2014 ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS) 2014
DOI: 10.1109/iccps.2014.6843720
|View full text |Cite
|
Sign up to set email alerts
|

Robustness of attack-resilient state estimators

Abstract: The interaction between information technology and physical world makes Cyber-Physical Systems (CPS) vulnerable to malicious attacks beyond the standard cyber attacks. This has motivated the need for attack-resilient state estimation. Yet, the existing state-estimators are based on the non-realistic assumption that the exact system model is known. Consequently, in this work we present a method for state estimation in presence of attacks, for systems with noise and modeling errors. When the the estimated states… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
164
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 217 publications
(165 citation statements)
references
References 15 publications
1
164
0
Order By: Relevance
“…Therefore, for the general form of LTI systems (2), the state-estimation problem can be mapped into the state estimation for systems from (1), where control inputs are discarded. In addition, as shown in [15], the bounds on the size of measurement noise in (2) can be related to the bounds on the size of process and measurement noise vectors, v p and v m .…”
Section: ) Model Motivationmentioning
confidence: 99%
See 3 more Smart Citations
“…Therefore, for the general form of LTI systems (2), the state-estimation problem can be mapped into the state estimation for systems from (1), where control inputs are discarded. In addition, as shown in [15], the bounds on the size of measurement noise in (2) can be related to the bounds on the size of process and measurement noise vectors, v p and v m .…”
Section: ) Model Motivationmentioning
confidence: 99%
“…For instance, in this case the point (x 0 ,ẽ * ) might not even be feasible. Thus, as we showed in [15], attack-resilient state estimation can be performed by solving the following problem that allows for the noise allowance…”
Section: Attack-resilient State Estimatorsmentioning
confidence: 99%
See 2 more Smart Citations
“…For instance, in [37], we introduced a method for attack-resilient state estimation for systems with modeling errors and illustrated its use on a real-world case study -design of attack-resilient cruise control on an unmanned ground robot ( Figure 5(a)). To obtain the state of a controlled physical process when the attacker compromises system sensors and actuators, we introduced an Integer Programming (IP) based procedure that utilizes a window of previous sensor measurement vectors and (limited) knowledge of the system's dynamics.…”
Section: Platform-aware Control Design For Secure Cpsmentioning
confidence: 99%