2017
DOI: 10.1002/rnc.4007
|View full text |Cite
|
Sign up to set email alerts
|

Secure estimation for cyber‐physical systems with adversarial attacks and unknown inputs: An L2‐gain method

Abstract: Summary This paper investigates the attack‐resilient state estimation problem for linear systems with adversarial attacks and unknown inputs, where the upper bound of the unknown inputs is unknown. It is assumed that the attacker has limited resources and can only manipulate a certain number of sensors. In most of the existing observer design approaches for the systems with unknown inputs even in the absence of attacks, the observer matching condition should be satisfied. To overcome this restriction, a novel … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
19
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 35 publications
(21 citation statements)
references
References 27 publications
(80 reference statements)
1
19
0
Order By: Relevance
“…Remark 3. Since the matrices ∆ • are nonnegative which implies that ∆ ∆ ∆ ∆ is also nonnegative, it is always possible to enhance the interval observer dynamics at jumps in (16) by reducing the matrix (18) to its optimal realization Γ(L, L).…”
Section: A Positive Realization Based Synthesismentioning
confidence: 99%
See 1 more Smart Citation
“…Remark 3. Since the matrices ∆ • are nonnegative which implies that ∆ ∆ ∆ ∆ is also nonnegative, it is always possible to enhance the interval observer dynamics at jumps in (16) by reducing the matrix (18) to its optimal realization Γ(L, L).…”
Section: A Positive Realization Based Synthesismentioning
confidence: 99%
“…ILLUSTRATIVE EXAMPLES In order to illustrate the performance of the proposed observer, we consider the following examples. Example 1: Unmanned Ground Vehicle (UGV) system borrowed from [18] and [11]: where x 1 (t) and x 2 (t) are the UGV position and the linear velocity, respectively. m and b are the mechanical mass and the translational friction coefficient, respectively.…”
Section: Definitionmentioning
confidence: 99%
“…S e Fτ S exists. en, (12) defines a finite-time observer for the system (1) and the observer estimates the exact state of system (1)…”
Section: Theorem 1 Suppose That the Inverse Of The Matrixmentioning
confidence: 99%
“…However, the above algorithmic method has the disadvantage of losing the correctness guarantee, while the observer-based method has a fast response and saves the computing resources. A novel state observer was proposed in [12,13]. Lu and Yang studied the problem of security state estimation of network physical systems and proposed a new security Luenberger observer in reference [14].…”
Section: Introductionmentioning
confidence: 99%
“…Considering the attacks on communication links from controllers to actuators, the observer‐based attack‐resilient control architecture for linear systems was proposed in the work of Xie and Yang . In addition, the state estimation problem against sensor attacks was considered in the works of Yang et al However, these methods are mostly implemented for linear systems.…”
Section: Introductionmentioning
confidence: 99%