2017
DOI: 10.1109/tcns.2016.2606880
|View full text |Cite
|
Sign up to set email alerts
|

Secure State Estimation Against Sensor Attacks in the Presence of Noise

Abstract: Abstract-We consider the problem of estimating the state of a noisy linear dynamical system when an unknown subset of sensors is arbitrarily corrupted by an adversary. We propose a secure state estimation algorithm, and derive (optimal) bounds on the achievable state estimation error given an upper bound on the number of attacked sensors. The proposed state estimator involves Kalman filters operating over subsets of sensors to search for a sensor subset which is reliable for state estimation. To further improv… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

2
110
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 126 publications
(112 citation statements)
references
References 15 publications
2
110
0
Order By: Relevance
“…where x k is the system state at time k, u k denotes the controller commands to actuators, y k are the sensor measurements, k is perturbation noise, e k is sensor noise, and A, B, C, D are matrices modeling the dynamics of the system. This approach has been used in previous studies, such as [30]- [32]. The limitations of linear dynamical system modeling include the requirement for controller command measurement, a requirement which is not met in most datasets.…”
Section: Related Workmentioning
confidence: 99%
“…where x k is the system state at time k, u k denotes the controller commands to actuators, y k are the sensor measurements, k is perturbation noise, e k is sensor noise, and A, B, C, D are matrices modeling the dynamics of the system. This approach has been used in previous studies, such as [30]- [32]. The limitations of linear dynamical system modeling include the requirement for controller command measurement, a requirement which is not met in most datasets.…”
Section: Related Workmentioning
confidence: 99%
“…The mitigation signal δ[t] can be generated using existing mitigation approaches [35], [36], [37], [38]. Specifically, once the attack is detected, a conservative mitigation approach is to ignore the sensor measurements completely, and drive the system based only on the model.…”
Section: A System Modelmentioning
confidence: 99%
“…Recently, dynamic state estimation with some Byzantine sensors has been discussed. Most approaches in the existing literature can be classified into two categories: stacked measurements [6]- [8] and Kalman filter decomposition [9], [10]. Fawzi et al [6] used the stacked measurements from time k to k + T − 1 to estimate the state at time k and provided l 0 and l 1 -based state estimation procedures.…”
mentioning
confidence: 99%
“…Pajic et al [7] extended the deterministic systems in [6] to ones with bounded measurement noises and obtained upper bounds of estimation error for both l 0 and l 1 -based estimators. Mishar et al [8] studied stochastic systems with unbounded noises and proposed a notion of ǫ-effective attack. The state estimation there is in essence an attack detection problem; a Chi-squared test is applied to the residues and the standard Kalman filter output based on the measurements from the largest set of sensors that are deemed ǫ-effective attack-free is used as the state estimate.…”
mentioning
confidence: 99%