State Estimation Under Sparse Sensor Attacks: A Constrained Set Partitioning Approach

State estimation from the sparsely corrupted measurements, a combinatorial problem, has been addressed by brute force search or convex relaxations in the literature. However, the computational efficiency and estimation correctness of these methods cannot be simultaneously guaranteed. This paper studies how to relieve the computational complexity on the premise of the estimation correctness. A novel algorithm based on a constrained set partitioning approach is presented. The computational efforts are alleviated by drastically reducing the search space, and the estimation correctness is guaranteed in terms of the existence of a solution for a set of linear matrix inequalities. The theoretical results are substantiated by simulating two numerical examples.

[1]  Guang-Hong Yang,et al.  Secure Switched Observers for Cyber-Physical Systems Under Sparse Sensor Attacks: A Set Cover Approach , 2019, IEEE Transactions on Automatic Control.

[2]  Roberto Battiti,et al.  Approximate Algorithms and Heuristics for MAX-SAT , 1998 .

[3]  Hyungbo Shim,et al.  On Redundant Observability: From Security Index to Attack Detection and Resilient State Estimation , 2018, IEEE Transactions on Automatic Control.

[4]  Yue Zhao,et al.  Minimum Sparsity of Unobservable Power Network Attacks , 2016, IEEE Transactions on Automatic Control.

[5]  Ling Shi,et al.  Optimal DoS Attack Scheduling in Wireless Networked Control System , 2016, IEEE Transactions on Control Systems Technology.

[6]  Ling Shi,et al.  Optimal Linear Cyber-Attack on Remote State Estimation , 2017, IEEE Transactions on Control of Network Systems.

[7]  Mark W. Lewis,et al.  A new modeling and solution approach for the set-partitioning problem , 2008, Comput. Oper. Res..

[8]  Paulo Tabuada,et al.  Event-Triggered State Observers for Sparse Sensor Noise/Attacks , 2013, IEEE Transactions on Automatic Control.

[9]  Paulo Tabuada,et al.  Secure State Estimation for Cyber-Physical Systems Under Sensor Attacks: A Satisfiability Modulo Theory Approach , 2014, IEEE Transactions on Automatic Control.

[10]  Ashish Tiwari,et al.  Safety envelope for security , 2014, HiCoNS.

[11]  Claire J. Tomlin,et al.  Secure Estimation based Kalman Filter for Cyber-Physical Systems against Adversarial Attacks , 2015, ArXiv.

[12]  Soummya Kar,et al.  Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems , 2016, IEEE Transactions on Control of Network Systems.

[13]  Bruno Sinopoli,et al.  Detecting Integrity Attacks on SCADA Systems , 2011 .

[14]  Guang-Hong Yang,et al.  Secure State Estimation Against Sparse Sensor Attacks With Adaptive Switching Mechanism , 2018, IEEE Transactions on Automatic Control.

[15]  Chengnian Long,et al.  Dynamic State Recovery for Cyber-Physical Systems Under Switching Location Attacks , 2017, IEEE Transactions on Control of Network Systems.

[16]  João Pedro Hespanha,et al.  Observability of linear systems under adversarial attacks , 2015, 2015 American Control Conference (ACC).

[17]  Claire J. Tomlin,et al.  Secure estimation based Kalman Filter for cyber-physical systems against sensor attacks , 2018, Autom..

[18]  Guang-Hong Yang,et al.  Secure state estimation for cyber-physical systems under sparse sensor attacks via a switched Luenberger observer , 2017, Inf. Sci..

[19]  Daniel Liberzon,et al.  Switching in Systems and Control , 2003, Systems & Control: Foundations & Applications.

[20]  Paulo Tabuada,et al.  Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.

[21]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.