1. Introduction
With the continuous development of industrial systems, cyber–physical systems (CPSs) have received more and more attention by integrating control, communication and information technology. The term CPS was firstly pioneered by Helen Gill, who explained basic theory in a workshop organized by the USNSF in 2006 [1]. In general, a cyber–physical system is defined as the integration of computation, communication, and control to achieve the desired performance of a physical process [2]. CPSs bridge cyber space and physical space, which can realize a remote control of multiple tasks. In comparison to traditional control systems, CPSs offer advantages such as high flexibility, stable and reliable operation, easy installation, and low maintenance costs [3]. However, due to the close interaction of information between physical components and cyber space, such systems are vulnerable to malicious attacks. For instance, in March 2000, the control system of a sewage treatment plant in Queensland, Australia, suffered a remote intrusion, resulting in a large amount of sewage being directly discharged, leading to a severe environmental disaster. A uranium enrichment plant was attacked by the malicious Stuxnet worm, causing the destruction of many centrifuges in June 2010 [4]. Therefore, security has become a big concern, and there is high demand for security in CPSs.
CPSs are now widely applied in various industries such as power systems, intelligent transportation, aerospace, chemical production and so forth, which play crucial roles in ensuring the normal operation of society. It is noted that there is an increasing variety of attack types targeting CPSs, primarily categorized into two types: DOS (Denial-of-Service) attacks and deception attacks (also called false data injection (FDI) attacks). DOS attacks involve attempts by attackers to temporarily or permanently disrupt services of devices connected to the internet, rendering legitimate users unable to access network resources. Deceptive data injection attacks are typically achieved by tampering with system data or packets, such as directly sending false packets to target nodes or injecting false data into original packets. In this paper, like most methods about CPS, we believe that the quality of service (QoS) of the developed communication network is adequate, that is, we assume that the signal transmission speed is very fast, and the impact of delay in the transmission process can be ignored to ensure that CPS operates under ideal conditions [5,6,7]. Hence, the architecture of a cyber–physical system attacked via a false data injection attack can be depicted by Figure 1. It is worth noting that a replay attack can be considered a specific type of deceptive data injection attack, where only past data can be replayed [8]. Recent literature focusing on the security of CPSs can mainly be categorized into two areas: attack detection and secure state estimation. In terms of methods, they are primarily classified into model-based [9,10,11,12,13] and deep learning-based approaches [14,15,16,17]. Secure state estimation is an intriguing and powerful technology that not only enables attack detection but also facilitates attack identification. Observer-based state estimation methods play a crucial role in attack detection and identification. Common secure state estimation methods include the Kalman filter method [18,19], sliding-mode estimation method [20,21], adaptive estimation methods [22,23], and proportional integral observer methods [24,25].
However, the current literature mostly concentrates on linear systems, and it either focuses on sensor attacks [26] or actuator attacks [27] or does not consider the influence of noise [28,29]. Furthermore, it is worth noting that many systems in engineering can be modeled as descriptor systems, where the nonlinear components of the system can be characterized in Lipschitz form, at least locally [30]. Descriptor system theory has been successfully applied in estimation and control for regular dynamics systems, and some pioneering works can be found in [31,32,33]. Compared with diagnosis and identification of physical faults, the attack reconstruction has limited results that need to be further investigated. Attack reconstruction is an advanced diagnosis strategy that can detect, isolate, and identify attacks at the same time.
In this study, Lipschitz nonlinear systems subjected to both actuator and sensor data injection attacks are investigated, and the contributions and innovations of this paper are highlighted as follows:
(i).. By forming an extended state vector composed of system states and sensor attacks, a descriptor dynamic system is established that is equivalent to original regular dynamic systems.
(ii).. Using proportional and derivative gain, the descriptor dynamic system is transformed into an augmented regular dynamic system, with sensor attacks as internal states but leaving actuator attacks as external unknown inputs.
(iii).. For the equivalent regular dynamic system obtained in (ii), a sliding-mode observer is designed to form an augmented descriptor observer, which can achieve the simultaneous reconstruction of system states, sensor attacks, and actuator attacks.
