{"title":"离散时间非线性系统攻击检测与隔离的多观测器方法","authors":"Tianci Yang, C. Murguia, M. Kuijper, D. Nešić","doi":"10.1109/ANZCC.2018.8606587","DOIUrl":null,"url":null,"abstract":"We address the problem of attack detection and isolation for a class of discrete-time nonlinear systems under (potentially unbounded) sensor attacks and measurement noise. We consider the case when a subset of sensors is subject to additive false data injection attacks. Using a bank of observers, each observer leading to an Input-to-State Stable (ISS) estimation error, we propose two algorithms for detecting and isolating sensor attacks. These algorithms make use of the ISS property of the observers to check whether the trajectories of observers are \"consistent\" with the attack-free trajectories of the system. Simulations results are presented to illustrate the performance of the proposed algorithms.","PeriodicalId":358801,"journal":{"name":"2018 Australian & New Zealand Control Conference (ANZCC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"A Multi-Observer Approach for Attack Detection and Isolation of Discrete-Time Nonlinear Systems\",\"authors\":\"Tianci Yang, C. Murguia, M. Kuijper, D. Nešić\",\"doi\":\"10.1109/ANZCC.2018.8606587\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We address the problem of attack detection and isolation for a class of discrete-time nonlinear systems under (potentially unbounded) sensor attacks and measurement noise. We consider the case when a subset of sensors is subject to additive false data injection attacks. Using a bank of observers, each observer leading to an Input-to-State Stable (ISS) estimation error, we propose two algorithms for detecting and isolating sensor attacks. These algorithms make use of the ISS property of the observers to check whether the trajectories of observers are \\\"consistent\\\" with the attack-free trajectories of the system. Simulations results are presented to illustrate the performance of the proposed algorithms.\",\"PeriodicalId\":358801,\"journal\":{\"name\":\"2018 Australian & New Zealand Control Conference (ANZCC)\",\"volume\":\"4 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-06-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 Australian & New Zealand Control Conference (ANZCC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ANZCC.2018.8606587\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Australian & New Zealand Control Conference (ANZCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ANZCC.2018.8606587","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Multi-Observer Approach for Attack Detection and Isolation of Discrete-Time Nonlinear Systems
We address the problem of attack detection and isolation for a class of discrete-time nonlinear systems under (potentially unbounded) sensor attacks and measurement noise. We consider the case when a subset of sensors is subject to additive false data injection attacks. Using a bank of observers, each observer leading to an Input-to-State Stable (ISS) estimation error, we propose two algorithms for detecting and isolating sensor attacks. These algorithms make use of the ISS property of the observers to check whether the trajectories of observers are "consistent" with the attack-free trajectories of the system. Simulations results are presented to illustrate the performance of the proposed algorithms.