Papers
Topics
Authors
Recent
2000 character limit reached

Distributed control under compromised measurements:Resilient estimation, attack detection, and vehicle platooning (2010.09661v1)

Published 19 Oct 2020 in eess.SY and cs.SY

Abstract: We study how to design a secure observer-based distributed controller such that a group of vehicles can achieve accurate state estimates and formation control even if the measurements of a subset of vehicle sensors are compromised by a malicious attacker. We propose an architecture consisting of a resilient observer, an attack detector, and an observer-based distributed controller. The distributed detector is able to update three sets of vehicle sensors: the ones surely under attack, surely attack-free, and suspected to be under attack. The adaptive observer saturates the measurement innovation through a preset static or time-varying threshold, such that the potentially compromised measurements have limited influence on the estimation. Essential properties of the proposed architecture include: 1) The detector is fault-free, and the attacked and attack-free vehicle sensors can be identified in finite time; 2) The observer guarantees both real-time error bounds and asymptotic error bounds, with tighter bounds when more attacked or attack-free vehicle sensors are identified by the detector; 3) The distributed controller ensures closed-loop stability. The effectiveness of the proposed methods is evaluated through simulations by an application to vehicle platooning.

Citations (24)

Summary

  • The paper develops a resilient framework integrating a saturation-based observer, online attack detector, and distributed controller to mitigate compromised sensor measurements.
  • It employs static and adaptive thresholds with redundant data exchange to accurately detect and isolate false sensor inputs, ensuring system reliability.
  • Simulations confirm bounded error performance and finite-time convergence even with multiple compromised sensors, ensuring robust vehicle platoon formation.

Distributed Control under Compromised Measurements: Resilient Estimation, Attack Detection, and Vehicle Platooning

Introduction

The paper presents a robust framework for distributed control of networked vehicles under potentially compromised sensor inputs. This research addresses the challenges faced in maintaining accurate state estimates and stable vehicle formations in the presence of sensor attacks. The architecture integrates a resilient observer, an attack detector, and a distributed controller to ensure the system's resilience against deceptive signals.

Architecture Overview

The proposed architecture comprises three core components:

  1. Resilient Observer: The observer mitigates the impact of false data injection (FDI) by incorporating a saturation mechanism that limits the influence of potentially corrupted sensor measurements. The observer operates by dynamically adjusting the trust placed on sensor data, using a combination of static and adaptive thresholds.
  2. Attack Detector: An online distributed detection mechanism identifies and categorizes sensors into categories of being under attack, attack-free, or suspected. The detector cross-verifies data using redundant measurements from neighboring vehicles, ensuring that compromised sensors do not propagate errors through the system.
  3. Distributed Controller: Based on observer estimates, the controller achieves formation control by adjusting vehicle dynamics in real-time. It ensures that all vehicles maintain a predetermined formation, despite the presence of compromised sensor data. Figure 1

    Figure 1: Platoon of five vehicles. The position and velocity measurements of vehicle 1 are compromised by a malicious attacker. Each vehicle is able to exchange messages with other vehicles nearby through wireless communication.

Implementation Details

Observer Design

The observer utilizes a saturation function applied to measurement innovations, effectively reducing the influence of any data anomalies. For vehicles within communication range LL, the observer leverages redundant information to reconstruct potential true state estimates. The design includes:

  • Static Threshold: A threshold βi\beta_i is calculated based on a predefined worst-case scenario, ensuring stability within known attack limits.
  • Adaptive Threshold: The system dynamically adapts to the attack severity by updating βi(t)\beta_i(t) to reflect changes in detection confidence over time.

The calculations for these thresholds are aligned with the constraints derived from vehicle and network capabilities, ensuring optimal resource use without compromising reliability.

Detector Operation

The detection process involves logical conditions assessing discrepancies in observed measurements versus expected behavior. By exchanging and processing data from nearby vehicles, the detector accurately identifies compromised nodes. The distributed nature ensures low latency in detection, crucial for maintaining operational integrity in dynamic environments.

Controller Functionality

The controller encompasses a feedback mechanism that stabilizes the vehicle platoon. It applies corrections based on discrepancies between estimated and desired states, using feedback from both absolute and relative positioning data.

Performance and Theoretical Guarantees

The research shows, through simulations, that the proposed methods effectively maintain control robustness even when bb sensors are compromised. Theoretical results demonstrate that for any noise level, the system achieves bounded errors. Furthermore, in a noise-free environment, the system can perfectly maintain the planned vehicle formation given the constraints and initial assumptions.

The architecture guarantees finite-time convergence of detection sets, ensuring timely updates to both estimation and control processes. Under defined system dynamics and control gains, the methodology assures asymptotic stability of the control system.

Conclusion

This integrated architecture presents a robust solution for distributed vehicle control systems subject to sensor attacks. By incorporating adaptive tools for estimation and detection, it allows for maintaining system stability and effectiveness even in adversarial settings. Future work may cover extended dynamic models and multi-dimensional vehicle network structures to further enhance the versatility and resilience of such systems.

Slide Deck Streamline Icon: https://streamlinehq.com

Whiteboard

Dice Question Streamline Icon: https://streamlinehq.com

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

List To Do Tasks Checklist Streamline Icon: https://streamlinehq.com

Collections

Sign up for free to add this paper to one or more collections.