Secure Estimation Against Malicious Attacks for Lithium-Ion Batteries Under Cloud Environments

This paper is concerned with the secure estimation problem for the state of charge of Lithium-ion batteries subject to malicious attacks during the data transmission from sensors to cloud-based battery management system terminal. First, the second-order resistance-capacitance equivalent circuit mode...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on circuits and systems. I, Regular papers Vol. 69; no. 10; pp. 4237 - 4247
Main Authors Wang, Licheng, Tian, Engang, Wang, Changsong, Liu, Shuai
Format Journal Article
LanguageEnglish
Published New York IEEE 01.10.2022
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
Abstract This paper is concerned with the secure estimation problem for the state of charge of Lithium-ion batteries subject to malicious attacks during the data transmission from sensors to cloud-based battery management system terminal. First, the second-order resistance-capacitance equivalent circuit model, whose parameters are identified by Kalman filter in an off-line manner, is introduced to describe the internal dynamics of lithium-ion batteries. Then, by applying the <inline-formula> <tex-math notation="LaTeX">\chi ^{2} </tex-math></inline-formula> detection mechanism, real-time malicious attacks are first detected and then a secure estimator is designed to suppress the influence of attacks on the estimation performance. An upper bound of the filtering error covariance is determined by solving certain coupled Riccati-like equations, and the filter parameter is obtained by minimizing such an upper bound at each time step. Finally, the validity of the proposed attack detection approach and the effectiveness of the developed estimation scheme are verified by experiment results under Federal Urban Driving Schedule condition.
AbstractList This paper is concerned with the secure estimation problem for the state of charge of Lithium-ion batteries subject to malicious attacks during the data transmission from sensors to cloud-based battery management system terminal. First, the second-order resistance-capacitance equivalent circuit model, whose parameters are identified by Kalman filter in an off-line manner, is introduced to describe the internal dynamics of lithium-ion batteries. Then, by applying the [Formula Omitted] detection mechanism, real-time malicious attacks are first detected and then a secure estimator is designed to suppress the influence of attacks on the estimation performance. An upper bound of the filtering error covariance is determined by solving certain coupled Riccati-like equations, and the filter parameter is obtained by minimizing such an upper bound at each time step. Finally, the validity of the proposed attack detection approach and the effectiveness of the developed estimation scheme are verified by experiment results under Federal Urban Driving Schedule condition.
This paper is concerned with the secure estimation problem for the state of charge of Lithium-ion batteries subject to malicious attacks during the data transmission from sensors to cloud-based battery management system terminal. First, the second-order resistance-capacitance equivalent circuit model, whose parameters are identified by Kalman filter in an off-line manner, is introduced to describe the internal dynamics of lithium-ion batteries. Then, by applying the <inline-formula> <tex-math notation="LaTeX">\chi ^{2} </tex-math></inline-formula> detection mechanism, real-time malicious attacks are first detected and then a secure estimator is designed to suppress the influence of attacks on the estimation performance. An upper bound of the filtering error covariance is determined by solving certain coupled Riccati-like equations, and the filter parameter is obtained by minimizing such an upper bound at each time step. Finally, the validity of the proposed attack detection approach and the effectiveness of the developed estimation scheme are verified by experiment results under Federal Urban Driving Schedule condition.
