机构地区:[1]Department of Electrical and Electronic Engineering,Imperial College London,London SW72AZ,UK,and also with the KIOS Research and Innovation Center of Excellence,University of Cyprus,Nicosia 1678,Cyprus [2]KIOS Research and Innovation Center of Excellence and the Department of Electrical and Computer Engineering,University of Cyprus,Nicosia 1678,Cyprus [3]Department of Electrical and Electronic Engineering,Imperial College London,London SW72AZ,UK [4]Department of Engineering and Architecture,University of Trieste,Trieste 34127,Italy [5]KIOS Research and Innovation Center of Excellence,University of Cyprus,Nicosia 1678,Cyprus [6]College of Automation Engineering,Nanjing University of Aeronautics and Astronautics,Nanjing 210016,China
出 处:《IEEE/CAA Journal of Automatica Sinica》2023年第4期898-915,共18页自动化学报(英文版)
基 金:This work was supported by the European Union’s Horizon 2020 Research and Innovation Programme under the Marie Skodowska-Curie(101027980(CSPCPS-A-ICA),739551(KIOS CoE-TEAMING));the Italian Ministry for Research in the Framework of the 2017 Program for Research Projects of National Interest(PRIN)(2017YKXYXJ);the National Natural Science Foundation of China(61903188,62073165,62020106003);the Natural Science Foundation of Jiangsu Province(BK20190403);the 111 Project(B20007);the Priority Academic Program Development of Jiangsu Higher Education Institutions.
摘 要:This paper proposes a passive methodology for detecting a class of stealthy intermittent integrity attacks in cyberphysical systems subject to process disturbances and measurement noise.A stealthy intermittent integrity attack strategy is first proposed by modifying a zero-dynamics attack model.The stealthiness of the generated attacks is rigorously investigated under the condition that the adversary does not know precisely the system state values.In order to help detect such attacks,a backward-in-time detection residual is proposed based on an equivalent quantity of the system state change,due to the attack,at a time prior to the attack occurrence time.A key characteristic of this residual is that its magnitude increases every time a new attack occurs.To estimate this unknown residual,an optimal fixed-point smoother is proposed by minimizing a piece-wise linear quadratic cost function with a set of specifically designed weighting matrices.The smoother design guarantees robustness with respect to process disturbances and measurement noise,and is also able to maintain sensitivity as time progresses to intermittent integrity attack by resetting the covariance matrix based on the weighting matrices.The adaptive threshold is designed based on the estimated backward-in-time residual,and the attack detectability analysis is rigorously investigated to characterize quantitatively the class of attacks that can be detected by the proposed methodology.Finally,a simulation example is used to demonstrate the effectiveness of the developed methodology.
关 键 词:Backward-in-time equivalent quantity fixed-point smoother intermittent integrity attacks
分 类 号:TP393.08[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...