(iv).. The robust performance of the dynamics in the estimation error equation can be ensured by using the linear matrix inequality technique.
(v).. An augmented descriptor adaptive observer technique is presented as well for achieving a robust simultaneous reconstruction of system states, sensor attacks, and actuator attacks.
(vi).. The proposed algorithms are off-line design and on-line implementation, indicating an excellent real-time performance.
(vii).. The two proposed novel attack estimation techniques are validated by an engineering-oriented example, and the performances of the two reconstruction techniques are analyzed and compared.
The remaining parts of this paper are organized as follows. Preliminaries and problem formulation are given Section 2. In Section 3, a novel augmented sliding-mode observer is presented for the secure estimation of actuator and sensor attacks. In Section 4, an adaptive descriptor augmented estimation technique is addressed for the simultaneous reconstruction of actuator and sensor attacks. Simulation studies and comparisons are shown in Section 5. The paper ends with conclusions in Section 6.
2. Preliminaries and Problem Formulation
Consider a continuous time dynamic system subjected to actuator attacks, sensor attacks, and unknown interference in the form of
(1)
where is the state vector, is the control input vector, is a Lipschitz nonlinear function, is the measured output vector, is the unknown but bounded external disturbance vector and , and and are the malicious actuator attack and sensor attack signals injected against the CPS, respectively. , and are known matrices with appropriate dimensions. is assumed to be full rank of column.Cyber–physical systems (CPSs) are often susceptible to attacks such as Denial-of-Service (DoS), false data injection attacks, and replay attacks. Among these, false data injection attacks have received significant attention due to their severe impact and the challenges associated with their detection. In this type of attack, adversaries can either directly transmit false data to the target location or modify data transmitted between different parts of the network, intentionally misleading the system, affecting its stability, and potentially causing severe damage to the system. In this paper, we focus on the monitoring and reconstruction problems related to such attacks.
For any , there is a constant such that
(2)
Then, the nonlinear function is Lipschitz.
Assume when . Therefore, from (2), one can have
(3)
The actuator fault and its derivative are assumed to be bounded, that is, and where and are assumed to be positive scalars.
Under Assumption 1, the nonlinear term is globally Lipschitz. It is noticed that in engineering practice, many nonlinear systems are locally Lipschitz in a region. The proposed methods can be easily extended to locally Lipschitz nonlinear systems (e.g., see [30]).
3. State and Attack Estimation Using Augmented Descriptor Sliding-Mode Techniques
In this section, to estimate the system state, actuator attacks, and sensor attacks while simultaneously mitigating the impacts of unknown disturbances, a new robust reconstruction technique is proposed by integrating augmented descriptor system approach and sliding-mode observer method.
3.1. Augmented Descriptor System Approach
Motivated by [31,32,33], we can define Therefore, we can identify an augmented descriptor system in the following form:
(4)
where(5)
In terms of (5) and (6), the augmented descriptor system can be simplified to
(6)
Let , then ,
Adding to both sides of Equation (6), we obtain
(7)
From , we can obtain a left-inverse as follows:
(8)
so thatBy left-multiplying both sides of Equation (7) by , we can obtain
(9)
Let
(10)
Then, Equation (9) can be rewritten as
(11)
Let
(12)
Equation (11) becomes
(13)
Substituting into (13), we have
(14)
As a result, the augmented equivalent system above has been obtained by using descriptor system theory and transformation.
3.2. Augmented Sliding-Mode Observer
For the augmented system (14), a sliding-mode observer in the following form can be constructed:
(15)
where is estimate of the state is the estimate of the augmented state , and is the sliding-mode term to be designed. is the gain to be solved.Derived from Equation (15), one has
(16)
Let
(17)
(18)
(19)
where is the sliding-mode gain to be designed, is the upper bound of , is the positive scalar, is the gain matrix to be solved, and is the output estimation error, which is .Subtracting (16) from (11), we can obtain
(20)
3.3. Stability Analysis
([25]). For any positive scalar and real constant matrices , the following inequality holds:
(21)
([34]). Given a symmetric matrix, . if and only if and .
The above lemma is known as the Schur complement lemma, which is useful for the design of the observer gains in this paper.
