• Corpus ID: 237941081

Constrained Attack-Resilient Estimation of Stochastic Cyber-Physical Systems

  title={Constrained Attack-Resilient Estimation of Stochastic Cyber-Physical Systems},
  author={Wenbin Wan and Hunmin Kim and Naira Hovakimyan and Petros G. Voulgaris},
In this paper, a constrained attack-resilient estimation algorithm (CARE) is developed for stochastic cyber-physical systems. The proposed CARE has improved estimation accuracy and detection performance when physical constraints and operational limitations are available. In particular, CARE is designed for simultaneous input and state estimation that provides minimumvariance unbiased estimates, and these estimates are projected onto the constrained space restricted by inequality constraints… 

Figures and Tables from this paper


Attack-resilient Estimation for Linear Discrete-time Stochastic Systems with Input and State Constraints
It is shown that the estimation errors and their covariances from the proposed algorithm are less than those from the unconstrained algorithm, and it is proved that the state estimation errors of the proposed estimation algorithm are practically exponentially stable.
Resilient state estimation against switching attacks on stochastic cyber-physical systems
In this paper, we address the resilient state estimation problem for some relatively unexplored security issues for cyber-physical systems, namely switching attacks and the presence of stochastic
Attack-resilient estimation of switched nonlinear cyber-physical systems
This paper studies attack-resilient estimation of a class of switched nonlinear systems subject to stochastic process and measurement noises and proposes an estimation algorithm which is composed of a bank of state and attack vector estimators and a mode estimator.
Robustness of attack-resilient state estimators
This work presents a method for state estimation in presence of attacks, for systems with noise and modeling errors, and describes how implementation issues such as jitter, latency and synchronization errors can be mapped into parameters of the state estimation procedure that describe modeling errors.
Attack-Resilient State Estimation for Noisy Dynamical Systems
This paper focuses on the most general model for sensor attacks where any signal can be injected via compromised sensors, and presents an attack-resilient state estimator that can be formulated as a mixed-integer linear program and its convex relaxation based on the LaTeX norm.
Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks
A new simple characterization of the maximum number of attacks that can be detected and corrected as a function of the pair (A,C) of the system is given and it is shown that it is impossible to accurately reconstruct the state of a system if more than half the sensors are attacked.
A Bayesian approach to joint attack detection and resilient state estimation
The problem of jointly detecting a signal attack and estimating the system state in presence of fake measurements is formulated and solved in the Bayesian framework leading to the analytical derivation of a hybrid Bernoulli filter that updates in real-time the joint posterior density of the detection attackBernoulli set and of the state vector.
Cyber security analysis of state estimators in electric power systems
It is shown that the more accurate model the attacker has access to, the larger deception attack he can perform undetected, and trade-offs between model accuracy and possible attack impact for different BDD schemes are quantified.
Constraining Attacker Capabilities Through Actuator Saturation
For LTI control systems, mathematical tools for computing outer ellipsoidal bounds on the reachable sets that attacks can induce in the system when they are subject to the physical limits of the actuators are provided.
Finite energy and bounded actuator attacks on cyber-physical systems
In this paper, attacks on actuator signals are analyzed from a system theoretic context and the optimal actuator attacks for both finite and infinite horizon LQ control are derived, therefore the worst case attack signals are obtained.