Secure state estimation for event-triggered cyber-physical systems against deception attacks

Nowadays, cyber-physical systems (CPSs) have been widely used in various fields due to their powerful performance and low cost. The cyber attacks will cause security risks and even huge losses according to the universality and vulnerability of CPSs. As a typical network attack, deception attacks hav...

Full description

Saved in:
Bibliographic Details
Published inJournal of the Franklin Institute Vol. 359; no. 18; pp. 11155 - 11185
Main Authors Han, Zhichen, Zhang, Shengbing, Jin, Zengwang, Hu, Yanyan
Format Journal Article
LanguageEnglish
Published Elsevier Ltd 01.12.2022
Online AccessGet full text

Cover

Loading…
More Information
Summary:Nowadays, cyber-physical systems (CPSs) have been widely used in various fields due to their powerful performance and low cost. The cyber attacks will cause security risks and even huge losses according to the universality and vulnerability of CPSs. As a typical network attack, deception attacks have the features of high concealment and strong destructiveness. Compared with the traditional deception attack models with a constant value, a deception attack with random characteristics is introduced in this paper, which is difficult to identify. In order to defend against such deception attacks and overcome energy constraints in CPSs, the secure state estimation and the event-triggered communication mechanism without feedback information are co-considered to reconcile accuracy of estimation and energy consumption. Firstly, an event-triggered augmented state estimator is proposed for secure state estimation and attack identification. Then, under the ideology of equivalence, the augmented state estimator is derived as a concise two-stage estimator with reduced order. The two-stage estimator can perform the secure state estimation and attack identification respectively. The estimators ensure the accuracy of attack identification well since not treating attack information as the trigger event. Afterward, the comparison of the computational complexity of these two algorithms is analyzed. Finally, an example of a target tracking system is supplied to prove the effectiveness and efficiency of the proposed algorithm.
ISSN:0016-0032
1879-2693
DOI:10.1016/j.jfranklin.2022.10.049