SMT-Based Observer Design for Cyber-Physical Systems under Sensor Attacks

被引:47
|
作者
Shoukry, Yasser [1 ,2 ]
Chong, Michelle [3 ]
Wakaiki, Masashi [4 ]
Nuzzo, Pierluigi [5 ]
Sangiovanni-Vincentelli, Alberto [1 ]
Seshia, Sanjit A. [1 ]
Hespanha, Joao P. [6 ]
Tabuada, Paulo [7 ]
机构
[1] Univ Calif Berkeley, Dept Elect Engn & Comp Sci, Cory Hall, Berkeley, CA 94720 USA
[2] UC Los Angeles, Los Angeles, CA 90095 USA
[3] Lund Univ, Dept Automat Control, Ole Romers Vag 1, S-22363 Lund, Sweden
[4] Kobe Univ, Grad Sch Syst Informat, Nada Ku, 1-1 Rokkodai, Kobe, Hyogo 6578501, Japan
[5] Univ Southern Calif, Dept Elect Engn, 3740 McClintock Ave, Los Angeles, CA 90089 USA
[6] Univ Calif Santa Barbara, Dept Elect & Comp Engn, Harold Frank Hall, Santa Barbara, CA 93106 USA
[7] Univ Calif Los Angeles, Dept Elect Engn, 56-125B Engn 4 Bldg, Los Angeles, CA 90095 USA
关键词
Secure state estimation; satisfiability modulo theory; secure cyber-physical systems;
D O I
10.1145/3078621
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
We introduce a scalable observer architecture, which can efficiently estimate the states of a discrete-time linear-time-invariant system whose sensors are manipulated by an attacker, and is robust to measurement noise. Given an upper bound on the number of attacked sensors, we build on previous results on necessary and sufficient conditions for state estimation, and propose a novel Multi-Modal Luenberger (MML) observer based on efficient Satisfiability Modulo Theory (SMT) solving. We present two techniques to reduce the complexity of the estimation problem. As a first strategy, instead of a bank of distinct observers, we use a family of filters sharing a single dynamical equation for the states, but different output equations, to generate estimates corresponding to different subsets of sensors. Such an architecture can reduce the memory usage of the observer from an exponential to a linear function of the number of sensors. We then develop an efficient SMT-based decision procedure that is able to reason about the estimates of the MML observer to detect at runtime which sets of sensors are attack-free, and use them to obtain a correct state estimate. Finally, we discuss two optimization-based algorithms that can efficiently select the observer parameters with the goal of minimizing the sensitivity of the estimates with respect to sensor noise. We provide proofs of convergence for our estimation algorithm and report simulation results to compare its runtime performance with alternative techniques. We show that our algorithm scales well for large systems (including up to 5,000 sensors) for which many previously proposed algorithms are not implementable due to excessive memory and time requirements. Finally, we illustrate the effectiveness of our approach, both in terms of resiliency to attacks and robustness to noise, on the design of large-scale power distribution networks.
引用
收藏
页数:27
相关论文
共 50 条
  • [31] Learning-based attacks in cyber-physical systems
    Khojasteh, Mohammad Javad
    Khina, Anatoly
    Franceschetti, Massimo
    Javidi, Tara
    IEEE Transactions on Control of Network Systems, 2021, 8 (01): : 437 - 449
  • [32] Learning-Based Attacks in Cyber-Physical Systems
    Khojasteh, Mohammad Javad
    Khina, Anatoly
    Franceschetti, Massimo
    Javidi, Tara
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2021, 8 (01): : 437 - 449
  • [33] Remote observer-based robust control for cyber-physical systems under asynchronous DoS attacks: an intelligent approach
    Li, Li
    Yang, Guang-Hong
    INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE, 2021, 52 (16) : 3511 - 3525
  • [34] Integrity Attacks on Cyber-Physical Systems
    Mo, Yilin
    Sinopoli, Bruno
    HICONS 12: PROCEEDINGS OF THE 1ST ACM INTERNATIONAL CONFERENCE ON HIGH CONFIDENCE NETWORKED SYSTEMS, 2012, : 47 - 54
  • [35] Cryptanalytical Attacks on Cyber-physical Systems
    Novotny, Martin
    2016 5TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2016, : 10 - 10
  • [36] Observer-based event -triggered control for cyber-physical systems under unknown periodic DoS jamming attacks
    Hu, Songlin
    Gu, Yongfang
    Chen, Xiaoli
    Ge, Hui
    PROCEEDINGS OF THE 30TH CHINESE CONTROL AND DECISION CONFERENCE (2018 CCDC), 2018, : 1422 - 1427
  • [37] A survey on security of cyber-physical systems under network attacks
    Ye D.
    Jin K.-J.
    Zhang T.-Y.
    Kongzhi yu Juece/Control and Decision, 2023, 38 (08): : 2243 - 2252
  • [38] On the robustness of cyber-physical LPV systems under DoS attacks
    Pessim, Paulo S. P.
    Lacerda, Marcio J.
    JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2022, 359 (02): : 677 - 696
  • [39] Secure Control for Cyber-Physical Systems Under Malicious Attacks
    Wu, Chengwei
    Yao, Weiran
    Pan, Wei
    Sun, Guanghui
    Liu, Jianxing
    Wu, Ligang
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2022, 9 (02): : 775 - 788
  • [40] Design of False Data Injection Attacks in Cyber-Physical Systems
    Padhan, Sushree
    Turuk, Ashok Kumar
    INFORMATION SCIENCES, 2022, 608 : 825 - 843