Distributed $H_\infty$ Estimation Resilient to Biasing Attacks

We consider the distributed H∞ estimation problem with an additional requirement of resilience to biasing attacks. An attack scenario is considered where an adversary misappropriates some of the observer nodes and injects biasing signals into observer dynamics. The paper proposes a procedure for the derivation of a distributed observer which endows each node with an attack detector which also functions as an attack compensating feedback controller for the main observer. Connecting these controlled observers into a network results in a distributed observer whose nodes produce unbiased robust estimates of the plant. We show that the gains for each controlled observer in the network can be computed in a decentralized fashion, thus reducing vulnerability of the network.

[1]  Shreyas Sundaram,et al.  Distributed Observers for LTI Systems , 2016, IEEE Transactions on Automatic Control.

[2]  A. Stephen Morse,et al.  A distributed observer for a time-invariant linear system , 2017, 2017 American Control Conference (ACC).

[3]  Valery A. Ugrinovskii,et al.  Detectability of distributed consensus-based observer networks: An elementary analysis and extensions , 2014, 2014 4th Australian Control Conference (AUCC).

[4]  Reza Olfati-Saber,et al.  Distributed Kalman filtering for sensor networks , 2007, 2007 46th IEEE Conference on Decision and Control.

[5]  J. Doyle,et al.  Robust and optimal control , 1995, Proceedings of 35th IEEE Conference on Decision and Control.

[6]  Valery A. Ugrinovskii,et al.  Detection and Mitigation of Biasing Attacks on Distributed Estimation Networks , 2018, Autom..

[7]  Shinkyu Park,et al.  Design of Distributed LTI Observers for State Omniscience , 2017, IEEE Transactions on Automatic Control.

[8]  Shreyas Sundaram,et al.  Secure local filtering algorithms for distributed optimization , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).

[9]  Valery A. Ugrinovskii,et al.  Minimum-energy distributed filtering , 2014, 53rd IEEE Conference on Decision and Control.

[10]  Valery A. Ugrinovskii,et al.  Conditions for Detectability in Distributed Consensus-Based Observer Networks , 2012, IEEE Transactions on Automatic Control.

[11]  Paulo Tabuada,et al.  Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.

[12]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[13]  Weixin Han,et al.  A Simple Approach to Distributed Observer Design for Linear Systems , 2017, IEEE Transactions on Automatic Control.

[14]  Magdi S. Mahmoud,et al.  Distributed Kalman filtering: a bibliographic review , 2013 .

[15]  Pietro Tesi,et al.  Input-to-State Stabilizing Control Under Denial-of-Service , 2015, IEEE Transactions on Automatic Control.

[16]  Quanyan Zhu,et al.  Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.

[17]  Valery A. Ugrinovskii,et al.  Controller-jammer game models of Denial of Service in control systems operating over packet-dropping links , 2017, Autom..

[18]  Tamer Basar,et al.  Optimal control in the presence of an intelligent jammer with limited actions , 2010, 49th IEEE Conference on Decision and Control (CDC).

[19]  V A Ugrinovskii,et al.  Distributed robust filtering with H∞ consensus of estimates , 2010, Proceedings of the 2010 American Control Conference.

[20]  P. Khargonekar,et al.  Filtering and smoothing in an H/sup infinity / setting , 1989, Proceedings of the 28th IEEE Conference on Decision and Control,.

[21]  Ann Cox,et al.  A science of system security , 2014, 53rd IEEE Conference on Decision and Control.

[22]  Karl Henrik Johansson,et al.  A secure control framework for resource-limited adversaries , 2012, Autom..

[23]  Shreyas Sundaram,et al.  Secure distributed observers for a class of linear time invariant systems in the presence of Byzantine adversaries , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).

[24]  S. Shankar Sastry,et al.  Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.

[25]  Roy S. Smith,et al.  Covert Misappropriation of Networked Control Systems: Presenting a Feedback Structure , 2015, IEEE Control Systems.

[26]  T. Basar,et al.  H∞-0ptimal Control and Related Minimax Design Problems: A Dynamic Game Approach , 1996, IEEE Trans. Autom. Control..

[27]  Valery A. Ugrinovskii,et al.  Robust detection of biasing attacks on misappropriated distributed observers via decentralized H∞ synthesis , 2017, 2017 11th Asian Control Conference (ASCC).

[28]  V. Ugrinovskii,et al.  Resilient Distributed $H_{\infty}$ Estimation via Dynamic Rejection of Biasing Attacks , 2018, 2018 Annual American Control Conference (ACC).

[29]  Ling Shi,et al.  Optimal Denial-of-Service Attack Scheduling With Energy Constraint , 2015, IEEE Transactions on Automatic Control.

[30]  Claire J. Tomlin,et al.  Secure estimation based Kalman Filter for cyber-physical systems against sensor attacks , 2018, Autom..

[31]  Henk Nijmeijer,et al.  Network Synchronization by Dynamic diffusive Coupling , 2013, Int. J. Bifurc. Chaos.

[32]  Roy S. Smith,et al.  Design of distributed decentralized estimators for formations with fixed and stochastic communication topologies , 2009, Autom..