2019 18th European Control Conference (ECC) 2019
DOI: 10.23919/ecc.2019.8796178
|View full text |Cite
|
Sign up to set email alerts
|

An Unknown Input Multi-Observer Approach for Estimation, Attack Isolation, and Control of LTI Systems under Actuator Attacks

Abstract: We address the problem of state estimation, attack isolation, and control of discrete-time linear time-invariant systems under (potentially unbounded) actuator and sensor false data injection attacks. Using a bank of unknown input observers, each observer leading to an exponentially stable estimation error (in the attack-free case), we propose an observer-based estimator that provides exponential estimates of the system state in spite of actuator and sensor attacks. Exploiting sensor and actuator redundancy, t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
6
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 38 publications
(70 reference statements)
0
6
0
Order By: Relevance
“…These works capture the process dynamics in the form of system models and use the point change detection methods to detect attacks in the process data. A similar recent approach [47] does isolate the attack but only the attacks on the actuators. Sensor fusion [34] and multi observer techniques [43] are recent efforts on attack isolation problem in simulated environments.…”
Section: System and Process Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…These works capture the process dynamics in the form of system models and use the point change detection methods to detect attacks in the process data. A similar recent approach [47] does isolate the attack but only the attacks on the actuators. Sensor fusion [34] and multi observer techniques [43] are recent efforts on attack isolation problem in simulated environments.…”
Section: System and Process Modelmentioning
confidence: 99%
“…The Attack Isolation Problem: The attack isolation problem also known as determining the source of an attack is important in the context of ICS [47]. Anomaly detection research suffers from this issue, especially methods rooted in machine learning [41,2].…”
Section: Introductionmentioning
confidence: 99%
“…Finally, valuation rings like finite hyperreals 7 and power series algebras 𝕂false[false[xfalse]false] are also Hermite rings. Some regulation problems of cyber‐security systems 8 might be faced as regulation problems on linear systems with infinitesimal inputs, that is, over the ring of finite hyperreals, 9,10 or over some Krylov hyperreal space 11 . Classical reference for Hermite rings is Kaplansky's seminal work 12 .…”
Section: Introductionmentioning
confidence: 99%
“…Finally, our conclusions are given in Section 5. Special attention is payed to the regulator problem for linear systems with outputs 8,15 …”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation