Research on Secure State Estimation and Recovery Control for CPS under Stealthy Attacks

被引:0
|
作者
Yang, Biao [1 ]
Xin, Liang [1 ]
Long, Zhiqiang [1 ]
机构
[1] Natl Univ Def Technol, Coll Intelligence Sci & Technol, Changsha 410073, Peoples R China
基金
中国国家自然科学基金;
关键词
cyber-physical systems (CPSs); secure state estimation; recovery control; stealthy attacks; improved Kalman filter; internal model control (IMC); CYBER-PHYSICAL SYSTEMS; ACTUATOR;
D O I
10.3390/act12110427
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
As the application of cyber-physical systems (CPSs) becomes more and more widespread, its security is becoming a focus of attention. Currently, there has been much research on the security defense of the physical layer of the CPS. However, most of the research only focuses on one of the aspects, for example, attack detection, security state estimation, or recovery control. Obviously, the effectiveness of security defense targeting only one aspect is limited. Therefore, in this paper, a set of security defense processes is proposed for the case that a CPS containing multiple sensors is subject to three kinds of stealthy attacks (i.e., zero-dynamics attack, covert attack, and replay attack). Firstly, the existing attack detection method based on improved residuals is used to detect stealthy attacks. Secondly, based on the detection results, an optimal state estimation method based on improved Kalman filtering is proposed to estimate the actual state of the system. Then, based on the optimal state, internal model control (IMC) is introduced to complete the recovery control of the system. Finally, the proposed methods are integrated to give a complete security defense process, and the simulation is verified for three kinds of stealthy attacks. The simulation results show that the proposed methods are effective.
引用
收藏
页数:17
相关论文
共 50 条
  • [21] Secure State Estimation of Cyber-Physical Systems Under Switching Attacks
    Forti, N.
    Battistelli, G.
    Chisci, L.
    Sinopoli, B.
    IFAC PAPERSONLINE, 2017, 50 (01): : 4979 - 4986
  • [22] Secure Distributed State Estimation for Sequentially Interconnected CPSs Under FDI Attacks
    Zhou, Jing
    Chen, Bo
    Li, Tongxiang
    Qiu, Xiang
    Yu, Li
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2024, 71 (04) : 2454 - 2458
  • [23] Optimal Linear Encryption Against Stealthy Attacks on Remote State Estimation
    Shang, Jun
    Chen, Maoyin
    Chen, Tongwen
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (08) : 3592 - 3607
  • [24] A Formal Model for Verifying Stealthy Attacks on State Estimation in Power Grids
    Rahman, Mohammad Ashiqur
    Al-Shaer, Ehab
    Rahman, Md Ashfaqur
    2013 IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM), 2013, : 414 - 419
  • [25] Attack detection and security control for quadrotor under stealthy attacks
    Wu, Chengwei
    Zhu, Yupeng
    Xu, Lezhong
    Zhu, Hongming
    Zhang, Quanqi
    Zhu, Jiajing
    Yao, Weiran
    SYSTEMS & CONTROL LETTERS, 2025, 197
  • [26] Globally Stealthy Attacks Against Distributed State Estimation in Smart Grid
    Xu, Shaojie
    Ye, Dan
    Li, Guangdi
    Yang, Dongsheng
    IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2024, : 1 - 11
  • [27] Forensic readiness of industrial control systems under stealthy attacks
    Azzam, Mazen
    Pasquale, Liliana
    Provan, Gregory
    Nuseibeh, Bashar
    COMPUTERS & SECURITY, 2023, 125
  • [28] Security Allocation in Networked Control Systems Under Stealthy Attacks
    Nguyen, Anh Tung
    Teixeira, Andre M. H.
    Medvedev, Alexander
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2025, 12 (01): : 216 - 227
  • [29] Secure State Estimation under Measurement Attacks using Virtual State in Distributed Observer System
    Sato, Shotaro
    Namerikawa, Toru
    2019 12TH ASIAN CONTROL CONFERENCE (ASCC), 2019, : 1683 - 1688
  • [30] Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks
    Fawzi, Hamza
    Tabuada, Paulo
    Diggavi, Suhas
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2014, 59 (06) : 1454 - 1467