For system (4), there exists an augmented sliding-mode observer in the form of (15) such that the estimation error dynamics in (20) is robustly stable and satisfies the robust performance index . If there exist a symmetric positive definite matrix positive scalars and , and a matrix for a given positive constant , the following inequality holds:
(22)
(23)
The observer gain can be calculated by , where , .
(i).. Asymptotic stability when
Define a Lyapunov function candidate of the error dynamic system (20) as
(24)
In terms of (20), one has
(25)
From Equations (19) and (22), and noticing that and we can obtain
(26)
Furthermore, from Assumption 1 and Lemma 1, it can be deduced that
(27)
Substituting the results of Equation (26) and Equation (27) into (25), one can have
(28)
Noting that and using Schur complement shown in Lemma 2 to (23), we have
(29)
which means(30)
From (28) and (30), we can obtain when . Therefore, the estimation error dynamics in (20) is asymptotically stable when .
-
(ii).. Robust stability when
Let
(31)
By using (28) and (31), one has
(32)
where is defined in (29).Under zero initial condition , one has
(33)
Since and , from (32), we have indicating . As a result, the robust performance index is satisfied. □
3.4. Accessibility Analysis of Sliding Surface in Finite Time
To ensure the rapid response of the system to sliding-mode inputs, assist in the quick recovery of the system to the desired state when subjected to disturbances or external perturbations, and enhance the system’s robustness, it is necessary to determine the gain in the sliding term of Equation (19), ensuring that the state error system moves onto the sliding surface within a finite time.
Consider a siding mode surface . For a given positive scalar , if the gain satisfies
(34)
the error dynamic system (20) can reach the sliding surface within a finite time.
Define a Lyapunov function candidate as
(35)
In terms of (19), and noting that and one has
(36)
If the optimization problem in Theorem 1 has a feasible solution, the dynamic state error is bounded, i.e., , where is a smaller positive scalar.
Then, from (36), one can have
(37)
When holds, we have
(38)
As a result, the error dynamic system can reach the sliding surface within a finite time. This completes the proof. □
3.5. Robust State and Attack Estimation
When the error dynamic system moves to the sliding-mode surface, ; then, the error equation of (21) can be abbreviated as
(39)
where is the equivalent output signal of .Note that , where . When is minimized as much as possible, we can obtain , and then
(40)
where, is a small positive scalar that can reduce vibration during the sliding-mode motion process.With the observer in the form of Equation (15) and the augmented state , we can easily obtain estimates of state and sensor attack signals, namely
(41)
From Equation (40), the proposed attack signal reconstruction scheme is not limited by the type of attack signal, meaning it is applicable to step-type, sinusoidal, and other types of attack signals.
3.6. Design Procedure of Robust SMO for FDI Estimation
The design procedure of the addressed robust sliding-model observer can be summarized as below:
(i).. Construct the descriptor augmented system in the form of (4). Calculate the augmented matrices , and in terms of (5).
(ii).. Select the gain , so that is nonsingular. Calculate the matrices , and in terms of (10).
(iii).. Compute the observer gain , where and can be obtained by solving Equations (22) and (23).
(iv).. Select the sliding-mode term to ensure that the error dynamic system (20) can reach the sliding surface within a finite time.
(v).. Establish the estimator in the form of (15), where the parameters are available from steps (i)–(iv). Carry out the real-time estimation to obtain the estimated vector . As a result, the reconstructed signals for system state, sensor attack, and actuator attack vectors can be readily formulated as follows:
(42)
4. State and Attack Estimation Using Augmented Adaptive Observers
4.1. Design of an Adaptive Augmented Observer
Based on descriptor augmented system (4) and equivalent regular dynamic system (14), we can design an augmented adaptive observer in the following form:
(43)
(44)
where is the estimate of the vector in (14), is the estimated value of the augmented state , and is the estimate of the actuator attack signal. is the gain to be solved; is the adaptive learning rate to be designed. is the output error, i.e.,From (43), we have
(45)
Define
(46)
By subtracting Equation (45) from Equation (11), we can obtain
(47)
4.2. Robust Stability Analysis
For the dynamic system (4), there is an augmented adaptive observer in the shape of (43) and (44) such that the estimation error dynamics in (47) is robustly stable with the robust performance index ; if there exist a symmetric positive definite matrix positive scalars , , and and suitable matrices and such that for a given positive constant , the following inequality holds
(48)
(49)
(50)
The observer gain can be calculated by .
