4.7 Article

Recursive Filtering of Distributed Cyber-Physical Systems With Attack Detection

Journal

IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS
Volume 51, Issue 10, Pages 6466-6476

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TSMC.2019.2960541

Keywords

Upper bound; Detectors; Kalman filters; Power system dynamics; Couplings; Network topology; Cyber-physical systems (CPSs); deception attacks; distributed filtering; power systems; security defenses

Funding

  1. Australian Research Council Discovery Early Career Researcher Award [DE200101128]
  2. Australian Research Council Discovery Project [DP160103567]
  3. Australian Research Council [DE200101128] Funding Source: Australian Research Council

Ask authors/readers for more resources

This article discusses the application of distributed recursive filtering in cyber-physical systems, proposing a defense strategy against attacks and designing a novel distributed filter. The filter only relies on neighboring information and information from the subsystem itself, meeting the requirement of scalability.
This article is concerned with the distributed recursive filtering of cyber-physical systems consisting of a set of spatially distributed subsystems. Due to the vulnerability of communication networks, the transmitted data among subsystems could be subject to deception attacks. In this article, attackers do not have enough knowledge of the full network topology and the system parameters and therefore cannot carry out stealth attacks. For this scenario, a defense strategy dependent on the received innovation is proposed to identify the occurring attacks as far as possible. In light of identified attacks, a novel distributed filter is constructed and its gain is designed via a set of recursive formulas on the upper bound of covariance of filtering errors. The utilization of upper bound is to avoid the calculational challenge of cross-covariance matrices and realize the requirement of distributed implementation, simultaneously. Furthermore, the developed scheme only depends on the neighboring information and the information from the subsystem itself, and thereby satisfying the requirement of the scalability. Finally, a standard IEEE 39-bus power system is utilized to verify the effectiveness of the proposed filtering scheme.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available