to secure cyber-physical systems against a malicious adversary that can arbitrarily corrupt sensor measurements. The first algorithm reconstructs the state from a batch of sensor measurements while the second algorithm is able to incorporate new measurements as they become available, in the spirit of a Luenberger observer. A distinguishing point of these algorithms is the use of event-triggered techniques to improve the computational performance of the proposed algorithms
Recommended from our members
Securing state reconstruction under sensor and actuator attacks: Theory and design
This paper discusses the problem of reconstructing the state of a linear time invariant system when some of its actuators and sensors are compromised by an adversarial agent. In the model considered in this paper, the adversarial agent attacks an input (output) by manipulating its value arbitrarily, i.e., we impose no constraints (statistical or otherwise) on how control commands (sensor measurements) are changed by the adversary other than a bound on the number of attacked actuators and sensors In the first part of this paper, we introduce the notion of sparse strong observability and we show that is a necessary and sufficient condition for correctly reconstructing the state despite the considered attacks. In the second half of this work, we propose an observer to harness the complexity of this intrinsically combinatorial problem, by leveraging satisfiability modulo theory solving. Numerical simulations illustrate the effectiveness and scalability of our observer
Recommended from our members
Secure state estimation against sensor attacks in the presence of noise
We consider the problem of estimating the state of a noisy linear dynamical system when an unknown subset of sensors is arbitrarily corrupted by an adversary. We propose a secure state estimation algorithm, and derive (optimal) bounds on the achievable state estimation error given an upper bound on the number of attacked sensors. The proposed state estimator involves Kalman filters operating over subsets of sensors to search for a sensor subset which is reliable for state estimation. To further improve the subset search time, we propose Satisfiability Modulo Theory-based techniques to exploit the combinatorial nature of searching over sensor subsets. Finally, as a result of independent interest, we give a coding theoretic view of attack detection and state estimation against sensor attacks in a noiseless dynamical system
Recommended from our members
Cloud-Based Quadratic Optimization with Partially Homomorphic Encryption
This article develops a cloud-based protocol for a constrained quadratic optimization problem involving multiple parties, each holding private data. The protocol is based on the projected gradient ascent on the Lagrange dual problem and exploits partially homomorphic encryption and secure communication techniques. Using formal cryptographic definitions of indistinguishability, the protocol is shown to achieve computational privacy. We show the implementation results of the protocol and discuss its computational and communication complexity. We conclude this article with a discussion on privacy notions
Lazy Abstraction-Based Controller Synthesis
We present lazy abstraction-based controller synthesis (ABCS) for
continuous-time nonlinear dynamical systems against reach-avoid and safety
specifications. State-of-the-art multi-layered ABCS pre-computes multiple
finite-state abstractions of varying granularity and applies reactive synthesis
to the coarsest abstraction whenever feasible, but adaptively considers finer
abstractions when necessary. Lazy ABCS improves this technique by constructing
abstractions on demand. Our insight is that the abstract transition relation
only needs to be locally computed for a small set of frontier states at the
precision currently required by the synthesis algorithm. We show that lazy ABCS
can significantly outperform previous multi-layered ABCS algorithms: on
standard benchmarks, lazy ABCS is more than 4 times faster
Equivalence of switching linear systems by bisimulation
A general notion of hybrid bisimulation is proposed for the class of switching linear systems. Connections between the notions of bisimulation-based equivalence, state-space equivalence, algebraic and input–output equivalence are investigated. An algebraic characterization of hybrid bisimulation and an algorithmic procedure converging in a finite number of steps to the maximal hybrid bisimulation are derived. Hybrid state space reduction is performed by hybrid bisimulation between the hybrid system and itself. By specializing the results obtained on bisimulation, also characterizations of simulation and abstraction are derived. Connections between observability, bisimulation-based reduction and simulation-based abstraction are studied.\ud
\u
Symbolic Controller Synthesis for B\"uchi Specifications on Stochastic Systems
We consider the policy synthesis problem for continuous-state controlled
Markov processes evolving in discrete time, when the specification is given as
a B\"uchi condition (visit a set of states infinitely often). We decompose
computation of the maximal probability of satisfying the B\"uchi condition into
two steps. The first step is to compute the maximal qualitative winning set,
from where the B\"uchi condition can be enforced with probability one. The
second step is to find the maximal probability of reaching the already computed
qualitative winning set. In contrast with finite-state models, we show that
such a computation only gives a lower bound on the maximal probability where
the gap can be non-zero.
In this paper we focus on approximating the qualitative winning set, while
pointing out that the existing approaches for unbounded reachability
computation can solve the second step. We provide an abstraction-based
technique to approximate the qualitative winning set by simultaneously using an
over- and under-approximation of the probabilistic transition relation. Since
we are interested in qualitative properties, the abstraction is
non-probabilistic; instead, the probabilistic transitions are assumed to be
under the control of a (fair) adversary. Thus, we reduce the original policy
synthesis problem to a B\"uchi game under a fairness assumption and
characterize upper and lower bounds on winning sets as nested fixed point
expressions in the -calculus. This characterization immediately provides a
symbolic algorithm scheme. Further, a winning strategy computed on the abstract
game can be refined to a policy on the controlled Markov process.
We describe a concrete abstraction procedure and demonstrate our algorithm on
two case studies
Simulation-based reachability analysis for nonlinear systems using componentwise contraction properties
A shortcoming of existing reachability approaches for nonlinear systems is
the poor scalability with the number of continuous state variables. To mitigate
this problem we present a simulation-based approach where we first sample a
number of trajectories of the system and next establish bounds on the
convergence or divergence between the samples and neighboring trajectories. We
compute these bounds using contraction theory and reduce the conservatism by
partitioning the state vector into several components and analyzing contraction
properties separately in each direction. Among other benefits this allows us to
analyze the effect of constant but uncertain parameters by treating them as
state variables and partitioning them into a separate direction. We next
present a numerical procedure to search for weighted norms that yield a
prescribed contraction rate, which can be incorporated in the reachability
algorithm to adjust the weights to minimize the growth of the reachable set
- …