Secure Estimation Against Malicious Attacks for Lithium-Ion Batteries Under Cloud Environments
This paper is concerned with the secure estimation problem for the state of charge of Lithium-ion batteries subject to malicious attacks during the data transmission from sensors to cloud-based battery management system terminal. First, the second-order resistance-capacitance equivalent circuit mode...
Saved in:
Published in | IEEE transactions on circuits and systems. I, Regular papers Vol. 69; no. 10; pp. 4237 - 4247 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
New York
IEEE
01.10.2022
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | This paper is concerned with the secure estimation problem for the state of charge of Lithium-ion batteries subject to malicious attacks during the data transmission from sensors to cloud-based battery management system terminal. First, the second-order resistance-capacitance equivalent circuit model, whose parameters are identified by Kalman filter in an off-line manner, is introduced to describe the internal dynamics of lithium-ion batteries. Then, by applying the <inline-formula> <tex-math notation="LaTeX">\chi ^{2} </tex-math></inline-formula> detection mechanism, real-time malicious attacks are first detected and then a secure estimator is designed to suppress the influence of attacks on the estimation performance. An upper bound of the filtering error covariance is determined by solving certain coupled Riccati-like equations, and the filter parameter is obtained by minimizing such an upper bound at each time step. Finally, the validity of the proposed attack detection approach and the effectiveness of the developed estimation scheme are verified by experiment results under Federal Urban Driving Schedule condition. |
---|---|
AbstractList | This paper is concerned with the secure estimation problem for the state of charge of Lithium-ion batteries subject to malicious attacks during the data transmission from sensors to cloud-based battery management system terminal. First, the second-order resistance-capacitance equivalent circuit model, whose parameters are identified by Kalman filter in an off-line manner, is introduced to describe the internal dynamics of lithium-ion batteries. Then, by applying the [Formula Omitted] detection mechanism, real-time malicious attacks are first detected and then a secure estimator is designed to suppress the influence of attacks on the estimation performance. An upper bound of the filtering error covariance is determined by solving certain coupled Riccati-like equations, and the filter parameter is obtained by minimizing such an upper bound at each time step. Finally, the validity of the proposed attack detection approach and the effectiveness of the developed estimation scheme are verified by experiment results under Federal Urban Driving Schedule condition. This paper is concerned with the secure estimation problem for the state of charge of Lithium-ion batteries subject to malicious attacks during the data transmission from sensors to cloud-based battery management system terminal. First, the second-order resistance-capacitance