Secure iterative interval estimation method for cyber-physical systems subject to stealthy deception attacks

被引:0
|
作者
Zhang, Tu [1 ]
Zhang, Guobao [1 ,2 ]
Huang, Yongming [1 ]
机构
[1] Southeast Univ, Sch Automat, Nanjing, Peoples R China
[2] Southeast Univ, Sch Automat, Nanjing 210096, Peoples R China
关键词
Interval estimation; cyber-physical systems; secure estimation; linear matrix inequality; OBSERVER DESIGN; ACTUATOR;
D O I
10.1177/01423312231189107
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper studies a secure iterative interval estimation approach for cyber-physical systems subject to stealthy deception attacks. Under the hypothesis that the system is accessed by a stealthy attack, an iteration scheme integrating the T-N-L observer framework is employed to reconstruct the system state. With the help of a structure separation method, a sufficient condition in terms of linear matrix inequality is provided to obtain convergent observation errors under deception attacks. Resorting to the reachability analysis, a secure state interval is built by means of the analyzed attack bounds and the observation error interval. Simulation studies verify the effectiveness of the proposed method for attack and attack-free cases.
引用
收藏
页码:1084 / 1092
页数:9
相关论文
共 50 条
  • [1] Improved Interval Estimation Method for Cyber-Physical Systems Under Stealthy Deception Attacks
    Fan, Jianwei
    Huang, Jun
    Zhao, Xudong
    [J]. IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS, 2022, 8 : 1 - 11
  • [2] Stealthy Deception Attacks for Cyber-Physical Systems
    Goes, Romulo Meira
    Kang, Eunsuk
    Kwong, Raymond
    Lafortune, Stephane
    [J]. 2017 IEEE 56TH ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2017,
  • [3] Secure Interval Estimation for Event-Triggered Cyber-Physical Systems Under Stealthy Attacks
    Wang, Xudong
    Wang, Guoqi
    Fei, Zhongyang
    Li, Zhe
    [J]. IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2024, 11 (02): : 648 - 657
  • [4] Design of Stealthy Attacks Against Interval Estimation for Cyber-Physical Systems
    Li, Zhi-Hui
    Yang, Guang-Hong
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (02): : 2215 - 2222
  • [5] Security Analysis for Cyber-Physical Systems against Stealthy Deception Attacks
    Kwon, Cheolhyeon
    Liu, Weiyi
    Hwang, Inseok
    [J]. 2013 AMERICAN CONTROL CONFERENCE (ACC), 2013, : 3344 - 3349
  • [6] Attack detection and secure correction control for cyber-physical systems subject to actuator deception attacks
    He, Ke
    Long, Yue
    Li, Tieshan
    [J]. 2023 35TH CHINESE CONTROL AND DECISION CONFERENCE, CCDC, 2023, : 3356 - 3361
  • [7] Interval Observers for Secure Estimation in Cyber-Physical Systems
    Degue, Kwassi H.
    Efimov, Denis
    Le Ny, Jerome
    Feron, Eric
    [J]. 2018 IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2018, : 4559 - 4564
  • [8] Performance analysis for cyber-physical systems under two types of stealthy deception attacks
    Liu, Qingchen
    Wang, Jie
    Ni, Yuqing
    Zhang, Cong
    Shi, Ling
    Qin, Jiahu
    [J]. AUTOMATICA, 2024, 160
  • [9] Secure state estimation for event-triggered cyber-physical systems against deception attacks
    Han, Zhichen
    Zhang, Shengbing
    Jin, Zengwang
    Hu, Yanyan
    [J]. JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2022, 359 (18): : 11155 - 11185
  • [10] Robust Stealthy Covert Attacks on Cyber-Physical Systems
    Li, Xuerong
    Zhang, Ping
    Dong, Hongli
    [J]. IFAC PAPERSONLINE, 2022, 55 (06): : 520 - 525