{"title":"网络攻击下基于安全状态估计的自治系统弹性控制","authors":"Muhammad Hilmi;Augie Widyotriatmo;Agus Hasan","doi":"10.1109/TCYB.2025.3574157","DOIUrl":null,"url":null,"abstract":"This article presents a cyber resilience strategy based on secure state estimation (SSE) to counter cyberattacks on autonomous systems. The proposed framework employs a cascade of nonlinear observers to estimate attacks targeting both sensors and actuators, deriving the operational conditions required for their effectiveness. These SSEs are integrated with identification algorithm and a control mitigation law designed using the direct Lyapunov method, ensuring the system’s stability and integrity are maintained even under active attacks. The framework is validated through its implementation on an autonomous container truck. Experimental results demonstrate that the secure state estimators effectively preserve system stability and operational integrity, showcasing their potential to enhance the resilience of autonomous systems against cyber threats.","PeriodicalId":13112,"journal":{"name":"IEEE Transactions on Cybernetics","volume":"55 8","pages":"3560-3572"},"PeriodicalIF":10.5000,"publicationDate":"2025-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Resilient Control Based on Secure State Estimation for Autonomous Systems Under Cyberattacks\",\"authors\":\"Muhammad Hilmi;Augie Widyotriatmo;Agus Hasan\",\"doi\":\"10.1109/TCYB.2025.3574157\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This article presents a cyber resilience strategy based on secure state estimation (SSE) to counter cyberattacks on autonomous systems. The proposed framework employs a cascade of nonlinear observers to estimate attacks targeting both sensors and actuators, deriving the operational conditions required for their effectiveness. These SSEs are integrated with identification algorithm and a control mitigation law designed using the direct Lyapunov method, ensuring the system’s stability and integrity are maintained even under active attacks. The framework is validated through its implementation on an autonomous container truck. Experimental results demonstrate that the secure state estimators effectively preserve system stability and operational integrity, showcasing their potential to enhance the resilience of autonomous systems against cyber threats.\",\"PeriodicalId\":13112,\"journal\":{\"name\":\"IEEE Transactions on Cybernetics\",\"volume\":\"55 8\",\"pages\":\"3560-3572\"},\"PeriodicalIF\":10.5000,\"publicationDate\":\"2025-06-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Cybernetics\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/11030868/\",\"RegionNum\":1,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Cybernetics","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/11030868/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
Resilient Control Based on Secure State Estimation for Autonomous Systems Under Cyberattacks
This article presents a cyber resilience strategy based on secure state estimation (SSE) to counter cyberattacks on autonomous systems. The proposed framework employs a cascade of nonlinear observers to estimate attacks targeting both sensors and actuators, deriving the operational conditions required for their effectiveness. These SSEs are integrated with identification algorithm and a control mitigation law designed using the direct Lyapunov method, ensuring the system’s stability and integrity are maintained even under active attacks. The framework is validated through its implementation on an autonomous container truck. Experimental results demonstrate that the secure state estimators effectively preserve system stability and operational integrity, showcasing their potential to enhance the resilience of autonomous systems against cyber threats.
期刊介绍:
The scope of the IEEE Transactions on Cybernetics includes computational approaches to the field of cybernetics. Specifically, the transactions welcomes papers on communication and control across machines or machine, human, and organizations. The scope includes such areas as computational intelligence, computer vision, neural networks, genetic algorithms, machine learning, fuzzy systems, cognitive systems, decision making, and robotics, to the extent that they contribute to the theme of cybernetics or demonstrate an application of cybernetics principles.