Secure State Estimation and Control of Cyber-Physical Systems: A Survey

Cyber-physical systems (CPSs) empower the integration of physical processes and cyber infrastructure with the aid of ubiquitous computation resources and communication capabilities. CPSs have permeated modern society and found extensive applications in a wide variety of areas, including energy, transportation, advanced manufacturing, and medical health. The security of CPSs against cyberattacks has been regarded as a long-standing concern. However, CPSs suffer from extendable vulnerabilities that are beyond classical networked systems due to the tight integration of cyber and physical components. Sophisticated and malicious cyberattacks continue to emerge to adversely impact CPS operation, resulting in performance degradation, service interruption, and system failure. Secure state estimation and control technologies play a vital role in warranting reliable monitoring and operation of safety-critical CPSs. This article provides a review of the state-of-the-art results for secure state estimation and control of CPSs. Specifically, the latest development of secure state estimation is summarized in light of different performance indicators and defense strategies. Then, the recent results on secure control are discussed and classified into three categories: 1) centralized secure control; 2) distributed secure control; and 3) resource-aware secure control. Furthermore, two specific application examples of water supply distribution systems and wide-area power systems are presented to demonstrate the applicability of secure state estimation and control approaches. Finally, several challenging issues are discussed to direct future research.

[1]  Qing-Long Han,et al.  Secure Distributed Finite-Time Filtering for Positive Systems Over Sensor Networks Under Deception Attacks , 2020, IEEE Transactions on Cybernetics.

[2]  Pietro Tesi,et al.  Resilient control under Denial-of-Service: Robust design , 2016, 2016 American Control Conference (ACC).

[3]  Ali Davoudi,et al.  Resilient and Robust Synchronization of Multiagent Systems Under Attacks on Sensors and Actuators , 2020, IEEE Transactions on Cybernetics.

[4]  Insup Lee,et al.  Attack-Resilient State Estimation for Noisy Dynamical Systems , 2017, IEEE Transactions on Control of Network Systems.

[5]  Qing-Long Han,et al.  Almost Sure Stability of Nonlinear Systems Under Random and Impulsive Sequential Attacks , 2020, IEEE Transactions on Automatic Control.

[6]  Ligang Wu,et al.  Stochastic Stability Analysis and Control of Secondary Frequency Regulation for Islanded Microgrids Under Random Denial of Service Attacks , 2019, IEEE Transactions on Industrial Informatics.

[7]  Derui Ding,et al.  Distributed Maximum Correntropy Filtering for Stochastic Nonlinear Systems Under Deception Attacks , 2020, IEEE Transactions on Cybernetics.

[8]  Shreyas Sundaram,et al.  Distributed Function Calculation via Linear Iterative Strategies in the Presence of Malicious Agents , 2011, IEEE Transactions on Automatic Control.

[9]  Yang Xiang,et al.  A survey on security control and attack detection for industrial cyber-physical systems , 2018, Neurocomputing.

[10]  Zhen Xiao,et al.  Adversarial Attacks and Defenses on Cyber–Physical Systems: A Survey , 2020, IEEE Internet of Things Journal.

[11]  Xiaowu Mu,et al.  Observer‐based consensus control of nonlinear multiagent systems under semi‐Markovian switching topologies and cyber attacks , 2020 .

[12]  Yuanqing Xia,et al.  Resilient State Estimation of Cyber-Physical System With Multichannel Transmission Under DoS Attack , 2021, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[13]  Bruno Sinopoli,et al.  Physical Authentication of Control Systems: Designing Watermarked Control Inputs to Detect Counterfeit Sensor Outputs , 2015, IEEE Control Systems.

[14]  Marilyn Wolf,et al.  Safety and Security in Cyber-Physical Systems and Internet-of-Things Systems , 2018, Proceedings of the IEEE.

[15]  Ling Shi,et al.  Sparse Linear Injection Attack on Multi-Agent Consensus Control Systems , 2021, IEEE Control Systems Letters.