Author Wang, Changsong
Tian, Engang
Liu, Shuai
Wang, Licheng
Author_xml – sequence: 1
  givenname: Licheng
  orcidid: 0000-0001-5333-5881
  surname: Wang
  fullname: Wang, Licheng
  email: wanglicheng1217@163.com
  organization: College of Automation Engineering, Shanghai University of Electric Power, Shanghai, China
– sequence: 2
  givenname: Engang
  orcidid: 0000-0002-8169-5347
  surname: Tian
  fullname: Tian, Engang
  email: tianengang@163.com
  organization: College of Automation Electronic Engineering, Qingdao University of Science and Technology, Qingdao, China
– sequence: 3
  givenname: Changsong
  surname: Wang
  fullname: Wang, Changsong
  organization: Department of Control Science and Engineering, Shanghai Key Laboratory of Modern Optical System, University of Shanghai for Science and Technology, Shanghai, China
– sequence: 4
  givenname: Shuai
  orcidid: 0000-0003-0523-022X
  surname: Liu
  fullname: Liu, Shuai
  organization: College of Science, University of Shanghai for Science and Technology, Shanghai, China
BookMark eNp9kD1PwzAQhi1UJNrCD0AslphT_JEPeyxVgUpFDG1XIte5gEtqF9tB4t-TUMTAwPTe8D53umeEBtZZQOiSkgmlRN6sZ6vFhBHGJpyKomDZCRrSLBMJESQf9HMqE8GZOEOjEHaEMEk4HaLnFejWA56HaPYqGmfx9EUZGyJ-VI3RxrUBT2NU-i3g2nm8NPHVtPtk0TVvVYzgDQS8sRV4PGtcW-G5_TDe2T3YGM7Raa2aABc_OUabu_l69pAsn-4Xs-ky0UzymKhacaZUkWdUAdFbKepaFJUQOs3rHLJaaM50l-k2ywtN-bbSEqRSGctTmgMfo-vj3oN37y2EWO5c6213smRFL0QymXat4tjS3oXgoS61id9PR69MU1JS9jLLXmbZyyx_ZHYk_UMefOfLf_7LXB0ZAwC_fSlokfKcfwGrs4NK
CODEN ITCSCH
CitedBy_id crossref_primary_10_1002_asjc_3473
crossref_primary_10_1016_j_engappai_2024_107919
crossref_primary_10_1002_asjc_3236
crossref_primary_10_1109_JAS_2023_124110
crossref_primary_10_1109_TCSI_2023_3291760
crossref_primary_10_1002_rnc_6425
crossref_primary_10_1109_TII_2023_3288221
crossref_primary_10_1016_j_est_2024_112438
crossref_primary_10_1016_j_apenergy_2025_125317
crossref_primary_10_1109_TCSII_2023_3288149
crossref_primary_10_1109_TCYB_2023_3253141
crossref_primary_10_1002_asjc_3559
crossref_primary_10_1109_TCSII_2022_3226219
crossref_primary_10_1109_TIM_2025_3547129
crossref_primary_10_1002_rnc_7520
crossref_primary_10_1016_j_jfranklin_2024_106993
crossref_primary_10_1002_asjc_3185
crossref_primary_10_1109_JIOT_2024_3377201
crossref_primary_10_1109_TNSE_2022_3216867
crossref_primary_10_1109_TCSI_2024_3503719
crossref_primary_10_1109_TSIPN_2023_3244113
crossref_primary_10_1109_TCSI_2022_3226578
crossref_primary_10_1002_rnc_6910
crossref_primary_10_1109_TSUSC_2022_3221090
crossref_primary_10_1016_j_sysconle_2023_105692
crossref_primary_10_1080_21642583_2022_2158959
crossref_primary_10_1109_TPWRS_2023_3260402
crossref_primary_10_1177_01423312241228893
crossref_primary_10_1631_FITEE_2300568
crossref_primary_10_1109_TCSI_2024_3381191
crossref_primary_10_1016_j_inffus_2023_02_032
crossref_primary_10_1109_LCSYS_2023_3333257
Cites_doi 10.1016/j.jpowsour.2012.10.060
10.1080/00207721.2021.1885082
10.1016/j.inffus.2011.09.004