-
(i).. Asymptotic stability when and
Define a Lyapunov function candidate of the error dynamic system (47) as
(51)
Using (47) and (51), one has
(52)
From Equation (44), we can deduce that
(53)
Substituting (47) and (53) into (52) and using (48), one can have
(54)
Using Lemma 1, we can obtain
(55)
(56)
(57)
Substituting (55)–(57) into (54), one can have
(58)
Letting and applying the Schur complement to (50), we have
(59)
(60)
It is clear that (59) indicates
(61)
where(62)
Therefore, (61) means when and . Therefore, the estimation error dynamics (47) is asymptotically stable when and
-
(ii).. Robust stability when and
Let
(63)
By using (58) and (63), one has
(64)
where(65)
and is defined as shown on the left-hand side of (59). As and from (64), we have indicating . As a result, the robust performance index is satisfied. The proof is completed. □4.3. Robust State and Attack Reconstruction
From Equation (44), we can easily obtain
(66)
where denotes the instant when the attack occurs.The state and sensor attack signals can be reconstructed as follows:
(67)
4.4. Design Procedure for the Reconstruction of the Attack Signals
The design procedure of the proposed robust fast adaptive observer for attack signal reconstruction can be highlighted as shown:
(i).. Build the augmented system as shown in (4). Calculate the augmented matrices , and in terms of (5).
(ii).. Select the gain , so that the matrix is nonsingular. Calculate the changed matrix , and in terms of (10).
(iii).. Select the adaptive learning rate
(iv).. Compute , where and can be obtained by solving Equations (48) and (49).
(v).. Establish estimators (43) and (44) where the parameters are available from steps (i)–(iv) and apply real-time simulation to identify the estimated vector . Hence, the estimated signals for the system state, sensor attack, and actuator attack vectors can be readily formulated as follows:
(68)
5. Simulation Study
In this section, considering the linearized longitudinal dynamic system of the VTOL aircraft [35] to validate the effectiveness of the proposed method, we assume that the system is subjected to nonlinear dynamics, unknown disturbances, actuator attacks, and sensor attacks simultaneously. Therefore, the state-space dynamic expression can be described as shown in (1), where the states include horizontal velocity, vertical velocity, pitch rate, and pitch angle. The system parameters are as follows:
(69)
From the parameter matrices mentioned above, the augmented matrices and in the form of Equations (5) and (10) can be calculated.
In this simulation, the disturbance signals are depicted in Figure 2, which are high-frequency signals corrupted by band-limited white noises.
-
(i).. Robust augmented sliding-mode observer
To evaluate the performance of the estimator, one can consider the following actuator time-varying attack signal and sensor attack signals and :
(70)
(71)
(72)
By solving (22) and (23), the gains are calculated as
(73)
(74)
Therefore, utilizing the estimator in the form of Equation (15) with the gains provided above, we can obtain curves for the states, attacks, and their respective estimates. Figure 3, Figure 4, Figure 5 and Figure 6 display the system states and their estimates, and Figure 7, Figure 8 and Figure 9 exhibit the attacks and their estimates. One can see that the estimated curves track the system states and attacks excellently.
-
(ii).. Adaptive augmented observer
To assess the performance of the estimator, we use the same attack signals as used in (i) above (e.g., see Equations (70)–(72)).
To solve LMIs (48) and (49), the following gains can be obtained:
(75)
(76)
Therefore, utilizing the estimator in the form of (43) and the gains obtained above, we can obtain the curves for the states, attacks, and their respective estimates. Figure 10, Figure 11, Figure 12 and Figure 13 show the states and their estimates, in which we can see that the estimated curves track the system states well, but the dynamic variations at initial time are relatively large. Figure 14, Figure 15 and Figure 16 exhibit the attacks and their estimates where the sensor attack signals in Figure 15 and Figure 16 are well tracked. It is noted that in Figure 14, the estimation curve can trace the actuator attack signal generally well, but there are significant dynamic response processes with noteworthy variations in the estimated actuator signal.