equivalent circuit model, whose parameters are identified by Kalman filter in an off-line manner, is introduced to describe the internal dynamics of lithium-ion batteries. Then, by applying the <inline-formula> <tex-math notation="LaTeX">\chi ^{2} </tex-math></inline-formula> detection mechanism, real-time malicious attacks are first detected and then a secure estimator is designed to suppress the influence of attacks on the estimation performance. An upper bound of the filtering error covariance is determined by solving certain coupled Riccati-like equations, and the filter parameter is obtained by minimizing such an upper bound at each time step. Finally, the validity of the proposed attack detection approach and the effectiveness of the developed estimation scheme are verified by experiment results under Federal Urban Driving Schedule condition. |
Author | Wang, Changsong Tian, Engang Liu, Shuai Wang, Licheng |
Author_xml | – sequence: 1 givenname: Licheng orcidid: 0000-0001-5333-5881 surname: Wang fullname: Wang, Licheng email: wanglicheng1217@163.com organization: College of Automation Engineering, Shanghai University of Electric Power, Shanghai, China – sequence: 2 givenname: Engang orcidid: 0000-0002-8169-5347 surname: Tian fullname: Tian, Engang email: tianengang@163.com organization: College of Automation Electronic Engineering, Qingdao University of Science and Technology, Qingdao, China – sequence: 3 givenname: Changsong surname: Wang fullname: Wang, Changsong organization: Department of Control Science and Engineering, Shanghai Key Laboratory of Modern Optical System, University of Shanghai for Science and Technology, Shanghai, China – sequence: 4 givenname: Shuai orcidid: 0000-0003-0523-022X surname: Liu fullname: Liu, Shuai organization: College of Science, University of Shanghai for Science and Technology, Shanghai, China |
BookMark | eNp9kD1PwzAQhi1UJNrCD0AslphT_JEPeyxVgUpFDG1XIte5gEtqF9tB4t-TUMTAwPTe8D53umeEBtZZQOiSkgmlRN6sZ6vFhBHGJpyKomDZCRrSLBMJESQf9HMqE8GZOEOjEHaEMEk4HaLnFejWA56HaPYqGmfx9EUZGyJ-VI3RxrUBT2NU-i3g2nm8NPHVtPtk0TVvVYzgDQS8sRV4PGtcW-G5_TDe2T3YGM7Raa2aABc_OUabu_l69pAsn-4Xs-ky0UzymKhacaZUkWdUAdFbKepaFJUQOs3rHLJaaM50l-k2ywtN-bbSEqRSGctTmgMfo-vj3oN37y2EWO5c6213smRFL0QymXat4tjS3oXgoS61id9PR69MU1JS9jLLXmbZyyx_ZHYk_UMefOfLf_7LXB0ZAwC_fSlokfKcfwGrs4NK |
CODEN | ITCSCH |
CitedBy_id | crossref_primary_10_1002_asjc_3473 crossref_primary_10_1016_j_engappai_2024_107919 crossref_primary_10_1002_asjc_3236 crossref_primary_10_1109_JAS_2023_124110 crossref_primary_10_1109_TCSI_2023_3291760 crossref_primary_10_1002_rnc_6425 crossref_primary_10_1109_TII_2023_3288221 crossref_primary_10_1016_j_est_2024_112438 crossref_primary_10_1016_j_apenergy_2025_125317 crossref_primary_10_1109_TCSII_2023_3288149 crossref_primary_10_1109_TCYB_2023_3253141 crossref_primary_10_1002_asjc_3559 crossref_primary_10_1109_TCSII_2022_3226219 crossref_primary_10_1109_TIM_2025_3547129 crossref_primary_10_1002_rnc_7520 crossref_primary_10_1016_j_jfranklin_2024_106993 crossref_primary_10_1002_asjc_3185 crossref_primary_10_1109_JIOT_2024_3377201 crossref_primary_10_1109_TNSE_2022_3216867 crossref_primary_10_1109_TCSI_2024_3503719 