2017 American Control Conference (ACC) 2017
DOI: 10.23919/acc.2017.7963372
|View full text |Cite
|
Sign up to set email alerts
|

Secure state estimation for nonlinear power systems under cyber attacks

Abstract: This paper focuses on securely estimating the state of a nonlinear dynamical system from a set of corrupted measurements. In particular, we consider two broad classes of nonlinear systems, and propose a technique which enables us to perform secure state estimation for such nonlinear systems. We then provide guarantees on the achievable state estimation error against arbitrary corruptions, and analytically characterize the number of errors that can be perfectly corrected by a decoder. To illustrate how the prop… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 21 publications
0
7
0
Order By: Relevance
“…However, assuming the measurement output to be a "flat" output limits the class of systems; for example, the given system should not have non-trivial zero dynamics [15]. On the other hand, a secure state estimator was constructed in [16] for a special form of nonlinear systems whose stacked outputs can be represented by a linear function of the initial state and the attack vector.…”
Section: Introductionmentioning
confidence: 99%
“…However, assuming the measurement output to be a "flat" output limits the class of systems; for example, the given system should not have non-trivial zero dynamics [15]. On the other hand, a secure state estimator was constructed in [16] for a special form of nonlinear systems whose stacked outputs can be represented by a linear function of the initial state and the attack vector.…”
Section: Introductionmentioning
confidence: 99%
“…Thus, the causality of nodes (sensor groups) can be analyzed with the lower calculation burden instead of the CA of measurement data directly from sensors. Therefore, we can evaluate the significance for each node instead of the significance for each measurement variable through ( 9), ( 10) and (11). The validity of this method will be verified in the subsequent experiments.…”
Section: ) Causality Analysis Of Sensor Groupsmentioning
confidence: 96%
“…Recently, due to the frequent industrial security contingencies in cyber-physical systems (CPS) (such as smart grids and other industrial control systems [1], [2]), the security problems induced by malicious cyber attacks in CPS have received wide attention [2]- [6]. The main research on these security problems can be divided into four categories: attack strategies [1], [7], self-protection of systems [8], attack detection and identification [2], [9], [10], and design of resilience state estimators and controllers [3]- [5], [11]. Note that the last three categories represent countermeasures against different attack strategies.…”
Section: Introductionmentioning
confidence: 99%
“…In the literature, resilient state estimation has attracted significant attention [10]. While there are numerous works on the topic, most of them focus on attack-resilient algorithms that consider measurement noise [11], [12], time varying attack support [13], robustness considerations [14] and distributed case [15]. There are also numerous applications including power systems [16], UAVs [17], energy delivery systems [18], autonomous vehicles and networked systems.…”
Section: Introductionmentioning
confidence: 99%
“…We provide theoretical guarantees of how certain boundedness properties of the prior information set can improve the reconstruction error bound of the resulting resilient estimator. Unlike previous work [13], [23], [24] which depends on the restricted isometry property (RIP) [25], we developed our results by leveraging the latent information contained in the auxiliary model. Moreover, the developed estimator is applied on realistic data acquired from the New York Independent System Operator (NYISO) transmission grid.…”
Section: Introductionmentioning
confidence: 99%