[16]  Dong Yue,et al.  Distributed Resilient Finite-Time Secondary Control for Heterogeneous Battery Energy Storage Systems Under Denial-of-Service Attacks , 2020, IEEE Transactions on Industrial Informatics.

[17]  Insup Lee,et al.  Design and Implementation of Attack-Resilient Cyberphysical Systems: With a Focus on Attack-Resilient State Estimators , 2017, IEEE Control Systems.

[18]  Xiao-Jian Li,et al.  Data-Driven Output-Feedback LQ Secure Control for Unknown Cyber-Physical Systems Against Sparse Actuator Attacks , 2021, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[19]  Frank L. Lewis,et al.  Resilient Networked AC Microgrids Under Unbounded Cyber Attacks , 2020, IEEE Transactions on Smart Grid.

[20]  An-Yang Lu,et al.  Observer-Based Control for Cyber-Physical Systems Under Denial-of-Service With a Decentralized Event-Triggered Scheme , 2020, IEEE Transactions on Cybernetics.

[21]  Mohammad Sayad Haghighi,et al.  Artificial Intelligence for Detection, Estimation, and Compensation of Malicious Attacks in Nonlinear Cyber-Physical Systems and Industrial IoT , 2020, IEEE Transactions on Industrial Informatics.

[22]  Qing-Long Han,et al.  Secure impulsive synchronization in Lipschitz-type multi-agent systems subject to deception attacks , 2020, IEEE/CAA Journal of Automatica Sinica.

[23]  Qing-Long Han,et al.  A Set-Membership Approach to Event-Triggered Filtering for General Nonlinear Systems Over Sensor Networks , 2020, IEEE Transactions on Automatic Control.

[24]  Bruno Sinopoli,et al.  Detecting Integrity Attacks on SCADA Systems , 2014, IEEE Transactions on Control Systems Technology.

[25]  Paulo Tabuada,et al.  Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.

[26]  Luca Zaccarian,et al.  Stubborn state observers for linear time-invariant systems , 2018, Autom..

[27]  Derui Ding,et al.  Event-based resilient filtering for stochastic nonlinear systems via innovation constraints , 2021, Inf. Sci..

[28]  Peter Willett,et al.  Feature article: security of SCADA systems against cyber–physical attacks , 2017, IEEE Aerospace and Electronic Systems Magazine.

[29]  Xiangpeng Xie,et al.  Resilient Event-Triggered Controller Synthesis of Networked Control Systems Under Periodic DoS Jamming Attacks , 2019, IEEE Transactions on Cybernetics.

[30]  Pietro Tesi,et al.  Input-to-State Stabilizing Control Under Denial-of-Service , 2015, IEEE Transactions on Automatic Control.

[31]  Derui Ding,et al.  Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks , 2017, Autom..

[32]  Hongli Dong,et al.  Robust Partial-Nodes-Based State Estimation for Complex Networks Under Deception Attacks , 2020, IEEE Transactions on Cybernetics.

[33]  Karl Henrik Johansson,et al.  Secure Control Systems: A Quantitative Risk Management Approach , 2015, IEEE Control Systems.

[34]  Guang-Hong Yang,et al.  Secure State Estimation Against Sparse Sensor Attacks With Adaptive Switching Mechanism , 2018, IEEE Transactions on Automatic Control.

[35]  Luca Zaccarian,et al.  Synchronization in Networks of Identical Nonlinear Systems via Dynamic Dead Zones , 2019, IEEE Control Systems Letters.

[36]  Paulo Tabuada,et al.  Secure State Estimation for Cyber-Physical Systems Under Sensor Attacks: A Satisfiability Modulo Theory Approach , 2014, IEEE Transactions on Automatic Control.

[37]  Pietro Tesi,et al.  Resilient Control under Denial-of-Service , 2013, ArXiv.

