2015 American Control Conference (ACC) 2015
DOI: 10.1109/acc.2015.7171925
|View full text |Cite
|
Sign up to set email alerts
|

Sound and complete state estimation for linear dynamical systems under sensor attacks using Satisfiability Modulo Theory solving

Abstract: We address the problem of detecting and mitigating the effect of malicious attacks on the sensors of a linear dynamical system. We develop a novel, efficient algorithm that uses a Satisfiability Modulo Theory approach to isolate the compromised sensors and estimate the system state despite the presence of the attack, thus harnessing the intrinsic combinatorial complexity of the problem. Simulation results show that our algorithm compares favorably with alternative techniques, with respect to both runtime and e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
3
2
2

Relationship

2
5

Authors

Journals

citations
Cited by 31 publications
(23 citation statements)
references
References 16 publications
0
23
0
Order By: Relevance
“…However, φ triv-cert does not provide much information, since it only excludes the current assignment from the search space, and can still lead to exponential execution time [10], [16]. In fact, the generated certificates heavily affect the overall execution time of an SMT solver.…”
Section: B Learning a Conflict Clausementioning
confidence: 99%
See 2 more Smart Citations
“…However, φ triv-cert does not provide much information, since it only excludes the current assignment from the search space, and can still lead to exponential execution time [10], [16]. In fact, the generated certificates heavily affect the overall execution time of an SMT solver.…”
Section: B Learning a Conflict Clausementioning
confidence: 99%
“…In fact, a major concern in secure state estimation is the ability of an intruder to use the uncertainty in the model and the noise in sensors to mount its attack [7]. We compare the estimation performance of the proposed observer against the performance of the previously proposed IMHOTEP-SMT solver [10], [16], which uses sensor data collected over a finite window length. As shown in Table I, the proposed observer performs better in terms of estimation error, which is to be expected as the observer averages out the noise over time.…”
Section: Case Study: Power Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, from (14) and (15), there exists an at most 2q max -sparse block vectorz ∈ R pN -defined asz = −∆ẽ l0 , with at most 2q max nonzero N -size blocks -such that…”
Section: Attack-resilient State Estimatorsmentioning
confidence: 99%
“…For noiseless linear time-invariant (LTI) systems for which the exact plant model is known, the attackresilient state estimation problem has been formulated as an l 0 optimization problem [8], [9]. In addition, in [14], the authors present an SMT-based state estimation technique.…”
Section: Introductionmentioning
confidence: 99%