ترغب بنشر مسار تعليمي؟ اضغط هنا

Resilient Distributed $H_infty$ Estimation via Dynamic Rejection of Biasing Attacks

121   0   0.0 ( 0 )
 نشر من قبل Valery Ugrinovskii
 تاريخ النشر 2018
  مجال البحث الهندسة المعلوماتية
والبحث باللغة English
 تأليف V. Ugrinovskii




اسأل ChatGPT حول البحث

We consider the distributed $H_infty$ estimation problem with additional requirement of resilience to biasing attacks. An attack scenario is considered where an adversary misappropriates some of the observer nodes and injects biasing signals into observer dynamics. Using a dynamic modelling of biasing attack inputs, a novel distributed state estimation algorithm is proposed which involves feedback from a network of attack detection filters. We show that each observer in the network can be computed in real time and in a decentralized fashion. When these controlled observers are interconnected to form a network, they are shown to cooperatively produce an unbiased estimate the plant, despite some of the nodes are compromised.



قيم البحث

اقرأ أيضاً

60 - Valery Ugrinovskii 2019
We consider the distributed $H_infty$ estimation problem with an additional requirement of resilience to biasing attacks. An attack scenario is considered where an adversary misappropriates some of the observer nodes and injects biasing signals into observer dynamics. The paper proposes a procedure for the derivation of a distributed observer which endows each node with an attack detector which also functions as an attack compensating feedback controller for the main observer. Connecting these controlled observers into a network results in a distributed observer whose nodes produce unbiased robust estimates of the plant. We show that the gains for each controlled observer in the network can be computed in a decentralized fashion, thus reducing vulnerability of the network.
82 - V. Ugrinovskii 2017
We develop a decentralized $H_infty$ synthesis approach to detection of biasing misappropriation attacks on distributed observers. Its starting point is to equip the observer with an attack model which is then used in the design of attack detectors. A two-step design procedure is proposed. First, an initial centralized setup is carried out which enables each node to compute the parameters of its attack detector online in a decentralized manner, without interacting with other nodes. Each such detector is designed using the $H_infty$ approach. Next, the attack detectors are embedded into the network, which allows them to detect misappropriated nodes from innovation in the network interconnections.
The paper addresses the problem of detecting attacks on distributed estimator networks that aim to intentionally bias process estimates produced by the network. It provides a sufficient condition, in terms of the feasibility of certain linear matrix inequalities, which guarantees distributed input attack detection using an $H_infty$ approach.
The paper considers a problem of detecting and mitigating biasing attacks on networks of state observers targeting cooperative state estimation algorithms. The problem is cast within the recently developed framework of distributed estimation utilizin g the vector dissipativity approach. The paper shows that a network of distributed observers can be endowed with an additional attack detection layer capable of detecting biasing attacks and correcting their effect on estimates produced by the network. An example is provided to illustrate the performance of the proposed distributed attack detector.
Kalman filters and observers are two main classes of dynamic state estimation (DSE) routines. Power system DSE has been implemented by various Kalman filters, such as the extended Kalman filter (EKF) and the unscented Kalman filter (UKF). In this pap er, we discuss two challenges for an effective power system DSE: (a) model uncertainty and (b) potential cyber attacks. To address this, the cubature Kalman filter (CKF) and a nonlinear observer are introduced and implemented. Various Kalman filters and the observer are then tested on the 16-machine, 68-bus system given realistic scenarios under model uncertainty and different types of cyber attacks against synchrophasor measurements. It is shown that CKF and the observer are more robust to model uncertainty and cyber attacks than their counterparts. Based on the tests, a thorough qualitative comparison is also performed for Kalman filter routines and observers.
التعليقات
جاري جلب التعليقات جاري جلب التعليقات
سجل دخول لتتمكن من متابعة معايير البحث التي قمت باختيارها
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا