Papers
Topics
Authors
Recent
2000 character limit reached

Passivity-based Attack Identification and Mitigation with Event-triggered Observer Feedback and Switching Controller (2403.15697v1)

Published 23 Mar 2024 in cs.SY and eess.SY

Abstract: This paper addresses the problem of output consensus in linear passive multi-agent systems under a False Data Injection (FDI) attack, considering the unavailability of complete state information. Our formulation relies on an event-based cryptographic authentication scheme for sensor integrity and considers FDI attacks at the actuator end, inspired by their practical nature and usages. For secure consensus, we propose (i) a passivity-based approach for detecting FDI attacks on the system and (ii) a Zeno-free event-triggered observer-based switching controller, which switches between the normal and the defense modes following an attack detection. We show that the closed-loop system achieves practical consensus under the controller's action in the defense mode. Simulation examples are provided to support the theoretical findings.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (28)
  1. A distributed attack detection method for multi-agent systems governed by consensus-based control. In 2017 IEEE 56th Annual Conference on Decision and Control (CDC), pages 5961–5966. IEEE, 2017.
  2. An ultrasonic sensor for distance measurement in automotive applications. IEEE Sensors journal, 1(2):143, 2001.
  3. Chi-Tsong Chen. Linear System Theory and Design. Oxford University Press, 1999.
  4. Nikhil Chopra. Output synchronization on strongly connected graphs. IEEE Transactions on Automatic Control, 57(11):2896–2901, 2012.
  5. Energy-based attack detection in networked control systems. In Proceedings of the 3rd international conference on High confidence networked systems, pages 115–124, 2014.
  6. Behrouz A. Forouzan. Cryptography and Network Security. McGraw-Hill Forouzan networking series. McGraw-Hill, 2008.
  7. Algebraic graph theory, volume 207. Springer Science & Business Media, 2001.
  8. Stealthy false data injection attacks with resource constraints against multi-sensor estimation systems. ISA transactions, 2022.
  9. Observer-based resilient consensus control for heterogeneous multi-agent systems against cyber-attacks. IEEE Transactions on Control of Network Systems, 2022.
  10. Passivity-based designs for synchronized path-following. Automatica, 43(9):1508–1518, 2007.
  11. An adaptive control architecture for mitigating sensor and actuator attacks in cyber-physical systems. IEEE Transactions on Automatic Control, 62(11):6058–6064, 2017.
  12. Resilient control of cyber-physical system using nonlinear encoding signal against system integrity attacks. IEEE Transactions on Automatic Control, 66(9):4334–4341, 2020.
  13. K-Team. KHEPERA IV NEW - K-Team Corporation. Accessed on 2023-01-19.
  14. H.K. Khalil. Nonlinear Systems. Pearson Education. Prentice Hall, 2002.
  15. Attack-resilient state estimation with intermittent data authentication. Automatica, 138:110035, 2022.
  16. Consensus of linear multi-agent systems with reduced-order observer-based protocols. Systems & Control Letters, 60(7):510–516, 2011.
  17. Modern robotics. Cambridge University Press, 2017.
  18. Adaptive consensus for heterogeneous multi-agent systems under sensor and actuator attacks. Automatica, 122:109242, 2020.
  19. Event-triggered communication and control of networked systems for multi-agent consensus. Automatica, 105:1–27, 2019.
  20. Switching-like event-triggered control for networked control systems under malicious denial of service attacks. IEEE Transactions on Automatic Control, 65(9):3943–3949, 2020.
  21. Event-triggered observer design for linear systems. In 2021 60th IEEE Conference on Decision and Control (CDC), pages 546–551. IEEE, 2021.
  22. Observer-based passive control for descriptor systems with time-delay. Journal of Systems Engineering and Electronics, 20(1):120–128, 2009.
  23. Generalized Inverse of Matrices and Its Applications. Probability and Statistics Series. Wiley, 1971.
  24. Event-triggered maximum likelihood state estimation. Automatica, 50(1):247–254, 2014.
  25. Brief survey on attack detection methods for cyber-physical systems. IEEE Systems Journal, 14(4):5329–5339, 2020.
  26. Storage functions for dissipative linear systems are quadratic state functions. In Proceedings of the 36th IEEE Conference on Decision and Control, volume 1, pages 42–47. IEEE, 1997.
  27. Synchronization of linear time-invariant systems on rooted graphs. In 2016 IEEE 55th Conference on Decision and Control (CDC), pages 4376–4381. IEEE, 2016.
  28. A resilient design for cyber physical systems under attack. In 2017 American Control Conference (ACC), pages 4418–4423. IEEE, 2017.
Citations (1)

Summary

We haven't generated a summary for this paper yet.

Whiteboard

Video Overview

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.