10.3390/en12132491
10.1109/TSMC.2019.2918002
10.1049/iet-gtd.2019.1330
10.1109/TITS.2021.3118648
10.1109/TCNS.2021.3049361
10.1007/s11265-020-01530-5
10.1080/00207721.2021.1998722
10.1016/j.automatica.2019.108681
10.1109/TCSI.2020.3027678
10.1109/TNNLS.2021.3137426
10.1080/00207721.2021.1917721
10.1080/00207721.2022.2049919
10.1080/00207721.2021.2005178
10.1080/00207721.2021.1872118
10.1016/j.automatica.2022.110421
10.1109/TSP.2020.3048245
10.1109/TCNS.2016.2570003
10.1109/TAC.2019.2929817
10.1109/TAC.1987.1104658
10.1016/j.simpat.2020.102244
10.1016/j.automatica.2019.108557
10.1109/TIE.2021.3078376
10.1109/TSMC.2021.3071390
10.1016/j.est.2020.101557
10.1109/TSIPN.2021.3097217
10.1109/TSMC.2021.3062848
10.1109/TCST.2017.2664726
10.1109/TCSI.2020.3007953
10.1109/TAC.2015.2498708
10.1109/TSIPN.2017.2749959
10.1016/j.neucom.2021.01.131
10.1016/j.apenergy.2021.116812
10.1109/TIA.2016.2524438
10.1002/rnc.5957
10.1109/JAS.2020.1003297
10.1109/TCYB.2019.2903817
10.1080/00207721.2021.1914768
10.1007/s11277-021-08855-9
10.1016/j.ijepes.2014.04.059
10.1109/TVT.2012.2235474
10.1016/j.neucom.2022.03.001
10.1109/TCST.2013.2280899
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022
DBID 97E
RIA
RIE
AAYXX
CITATION
7SP
8FD
L7M
DOI 10.1109/TCSI.2022.3187725
DatabaseName IEEE Xplore (IEEE)
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Electronics & Communications Abstracts
Technology Research Database
Advanced Technologies Database with Aerospace
DatabaseTitle CrossRef
Technology Research Database
Advanced Technologies Database with Aerospace
Electronics & Communications Abstracts
DatabaseTitleList Technology Research Database

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1558-0806
EndPage 4247
ExternalDocumentID 10_1109_TCSI_2022_3187725
9817436
Genre orig-research
GrantInformation_xml – fundername: National Natural Science Foundation of China
  grantid: 62003213; 61903253
  funderid: 10.13039/501100001809
GroupedDBID 0R~
29I
4.4
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACIWK
AETIX
AGQYO
AGSQL
AHBIQ
AIBXA
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
EBS
EJD
HZ~
H~9
IFIPE
IPLJI
JAVBF
M43
O9-
OCL
PZZ
RIA
RIE
RNS
VJK
AAYXX
CITATION
RIG
7SP
8FD
L7M
ID FETCH-LOGICAL-c293t-afa32aa7651ae0cb98ff87d88c46f6e5f8c32ce5f4b567c13bdc9e9aa526416e3
IEDL.DBID RIE
ISSN 1549-8328
IngestDate Mon Jun 30 10:20:31 EDT 2025
Tue Jul 01 04:15:17 EDT 2025
Thu Apr 24 22:57:18 EDT 2025
Wed Aug 27 02:14:21 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 10
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c293t-afa32aa7651ae0cb98ff87d88c46f6e5f8c32ce5f4b567c13bdc9e9aa526416e3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0003-0523-022X
0000-0001-5333-5881
0000-0002-8169-5347
PQID 2718779294
PQPubID 85411
PageCount 11
ParticipantIDs proquest_journals_2718779294
ieee_primary_9817436
crossref_citationtrail_10_1109_TCSI_2022_3187725
crossref_primary_10_1109_TCSI_2022_3187725