[38]  Yuanqing Xia,et al.  Stability analysis on networked control systems under double attacks with predictive control , 2019, International Journal of Robust and Nonlinear Control.

[39]  Steffi Knorn,et al.  Effects of Jamming Attacks on a Control System With Energy Harvesting , 2019, IEEE Control Systems Letters.

[40]  Chengcui Zhang,et al.  Stochastic Game in Linear Quadratic Gaussian Control for Wireless Networked Control Systems Under DoS Attacks , 2022, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[41]  Ruochi Zhang,et al.  False Data Injection and Detection in LQG Systems: A Game Theoretic Approach , 2020, IEEE Transactions on Control of Network Systems.

[42]  Wei Xing Zheng,et al.  Resilient Consensus of Discrete-Time Complex Cyber-Physical Networks Under Deception Attacks , 2020, IEEE Transactions on Industrial Informatics.

[43]  Minrui Fei,et al.  Resilient Event-Triggering $H_{\infty }$ Load Frequency Control for Multi-Area Power Systems With Energy-Limited DoS Attacks , 2017, IEEE Transactions on Power Systems.

[44]  Guang-Hong Yang,et al.  LQ Secure Control for Cyber-Physical Systems Against Sparse Sensor and Actuator Attacks , 2019, IEEE Transactions on Control of Network Systems.

[45]  Wei Xing Zheng,et al.  Observer-Based Control for Cyber-Physical Systems With Periodic DoS Attacks via a Cyclic Switching Strategy , 2020, IEEE Transactions on Automatic Control.

[46]  Quanyan Zhu,et al.  Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.

[47]  Yilin Mo,et al.  Attack-Resilient H_2, H_∞, and ℓ_1 State Estimator , 2018, 1803.07053.

[48]  Daniel W. C. Ho,et al.  Observer-Based PID Security Control for Discrete Time-Delay Systems Under Cyber-Attacks , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[49]  Zhao Yang Dong,et al.  A Survey on the Detection Algorithms for False Data Injection Attacks in Smart Grids , 2020, IEEE Transactions on Smart Grid.

[50]  Tao Jiang,et al.  Blind False Data Attacks Against AC State Estimation Based on Geometric Approach in Smart Grid Communications , 2018, IEEE Transactions on Smart Grid.

[51]  Walter Lucia,et al.  Resilient Control for Cyber-Physical Systems Subject to Replay Attacks , 2019, IEEE Control Systems Letters.

[52]  Antonio Bicchi,et al.  Consensus Computation in Unreliable Networks: A System Theoretic Approach , 2010, IEEE Transactions on Automatic Control.

[53]  Soummya Kar,et al.  Resilient Distributed Estimation: Sensor Attacks , 2017, IEEE Transactions on Automatic Control.

[54]  Xavier Litrico,et al.  Cyber Security of Water SCADA Systems—Part I: Analysis and Experimentation of Stealthy Deception Attacks , 2013, IEEE Transactions on Control Systems Technology.

[55]  Qing-Long Han,et al.  Distributed Event-Triggered Estimation Over Sensor Networks: A Survey , 2020, IEEE Transactions on Cybernetics.

[56]  Qing-Long Han,et al.  Variance-Constrained Distributed Filtering for Time-Varying Systems With Multiplicative Noises and Deception Attacks Over Sensor Networks , 2017, IEEE Sensors Journal.

[57]  Qing-Long Han,et al.  Distributed Secondary Control for Active Power Sharing and Frequency Regulation in Islanded Microgrids Using an Event-Triggered Communication Mechanism , 2019, IEEE Transactions on Industrial Informatics.

[58]  Qing-Long Han,et al.  Distributed Resilient Estimator Design for Positive Systems Under Topological Attacks , 2020, IEEE Transactions on Cybernetics.

[59]  Qing-Long Han,et al.  A Dynamic Event-Triggered Transmission Scheme for Distributed Set-Membership Estimation Over Wireless Sensor Networks , 2019, IEEE Transactions on Cybernetics.