crossref_primary_10_1109_TSIPN_2023_3244113 crossref_primary_10_1109_TCSI_2022_3226578 crossref_primary_10_1002_rnc_6910 crossref_primary_10_1109_TSUSC_2022_3221090 crossref_primary_10_1016_j_sysconle_2023_105692 crossref_primary_10_1080_21642583_2022_2158959 crossref_primary_10_1109_TPWRS_2023_3260402 crossref_primary_10_1177_01423312241228893 crossref_primary_10_1631_FITEE_2300568 crossref_primary_10_1109_TCSI_2024_3381191 crossref_primary_10_1016_j_inffus_2023_02_032 crossref_primary_10_1109_LCSYS_2023_3333257 |
Cites_doi | 10.1016/j.jpowsour.2012.10.060 10.1080/00207721.2021.1885082 10.1016/j.inffus.2011.09.004 10.3390/en12132491 10.1109/TSMC.2019.2918002 10.1049/iet-gtd.2019.1330 10.1109/TITS.2021.3118648 10.1109/TCNS.2021.3049361 10.1007/s11265-020-01530-5 10.1080/00207721.2021.1998722 10.1016/j.automatica.2019.108681 10.1109/TCSI.2020.3027678 10.1109/TNNLS.2021.3137426 10.1080/00207721.2021.1917721 10.1080/00207721.2022.2049919 10.1080/00207721.2021.2005178 10.1080/00207721.2021.1872118 10.1016/j.automatica.2022.110421 10.1109/TSP.2020.3048245 10.1109/TCNS.2016.2570003 10.1109/TAC.2019.2929817 10.1109/TAC.1987.1104658 10.1016/j.simpat.2020.102244 10.1016/j.automatica.2019.108557 10.1109/TIE.2021.3078376 10.1109/TSMC.2021.3071390 10.1016/j.est.2020.101557 10.1109/TSIPN.2021.3097217 10.1109/TSMC.2021.3062848 10.1109/TCST.2017.2664726 10.1109/TCSI.2020.3007953 10.1109/TAC.2015.2498708 10.1109/TSIPN.2017.2749959 10.1016/j.neucom.2021.01.131 10.1016/j.apenergy.2021.116812 10.1109/TIA.2016.2524438 10.1002/rnc.5957 10.1109/JAS.2020.1003297 10.1109/TCYB.2019.2903817 10.1080/00207721.2021.1914768 10.1007/s11277-021-08855-9 10.1016/j.ijepes.2014.04.059 10.1109/TVT.2012.2235474 10.1016/j.neucom.2022.03.001 10.1109/TCST.2013.2280899 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022 |
DBID | 97E RIA RIE AAYXX CITATION 7SP 8FD L7M |
DOI | 10.1109/TCSI.2022.3187725 |
DatabaseName | IEEE Xplore (IEEE) IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Electronics & Communications Abstracts Technology Research Database Advanced Technologies Database with Aerospace |
DatabaseTitle | CrossRef Technology Research Database Advanced Technologies Database with Aerospace Electronics & Communications Abstracts |
DatabaseTitleList | Technology Research Database |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1558-0806 |
EndPage | 4247 |
ExternalDocumentID | 10_1109_TCSI_2022_3187725 9817436 |
Genre | orig-research |
GrantInformation_xml | – fundername: National Natural Science Foundation of China grantid: 62003213; 61903253 funderid: 10.13039/501100001809 |
GroupedDBID | 0R~ 29I 4.4 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACIWK AETIX AGQYO AGSQL AHBIQ AIBXA AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD HZ~ H~9 IFIPE IPLJI JAVBF M43 O9- OCL PZZ RIA RIE RNS VJK AAYXX CITATION RIG 7SP 8FD L7M |
ID | FETCH-LOGICAL-c293t-afa32aa7651ae0cb98ff87d88c46f6e5f8c32ce5f4b567c13bdc9e9aa526416e3 |
IEDL.DBID | RIE |
ISSN | 1549-8328 |