-
(iii).. Comparison study
For comparison studies, the algorithm proposed in reference [36] is simulated here.
Let , system (1) can be augmented to the following form:
(77)
whereThe nonlinear augmented unknown input observer is given in the form of
(78)
Using Theorem 3 from the literature [36], one can obtain the gains of the UIO-augmented observer. The simulated curves of the attacks and their estimates are depicted in Figure 17, Figure 18 and Figure 19. One can see that the augmented UIO approach can track step signals, slope signals, and parabola signals excellently. The UIO approach can also track the effectiveness of the loss signal and square wave signal generally well, but there are some spikes caused by abrupt changes from other attack signals. The UIO method can track the low-frequency sinusoidal signals well, but the tracking performance reduces as the frequency of the signal increases.
By comparing Figure 7, Figure 8 and Figure 9 in (i), Figure 14, Figure 15 and Figure 16 in (ii), and Figure 17, Figure 18 and Figure 19 in (iii), one can summarize the comments in Table 1.
6. Conclusions
In this paper, two simultaneous estimation techniques for state and false data injection attacks on the Lipschitz nonlinear systems affected by actuator attacks, sensor attacks, and unknown input disturbances have been proposed based on descriptor system theory, sliding-mode estimation, and adaptive estimation techniques. The robust stability conditions of the system have been analyzed based on the Lyapunov stability and linear matrix inequality methods. The proposed algorithms have been validated using simulation and comparison studies. The proposed algorithms have provided new insights into the reconstruction of multiple attacks, improving the safety and reliability of industrial systems.
Conceptualization, Z.-W.G.; writing—original draft preparation, H.W. and Z.-W.G.; writing—revision, Z.-W.G.; supervision, Z.-W.G.; project administration, Z.-W.G. and Y.L.; Software, H.W. and Y.L.; validation, H.W. and Z.-W.G.; formal analysis, H.W. and Z.-W.G. All authors have read and agreed to the published version of the manuscript.
No new data were created in this study. Data sharing is not applicable to this article.
The authors declare no conflicts of interest.
Footnotes
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Figure 3. State [Forumla omitted. See PDF.] and its estimate: augmented sliding-mode technique.
Figure 4. State [Forumla omitted. See PDF.] and its estimate: augmented sliding-mode technique.
Figure 5. State [Forumla omitted. See PDF.] and its estimate: augmented sliding-mode technique.
Figure 6. State [Forumla omitted. See PDF.] and its estimate: augmented sliding-mode technique.
Figure 7. Actuator attack signal and its estimate: augmented sliding-mode technique.
Figure 8. The first sensor attack signal and its estimate: augmented sliding-mode technique.
Figure 9. The second sensor attack signal and its estimate: augmented sliding-mode technique.
Figure 10. State [Forumla omitted. See PDF.] and its estimate: augmented adaptive technique.
Figure 11. State [Forumla omitted. See PDF.] and its estimate: augmented adaptive technique.
Figure 12. State [Forumla omitted. See PDF.] and its estimate: augmented adaptive technique.
Figure 13. State [Forumla omitted. See PDF.] and its estimate: augmented adaptive technique.
Figure 14. Actuator attack signal and its estimate: augmented adaptive technique.
Figure 15. The first sensor attack signal and its estimate: augmented adaptive technique.
Figure 16. The second sensor attack signal and its estimate: augmented adaptive technique.
Comparison among three attack estimation methods.
