Resilient Reinforcement in Secure State Estimation Against Sensor Attacks With A Priori Information

Recent control systems severe depend on information technology infrastructures, especially the Internet of things (IoT) devices, which create many opportunities for the interaction between the physical world and cyberspace. Due to the tight connection, however, cyber attacks have the potential to generate evil consequences for the physical entities, and therefore, securing control systems is a vital issue to be addressed for building smart societies. To this end, this paper especially deals with the state estimation problem in the presence of malicious sensor attacks. Unlike the existing work, in this paper, we consider the problem with a priori information of the state to be estimated. Specifically, we address three prior knowledge—the sparsity information, $ (\alpha, \bar{n}_0)$-sparsity information, and side information, and in each scenario, we show that the state can be reconstructed even if more sensors are compromised. This implies that the prior information reinforces the system resilience against malicious sensor attacks. Then, an estimator under sensor attacks considering the information is developed and, under a certain condition, the estimator can be relaxed into a tractable convex optimization problem. Further, we extend this analysis to systems in the presence of measurement noises, and it is shown that the prior information reduces the state-estimation error caused by the noise. The numerical simulations in a diffusion process finally illustrate the reinforcement and error-reduction results with the information.

[1]  Paulo Tabuada,et al.  Secure State Estimation for Cyber-Physical Systems Under Sensor Attacks: A Satisfiability Modulo Theory Approach , 2014, IEEE Transactions on Automatic Control.

[2]  Toru Namerikawa,et al.  Consensus-Based Cooperative Formation Control for Multiquadcopter System With Unidirectional Network Connections , 2018 .

[3]  Paulo Tabuada,et al.  Event-Triggered State Observers for Sparse Sensor Noise/Attacks , 2013, IEEE Transactions on Automatic Control.

[4]  Claire J. Tomlin,et al.  Secure State Estimation and Control for Cyber Security of the Nonlinear Power Systems , 2018, IEEE Transactions on Control of Network Systems.

[5]  Ralph Langner,et al.  Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.

[6]  Eduard Heindl,et al.  Understanding the spreading patterns of mobile phone viruses , 2012 .

[7]  Karl Henrik Johansson,et al.  A secure control framework for resource-limited adversaries , 2012, Autom..

[8]  Paulo Tabuada,et al.  Secure state reconstruction in differentially flat systems under sensor attacks using satisfiability modulo theory solving , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[9]  Siddharth Sridhar,et al.  Cyber-Physical System Security for the Electric Power Grid Controlinpowersystemsthatmaybevulnerabletosecurityattacksisdiscussedinthis paper as are control loop vulnerabilities, potential impact of disturbances, and several mitigations. , 2012 .

[10]  Bhaskar D. Rao,et al.  Sparse signal reconstruction from limited data using FOCUSS: a re-weighted minimum norm algorithm , 1997, IEEE Trans. Signal Process..

[11]  René Vidal,et al.  Block-Sparse Recovery via Convex Optimization , 2011, IEEE Transactions on Signal Processing.

[12]  Hyungbo Shim,et al.  Enhancement of security against zero dynamics attack via generalized hold , 2017, 2017 IEEE 56th Annual Conference on Decision and Control (CDC).

[13]  Toru Namerikawa,et al.  On the Vulnerabilities Due to Manipulative Zero-Stealthy Attacks in Cyber-Physical Systems , 2017 .

[14]  Toru Namerikawa,et al.  Reach Set-based Attack Resilient State Estimation against Omniscient Adversaries , 2018, 2018 Annual American Control Conference (ACC).

[15]  Toru Namerikawa,et al.  Manipulative zero-stealthy attacks in cyber-physical systems: Existence space of feasible attack objectives , 2017, 2017 IEEE Conference on Control Technology and Applications (CCTA).

[16]  Paulo Tabuada,et al.  Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.

[17]  Insup Lee,et al.  Design and Implementation of Attack-Resilient Cyberphysical Systems: With a Focus on Attack-Resilient State Estimators , 2017, IEEE Control Systems.

