quotation:[Copy]
Mostafa Safi1.[en_title][J].Control Theory and Technology,2022,20(4):488~503.[Copy]
【Print page】 【Online reading】【Download 【PDF Full text】 View/Add CommentDownload reader Close

←Previous page|Page Next →

Back Issue    Advanced search

This Paper:Browse 478   Download 0 本文二维码信息
码上扫一扫!
Cooperative distributed state estimation: resilient topologies against smart spoofers
MostafaSafi1
0
(1 Amirkabir University of Technology, Hafez, Tehran 424, Iran)
摘要:
A network of observers is considered, where through asynchronous (with bounded delay) communications, they cooperatively estimate the states of a linear time-invariant (LTI) system. In such a setting, a new type of adversary might affect the observation process by impersonating the identity of the regular node, which is a violation of communication authenticity. These adversaries also inherit the capabilities of Byzantine nodes, making them more powerful threats called smart spoofers. We show how asynchronous networks are vulnerable to smart spoofing attack. In the estimation scheme considered in this paper, information flows from the sets of source nodes, which can detect a portion of the state variables each, to the other follower nodes. The regular nodes, to avoid being misguided by the threats, distributively filter the extreme values received from the nodes in their neighborhood. Topological conditions based on strong robustness are proposed to guarantee the convergence. Two simulation scenarios are provided to verify the results.
关键词:  Cyber-physical systems · Smart spoofing · Distributed resilient algorithm · Secure observers
DOI:https://doi.org/10.1007/s11768-022-00118-7
基金项目:
Cooperative distributed state estimation: resilient topologies against smart spoofers
Mostafa Safi1
(1 Amirkabir University of Technology, Hafez, Tehran 424, Iran)
Abstract:
A network of observers is considered, where through asynchronous (with bounded delay) communications, they cooperatively estimate the states of a linear time-invariant (LTI) system. In such a setting, a new type of adversary might affect the observation process by impersonating the identity of the regular node, which is a violation of communication authenticity. These adversaries also inherit the capabilities of Byzantine nodes, making them more powerful threats called smart spoofers. We show how asynchronous networks are vulnerable to smart spoofing attack. In the estimation scheme considered in this paper, information flows from the sets of source nodes, which can detect a portion of the state variables each, to the other follower nodes. The regular nodes, to avoid being misguided by the threats, distributively filter the extreme values received from the nodes in their neighborhood. Topological conditions based on strong robustness are proposed to guarantee the convergence. Two simulation scenarios are provided to verify the results.
Key words:  Cyber-physical systems · Smart spoofing · Distributed resilient algorithm · Secure observers