Journal
AUTOMATICA
Volume 116, Issue -, Pages -Publisher
PERGAMON-ELSEVIER SCIENCE LTD
DOI: 10.1016/j.automatica.2020.108920
Keywords
Cyber-physical security; State reconstruction; Security monitoring
Funding
- National Science Foundation [1705135, 1740047]
- UC-NL grant [LFR-18-548554]
- Army Research Laboratory [W911NF-17-2-0196]
- NSF [2002405, 2013824]
- Direct For Computer & Info Scie & Enginr [2013824, 1740047, 1705135, 2002405] Funding Source: National Science Foundation
- Division Of Computer and Network Systems [1740047, 1705135, 2013824, 2002405] Funding Source: National Science Foundation
Ask authors/readers for more resources
This paper discusses the problem of reconstructing the state of a linear time invariant system when some of its actuators and sensors are compromised by an adversarial agent. In the model considered in this paper, the adversarial agent attacks an input (output) by manipulating its value arbitrarily, i.e., we impose no constraints (statistical or otherwise) on how control commands (sensor measurements) are changed by the adversary other than a bound on the number of attacked actuators and sensors In the first part of this paper, we introduce the notion of sparse strong observability and we show that is a necessary and sufficient condition for correctly reconstructing the state despite the considered attacks. In the second half of this work, we propose an observer to harness the complexity of this intrinsically combinatorial problem, by leveraging satisfiability modulo theory solving. Numerical simulations illustrate the effectiveness and scalability of our observer. (C) 2020 Elsevier Ltd. All rights reserved.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available