2020
DOI: 10.1002/asjc.2355
|View full text |Cite
|
Sign up to set email alerts
|

Observer‐Based Sensor Attack Diagnosis for Cyber‐Physical Systems via Zonotope Theory

Abstract: This paper investigates the attack detection, isolation and reconstruction problems for cyber-physical systems (CPSs) under sensor attacks. We deal with all the issues in view of an overall system instead of every subsystem. To begin with, a Luenberger-like observer is designed and a state interval estimation method is proposed based on the zonotope theory. And then, a sensor attack detection scheme is developed by using the interval estimation of the output error as the dynamic residual. Besides, the sensor d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(16 citation statements)
references
References 42 publications
0
16
0
Order By: Relevance
“…H∞ filtering and LMI Fading measurements [11,23] Quantization effects [74] Stochastic additive faults [15,28] Medium access constraints [14] Unknown transition probability [75] Comprehensive incomplete measurements [12,13,25,26] EM algorithm under the Bayesian framework Asynchronous measurements in distributed systems [54] Residual generating based on fault diagnosis filters and observers Additive faults & incomplete measurements [7,8,17,24,27,31,32,46,47] Attacks on sensors [73] Soft faults & packet dropouts [48] Actuator faults [42,45] Faulty periodic communication [30] Cyber attacks [39,76] Sliding mode observer Attacks on sensors [72] Unknown input observer False data injection attacks [35] Minimum-variance filtering and Kalman filtering Cyber attacks [20,37,64,70] Additive faults [49] Homomorphic encryption [77] Particle filtering Cyber attacks [41,69] Strong tracking filtering Packet dropouts [78] Distributed resilient filtering Sensor degradation [79] Self-learning approaches Additive sensor fault [71,75,…”
Section: Methodologies Major Problems Addressed Literaturementioning
confidence: 99%
“…H∞ filtering and LMI Fading measurements [11,23] Quantization effects [74] Stochastic additive faults [15,28] Medium access constraints [14] Unknown transition probability [75] Comprehensive incomplete measurements [12,13,25,26] EM algorithm under the Bayesian framework Asynchronous measurements in distributed systems [54] Residual generating based on fault diagnosis filters and observers Additive faults & incomplete measurements [7,8,17,24,27,31,32,46,47] Attacks on sensors [73] Soft faults & packet dropouts [48] Actuator faults [42,45] Faulty periodic communication [30] Cyber attacks [39,76] Sliding mode observer Attacks on sensors [72] Unknown input observer False data injection attacks [35] Minimum-variance filtering and Kalman filtering Cyber attacks [20,37,64,70] Additive faults [49] Homomorphic encryption [77] Particle filtering Cyber attacks [41,69] Strong tracking filtering Packet dropouts [78] Distributed resilient filtering Sensor degradation [79] Self-learning approaches Additive sensor fault [71,75,…”
Section: Methodologies Major Problems Addressed Literaturementioning
confidence: 99%
“…Instead of using the parametrized approach proposed in Darouach and Zasadzinski [26] to minimize tr(P k|k ) with respect to K k under (13), which requires pre-computing off-line the structure of K k for each possible combinatorial situation of the binary sequence…”
Section: Theorem 1 the Minimum Variance Unbiased Estimatementioning
confidence: 99%
“…Finally, physical attacks on sensors and actuators that are roughly considered as faults in traditional model-based fault detection and isolation (FDI) schemes [9][10][11][12]. In a previous study [13], the authors investigate the attack detection, isolation, and reconstruction problems for cyber physical systems (CPS). A Luenberger-like observer is designed, and state interval estimation method is proposed based on the zonotope theory.…”
Section: Introductionmentioning
confidence: 99%
“…After the controller has a correct understanding of the physical process, it sends control instructions to the actuator through the actuator network transmission to realize the feedback control of the physical process. Recently, many emerging attacks specifically targeting the communication and control systems in CPS are exposed [1][2][3], such as denial-of-service (DoS) attack and random attack. The attacker may implement DoS attack on the sensor output communication link, resulting in the loss of transmission data.…”
Section: Introductionmentioning
confidence: 99%