Finite time secure state estimation for linear cyber-physical systems with actuator and sensor attacks

被引:4
|
作者
Liu, Ang [1 ]
Ren, Yuwei [1 ,4 ]
Fang, Yixian [2 ]
Song, Xinmin [1 ]
Li, Chengdong [3 ]
机构
[1] Shandong Normal Univ, Sch Informat Sci & Engn, Jinan, Peoples R China
[2] Shandong Management Univ, Sch Informat Engn, Jinan, Peoples R China
[3] Shandong Jianzhu Univ, Sch Informat & Elect Engn, Jinan, Peoples R China
[4] Shandong Normal Univ, Sch Informat Sci & Engn, Jinan 250014, Peoples R China
基金
中国国家自然科学基金;
关键词
actuator attacks; cyber-physical systems; finite time observer; secure state estimation; sensor attacks; SPARSE ACTUATOR; OBSERVERS; FUTURE; CPSS;
D O I
10.1002/rnc.6870
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This manuscript studies the problem of secure state estimation (SSE) for a class of linear discrete cyber-physical systems (CPSs) considered with output disturbances, actuator, and sensor attacks. The disturbances and attacks considered are unbounded. A finite time SSE (FTSSE) method is designed to realize SSE for CPSs in a predetermined finite time. First, a finite time observer is designed to implement the FTSSE for CPSs with actuator attacks and output disturbances. After that, the FTSSE method for CPSs with simultaneous sensor attacks is proposed by extending the designed finite time observer. The necessary conditions for the existence of the proposed FTSSE method are given, and its effectiveness is analyzed theoretically. In addition, the simultaneous estimation of disturbance and attack can be achieved by the designed estimator when the system satisfies some given conditions. Finally, the effectiveness of the designed method is verified by a simulation experiment.
引用
收藏
页码:9701 / 9717
页数:17
相关论文
共 50 条
  • [21] Time-Stamp Attacks on Remote State Estimation in Cyber-Physical Systems
    Qu, Fuyi
    Yang, Nachuan
    Liu, Hao
    Li, Yuzhe
    Quevedo, Daniel E.
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2024, 11 (01): : 450 - 461
  • [22] Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks
    Fawzi, Hamza
    Tabuada, Paulo
    Diggavi, Suhas
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2014, 59 (06) : 1454 - 1467
  • [23] Composite Finite-Time Resilient Control for Cyber-Physical Systems Subject to Actuator Attacks
    Zhao, Yue
    Zhou, Chunjie
    Tian, Yu-Chu
    Qin, Yuanqing
    IEEE TRANSACTIONS ON CYBERNETICS, 2023, 53 (02) : 1063 - 1077
  • [24] Lasso-based state estimation for cyber-physical systems under sensor attacks
    Cerone, V.
    Fosson, S. M.
    Regruto, D.
    Ripa, F.
    IFAC PAPERSONLINE, 2024, 58 (15): : 163 - 168
  • [25] Secure State Estimation of Nonlinear Cyber-Physical Systems Against DoS Attacks: A Multiobserver Approach
    Yan, Jing-Jing
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON CYBERNETICS, 2023, 53 (03) : 1447 - 1459
  • [26] Distributed Secure State Estimation for Cyber-Physical Systems Under False Data Injection Attacks
    Zhang, Xin-Yu
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (05): : 4443 - 4455
  • [27] Secure state estimation for event-triggered cyber-physical systems against deception attacks
    Han, Zhichen
    Zhang, Shengbing
    Jin, Zengwang
    Hu, Yanyan
    JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2022, 359 (18): : 11155 - 11185
  • [28] Secure State Estimation and Control of Cyber-Physical Systems: A Survey
    Ding, Derui
    Han, Qing-Long
    Ge, Xiaohua
    Wang, Jun
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2021, 51 (01): : 176 - 190
  • [29] Undetectable Sensor and Actuator Attacks for Observer Based Controlled Cyber-Physical Systems
    Ayas, Mustafa Sinasi
    Djouadi, Seddik M.
    PROCEEDINGS OF 2016 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (SSCI), 2016,
  • [30] Adaptive Resilient Control of Cyber-Physical Systems Under Actuator and Sensor Attacks
    Zhao, Yue
    Du, Xin
    Zhou, Chunjie
    Tian, Yu-Chu
    Hu, Xiaoya
    Quevedo, Daniel E.
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (05) : 3203 - 3212