[18]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[19]  Bruno Sinopoli,et al.  A Graph-Theoretic Characterization of Perfect Attackability for Secure Design of Distributed Control Systems , 2017, IEEE Transactions on Control of Network Systems.

[20]  Balas K. Natarajan,et al.  Sparse Approximate Solutions to Linear Systems , 1995, SIAM J. Comput..

[21]  Marc E. Pfetsch,et al.  The Computational Complexity of the Restricted Isometry Property, the Nullspace Property, and Related Concepts in Compressed Sensing , 2012, IEEE Transactions on Information Theory.

[22]  Hyungbo Shim,et al.  Secure and robust state estimation under sensor attacks, measurement noises, and process disturbances: Observer-based combinatorial approach , 2015, 2015 European Control Conference (ECC).

[23]  Yilin Mo,et al.  Dynamic state estimation in the presence of compromised sensory data , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[24]  Michael Elad,et al.  Stable recovery of sparse overcomplete representations in the presence of noise , 2006, IEEE Transactions on Information Theory.

[25]  Francesco Bullo,et al.  Control-Theoretic Methods for Cyberphysical Security: Geometric Principles for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.

[26]  Soummya Kar,et al.  Dynamic Attack Detection in Cyber-Physical Systems With Side Initial State Information , 2015, IEEE Transactions on Automatic Control.

[27]  Bruno Sinopoli,et al.  Detecting Integrity Attacks on SCADA Systems , 2011 .

[28]  Paulo Tabuada,et al.  An SMT-based approach to secure state estimation under sensor and actuator attacks , 2017, 2017 IEEE 56th Annual Conference on Decision and Control (CDC).

[29]  T. Pultarova,et al.  News Briefing: Cyber security - Ukraine grid hack is wake-up call for network operators , 2016 .

[30]  Jianfeng Lu,et al.  Localization of diffusion sources in complex networks with sparse observations , 2018 .

[31]  Insup Lee,et al.  Attack-Resilient State Estimation for Noisy Dynamical Systems , 2017, IEEE Transactions on Control of Network Systems.

[32]  Bruno Sinopoli,et al.  On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks , 2016, IEEE Transactions on Automatic Control.

[33]  Michael Elad,et al.  Optimally sparse representation in general (nonorthogonal) dictionaries via ℓ1 minimization , 2003, Proceedings of the National Academy of Sciences of the United States of America.

[34]  Roy S. Smith,et al.  Covert Misappropriation of Networked Control Systems: Presenting a Feedback Structure , 2015, IEEE Control Systems.

[35]  Anuradha M. Annaswamy,et al.  Adaptive Control of Quadrotor UAVs: A Design Trade Study With Flight Evaluations , 2013, IEEE Transactions on Control Systems Technology.

[36]  Emmanuel J. Candès,et al.  Decoding by linear programming , 2005, IEEE Transactions on Information Theory.

[37]  Panganamala Ramana Kumar,et al.  Cyber–Physical Systems: A Perspective at the Centennial , 2012, Proceedings of the IEEE.

[38]  Jill Slay,et al.  Lessons Learned from the Maroochy Water Breach , 2007, Critical Infrastructure Protection.

[39]  Quanyan Zhu,et al.  Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks , 2016, IEEE Transactions on Control of Network Systems.

[40]  George J. Pappas,et al.  Design and Implementation of Attack-Resilient Cyber-Physical Systems , 2016 .

[41]  Paulo Tabuada,et al.  Attack-resilient state estimation in the presence of noise , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[42]  Gabor Karsai,et al.  Toward a Science of Cyber–Physical System Integration , 2012, Proceedings of the IEEE.

[43]  Bruno Sinopoli,et al.  Challenges for Securing Cyber Physical Systems , 2009 .

[44]  João Pedro Hespanha,et al.  Observability of linear systems under adversarial attacks , 2015, 2015 American Control Conference (ACC).