Secure estimation based Kalman Filter for cyber–physical systems against sensor attacks

Young Hwan Chang, Qie Hu, Claire J. Tomlin

Research output: Contribution to journalArticle

9 Citations (Scopus)

Abstract

Cyber–physical systems are found in many applications such as power networks, manufacturing processes, and air and ground transportation systems. Maintaining security of these systems under cyber attacks is an important and challenging task, since these attacks can be erratic and thus difficult to model. Secure estimation problems study how to estimate the true system states when measurements are corrupted and/or control inputs are compromised by attackers. The authors in Fawzi et al. (2014) proposed a secure estimation method when the set of attacked nodes (sensors, controllers) is fixed. In this paper, we extend these results to scenarios in which the set of attacked nodes can change over time. We formulate this secure estimation problem into the classical error correction problem (Candes and Tao, 2005) and we show that accurate decoding can be guaranteed. Furthermore, we propose a combined secure estimation method with our proposed secure estimator and the Kalman Filter for improved practical performance. Finally, we demonstrate the performance of our method through simulations of two scenarios where an unmanned aerial vehicle is under attack.

Original languageEnglish (US)
Pages (from-to)399-412
Number of pages14
JournalAutomatica
Volume95
DOIs
StatePublished - Sep 1 2018

Fingerprint

Kalman filters
Sensors
Error correction
Unmanned aerial vehicles (UAV)
Sensor nodes
Decoding
Controllers
Air

Keywords

  • Cyber–physical systems
  • Error correction
  • Secure estimation

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Electrical and Electronic Engineering

Cite this

Secure estimation based Kalman Filter for cyber–physical systems against sensor attacks. / Chang, Young Hwan; Hu, Qie; Tomlin, Claire J.

In: Automatica, Vol. 95, 01.09.2018, p. 399-412.

Research output: Contribution to journalArticle

@article{1c25cd0e43b74bb89c698dd3ab23a52f,
title = "Secure estimation based Kalman Filter for cyber–physical systems against sensor attacks",
abstract = "Cyber–physical systems are found in many applications such as power networks, manufacturing processes, and air and ground transportation systems. Maintaining security of these systems under cyber attacks is an important and challenging task, since these attacks can be erratic and thus difficult to model. Secure estimation problems study how to estimate the true system states when measurements are corrupted and/or control inputs are compromised by attackers. The authors in Fawzi et al. (2014) proposed a secure estimation method when the set of attacked nodes (sensors, controllers) is fixed. In this paper, we extend these results to scenarios in which the set of attacked nodes can change over time. We formulate this secure estimation problem into the classical error correction problem (Candes and Tao, 2005) and we show that accurate decoding can be guaranteed. Furthermore, we propose a combined secure estimation method with our proposed secure estimator and the Kalman Filter for improved practical performance. Finally, we demonstrate the performance of our method through simulations of two scenarios where an unmanned aerial vehicle is under attack.",
keywords = "Cyber–physical systems, Error correction, Secure estimation",
author = "Chang, {Young Hwan} and Qie Hu and Tomlin, {Claire J.}",
year = "2018",
month = "9",
day = "1",
doi = "10.1016/j.automatica.2018.06.010",
language = "English (US)",
volume = "95",
pages = "399--412",
journal = "Automatica",
issn = "0005-1098",
publisher = "Elsevier Limited",

}

TY - JOUR

T1 - Secure estimation based Kalman Filter for cyber–physical systems against sensor attacks

AU - Chang, Young Hwan

AU - Hu, Qie

AU - Tomlin, Claire J.

PY - 2018/9/1

Y1 - 2018/9/1

N2 - Cyber–physical systems are found in many applications such as power networks, manufacturing processes, and air and ground transportation systems. Maintaining security of these systems under cyber attacks is an important and challenging task, since these attacks can be erratic and thus difficult to model. Secure estimation problems study how to estimate the true system states when measurements are corrupted and/or control inputs are compromised by attackers. The authors in Fawzi et al. (2014) proposed a secure estimation method when the set of attacked nodes (sensors, controllers) is fixed. In this paper, we extend these results to scenarios in which the set of attacked nodes can change over time. We formulate this secure estimation problem into the classical error correction problem (Candes and Tao, 2005) and we show that accurate decoding can be guaranteed. Furthermore, we propose a combined secure estimation method with our proposed secure estimator and the Kalman Filter for improved practical performance. Finally, we demonstrate the performance of our method through simulations of two scenarios where an unmanned aerial vehicle is under attack.

AB - Cyber–physical systems are found in many applications such as power networks, manufacturing processes, and air and ground transportation systems. Maintaining security of these systems under cyber attacks is an important and challenging task, since these attacks can be erratic and thus difficult to model. Secure estimation problems study how to estimate the true system states when measurements are corrupted and/or control inputs are compromised by attackers. The authors in Fawzi et al. (2014) proposed a secure estimation method when the set of attacked nodes (sensors, controllers) is fixed. In this paper, we extend these results to scenarios in which the set of attacked nodes can change over time. We formulate this secure estimation problem into the classical error correction problem (Candes and Tao, 2005) and we show that accurate decoding can be guaranteed. Furthermore, we propose a combined secure estimation method with our proposed secure estimator and the Kalman Filter for improved practical performance. Finally, we demonstrate the performance of our method through simulations of two scenarios where an unmanned aerial vehicle is under attack.

KW - Cyber–physical systems

KW - Error correction

KW - Secure estimation

UR - http://www.scopus.com/inward/record.url?scp=85048749774&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85048749774&partnerID=8YFLogxK

U2 - 10.1016/j.automatica.2018.06.010

DO - 10.1016/j.automatica.2018.06.010

M3 - Article

AN - SCOPUS:85048749774

VL - 95

SP - 399

EP - 412

JO - Automatica

JF - Automatica

SN - 0005-1098

ER -