Reach Set-Based Secure State Estimation against Sensor Attacks with Interval Hull Approximation

This paper deals with the problem of secure state estimation in an adversarial environment with the presence of bounded noises. The problem is given as min-max optimization, that is, the system operator seeks an optimal estimate which minimizes the worst-case estimation error due to the manipulation by the attacker. To derive the optimal estimate, taking the reach set of the system into account, we first show that the feasible set of the state can be represented as a union of polytopes, and the optimal estimate is given as the Chebyshev center of the union. Then, for calculating the optimal state estimate, we provide a convex optimization problem that utilizes the vertices of the union. On the proposed estimator, the estimation error is bounded even if the adversary corrupts any subset of sensors. For the sake of reducing the calculation complexity, we further provide another estimator which resorts to the interval hull approximation of the reach set and properties of zonotopes. This approximated estimator is able to reduce the complexity without degrading the estimation accuracy sorely. Numerical comparisons and examples finally illustrate the effectiveness of the proposed estimators.

[1]  Thomas M. Liebling,et al.  Analysis of Backtrack Algorithms for Listing All Vertices and All Faces of a Convex Polyhedron , 1997, Comput. Geom..

[2]  Paulo Tabuada,et al.  Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.

[3]  G. Ziegler Lectures on Polytopes , 1994 .

[4]  Gabor Karsai,et al.  Toward a Science of Cyber–Physical System Integration , 2012, Proceedings of the IEEE.

[5]  Panganamala Ramana Kumar,et al.  Cyber–Physical Systems: A Perspective at the Centennial , 2012, Proceedings of the IEEE.

[6]  Paulo Tabuada,et al.  Event-Triggered State Observers for Sparse Sensor Noise/Attacks , 2013, IEEE Transactions on Automatic Control.

[7]  Kevin Barraclough,et al.  I and i , 2001, BMJ : British Medical Journal.

[8]  Dan Amir Chebyshev centers and uniform convexity , 1978 .

[9]  Toru Namerikawa,et al.  Detection of replay attack on smart grid with code signal and bargaining game , 2017, 2017 American Control Conference (ACC).

[10]  Karl Henrik Johansson,et al.  A secure control framework for resource-limited adversaries , 2012, Autom..

[11]  Paulo Tabuada,et al.  Non-invasive Spoofing Attacks for Anti-lock Braking Systems , 2013, CHES.

[12]  Bruno Sinopoli,et al.  Detecting Integrity Attacks on SCADA Systems , 2014, IEEE Transactions on Control Systems Technology.

[13]  John B. Shoven,et al.  I , Edinburgh Medical and Surgical Journal.

[14]  R. Stephenson A and V , 1962, The British journal of ophthalmology.

[15]  João Pedro Hespanha,et al.  Observability of linear systems under adversarial attacks , 2015, 2015 American Control Conference (ACC).

[16]  E. Kerrigan Robust Constraint Satisfaction: Invariant Sets and Predictive Control , 2000 .

[17]  Ralph Langner,et al.  Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.

[18]  Srdjan Capkun,et al.  On the requirements for successful GPS spoofing attacks , 2011, CCS '11.

[19]  Stephen P. Boyd,et al.  Graph Implementations for Nonsmooth Convex Programs , 2008, Recent Advances in Learning and Control.

[20]  V. Klee,et al.  Helly's theorem and its relatives , 1963 .

[21]  Toru Namerikawa,et al.  On the Vulnerabilities Due to Manipulative Zero-Stealthy Attacks in Cyber-Physical Systems , 2017 .

[22]  Paulo Tabuada,et al.  Secure State Estimation for Cyber-Physical Systems Under Sensor Attacks: A Satisfiability Modulo Theory Approach , 2014, IEEE Transactions on Automatic Control.

[23]  Antoine Girard,et al.  Efficient Computation of Reachable Sets of Linear Time-Invariant Systems with Inputs , 2006, HSCC.

[24]  Yilin Mo,et al.  Dynamic state estimation in the presence of compromised sensory data , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[25]  Tsuyoshi Murata,et al.  {m , 1934, ACML.

[26]  Stephen P. Boyd,et al.  Real-Time Convex Optimization in Signal Processing , 2010, IEEE Signal Processing Magazine.

[27]  George J. Pappas,et al.  Design and Implementation of Attack-Resilient Cyber-Physical Systems , 2016 .

[28]  Aaas News,et al.  Book Reviews , 1893, Buffalo Medical and Surgical Journal.

[29]  T. Zaslavsky Facing Up to Arrangements: Face-Count Formulas for Partitions of Space by Hyperplanes , 1975 .

[30]  Komei Fukuda,et al.  Combinatorial Face Enumeration in Convex Polytopes , 1994, Comput. Geom..

[31]  Insup Lee,et al.  Attack-Resilient State Estimation for Noisy Dynamical Systems , 2017, IEEE Transactions on Control of Network Systems.

[32]  Bruno Sinopoli,et al.  On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks , 2016, IEEE Transactions on Automatic Control.