Control Theory in Engineering [Working Title] 2019
DOI: 10.5772/intechopen.88669
|View full text |Cite
|
Sign up to set email alerts
|

Secure State Estimation and Attack Reconstruction in Cyber-Physical Systems: Sliding Mode Observer Approach

Abstract: A cyber-physical system (CPS) is a tight coupling of computational resources, network communication, and physical processes. They are composed of a set of networked components, including sensors, actuators, control processing units, and communication agents that instrument the physical world to make "smarter." However, cyber components are also the source of new, unprecedented vulnerabilities to malicious attacks. In order to protect a CPS from attacks, three security levels of protection, detection, and ident… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 7 publications
(12 citation statements)
references
References 36 publications
0
12
0
Order By: Relevance
“…The signal 𝜈 in (15) represents a nonlinear injection signal depending on (y 2 − z 22 ) whose purpose is to produce a sliding motion in finite time in the estimation error space. Define the observer gain matrix in (15) associated with 𝜈 as…”
Section: An Analytic Solutionmentioning
confidence: 99%
See 1 more Smart Citation
“…The signal 𝜈 in (15) represents a nonlinear injection signal depending on (y 2 − z 22 ) whose purpose is to produce a sliding motion in finite time in the estimation error space. Define the observer gain matrix in (15) associated with 𝜈 as…”
Section: An Analytic Solutionmentioning
confidence: 99%
“…5,13,14 Finally the fast developing area of protecting systems against cyber-attacks can also be posed in an unknown input problem framework. 15,16 Because of the engineering applicability of the unknown input reconstruction problem for linear time invariant (LTI) systems, unsurprisingly, a rich collection of different approaches have been developed. For example the ubiquitous (Extended) Kalman filter 17,18 has been used-often involving augmenting the state-space representation with the unknown input signals considered to be states (under the assumption the rate of the change of the unknown input is small).…”
Section: Introductionmentioning
confidence: 99%
“…The state attack line-by-line STWO in Equations ( 25)- (30) discussed in Section 5 suffers from the overestimating the unknown bounds L j i > 0. In this section, it is proposed to replace the line-by-line STWO in Equations ( 25)-( 30) by a gain adaptation algorithm with non-overestimated gains.…”
Section: Novel Astwo For State Attack Estimationmentioning
confidence: 99%
“…Most of the recent studies on the security of CPSs investigate protection of CPSs to prevent the attacks, detecting the attack, and mitigating the effects of attacks [14][15][16][17][18][19][20][21][22][23][24][25][26]. Quite a few results on the elimination of the effects of attacks have been reported [27][28][29][30][31][32]. In this paper, the objective is to eliminate the destructive effects of attacks, although some considered constraints and assumptions in the recent studies have been removed.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation