Secure Fusion Estimation for Bandwidth Constrained Cyber-Physical Systems Under Replay Attacks

State estimation plays an essential role in the monitoring and supervision of cyber-physical systems (CPSs), and its importance has made the security and estimation performance a major concern. In this case, multisensor information fusion estimation (MIFE) provides an attractive alternative to study secure estimation problems because MIFE can potentially improve estimation accuracy and enhance reliability and robustness against attacks. From the perspective of the defender, the secure distributed Kalman fusion estimation problem is investigated in this paper for a class of CPSs under replay attacks, where each local estimate obtained by the sink node is transmitted to a remote fusion center through bandwidth constrained communication channels. A new mathematical model with compensation strategy is proposed to characterize the replay attacks and bandwidth constrains, and then a recursive distributed Kalman fusion estimator (DKFE) is designed in the linear minimum variance sense. According to different communication frameworks, two classes of data compression and compensation algorithms are developed such that the DKFEs can achieve the desired performance. Several attack-dependent and bandwidth-dependent conditions are derived such that the DKFEs are secure under replay attacks. An illustrative example is given to demonstrate the effectiveness of the proposed methods.

[1]  Heejo Lee,et al.  This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .

[2]  Guoqiang Hu,et al.  Information Fusion Estimation for spatially distributed cyber-physical systems with communication delay and bandwidth constraints , 2015, 2015 American Control Conference (ACC).

[3]  Huijun Gao,et al.  Aggregation and Charging Control of PHEVs in Smart Grid: A Cyber–Physical Perspective , 2016, Proceedings of the IEEE.

[4]  Karl Henrik Johansson,et al.  Attack models and scenarios for networked control systems , 2012, HiCoNS '12.

[5]  Balasubramaniam Natarajan,et al.  State Estimation Over a Lossy Network in Spatially Distributed Cyber-Physical Systems , 2014, IEEE Transactions on Signal Processing.

[6]  Guoqiang Hu,et al.  Distributed Mixed $H_{2}/H_{\infty}$ Fusion Estimation With Limited Communication Capacity , 2016, IEEE Transactions on Automatic Control.

[7]  Guoqiang Hu,et al.  Distributed Fusion Estimation With Communication Bandwidth Constraints , 2015, IEEE Transactions on Automatic Control.

[8]  Jing Huang,et al.  State Estimation in Electric Power Grids: Meeting New Challenges Presented by the Requirements of the Future Grid , 2012, IEEE Signal Processing Magazine.

[9]  György Dán,et al.  Security of Fully Distributed Power System State Estimation: Detection and Mitigation of Data Integrity Attacks , 2014, IEEE Journal on Selected Areas in Communications.

[10]  Chongzhao Han,et al.  Optimal Linear Estimation Fusion — Part I : Unified Fusion Rules , 2001 .

[11]  Yugang Niu,et al.  Distributed estimation and filtering for sensor networks , 2011 .

[12]  Vijay Kumar,et al.  Robust Control for Mobility and Wireless Communication in Cyber–Physical Systems With Application to Robot Teams , 2012, Proceedings of the IEEE.

[13]  Zuyi Li,et al.  Modeling Load Redistribution Attacks in Power Systems , 2011, IEEE Transactions on Smart Grid.

[14]  Michail Maniatakos,et al.  Cyber-physical systems: A security perspective , 2015, 2015 20th IEEE European Test Symposium (ETS).

[15]  J. A. Roecker,et al.  Comparison of two-sensor tracking methods based on state vector fusion and measurement fusion , 1988 .

[16]  Te-son Kuo,et al.  Trace bounds on the solution of the algebraic matrix Riccati and Lyapunov equation , 1986 .

[17]  Shuzhi Sam Ge,et al.  Cognitive Radio Based State Estimation in Cyber-Physical Systems , 2014, IEEE Journal on Selected Areas in Communications.

[18]  G. Giannakis,et al.  Kalman Filtering in Wireless Sensor Networks , 2010, IEEE Control Systems.

[19]  Thia Kirubarajan,et al.  Estimation with Applications to Tracking and Navigation: Theory, Algorithms and Software , 2001 .

[20]  Jun Fang,et al.  Hyperplane-Based Vector Quantization for Distributed Estimation in Wireless Sensor Networks , 2009, IEEE Transactions on Information Theory.

[21]  Bruno Sinopoli,et al.  Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[22]  Chongzhao Han,et al.  Optimal linear estimation fusion .I. Unified fusion rules , 2003, IEEE Trans. Inf. Theory.

[23]  Sonia Martínez,et al.  On the Performance Analysis of Resilient Networked Control Systems Under Replay Attacks , 2013, IEEE Transactions on Automatic Control.

[24]  Yuan Gao,et al.  New approach to information fusion steady-state Kalman filtering , 2005, Autom..

[25]  Qiang Zhang,et al.  Node Topology Effect on Target Tracking Based on UWSNs Using Quantized Measurements , 2015, IEEE Transactions on Cybernetics.

[26]  H. Vincent Poor,et al.  Multicast Routing for Decentralized Control of Cyber Physical Systems with an Application in Smart Grid , 2012, IEEE Journal on Selected Areas in Communications.

[27]  Andrey V. Savkin,et al.  On false-data attacks in robust multi-sensor-based estimation , 2011, 2011 9th IEEE International Conference on Control and Automation (ICCA).

[28]  Aniruddha S. Gokhale,et al.  A Cyber Physical Systems Perspective on the Real-time and Reliable Dissemination of Information in Intelligent Transportation Systems , 2010, Netw. Protoc. Algorithms.

[29]  George J. Pappas,et al.  Stochastic game approach for replay attack detection , 2013, 52nd IEEE Conference on Decision and Control.

[30]  Bruno Sinopoli,et al.  Secure Estimation in the Presence of Integrity Attacks , 2013, IEEE Transactions on Automatic Control.

[31]  Yuanqing Xia,et al.  Design and Stability Analysis of Networked Predictive Control Systems , 2013, IEEE Transactions on Control Systems Technology.

[32]  F. Maan,et al.  Vulnerability assessment of AODV and SAODV routing protocols against network routing attacks and performance comparisons , 2011, 2011 Wireless Advanced.

[33]  Rick S. Blum,et al.  Asymptotically Optimum Distributed Estimation in the Presence of Attacks , 2015, IEEE Transactions on Signal Processing.

[34]  Wen-an Zhang,et al.  Distributed Finite-Horizon Fusion Kalman Filtering for Bandwidth and Energy Constrained Wireless Sensor Networks , 2014, IEEE Transactions on Signal Processing.

[35]  Daniel W. C. Ho,et al.  Networked Fusion Estimation With Bounded Noises , 2017, IEEE Transactions on Automatic Control.

[36]  S. Shankar Sastry,et al.  Research Challenges for the Security of Control Systems , 2008, HotSec.