Distributed Secure State Estimation Using Diffusion Kalman Filters and Reachability Analysis

The tight coupling of information technology with physical sensing and actuation in cyber-physical systems (CPS) has given rise to new security vulnerabilities and attacks with potentially life-threatening consequences. These attacks are designed to transfer the physical system into unstable and insecure states by providing corrupted sensor readings. In this work, we present an approach for distributed secure linear state estimation in the presence of modeling and measurement noise between a network of nodes with pairwise measurements. We provide security against measurement attacks and simplify the traditional distributed secure state estimation problem. Reachability analysis is utilized to establish a security layer providing secure estimate shares for the distributed diffusion Kalman filter. Furthermore, we consider not only attacks on the link level but also on the sensor level. The proposed combined filter protects against measurement and diffusion attacks without requiring specialized hardware or cryptographic techniques. The effectiveness of the approach is demonstrated by a localization example of a rotating target.

[1]  Matthias Althoff,et al.  Implementation of Interval Arithmetic in CORA 2016 , 2016, ARCH@CPSWeek.

[2]  Matthias Althoff,et al.  Implementation of Taylor models in CORA 2018 , 2018, ARCH@ADHS.

[3]  Yongduan Song,et al.  Distributed Secure State Estimation and Control for CPSs Under Sensor Attacks , 2020, IEEE Transactions on Cybernetics.

[4]  D. Kushner,et al.  The real story of stuxnet , 2013, IEEE Spectrum.

[5]  G. Padmavathi,et al.  A Survey on Various Cyber Attacks and their Classification , 2013, Int. J. Netw. Secur..

[6]  Paulo Tabuada,et al.  Robustness of attack-resilient state estimators , 2014, 2014 ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS).

[7]  Emanuele Garone,et al.  False data injection attacks against state estimation in wireless sensor networks , 2010, 49th IEEE Conference on Decision and Control (CDC).

[8]  Antoine Girard,et al.  Reachability of Uncertain Linear Systems Using Zonotopes , 2005, HSCC.

[9]  Wenyuan Xu,et al.  Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors , 2013, 2013 IEEE Symposium on Security and Privacy.

[10]  Vijay Gupta,et al.  On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds , 2017, IEEE Transactions on Automatic Control.

[11]  Paulo Tabuada,et al.  Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.

[12]  Florian Dörfler,et al.  A divide-and-conquer approach to distributed attack identification , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[13]  Guang-Hong Yang,et al.  Distributed secure state estimation for cyber-physical systems under sensor attacks , 2019, Autom..

[14]  Ali H. Sayed,et al.  Diffusion strategies for distributed Kalman filtering: formulation and performance analysis , 2008 .

[15]  Mani B. Srivastava,et al.  SecSens: Secure State Estimation with Application to Localization and Time Synchronization , 2018, ArXiv.

[16]  Matthias Althoff,et al.  Reachability Analysis and its Application to the Safety Assessment of Autonomous Cars , 2010 .

[17]  Vinay M. Igure,et al.  Security issues in SCADA networks , 2006, Comput. Secur..

[18]  S. Shankar Sastry,et al.  Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.

[19]  Bruno Sinopoli,et al.  Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[20]  Ali H. Sayed,et al.  Distributed nonlinear Kalman filtering with applications to wireless localization , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[21]  George J. Pappas,et al.  Stochastic game approach for replay attack detection , 2013, 52nd IEEE Conference on Decision and Control.

[22]  Mani B. Srivastava,et al.  D-SLATS: Distributed Simultaneous Localization and Time Synchronization , 2017, MobiHoc.

[23]  Francesco Bullo,et al.  Control-Theoretic Methods for Cyberphysical Security: Geometric Principles for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.

[24]  Ralph Langner,et al.  Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.

[25]  João Pedro Hespanha,et al.  Observability of linear systems under adversarial attacks , 2015, 2015 American Control Conference (ACC).

[26]  Vicenç Puig,et al.  Set-membership approach and Kalman observer based on zonotopes for discrete-time descriptor systems , 2018, Autom..

[27]  Eduardo F. Camacho,et al.  Guaranteed state estimation by zonotopes , 2005, Autom..

[28]  Jill Slay,et al.  Lessons Learned from the Maroochy Water Breach , 2007, Critical Infrastructure Protection.

[29]  Matthias Althoff,et al.  An Introduction to CORA 2015 , 2015, ARCH@CPSWeek.