Distributed secure state estimation for cyber-physical systems under sensor attacks

Cyber–physical systems (CPSs) usually employ distributed sensor networks to gather, process and exchange information as a team. In contrast to the previous centralized secure state estimation (SSE) for CPSs, this paper proposes a distributed SSE algorithm via consensus-based distributed non-convex optimization protocols. The algorithm is implemented over a multi-agent network where each agent privately processes own sensing measurements while communicating with its neighbors via a graph topology. The combinatorial problem caused by the sparse sensor attacks is solved well via a transformation technique and a distributed vote location approach. Based on min-switching and check mechanisms, it is proved that the algorithm achieves consensus at the true system state with probability one under the condition of the graph being regular with a certain prescribed connectivity. Simulation results demonstrate the accuracy of the developed algorithm under the condition of attacks.

[1]  Yiguang Hong,et al.  Constrained Consensus Algorithms With Fixed Step Size for Distributed Convex Optimization Over Multiagent Networks , 2017, IEEE Transactions on Automatic Control.

[2]  Stephen P. Boyd,et al.  Distributed Optimization and Statistical Learning via the Alternating Direction Method of Multipliers , 2011, Found. Trends Mach. Learn..

[3]  Fen Wu,et al.  Analysis and control of switched linear systems via dwell-time min-switching , 2014, Syst. Control. Lett..

[4]  Guang-Hong Yang,et al.  Secure State Estimation Against Sparse Sensor Attacks With Adaptive Switching Mechanism , 2018, IEEE Transactions on Automatic Control.

[5]  Junshan Zhang,et al.  Optimal Allocation of Interconnecting Links in Cyber-Physical Systems: Interdependence, Cascading Failures, and Robustness , 2012, IEEE Transactions on Parallel and Distributed Systems.

[6]  Asuman E. Ozdaglar,et al.  Distributed Subgradient Methods for Multi-Agent Optimization , 2009, IEEE Transactions on Automatic Control.

[7]  Guoguang Zhang,et al.  Vibration control of three-inertia system , 1999, IECON'99. Conference Proceedings. 25th Annual Conference of the IEEE Industrial Electronics Society (Cat. No.99CH37029).

[8]  György Dán,et al.  Security of Fully Distributed Power System State Estimation: Detection and Mitigation of Data Integrity Attacks , 2014, IEEE Journal on Selected Areas in Communications.

[9]  Paulo Tabuada,et al.  Secure State Estimation for Cyber-Physical Systems Under Sensor Attacks: A Satisfiability Modulo Theory Approach , 2014, IEEE Transactions on Automatic Control.

[10]  Panos J. Antsaklis,et al.  Goals and Challenges in Cyber-Physical Systems Research Editorial of the Editor in Chief , 2014, IEEE Trans. Autom. Control..

[11]  Bahman Gharesifard,et al.  Distributed Continuous-Time Convex Optimization on Weight-Balanced Digraphs , 2012, IEEE Transactions on Automatic Control.

[12]  Giorgio Battistelli,et al.  Distributed Joint Attack Detection and Secure State Estimation , 2018, IEEE Transactions on Signal and Information Processing over Networks.

[13]  B. Gharesifard,et al.  Distributed Optimization Under Adversarial Nodes , 2016, IEEE Transactions on Automatic Control.

[14]  Marios M. Polycarpou,et al.  Distributed Sensor Fault Diagnosis for a Network of Interconnected Cyberphysical Systems , 2015, IEEE Transactions on Control of Network Systems.

[15]  Patrizio Colaneri,et al.  Stability and Stabilization of Continuous-Time Switched Linear Systems , 2006, SIAM J. Control. Optim..

[16]  Paulo Tabuada,et al.  Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.

[17]  Asuman E. Ozdaglar,et al.  Distributed Subgradient Methods for Convex Optimization Over Random Networks , 2011, IEEE Transactions on Automatic Control.

[18]  João Pedro Hespanha,et al.  Observability of linear systems under adversarial attacks , 2015, 2015 American Control Conference (ACC).

[19]  Qing-Guo Wang,et al.  Resilient distributed optimization algorithm against adversary attacks , 2017, 2017 13th IEEE International Conference on Control & Automation (ICCA).

[20]  H. Vincent Poor,et al.  Sparse Attack Construction and State Estimation in the Smart Grid: Centralized and Distributed Models , 2013, IEEE Journal on Selected Areas in Communications.

[21]  Guang-Hong Yang,et al.  Secure Switched Observers for Cyber-Physical Systems Under Sparse Sensor Attacks: A Set Cover Approach , 2019, IEEE Transactions on Automatic Control.

[22]  Changyun Wen,et al.  Distributed robust attack detection and reconstruction for a class of uncertain nonlinear interconnected CPSs , 2016, 2016 12th World Congress on Intelligent Control and Automation (WCICA).

[23]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[24]  Uri Shaked,et al.  Robust State-Dependent Switching of Linear Systems With Dwell Time , 2013, IEEE Transactions on Automatic Control.

[25]  Hyungbo Shim,et al.  On Redundant Observability: From Security Index to Attack Detection and Resilient State Estimation , 2018, IEEE Transactions on Automatic Control.

[26]  Balasubramaniam Natarajan,et al.  State Estimation Over a Lossy Network in Spatially Distributed Cyber-Physical Systems , 2014, IEEE Transactions on Signal Processing.

[27]  Ling Shi,et al.  Time Synchronization in WSNs: A Maximum-Value-Based Consensus Approach , 2014, IEEE Transactions on Automatic Control.

[28]  Yiguang Hong,et al.  Quantized Subgradient Algorithm and Data-Rate Analysis for Distributed Optimization , 2014, IEEE Transactions on Control of Network Systems.

[29]  Guang-Hong Yang,et al.  State Estimation Under Sparse Sensor Attacks: A Constrained Set Partitioning Approach , 2019, IEEE Transactions on Automatic Control.

[30]  Paulo Tabuada,et al.  Event-Triggered State Observers for Sparse Sensor Noise/Attacks , 2013, IEEE Transactions on Automatic Control.

[31]  Ruggero Carli,et al.  Distributed estimation via iterative projections with application to power network monitoring , 2011, Autom..

[32]  Emmanuel J. Candès,et al.  Decoding by linear programming , 2005, IEEE Transactions on Information Theory.

[33]  Shreyas Sundaram,et al.  Distributed Function Calculation via Linear Iterative Strategies in the Presence of Malicious Agents , 2011, IEEE Transactions on Automatic Control.