Attack Signal | Proposed Sliding-Mode Technique | Proposed Adaptive Technique | Existing Augmented UIO Technique [ |
---|---|---|---|
First sensor attack signal (a combination of measurement effectives loss and square waveform signals) | Tracks well | Tracks well | Tracks well |
Second sensor attack signal (a combination of step, slope, and parabola signals) | Tracks well | Tracks well | Tracks well with quick response speed |
Actuator signal (a combination of low-frequency and high-frequency periodic signals) | Tracks low-frequency and high-frequency signals excellently, and the tracking performance is best among the three methods | Tracks low-frequency signal well and traces high-frequency signal acceptably but with significant dynamic response time. There are evident variations at starting points when following the signal and its subsequent waveform change | Tracks low-frequency signal well, but the estimation performance reduces as the frequency increases. There are some spikes at the time instants when other signals change abruptly |
References
1. Singh, S.; Yadav, N.; Chuarasia, P.K. A review on cyber physical system attacks: Issues and challenges. Proceedings of the 2020 International Conference on Communication and Signal Processing (ICCSP); Chennai, India, 28–30 July 2020; pp. 1133-1138.
2. Mahmoud, M.S.; Hamdan, M.M.; Baroudi, U.A.N. Modeling and control of cyber-physical systems subject to cyber attacks: A survey of recent advances and challenges. Neurocomputing; 2019; 338, pp. 101-115. [DOI: https://dx.doi.org/10.1016/j.neucom.2019.01.099]
3. Sánchez, H.S.; Rotondo, D.; Escobet, T.; Puig, V.; Quevedo, J. Bibliographical review on cyber attacks from a control oriented perspective. Annu. Rev. Control; 2019; 48, pp. 103-128. [DOI: https://dx.doi.org/10.1016/j.arcontrol.2019.08.002]
4. Pasqualetti, F.; Dörfler, F.; Bullo, F. Attack detection and identification in cyber-physical systems. IEEE Trans. Autom. Control; 2013; 58, pp. 2715-2729. [DOI: https://dx.doi.org/10.1109/TAC.2013.2266831]
5. Baroumand, S.; Zaman, A.; Mihaylova, L. Attack detection and fault-tolerant control of interconnected cyber-physical systems against simultaneous replayed time-delay and false-data injection attacks. IET Control Theory Appl.; 2023; 17, pp. 527-541. [DOI: https://dx.doi.org/10.1049/cth2.12393]
6. Sadeghikhorami, L.; Varadharajan, V.; Safavi, A.A. A novel secure observer-based controller and attack detection scheme for Networked Control Systems. Inf. Sci.; 2021; 575, pp. 185-205. [DOI: https://dx.doi.org/10.1016/j.ins.2021.06.012]
7. Dong, K.; Yang, G.-H.; Wang, H. Estimator-based event-triggered output synchronization for heterogeneous multi-agent systems under denial-of-service attacks and actuator faults. Inf. Sci.; 2024; 657, 119955. [DOI: https://dx.doi.org/10.1016/j.ins.2023.119955]
8. Zhang, D.; Wang, Q.-G.; Feng, G.; Shi, Y.; Vasilakos, A. A survey on attack detection, estimation and control of industrial cyber–physical systems. ISA Trans.; 2021; 116, pp. 1-16. [DOI: https://dx.doi.org/10.1016/j.isatra.2021.01.036]
9. Guo, Z.; Shi, D.; Quevedo, D.E.; Shi, L. Secure state estimation against integrity attacks: A Gaussian mixture model approach. IEEE Trans. Signal Process.; 2018; 67, pp. 194-207. [DOI: https://dx.doi.org/10.1109/TSP.2018.2879037]
10. Gao, Y.; Sun, G.; Liu, J.; Shi, Y.; Wu, L. State estimation and self-triggered control of CPSs against joint sensor and actuator attacks. Automatica; 2020; 113, 108687. [DOI: https://dx.doi.org/10.1016/j.automatica.2019.108687]
11. Lv, M.; Lv, Y.; Yu, W.; Meng, H. Finite-Time Attack Detection and Secure State Estimation for Cyber-Physical Systems. IEEE/CAA J. Autom. Sin.; 2023; 10, pp. 2032-2034. [DOI: https://dx.doi.org/10.1109/JAS.2023.123351]
