×

Distributed secure state estimation for linear systems against malicious agents through sorting and filtering. (English) Zbl 1520.93192

Summary: This paper investigates the distributed secure state estimation problem for the cyber-physical systems monitored by a multi-agent network where partial agents are malicious. Through introducing a sort and filter approach, a novel distributed secure state estimation strategy, where the impact of malicious agents is mitigated through discarding partial extreme values from the received vectors, is proposed. Sufficient conditions on the graph topology and the system matrices to tolerant a bounded number of malicious agents are given. It is shown that by adopting the proposed secure state estimation strategy, normal agents can effectively generate correct state estimate in the presence of malicious agents. Besides, for efficiently updating the state estimate while new measurements are available, a distributed observer is also designed. Compared with the existing techniques searching an appropriate candidate from multiple ones, the proposed secure state estimation strategies are much more computationally efficient since reliable state estimates are generated without brute force search. Finally, simulation results are provided to illustrate the effectiveness of the proposed algorithms.

MSC:

93B70 Networked control
93C83 Control/observation systems involving computers (process control, etc.)
93C05 Linear systems in control theory
Full Text: DOI

References:

[1] An, L.; Yang, G. H., Distributed secure state estimation for cyber-physical systems under sensor attacks, Automatica, 107, 526-538 (2019) · Zbl 1429.93237
[2] Chen, Y.; Kar, S.; Moura, J. M.F., Resilient distributed estimation through adversary detection, IEEE Transactions on Signal Processing, 66, 9, 2455-2469 (2018) · Zbl 1415.94319
[3] Deng, C.; Wen, C.; Huang, J.; Zhang, X. M.; Zou, Y., Distributed observer-based cooperative control approach for uncertain nonlinear MASs under event-triggered communication, IEEE Transactions on Automatic Control, 67, 5, 2669-2676 (2022) · Zbl 1537.93382
[4] Fawzi, H.; Tabuada, P.; Diggavi, S., Secure estimation and control for cyber-physical systems under adversarial attacks, IEEE Transactions on Automatic Control, 59, 6, 1454-1467 (2014) · Zbl 1360.93201
[5] Ge, X.; Han, Q.-L.; Zhong, M.; Zhang, X.-M., Distributed krein space-based attack detection over sensor networks under deception attacks, Automatica, 109, Article 108557 pp. (2019) · Zbl 1429.93135
[6] He, X.; Hu, C.; Hong, Y. G.; Shi, L.; Fang, H., Distributed Kalman filters with state equality constraints: time-based and event-triggered communications, IEEE Transactions on Automatic Control, 65, 1, 28-43 (2020) · Zbl 1483.93649
[7] Huang, J.; Ho, D. W.C.; Li, F.; Yang, W.; Tang, Y., Secure remote state estimation against linear man-in-the-middle attacks using watermarking, Automatica, 121, Article 109182 pp. (2020) · Zbl 1448.93317
[8] Kar, S.; Hug, G., Distributed robust economic dispatch in power systems: A consensus + innovations approach, (IEEE power and energy society general meeting (2012)), 1-8
[9] Lu, A. Y.; Yang, G. H., Input-to-state stabilizing control for cyber-physical systems with multiple transmission channels under denial-of-service, IEEE Transactions on Automatic Control, 63, 6, 1813-1820 (2018) · Zbl 1395.93483
[10] Lu, A. Y.; Yang, G. H., Switched projected gradient descent algorithms for secure state estimation under sparse sensor attacks, Automatica, 103, 503-514 (2019) · Zbl 1415.93253
[11] Mitra, A., & Sundaram, S. (2018). Secure distributed state estimation of an LTI system over time-varying networks and analog erasure channels. In Annual american control conference (ACC) (pp. 6578-6583).
[12] Mitra, A.; Sundaram, S., Byzantine-resilient distributed observers for LTI systems, Automatica, 108, Article 108487 pp. (2019) · Zbl 1536.93292
[13] Mo, Y.; Ambrosino, R.; Sinopoli, B., Sensor selection strategies for state estimation in energy constrained wireless sensor networks, Automatica, 47, 7, 1330-1338 (2011) · Zbl 1219.93130
[14] Mo, Y.; Sinopoli, B., On the performance degradation of cyber-physical systems under stealthy integrity attacks, IEEE Transactions on Automatic Control, 61, 9, 2618-2624 (2016) · Zbl 1359.93257
[15] Nedić, A.; Ozdaglar, A., Distributed subgradient methods for multi-agent optimization, IEEE Transactions on Automatic Control, 54, 1, 48-61 (2009) · Zbl 1367.90086
[16] Nedić, A.; Ozdaglar, A.; Parrilo, P. A., Constrained consensus and optimization in multi-agent networks, IEEE Transactions on Automatic Control, 55, 4, 922-938 (2010) · Zbl 1368.90143
[17] Pan, Y.; Du, P.; Xue, H.; Lam, H. K., Singularity-free fixed-time fuzzy control for robotic systems with user-defined performance, IEEE Transactions on Fuzzy Systems, 29, 8, 2388-2398 (2021)
[18] Park, S.; Martins, N. C., Design of distributed lti observers for state omniscience, IEEE Transactions on Automatic Control, 62, 2, 561-576 (2017) · Zbl 1364.93435
[19] Qu, B.; Wang, Z.; Shen, B.; Dong, H., Distributed state estimation for renewable energy microgrids with sensor saturations, Automatica, 131, Article 109730 pp. (2021) · Zbl 1478.93683
[20] Shoukry, Y.; Tabuada, P., Event-triggered state observers for sparse sensor noise/attacks, IEEE Transactions on Automatic Control, 61, 8, 2079-2091 (2016) · Zbl 1359.93072
[21] Su, L.; Shahrampour, S., Finite-time guarantees for byzantine-resilient distributed state estimation with noisy measurements, IEEE Transactions on Automatic Control, 65, 9, 3758-3771 (2020) · Zbl 1533.93781
[22] Sundaram, S.; Gharesifard, B., Distributed optimization under adversarial nodes, IEEE Transactions on Automatic Control, 64, 3, 1063-1076 (2019) · Zbl 1482.90233
[23] Sundaram, S.; Hadjicostis, C. N., Distributed function calculation via linear iterative strategies in the presence of malicious agents, IEEE Transactions on Automatic Control, 56, 7, 1495-1508 (2011) · Zbl 1368.93140
[24] Yan, J.; Deng, C.; Wen, C., Resilient output regulation in heterogeneous networked systems under Byzantine agents, Automatica, 133, Article 109872 pp. (2021) · Zbl 1480.93180
[25] Yang, Z.; Bajwa, W. U., ByRDiE: Byzantine-resilient distributed coordinate descent for decentralized learning, IEEE Transactions on Signal and Information Processing over Networks, 5, 4, 611-627 (2019)
[26] Yang, W.; Yang, C.; Shi, H.; Shi, L.; Chen, G., Stochastic link activation for distributed filtering under sensor power constraint, Automatica, 75, 109-118 (2017) · Zbl 1351.93148
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.