IngestDate | Mon Jun 30 10:20:31 EDT 2025 Tue Jul 01 04:15:17 EDT 2025 Thu Apr 24 22:57:18 EDT 2025 Wed Aug 27 02:14:21 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 10 |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c293t-afa32aa7651ae0cb98ff87d88c46f6e5f8c32ce5f4b567c13bdc9e9aa526416e3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0003-0523-022X 0000-0001-5333-5881 0000-0002-8169-5347 |
PQID | 2718779294 |
PQPubID | 85411 |
PageCount | 11 |
ParticipantIDs | proquest_journals_2718779294 ieee_primary_9817436 crossref_citationtrail_10_1109_TCSI_2022_3187725 crossref_primary_10_1109_TCSI_2022_3187725 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2022-10-01 |
PublicationDateYYYYMMDD | 2022-10-01 |
PublicationDate_xml | – month: 10 year: 2022 text: 2022-10-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationTitle | IEEE transactions on circuits and systems. I, Regular papers |
PublicationTitleAbbrev | TCSI |
PublicationYear | 2022 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref13 ref35 ref12 ref34 ref15 ref37 ref14 ref36 ref31 ref30 ref11 ref33 ref10 ref32 ref2 ref17 ref39 ref16 ref38 ref19 ref18 Zhuang (ref1) 2020; 37 ref24 ref46 ref23 ref45 ref26 ref25 ref20 ref42 ref41 ref22 ref44 ref21 ref43 ref28 ref27 ref29 ref8 ref7 ref9 ref4 ref3 ref6 ref5 ref40 |
References_xml | – ident: ref21 doi: 10.1016/j.jpowsour.2012.10.060 – ident: ref15 doi: 10.1080/00207721.2021.1885082 – ident: ref9 doi: 10.1016/j.inffus.2011.09.004 – ident: ref41 doi: 10.3390/en12132491 – ident: ref46 doi: 10.1109/TSMC.2019.2918002 – ident: ref6 doi: 10.1049/iet-gtd.2019.1330 – ident: ref40 doi: 10.1109/TITS.2021.3118648 – ident: ref27 doi: 10.1109/TCNS.2021.3049361 – ident: ref31 doi: 10.1007/s11265-020-01530-5 – ident: ref19 doi: 10.1080/00207721.2021.1998722 – ident: ref20 doi: 10.1016/j.automatica.2019.108681 – ident: ref32 doi: 10.1109/TCSI.2020.3027678 – ident: ref30 doi: 10.1109/TNNLS.2021.3137426 – ident: ref45 doi: 10.1080/00207721.2021.1917721 – ident: ref39 doi: 10.1080/00207721.2022.2049919 – ident: ref12 doi: 10.1080/00207721.2021.2005178 – ident: ref22 doi: 10.1080/00207721.2021.1872118 – ident: ref37 doi: 10.1016/j.automatica.2022.110421 – ident: ref11 doi: 10.1109/TSP.2020.3048245 – ident: ref14 doi: 10.1109/TCNS.2016.2570003 – ident: ref23 doi: 10.1109/TAC.2019.2929817 – ident: ref3 doi: 10.1109/TAC.1987.1104658 – ident: ref8 doi: 10.1016/j.simpat.2020.102244 – ident: ref10 doi: 10.1016/j.automatica.2019.108557 – volume: 37 start-page: 629 issue: 3 year: 2020 ident: ref1 article-title: Establishing a detection model for denial of service attacks in industrial cyber physical systems publication-title: Control Theory Appl. – ident: ref4 doi: 10.1109/TIE.2021.3078376 – ident: ref24 doi: 10.1109/TSMC.2021.3071390 – ident: ref25 doi: 10.1016/j.est.2020.101557 – ident: ref26 doi: 10.1109/TSIPN.2021.3097217 – ident: ref34 doi: 10.1109/TSMC.2021.3062848 – ident: ref5 doi: 10.1109/TCST.2017.2664726 – ident: ref35 doi: 10.1109/TCSI.2020.3007953 – ident: ref29 doi: 10.1109/TAC.2015.2498708 – ident: ref13 doi: 10.1109/TSIPN.2017.2749959 – ident: ref33 doi: 10.1016/j.neucom.2021.01.131 – ident: ref36 doi: 10.1016/j.apenergy.2021.116812 – ident: ref42 doi: 10.1109/TIA.2016.2524438 – ident: ref44 doi: 10.1002/rnc.5957 – ident: ref17 doi: 10.1109/JAS.2020.1003297 – ident: ref16 doi: 10.1109/TCYB.2019.2903817 – ident: ref43 doi: 10.1080/00207721.2021.1914768 – ident: ref2 doi: 10.1007/s11277-021-08855-9 – ident: ref18 doi: 10.1016/j.ijepes.2014.04.059 – ident: ref7 doi: 10.1109/TVT.2012.2235474 – ident: ref38 doi: 10.1016/j.neucom.2022.03.001 – ident: ref28 doi: 10.1109/TCST.2013.2280899 |