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2022-10-01
PublicationDateYYYYMMDD 2022-10-01
PublicationDate_xml – month: 10
  year: 2022
  text: 2022-10-01
  day: 01
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE transactions on circuits and systems. I, Regular papers
PublicationTitleAbbrev TCSI
PublicationYear 2022
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref35
ref12
ref34
ref15
ref37
ref14
ref36
ref31
ref30
ref11
ref33
ref10
ref32
ref2
ref17
ref39
ref16
ref38
ref19
ref18
Zhuang (ref1) 2020; 37
ref24
ref46
ref23
ref45
ref26
ref25
ref20
ref42
ref41
ref22
ref44
ref21
ref43
ref28
ref27
ref29
ref8
ref7
ref9
ref4
ref3
ref6
ref5
ref40
References_xml – ident: ref21
  doi: 10.1016/j.jpowsour.2012.10.060
– ident: ref15
  doi: 10.1080/00207721.2021.1885082
– ident: ref9
  doi: 10.1016/j.inffus.2011.09.004
– ident: ref41
  doi: 10.3390/en12132491
– ident: ref46
  doi: 10.1109/TSMC.2019.2918002
– ident: ref6
  doi: 10.1049/iet-gtd.2019.1330
– ident: ref40
  doi: 10.1109/TITS.2021.3118648
– ident: ref27
  doi: 10.1109/TCNS.2021.3049361
– ident: ref31
  doi: 10.1007/s11265-020-01530-5
– ident: ref19
  doi: 10.1080/00207721.2021.1998722
– ident: ref20
  doi: 10.1016/j.automatica.2019.108681
– ident: ref32
  doi: 10.1109/TCSI.2020.3027678
– ident: ref30
  doi: 10.1109/TNNLS.2021.3137426
– ident: ref45
  doi: 10.1080/00207721.2021.1917721
– ident: ref39
  doi: 10.1080/00207721.2022.2049919
– ident: ref12
  doi: 10.1080/00207721.2021.2005178
– ident: ref22
  doi: 10.1080/00207721.2021.1872118
– ident: ref37
  doi: 10.1016/j.automatica.2022.110421
– ident: ref11
  doi: 10.1109/TSP.2020.3048245
– ident: ref14
  doi: 10.1109/TCNS.2016.2570003
– ident: ref23
  doi: 10.1109/TAC.2019.2929817
– ident: ref3
  doi: 10.1109/TAC.1987.1104658
– ident: ref8
  doi: 10.1016/j.simpat.2020.102244
– ident: ref10
  doi: 10.1016/j.automatica.2019.108557
– volume: 37
  start-page: 629
  issue: 3
  year: 2020
  ident: ref1
  article-title: Establishing a detection model for denial of service attacks in industrial cyber physical systems
  publication-title: Control Theory Appl.
– ident: ref4
  doi: 10.1109/TIE.2021.3078376
– ident: ref24
  doi: 10.1109/TSMC.2021.3071390
– ident: ref25
  doi: 10.1016/j.est.2020.101557
– ident: ref26
  doi: 10.1109/TSIPN.2021.3097217
– ident: ref34
  doi: 10.1109/TSMC.2021.3062848
– ident: ref5
  doi: 10.1109/TCST.2017.2664726
– ident: ref35
  doi: 10.1109/TCSI.2020.3007953
– ident: ref29
  doi: 10.1109/TAC.2015.2498708
– ident: ref13
  doi: 10.1109/TSIPN.2017.2749959
– ident: ref33
  doi: 10.1016/j.neucom.2021.01.131
– ident: ref36
  doi: 10.1016/j.apenergy.2021.116812
– ident: ref42
  doi: 10.1109/TIA.2016.2524438
– ident: ref44
  doi: 10.1002/rnc.5957
– ident: ref17
  doi: 10.1109/JAS.2020.1003297
– ident: ref16
  doi: 10.1109/TCYB.2019.2903817
– ident: ref43
  doi: 10.1080/00207721.2021.1914768
– ident: ref2
  doi: 10.1007/s11277-021-08855-9
– ident: ref18
  doi: 10.1016/j.ijepes.2014.04.059
– ident: ref7
