State-Saturated Recursive Filter Design for Stochastic Time-Varying Nonlinear Complex Networks Under Deception Attacks

This article tackles the recursive filtering problem for a class of stochastic nonlinear time-varying complex networks (CNs) suffering from both the state saturations and the deception attacks. The nonlinear inner coupling and the state saturations are taken into account to characterize the nonlinear nature of CNs. From the defender’s perspective, the randomly occurring deception attack is governed by a set of Bernoulli binary distributed white sequence with a given probability. The objective of the addressed problem is to design a state-saturated recursive filter such that, in the simultaneous presence of the state saturations and the randomly occurring deception attacks, a certain upper bound is guaranteed on the filtering error covariance, and such an upper bound is then minimized at each time instant. By employing the induction method, an upper bound on the filtering error variance is first constructed in terms of the solutions to a set of matrix difference equations. Subsequently, the filter parameters are appropriately designed to minimize such an upper bound. Finally, a numerical simulation example is provided to demonstrate the feasibility and usefulness of the proposed filtering scheme.

[1]  Fuad E. Alsaadi,et al.  A Partial-Nodes-Based Information fusion approach to state estimation for discrete-Time delayed stochastic complex networks , 2019, Inf. Fusion.

[2]  Siddharth Sridhar,et al.  Cyber–Physical System Security for the Electric Power Grid , 2012, Proceedings of the IEEE.

[3]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2009, CCS.

[4]  Hongli Dong,et al.  Robust Partial-Nodes-Based State Estimation for Complex Networks Under Deception Attacks , 2020, IEEE Transactions on Cybernetics.

[5]  Gabriela Hug,et al.  Vulnerability Assessment of AC State Estimation With Respect to False Data Injection Cyber-Attacks , 2012, IEEE Transactions on Smart Grid.

[6]  Bo Chen,et al.  Event/Self-Triggered Control for Leader-Following Consensus Over Unreliable Network With DoS Attacks , 2019, IEEE Transactions on Neural Networks and Learning Systems.

[7]  Qing-Long Han,et al.  A Survey on Model-Based Distributed Control and Filtering for Industrial Cyber-Physical Systems , 2019, IEEE Transactions on Industrial Informatics.

[8]  Yuri B. Shtessel,et al.  Continuous Finite-Time Higher Order Output Regulators for Systems With Unmatched Unbounded Disturbances , 2016, IEEE Transactions on Industrial Electronics.

[9]  Maozhen Li,et al.  Distributed Set-Membership Filtering for Multirate Systems Under the Round-Robin Scheduling Over Sensor Networks , 2020, IEEE Transactions on Cybernetics.

[10]  Yukun Sun,et al.  Improvement on Stability Analysis for Linear Systems Under State Saturation , 2008, IEEE Transactions on Automatic Control.

[11]  Uri Shaked,et al.  Robust discrete-time minimum-variance filtering , 1996, IEEE Trans. Signal Process..

[12]  Jure Leskovec,et al.  Higher-order organization of complex networks , 2016, Science.

[13]  Emmanouil Magkos,et al.  Modeling security in cyber-physical systems , 2012, Int. J. Crit. Infrastructure Prot..

[14]  Donghua Zhou,et al.  Event-Based Recursive Distributed Filtering Over Wireless Sensor Networks , 2015, IEEE Transactions on Automatic Control.

[15]  William H. Sanders,et al.  SCPSE: Security-Oriented Cyber-Physical State Estimation for Power Grid Critical Infrastructures , 2012, IEEE Transactions on Smart Grid.

[16]  Lang Tong,et al.  Malicious Data Attacks on the Smart Grid , 2011, IEEE Transactions on Smart Grid.

[17]  H. Vincent Poor,et al.  Strategic Protection Against Data Injection Attacks on Power Grids , 2011, IEEE Transactions on Smart Grid.

[18]  S. Shankar Sastry,et al.  Rethinking security properties, threat models, and the design space in sensor networks: A case study in SCADA systems , 2009, Ad Hoc Networks.

[19]  Zidong Wang,et al.  State‐saturated H∞ filtering with randomly occurring nonlinearities and packet dropouts: the finite‐horizon case , 2013 .

[20]  Yun Gu,et al.  Extended Distributed State Estimation: A Detection Method against Tolerable False Data Injection Attacks in Smart Grids , 2014 .

[21]  Qing-Long Han,et al.  Regional Stabilization for Discrete Time-Delay Systems With Actuator Saturations via A Delay-Dependent Polytopic Approach , 2019, IEEE Transactions on Automatic Control.

