2018
DOI: 10.1016/j.automatica.2018.03.040
|View full text |Cite
|
Sign up to set email alerts
|

Guaranteed model-based fault detection in cyber–physical systems: A model invalidation approach

Abstract: This paper presents a sound and complete fault detection approach for cyber-physical systems represented by hidden-mode switched affine models with time varying parametric uncertainty. The fault detection approach builds upon techniques from model invalidation. In particular, a set-membership approach is taken where the noisy input-output data is compared to the set of behaviors of a nominal model. As we show, this set-membership check can be reduced to the feasibility of a mixed-integer linear programming (MI… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
52
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 58 publications
(53 citation statements)
references
References 53 publications
1
52
0
Order By: Relevance
“…Moreover, SOS-1 constraints, which are by nature integral constraints, make the branch and bound search procedures noticeably faster (see, e.g., [28, Section 3.3.4] for a discussion). Our new model invalidation problem using SOS-1 constraints is presented below, which we will demonstrate to be much faster than an earlier formulation [20], [29] in Section VI-A.…”
Section: Model Invalidation and T -Detectability A Model Invalimentioning
confidence: 99%
See 2 more Smart Citations
“…Moreover, SOS-1 constraints, which are by nature integral constraints, make the branch and bound search procedures noticeably faster (see, e.g., [28, Section 3.3.4] for a discussion). Our new model invalidation problem using SOS-1 constraints is presented below, which we will demonstrate to be much faster than an earlier formulation [20], [29] in Section VI-A.…”
Section: Model Invalidation and T -Detectability A Model Invalimentioning
confidence: 99%
“…Thus, given two SWA models and an integer T , the T -distinguishability problem is to check whether the two models are T -distinguishable or not. This problem can be addressed using a Satisfiability Modulo Theory approach [20], or a MILP feasibility check [29]. As with model invalidation in the previous section, we will also propose an alternative MILP formulation for checking T -distinguishability, which employs SOS-1 type constraints and as before, is more intuitive and computationally superior (cf.…”
Section: B T -Distinguishabilitymentioning
confidence: 99%
See 1 more Smart Citation
“…In contrast, the method proposed in this paper is guaranteed to construct the state correctly in spite of attacks on sensors and/or actuators if the number of attacked components is below a specified threshold that depends on the system. In a recent work [15], Harirchi et. al.…”
Section: Introductionmentioning
confidence: 97%
“…The authors pursued a worst-case scenario approach and therefore their framework is suitable for security. However, necessary and sufficient conditions for state estimation in a general adversarial setting were not investigated in [15]. In this paper, we precisely characterize the class of systems, by providing necessary and sufficient conditions, for which state reconstruction is possible despite sensor and/or actuator attacks.…”
Section: Introductionmentioning
confidence: 99%