12. Lv, Y.; Lu, J.; Liu, Y.; Zhang, L. A class of stealthy attacks on remote state estimation with intermittent observation. Inf. Sci.; 2023; 639, 118964. [DOI: https://dx.doi.org/10.1016/j.ins.2023.118964]
13. Kazemi, Z.; Safavi, A.A.; Arefi, M.M.; Naseri, F. Finite-time secure dynamic state estimation for cyber–physical systems under unknown inputs and sensor attacks. IEEE Trans. Syst. Man Cybern. Syst.; 2021; 52, pp. 4950-4959. [DOI: https://dx.doi.org/10.1109/TSMC.2021.3106228]
14. Liu, G.; Zhao, H.; Fan, F.; Liu, G.; Xu, Q.; Nazir, S. An enhanced intrusion detection model based on improved kNN in WSNs. Sensors; 2022; 22, 1407. [DOI: https://dx.doi.org/10.3390/s22041407] [PubMed: https://www.ncbi.nlm.nih.gov/pubmed/35214308]
15. Xiao, Y.; Xing, C.; Zhang, T.; Zhao, Z. An intrusion detection model based on feature reduction and convolutional neural networks. IEEE Access; 2019; 7, pp. 42210-42219. [DOI: https://dx.doi.org/10.1109/ACCESS.2019.2904620]
16. Almalaq, A.; Albadran, S.; Mohamed, M.A. Deep machine learning model-based cyber-attacks detection in smart power systems. Mathematics; 2022; 10, 2574. [DOI: https://dx.doi.org/10.3390/math10152574]
17. Wang, Z.; Li, Z.; Wang, J.; Li, D. Network intrusion detection model based on improved BYOL self-supervised learning. Secur. Commun. Netw.; 2021; 9486949. [DOI: https://dx.doi.org/10.1155/2021/9486949]
18. Liu, Y.; Yang, G.-H. Event-triggered distributed state estimation for cyber-physical systems under DoS attacks. IEEE Trans. Cybern.; 2020; 52, pp. 3620-3631. [DOI: https://dx.doi.org/10.1109/TCYB.2020.3015507]
19. Zhang, J.; Sun, J. Optimal cooperative multiple-attackers scheduling against remote state estimation of cyber-physical systems. Syst. Control Lett.; 2020; 144, 104771. [DOI: https://dx.doi.org/10.1016/j.sysconle.2020.104771]
20. Liu, Z.; Chen, X.; Yu, J. Adaptive sliding mode security control for stochastic Markov jump cyber-physical nonlinear systems subject to actuator failures and randomly occurring injection attacks. IEEE Trans. Ind. Inform.; 2022; 19, pp. 3155-3165. [DOI: https://dx.doi.org/10.1109/TII.2022.3181274]
21. Yang, H.; Yin, S.; Han, H.; Sun, H. Sparse actuator and sensor attacks reconstruction for linear cyber-physical systems with sliding mode observer. IEEE Trans. Ind. Inform.; 2021; 18, pp. 3873-3884. [DOI: https://dx.doi.org/10.1109/TII.2021.3111221]
22. Yan, J.-J.; Yang, G.-H. Adaptive fault estimation for cyber-physical systems with intermittent DoS attacks. Inf. Sci.; 2021; 547, pp. 746-762. [DOI: https://dx.doi.org/10.1016/j.ins.2020.08.086]
23. An, L.; Yang, G.-H. Secure state estimation against sparse sensor attacks with adaptive switching mechanism. IEEE Trans. Autom. Control; 2017; 63, pp. 2596-2603. [DOI: https://dx.doi.org/10.1109/TAC.2017.2766759]
24. Dong, L.; Xu, H.; Zhang, L.; Li, Z.; Chen, Y. Adjustable proportional-integral multivariable observer-based FDI attack dynamic reconstitution and secure control for cyber-physical systems. Appl. Math. Comput.; 2023; 443, 127762. [DOI: https://dx.doi.org/10.1016/j.amc.2022.127762]
25. Wang, X.; Ding, D.; Dong, H.; Yi, X. PI-based security control against joint sensor and controller attacks and applications in load frequency control. IEEE Trans. Syst. Man Cybern. Syst.; 2022; 53, pp. 970-980. [DOI: https://dx.doi.org/10.1109/TSMC.2022.3190005]
26. Huo, J.-R.; Li, X.-J. False data injection attacks on sensors against state estimation in cyber-physical systems. J. Frankl. Inst.; 2023; 360, pp. 6110-6130. [DOI: https://dx.doi.org/10.1016/j.jfranklin.2023.03.052]