[22]  Lei Zou,et al.  Finite-horizon H∞ state estimation for artificial neural networks with component-based distributed delays and stochastic protocol , 2018, Neurocomputing.

[23]  Renquan Lu,et al.  Finite-Horizon $l_2-l_\infty$ Synchronization for Time-Varying Markovian Jump Neural Networks Under Mixed-Type Attacks: Observer-Based Case , 2019, IEEE Transactions on Neural Networks and Learning Systems.

[24]  Zuyi Li,et al.  Guest Editorial Cyber, Physical, and System Security for Smart Grid , 2011 .

[25]  Lei Guo,et al.  On resilient strategy design of multi-tasking optimal control for state-saturated systems with nonlinear disturbances: The time-varying case , 2019, Autom..

[26]  Qing-Long Han,et al.  Effects of Coupling Delays on Synchronization in Lur'e Complex Dynamical Networks , 2010, Int. J. Bifurc. Chaos.

[27]  Guoqiang Hu,et al.  Distributed Covariance Intersection Fusion Estimation for Cyber-Physical Systems With Communication Constraints , 2016, IEEE Transactions on Automatic Control.

[28]  Guoqiang Hu,et al.  Distributed consensus tracking for multi‐agent systems under two types of attacks , 2016 .

[29]  Bruno Sinopoli,et al.  Integrity Data Attacks in Power Market Operations , 2011, IEEE Transactions on Smart Grid.

[30]  Qing-Long Han,et al.  Finite-Time $H_{\infty}$ State Estimation for Discrete Time-Delayed Genetic Regulatory Networks Under Stochastic Communication Protocols , 2018, IEEE Transactions on Circuits and Systems I: Regular Papers.

[31]  Peng Shi,et al.  Nonfragile State Estimation of Quantized Complex Networks With Switching Topologies , 2018, IEEE Transactions on Neural Networks and Learning Systems.

[32]  Yonggang Chen,et al.  Exponential Synchronization for Delayed Dynamical Networks via Intermittent Control: Dealing With Actuator Saturations , 2019, IEEE Transactions on Neural Networks and Learning Systems.

[33]  Daniel W. C. Ho,et al.  Distributed edge event‐triggered consensus protocol of multi‐agent systems with communication buffer , 2017 .

[34]  Renquan Lu,et al.  Asynchronous Dissipative State Estimation for Stochastic Complex Networks With Quantized Jumping Coupling and Uncertain Measurements , 2017, IEEE Transactions on Neural Networks and Learning Systems.

[35]  Charles R. Johnson,et al.  Topics in Matrix Analysis , 1991 .

[36]  Mourad Debbabi,et al.  Communication security for smart grid distribution networks , 2013, IEEE Communications Magazine.

[37]  Lang Tong,et al.  On Topology Attack of a Smart Grid: Undetectable Attacks and Countermeasures , 2013, IEEE Journal on Selected Areas in Communications.

[38]  Guang-Hong Yang,et al.  Optimal synchronization controller design for complex dynamical networks with unknown system dynamics , 2019, J. Frankl. Inst..

[39]  Zidong Wang,et al.  Variance-Constrained State Estimation for Complex Networks With Randomly Varying Topologies , 2018, IEEE Transactions on Neural Networks and Learning Systems.

[40]  Yurong Liu,et al.  Event-Triggered Partial-Nodes-Based State Estimation for Delayed Complex Networks With Bounded Distributed Delays , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[41]  Qing-Long Han,et al.  Event-Based Set-Membership Leader-Following Consensus of Networked Multi-Agent Systems Subject to Limited Communication Resources and Unknown-But-Bounded Noise , 2017, IEEE Transactions on Industrial Electronics.

[42]  Bruno Sinopoli,et al.  Secure Estimation in the Presence of Integrity Attacks , 2013, IEEE Transactions on Automatic Control.

[43]  Wei Qian,et al.  Global Consensus of Multiagent Systems With Internal Delays and Communication Delays , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[44]  Wei Chen,et al.  Distributed Resilient Filtering for Power Systems Subject to Denial-of-Service Attacks , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[45]  Zidong Wang,et al.  Near-Optimal Resilient Control Strategy Design for State-Saturated Networked Systems Under Stochastic Communication Protocol , 2019, IEEE Transactions on Cybernetics.

[46]  J. Sola,et al.  Importance of input data normalization for the application of neural networks to complex industrial problems , 1997 .

[47]  Heejo Lee,et al.  This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .