{"title":"通过鲁棒优化实现非线性网络物理系统的安全状态估计","authors":"Lexin Chen, Yongming Li, Shaocheng Tong","doi":"10.1002/oca.3096","DOIUrl":null,"url":null,"abstract":"This article proposes secure state estimation for cyber-physical systems against sensor attacks. The attack and defense strategies are established via additional historical data, and the defender aims to reduce the estimation error maximally while the attacker aims to degrade the system performance maximally. The algorithm is implemented in the Nash equilibrium framework where the defender first designs the defense strategy and then the attacker designs corresponding attack parameters to launch attacks. Then, a robust optimization problem is formulated using Wasserstein ambiguity sets, which turn out to be equivalent to a convex program. A novel secure observer is proposed, where the attack estimation is used to mitigate attacks. Moreover, the detector is to monitor system behavior and detects the existence of sensor attacks. Finally, simulation results and comparative results illustrate the effectiveness of the defense strategy.","PeriodicalId":501055,"journal":{"name":"Optimal Control Applications and Methods","volume":"17 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secure state estimation via robust optimization for nonlinear cyber-physical systems\",\"authors\":\"Lexin Chen, Yongming Li, Shaocheng Tong\",\"doi\":\"10.1002/oca.3096\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This article proposes secure state estimation for cyber-physical systems against sensor attacks. The attack and defense strategies are established via additional historical data, and the defender aims to reduce the estimation error maximally while the attacker aims to degrade the system performance maximally. The algorithm is implemented in the Nash equilibrium framework where the defender first designs the defense strategy and then the attacker designs corresponding attack parameters to launch attacks. Then, a robust optimization problem is formulated using Wasserstein ambiguity sets, which turn out to be equivalent to a convex program. A novel secure observer is proposed, where the attack estimation is used to mitigate attacks. Moreover, the detector is to monitor system behavior and detects the existence of sensor attacks. Finally, simulation results and comparative results illustrate the effectiveness of the defense strategy.\",\"PeriodicalId\":501055,\"journal\":{\"name\":\"Optimal Control Applications and Methods\",\"volume\":\"17 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-01-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Optimal Control Applications and Methods\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1002/oca.3096\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Optimal Control Applications and Methods","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1002/oca.3096","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secure state estimation via robust optimization for nonlinear cyber-physical systems
This article proposes secure state estimation for cyber-physical systems against sensor attacks. The attack and defense strategies are established via additional historical data, and the defender aims to reduce the estimation error maximally while the attacker aims to degrade the system performance maximally. The algorithm is implemented in the Nash equilibrium framework where the defender first designs the defense strategy and then the attacker designs corresponding attack parameters to launch attacks. Then, a robust optimization problem is formulated using Wasserstein ambiguity sets, which turn out to be equivalent to a convex program. A novel secure observer is proposed, where the attack estimation is used to mitigate attacks. Moreover, the detector is to monitor system behavior and detects the existence of sensor attacks. Finally, simulation results and comparative results illustrate the effectiveness of the defense strategy.