[60]  Guoqiang Hu,et al.  Distributed Secure Cooperative Control Under Denial-of-Service Attacks From Multiple Adversaries , 2020, IEEE Transactions on Cybernetics.

[61]  Eman Mousavinejad,et al.  Distributed Cyber Attacks Detection and Recovery Mechanism for Vehicle Platooning , 2020, IEEE Transactions on Intelligent Transportation Systems.

[62]  Hyungbo Shim,et al.  Stealthy Adversaries Against Uncertain Cyber-Physical Systems: Threat of Robust Zero-Dynamics Attack , 2019, IEEE Transactions on Automatic Control.

[63]  Qing-Long Han,et al.  Security Control for Discrete-Time Stochastic Nonlinear Systems Subject to Deception Attacks , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[64]  Van Long Do,et al.  Sequential Detection and Isolation of Cyber-physical Attacks on SCADA Systems. (Détection et localisation séquentielle d'attaques cyber-physiques aux systèmes SCADA) , 2015 .

[65]  Huosheng Hu,et al.  Stability analysis of token-based wireless networked control systems under deception attacks , 2018, Inf. Sci..

[66]  Qing-Long Han,et al.  Resilient Control Design Based on a Sampled-Data Model for a Class of Networked Control Systems Under Denial-of-Service Attacks , 2019, IEEE Transactions on Cybernetics.

[67]  Karl Henrik Johansson,et al.  A secure control framework for resource-limited adversaries , 2012, Autom..

[68]  Derui Ding,et al.  Recursive Filtering of Distributed Cyber-Physical Systems With Attack Detection , 2021, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[69]  Guang-Hong Yang,et al.  Secure estimation for cyber‐physical systems with adversarial attacks and unknown inputs: An L2‐gain method , 2018 .

[70]  M. Pirani,et al.  A systems and control perspective of CPS security , 2019, Annu. Rev. Control..

[71]  Aron Laszka,et al.  Improving Network Connectivity and Robustness Using Trusted Nodes With Application to Resilient Consensus , 2018, IEEE Transactions on Control of Network Systems.

[72]  Paulo S. P. Pessim,et al.  State-Feedback Control for Cyber-Physical LPV Systems Under DoS Attacks , 2021, IEEE Control Systems Letters.

[73]  Paulo Tabuada,et al.  Securing state reconstruction under sensor and actuator attacks: Theory and design , 2020, Autom..

[74]  Xavier Litrico,et al.  Cyber Security of Water SCADA Systems—Part II: Attack Detection Using Enhanced Hydrodynamic Models , 2013, IEEE Transactions on Control Systems Technology.

[75]  Yuanqing Xia,et al.  Distributed Secure Filtering for Discrete-Time Systems Under Round-Robin Protocol and Deception Attacks , 2020, IEEE Transactions on Cybernetics.

[76]  Lei Zou,et al.  Recursive Filtering for Time-Varying Systems With Random Access Protocol , 2019, IEEE Transactions on Automatic Control.

[77]  Frank L. Lewis,et al.  Distributed Resilient Secondary Control of DC Microgrids Against Unbounded Attacks , 2020, IEEE Transactions on Smart Grid.

[78]  Daniel W. C. Ho,et al.  Observer-Based Event-Triggering Consensus Control for Multiagent Systems With Lossy Sensors and Cyber-Attacks , 2017, IEEE Transactions on Cybernetics.

[79]  Lei Guo,et al.  Resilient Control of Wireless Networked Control System Under Denial-of-Service Attacks: A Cross-Layer Design Approach , 2020, IEEE Transactions on Cybernetics.

[80]  Guang-Hong Yang,et al.  Secure Switched Observers for Cyber-Physical Systems Under Sparse Sensor Attacks: A Set Cover Approach , 2019, IEEE Transactions on Automatic Control.