27. He, K.; Li, T.; Long, Y.; Park, J.H.; Chen, C.P. Secure state estimation and actuator attack reconstruction for cyber-physical systems based on sliding-mode observer. Int. J. Robust Nonlinear Control; 2023; 33, pp. 8508-8523. [DOI: https://dx.doi.org/10.1002/rnc.6833]
28. Zhao, Z.; Xu, Y. Performance based attack detection and security analysis for cyber-physical systems. Int. J. Robust Nonlinear Control; 2023; 33, pp. 3267-3284. [DOI: https://dx.doi.org/10.1002/rnc.6556]
29. Keijzer, T.; Ferrari, R.M.; Sandberg, H. Secure State Estimation under Actuator and Sensor Attacks using Sliding Mode Observers. IEEE Control Syst. Lett.; 2023; 7, pp. 2071-2076. [DOI: https://dx.doi.org/10.1109/LCSYS.2023.3284393]
30. Gao, Z. Estimation and compensation for Lipschitz nonlinear discrete-time systems subjected to unknown measurement delays. IEEE Trans. Ind. Electron.; 2015; 62, pp. 5950-5961. [DOI: https://dx.doi.org/10.1109/TIE.2015.2421877]
31. Gao, Z. Fault estimation and fault-tolerant control for discrete-time dynamic systems. IEEE Trans. Ind. Electron.; 2015; 62, pp. 3874-3884. [DOI: https://dx.doi.org/10.1109/TIE.2015.2417511]
32. Gao, Z.; Ding, S.X. Actuator fault robust estimation and fault-tolerant control for a class of nonlinear descriptor systems. Automatica; 2007; 43, pp. 912-920. [DOI: https://dx.doi.org/10.1016/j.automatica.2006.11.018]
33. Gao, Z.; Wang, H. Descriptor observer approaches for multivariable systems with measurement noises and application in fault detection and diagnosis. Syst. Control Lett.; 2006; 55, pp. 304-313. [DOI: https://dx.doi.org/10.1016/j.sysconle.2005.08.004]
34. Boyd, S.; El Ghaoui, L.; Feron, E.; Balakrishnan, V. Linear Matrix Inequalities in System and Control Theory; Society for Industrial and Applied Mathematics (SIAM): Philadelphia, PA, USA, 1994.
35. Han, J.; Liu, X.; Wei, X.; Zhang, H.; Hu, X. Adjustable dimension descriptor observer based fault estimation of nonlinear system with unknown input. Appl. Math. Comput.; 2021; 396, 125899. [DOI: https://dx.doi.org/10.1016/j.amc.2020.125899]
36. Gao, Z.; Liu, X.; Chen, M.Z.Q. Unknown input observer-based robust fault estimation for systems corrupted by partially decoupled disturbances. IEEE Trans. Ind. Electron.; 2015; 63, pp. 2537-2547. [DOI: https://dx.doi.org/10.1109/TIE.2015.2497201]
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
Fault data injection attacks may lead to a decrease in system performance and even a malfunction in system operation for an automatic feedback control system, which has motive to develop an effective method for rapidly detecting such attacks so that appropriate measures can be taken correspondingly. In this study, a secure descriptor estimation technique is proposed for continuous-time Lipschitz nonlinear cyber physical systems affected by actuator attacks, sensor attacks, and unknown process uncertainties. Specifically, by forming a new state vector composed of original system states and sensor faults, an equivalent descriptor dynamic system is built. A proportional and derivate sliding-mode observer is presented so that the system states, sensor attack, and actuator attack can be reconstructed successfully. The observer gains are obtained by using linear matrix inequality to secure robustly stable estimation error dynamics. Moreover, a robust descriptor fast adaptive observer estimator is presented as a complement. Finally, the efficacy levels of the proposed design approaches are validated using a vertical take-off and landing aircraft system. Comparison studies are also carried out to assess the tracking performances of the proposed algorithms.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer