Resilient Distributed $H_\infty$ Estimation via Dynamic Rejection of Biasing Attacks
نویسنده
چکیده
We consider the distributed $H_\infty$ estimation problem with additional requirement of resilience to biasing attacks. An attack scenario is considered where an adversary misappropriates some of the observer nodes and injects biasing signals into observer dynamics. Using a dynamic modelling of biasing attack inputs, a novel distributed state estimation algorithm is proposed which involves feedback from a network of attack detection filters. We show that each observer in the network can be computed in real time and in a decentralized fashion. When these controlled observers are interconnected to form a network, they are shown to cooperatively produce an unbiased estimate the plant, despite some of the nodes are compromised.
منابع مشابه
An Effective Attack-Resilient Kalman Filter-Based Approach for Dynamic State Estimation of Synchronous Machine
Kalman filtering has been widely considered for dynamic state estimation in smart grids. Despite its unique merits, the Kalman Filter (KF)-based dynamic state estimation can be undesirably influenced by cyber adversarial attacks that can potentially be launched against the communication links in the Cyber-Physical System (CPS). To enhance the security of KF-based state estimation, in this paper...
متن کاملResilient Configuration of Distribution System versus False Data Injection Attacks Against State Estimation
State estimation is used in power systems to estimate grid variables based on meter measurements. Unfortunately, power grids are vulnerable to cyber-attacks. Reducing cyber-attacks against state estimation is necessary to ensure power system safe and reliable operation. False data injection (FDI) is a type of cyber-attack that tampers with measurements. This paper proposes network reconfigurati...
متن کاملRobust detection of biasing attacks on misappropriated distributed observers via decentralized H∞ synthesis
We develop a decentralized H∞ synthesis approach to detection of biasing misappropriation attacks on distributed observers. Its starting point is to equip the observer with an attack model which is then used in the design of attack detectors. A two-step design procedure is proposed. First, an initial centralized setup is carried out which enables each node to compute the parameters of its attac...
متن کاملResilient Autonomous Control of Distributed Multi-agent Systems in Contested Environments,
An autonomous and resilient controller is proposed for leader-follower multi-agent systems under uncertainties and cyber-physical attacks. The leader is assumed non-autonomous with a nonzero control input which allows changing the team behavior or mission in response to environmental changes. A two-layer resilient learning-based control protocol is presented to find optimal solutions to the syn...
متن کاملNovel Shoulder-Surfing Resistant Haptic-based Graphical Password
Graphical password schemes are believed to be more secure and more resilient to dictionary attacks than textual passwords, but more vulnerable to shoulder surfing attacks. In this work, we design a new graphical password which is larger in the possible passwords’ space than in similar schemes and it is more resilient to shouldersurfing attacks. Personal entropies are integrated into the system ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2018