[81]  Hamidreza Modares,et al.  Resilient Autonomous Control of Distributed Multiagent Systems in Contested Environments , 2017, IEEE Transactions on Cybernetics.

[82]  Guanghui Sun,et al.  State estimation and self-triggered control of CPSs against joint sensor and actuator attacks , 2020, Autom..

[83]  Aditya Ashok,et al.  Cyber-Physical Attack-Resilient Wide-Area Monitoring, Protection, and Control for the Power Grid , 2017, Proceedings of the IEEE.

[84]  Charalambos Konstantinou,et al.  Enhanced Resilient State Estimation Using Data-Driven Auxiliary Models , 2020, IEEE Transactions on Industrial Informatics.

[85]  Lei Guo,et al.  Resilient Control of Networked Control System Under DoS Attacks: A Unified Game Approach , 2016, IEEE Transactions on Industrial Informatics.

[86]  Jianhui Wang,et al.  Resilience Analysis of DC Microgrids Under Denial of Service Threats , 2019, IEEE Transactions on Power Systems.

[87]  Guoqiang Hu,et al.  Secure Cooperative Event-Triggered Control of Linear Multiagent Systems Under DoS Attacks , 2020, IEEE Transactions on Control Systems Technology.

[88]  Hongtao Sun,et al.  A Survey on Security Communication and Control for Smart Grids Under Malicious Cyber Attacks , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[89]  Qing-Long Han,et al.  Neural-Network-Based Output-Feedback Control Under Round-Robin Scheduling Protocols , 2019, IEEE Transactions on Cybernetics.

[90]  Chao Yang,et al.  Distributed filtering under false data injection attacks , 2019, Autom..

[91]  Jie Cao,et al.  Event-Triggered $H_\infty$ Load Frequency Control for Multiarea Power Systems Under Hybrid Cyber Attacks , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[92]  Paulo Tabuada,et al.  Secure State Estimation Against Sensor Attacks in the Presence of Noise , 2015, IEEE Transactions on Control of Network Systems.

[93]  Guang-Hong Yang,et al.  Switched projected gradient descent algorithms for secure state estimation under sparse sensor attacks , 2019, Autom..

[94]  Chengnian Long,et al.  Dynamic State Recovery for Cyber-Physical Systems Under Switching Location Attacks , 2017, IEEE Transactions on Control of Network Systems.

[95]  Zidong Wang,et al.  State-Saturated Recursive Filter Design for Stochastic Time-Varying Nonlinear Complex Networks Under Deception Attacks , 2019, IEEE Transactions on Neural Networks and Learning Systems.

[96]  Qing-Long Han,et al.  Distributed Krein space-based attack detection over sensor networks under deception attacks , 2019, Autom..

[97]  Quanyan Zhu,et al.  A hybrid stochastic game for secure control of cyber-physical systems , 2018, Autom..

[98]  Wei Chen,et al.  Distributed Resilient Filtering for Power Systems Subject to Denial-of-Service Attacks , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[99]  Qing-Long Han,et al.  State estimation under false data injection attacks: Security analysis and system protection , 2018, Autom..

[100]  Qing-Long Han,et al.  Networked control systems: a survey of trends and techniques , 2020, IEEE/CAA Journal of Automatica Sinica.

[101]  Lei Zou,et al.  Moving Horizon Estimation for Networked Time-Delay Systems Under Round-Robin Protocol , 2019, IEEE Transactions on Automatic Control.

[102]  Yilin Mo,et al.  On the Performance Analysis of Reset Attack in Cyber-Physical Systems , 2020, IEEE Transactions on Automatic Control.

[103]  Fuwen Yang,et al.  Resilient and secure remote monitoring for a class of cyber-physical systems against attacks , 2020, Inf. Sci..

[104]  Qing-Long Han,et al.  Dynamic Event-Triggered Distributed Coordination Control and its Applications: A Survey of Trends and Techniques , 2020, IEEE Transactions on Systems, Man, and Cybernetics: Systems.