2020
DOI: 10.1016/j.automatica.2020.109043
|View full text |Cite
|
Sign up to set email alerts
|

A multi-observer based estimation framework for nonlinear systems under sensor attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 22 publications
(20 citation statements)
references
References 18 publications
0
20
0
Order By: Relevance
“…Remark 1 It is usually assumed in the literature, e.g., [10], [7], [12], [11], [28], [29], [31] that the set of attacked nodes is time-invariant, i.e., the attacker cannot change his mind by attacking the other nodes rather than the ones he chose initially. We relax this assumption by allowing the set of attacked sensors to be time-varying, i.e., the attacker can choose a different set of sensors to compromise at different time.…”
Section: Secure Sensor Fusion Under Sensor Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…Remark 1 It is usually assumed in the literature, e.g., [10], [7], [12], [11], [28], [29], [31] that the set of attacked nodes is time-invariant, i.e., the attacker cannot change his mind by attacking the other nodes rather than the ones he chose initially. We relax this assumption by allowing the set of attacked sensors to be time-varying, i.e., the attacker can choose a different set of sensors to compromise at different time.…”
Section: Secure Sensor Fusion Under Sensor Attacksmentioning
confidence: 99%
“…Sensor redundancy has been proved to be crucial for estimation under attacks [27], [10], [28], [29], [14], [30]. Using redundant sensors/actuators for secure estimation and control is a commonly adopted technique, see, e.g., [27], [10], [28], [29], [11], [31], and references therein. Note that it might be costly to create redundancy, which indicates some of these estimation methods might have conservative applications; however, for security-critical systems, for instance, CAVs, this is the price to pay [6].…”
Section: Introductionmentioning
confidence: 99%
“…A joint detection and estimation problem is investigated in [8] with the knowledge of some attack statistics. There are some methods for multi-observer based detector design [9][10][11]. However, the computational complexity of these methods substantially increases as the number of sensors is increasing.…”
Section: Motivations and Related Workmentioning
confidence: 99%
“…The proposed observer is able to handle more typical sensor attacks than [7,8], such as random attack, DoS attack, bias injection attack, and replay attack. The proposed detector is based on one observer, which requires less computational resources than the detectors based on multiple observers [9][10][11]. Although [20] study a wider range of attacks than this paper, we remove the requirements of graph robustness.…”
Section: Contributionsmentioning
confidence: 99%
“…Our sensor fusion algorithm is inspired by [27], where a state estimator is constructed for general linear time-invariant (LTI) systems under sensor attacks using a bank of observers. Placing redundant sensors/actuators in systems and then exploiting sensor/actuator redundancy is a commonly adopted technique in the research area of secure estimation and control for cyber-physical systems [27]- [32]. In this manuscript, we create sensor redundancy by assuming each CAV collaborates with each other by sharing its local sensor measurements via the cloud.…”
Section: Introductionmentioning
confidence: 99%