SSID | ssj0029031 |
Score | 2.513723 |
Snippet | This paper is concerned with the secure estimation problem for the state of charge of Lithium-ion batteries subject to malicious attacks during the data... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 4237 |
SubjectTerms | attack detection Batteries Data transmission Equivalent circuits Estimation Integrated circuit modeling Kalman filter Kalman filters Lithium Lithium-ion batteries malicious attacks Parameter identification Real-time systems Rechargeable batteries secure remote estimation State of charge Upper bounds |
Title | Secure Estimation Against Malicious Attacks for Lithium-Ion Batteries Under Cloud Environments |
URI | https://ieeexplore.ieee.org/document/9817436 https://www.proquest.com/docview/2718779294 |
Volume | 69 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwED4VJhh4FUR5yQMTIiUvO_FYVUWAKAtUYiJy_ICK0iJIFn49ZyeNykOIKRnsyMqd7e-z774DOEaMoFWsfM-YhCJBSYyXMxF4WkVS5egwygVjDm_YxSi-uqf3LThtcmG01i74THftq7vLVzNZ2qOyM55a_MyWYAmJW5Wr1ZAr7keVNmrMPfTStL7BDHx-dte_vUQmGIZIUFNEk_TLHuSKqvxYid32cr4Ow_nAqqiS525Z5F358U2z8b8j34C1GmeSXuUYm9DS0y1YXVAfbMODO2vXZICzvEpgJL1HMUa8SIaIzqWNjiW9orBZ-ASxLbkeF0_j8sW7xJaVLifSbOIqJ5H-ZFYqMlhIm9uG0fngrn_h1eUWPIl7fuEJI6JQiITRQGhf5jw1Jk1UmsqYGaapSWUUSnzGOWWJDKJcSa65EBRBVcB0tAPL09lU7wJRQmvfqMRYgTRmAhGEgYpoYpRUETdhB_y5ATJZa5HbkhiTzHESn2fWZpm1WVbbrAMnTZfXSojjr8Zta4OmYf37O3Awt3JWT9X3LExsH0SJ8d7vvfZhxX67iuA7gOXirdSHiESK_Mi54CezjtwU |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwzV1Nj9MwEB0tywE48LWsKCzgA1yQ0k2c2IkPHKrSVcu2e6Er7Yng2GOoWFpEEyH4LfwV_htjJ62WD3FbiVNysBPF82K_sWfeADwljoA2s3HkXC7IQcldVEmdRGhTYysCjA3BmLMTOT7NXp2Jsx34vs2FQcQQfIZ9fxvO8u3KNH6r7FAVnj_LLoTyGL9-IQdt_WLykqz5jPOj0Xw4jroaApGhhayOtNMp1zqXItEYm0oVzhW5LQqTSSdRuMKk3NA1q4TMTZJW1ihUWgtiConElJ57Ba4SzxC8zQ7bunMqTls11kxF9F8U3ZlpEqvD-fD1hHxPzsklLoi_il9WvVDG5Y-5PyxoR7fgx2Yo2jiWD_2mrvrm228qkf_rWN2Gmx2TZoMW-ndgB5d34cYFfcU9eBNOE5CNaB5rUzTZ4J1eECNmM_I_jI__ZYO69joDjNg7my7q94vmYzShlq3y6ALXLNSGYsPzVWPZ6EJi4D04vZQP3Ifd5WqJ94FZjRg7mzsvASddohOe2FTkzhqbKsd7EG8MXppObd0X_Tgvg9cVq9JjpPQYKTuM9OD5tsunVmrkX433vM23DTtz9-Bgg6qym4zWJc99H-LB2YO_93oC18bz2bScTk6OH8J1_542XvEAduvPDT4i3lVXjwP8Gby9bAz9BKvJPFo |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Secure+Estimation+Against+Malicious+Attacks+for+Lithium-Ion+Batteries+Under+Cloud+Environments&rft.jtitle=IEEE+transactions+on+circuits+and+systems.+I%2C+Regular+papers&rft.au=Wang%2C+Licheng&rft.au=Tian%2C+Engang&rft.au=Wang%2C+Changsong&rft.au=Liu%2C+Shuai&rft.date=2022-10-01&rft.pub=IEEE&rft.issn=1549-8328&rft.volume=69&rft.issue=10&rft.spage=4237&rft.epage=4247&rft_id=info:doi/10.1109%2FTCSI.2022.3187725&rft.externalDocID=9817436 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1549-8328&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1549-8328&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1549-8328&client=summon |