  doi: 10.1109/TVT.2012.2235474
– ident: ref38
  doi: 10.1016/j.neucom.2022.03.001
– ident: ref28
  doi: 10.1109/TCST.2013.2280899
SSID ssj0029031
Score 2.513723
Snippet This paper is concerned with the secure estimation problem for the state of charge of Lithium-ion batteries subject to malicious attacks during the data...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 4237
SubjectTerms attack detection
Batteries
Data transmission
Equivalent circuits
Estimation
Integrated circuit modeling
Kalman filter
Kalman filters
Lithium
Lithium-ion batteries
malicious attacks
Parameter identification
Real-time systems
Rechargeable batteries
secure remote estimation
State of charge
Upper bounds
Title Secure Estimation Against Malicious Attacks for Lithium-Ion Batteries Under Cloud Environments
URI https://ieeexplore.ieee.org/document/9817436
https://www.proquest.com/docview/2718779294
Volume 69
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwED4VJhh4FUR5yQMTIiUvO_FYVUWAKAtUYiJy_ICK0iJIFn49ZyeNykOIKRnsyMqd7e-z774DOEaMoFWsfM-YhCJBSYyXMxF4WkVS5egwygVjDm_YxSi-uqf3LThtcmG01i74THftq7vLVzNZ2qOyM55a_MyWYAmJW5Wr1ZAr7keVNmrMPfTStL7BDHx-dte_vUQmGIZIUFNEk_TLHuSKqvxYid32cr4Ow_nAqqiS525Z5F358U2z8b8j34C1GmeSXuUYm9DS0y1YXVAfbMODO2vXZICzvEpgJL1HMUa8SIaIzqWNjiW9orBZ-ASxLbkeF0_j8sW7xJaVLifSbOIqJ5H-ZFYqMlhIm9uG0fngrn_h1eUWPIl7fuEJI6JQiITRQGhf5jw1Jk1UmsqYGaapSWUUSnzGOWWJDKJcSa65EBRBVcB0tAPL09lU7wJRQmvfqMRYgTRmAhGEgYpoYpRUETdhB_y5ATJZa5HbkhiTzHESn2fWZpm1WVbbrAMnTZfXSojjr8Zta4OmYf37O3Awt3JWT9X3LExsH0SJ8d7vvfZhxX67iuA7gOXirdSHiESK_Mi54CezjtwU
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwzV1Nj9MwEB0tywE48LWsKCzgA1yQ0k2c2IkPHKrSVcu2e6Er7Yng2GOoWFpEEyH4LfwV_htjJ62WD3FbiVNysBPF82K_sWfeADwljoA2s3HkXC7IQcldVEmdRGhTYysCjA3BmLMTOT7NXp2Jsx34vs2FQcQQfIZ9fxvO8u3KNH6r7FAVnj_LLoTyGL9-IQdt_WLykqz5jPOj0Xw4jroaApGhhayOtNMp1zqXItEYm0oVzhW5LQqTSSdRuMKk3NA1q4TMTZJW1ihUWgtiConElJ57Ba4SzxC8zQ7bunMqTls11kxF9F8U3ZlpEqvD-fD1hHxPzsklLoi_il9WvVDG5Y-5PyxoR7fgx2Yo2jiWD_2mrvrm228qkf_rWN2Gmx2TZoMW-ndgB5d34cYFfcU9eBNOE5CNaB5rUzTZ4J1eECNmM_I_jI__ZYO69joDjNg7my7q94vmYzShlq3y6ALXLNSGYsPzVWPZ6EJi4D04vZQP3Ifd5WqJ94FZjRg7mzsvASddohOe2FTkzhqbKsd7EG8MXppObd0X_Tgvg9cVq9JjpPQYKTuM9OD5tsunVmrkX433vM23DTtz9-Bgg6qym4zWJc99H-LB2YO_93oC18bz2bScTk6OH8J1_542XvEAduvPDT4i3lVXjwP8Gby9bAz9BKvJPFo
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Secure+Estimation+Against+Malicious+Attacks+for+Lithium-Ion+Batteries+Under+Cloud+Environments&rft.jtitle=IEEE+transactions+on+circuits+and+systems.+I%2C+Regular+papers&rft.au=Wang%2C+Licheng&rft.au=Tian%2C+Engang&rft.au=Wang%2C+Changsong&rft.au=Liu%2C+Shuai&rft.date=2022-10-01&rft.pub=IEEE&rft.issn=1549-8328&rft.volume=69&rft.issue=10&rft.spage=4237&rft.epage=4247&rft_id=info:doi/10.1109%2FTCSI.2022.3187725&rft.externalDocID=9817436
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1549-8328&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1549-8328&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1549-8328&client=summon