Abstract
This paper considers a discrete-time linear time invariant system in the presence of Gaussian disturbances/noises and sparse sensor attacks. First, we propose an optimal decentralized multi-sensor information fusion Kalman filter based on the observability decomposition when there is no sensor attack. The proposed decentralized Kalman filter deploys a bank of local observers who utilize their own single sensor information and generate the state estimate for the observable subspace. In the absence of an attack, the state estimate achieves the minimum variance, and the computational process does not suffer from the divergent error covariance matrix. Second, the decentralized Kalman filter method is applied in the presence of sparse sensor attacks as well as Gaussian disturbances/noises. Based on the redundant observability, an attack detection scheme by the test and a resilient state estimation algorithm by the maximum likelihood decision rule among multiple hypotheses, are presented. The secure state estimation algorithm finally produces a state estimate that is most likely to have minimum variance with an unbiased mean. Simulation results on a motor controlled multiple torsion system are provided to validate the effectiveness of the proposed algorithm.
Keywords: information fusion, decentralized Kalman filter, observability decomposition, attack resilience, secure state estimation, redundant observability, sparse sensor attack
1. Introduction
As control systems operate through network communication and become more complex due to increased connectivity, security against adversarial attacks is becoming more important and receiving attention [1,2,3,4]. In fact, attacks on control systems took place in reality [5,6,7,8], and many studies have been conducted on the security issues of systems whose measurements have been compromised by adversaries because sensors are one of the vulnerable points to malicious attackers in dynamical systems [9,10,11,12,13,14,15].
Among them, the state estimation problem when some of sensors are corrupted by attackers, often called a sparse sensor attack, has been investigated, and several solutions have been recently proposed [10,11,12,13,14,15]. The reference [10] introduces the basic concepts of the secure state estimation problem and formulates it as a non-convex combinatorial optimization problem. The problem is shown to be transformed into a convex optimization problem by using the results developed in the field of compressed sensing [16,17] under additional limiting assumptions. The relationship between this resilient state estimation problem and the notion of strong observability was revealed in [11]. A necessary and sufficient condition for the solvability of this problem is derived in [12,15] with the notion of redundant observability, more specifically, it requires the redundancy of observability twice as much as the sparsity of sensor attacks. A method to alleviate the computational complexity of the logic for finding a combination of non-attacked sensors, is proposed in [13,14]. In [15], the estimator is designed by a set of local observers with only a single sensor, and the decoder uses an error correction algorithm to generate a final state estimate based on the data collected from each local observer.
In addition to sparse sensor attacks, disturbances and noises are considered to enhance the robustness. First, bounded disturbances and noises are considered in [13,15,18], and in particular, the reference [15] explicitly derives the estimation error with the system parameters to provide an analysis of robustness. Second, zero-mean Gaussian white noises and disturbances rather than bounded ones were considered in [19,20,21], and Kalman filters were used to guarantee the state-estimation performance in a probabilistic manner. The reference [19] proposed an estimator with Kalman filters that searches a reliable subset of sensors and operates on the identified subset. A method of combining a secure state estimator and the standard Kalman filter by using the secure state estimator as a pre-filter for the Kalman filter when the set of attacked sensors changes over time, is proposed in [20]. It was shown in [21] that the optimal Kalman estimate can be decomposed into a weighted sum of local estimates, where each estimate uses only a single sensor measurement and that a secure state estimation can be achieved by a convex optimization under some additional assumptions.
This paper considers a general discrete-time linear dynamical system that is corrupted by sparse sensor attacks and Gaussian disturbances/noises. First, we construct local observers on each single sensor and design those local observers with Kalman filters using their own sensor data to cope with Gaussian disturbances/noises. The design of local observers is fully decentralized since it does not utilize any information including Kalman gains or error covariance matrices from other sensors as well as the sensor readings. Furthermore, the local observer’s error covariance is guaranteed not to diverge since it is constructed in the observable subspace based on the observability decomposition, and thus, there is no numerical computational error in practice. Second, a novel information fusion scheme is developed to counteract sparse sensor attacks while maintaining the minimum variance properties. The information fusion center detects the presence of sensor attack in the selected subset of sensors by the test, which is typically used in the area of fault detection [22,23]. If the test concludes that there is an attack in the selected subset, a search algorithm is launched to choose a new index set of sensors that is most likely to be unattacked by the multiple hypothesis test. Each hypothesis produces a state estimate with minimum variance, assuming that the index set is attack-free so that each estimate is unbiased. Therefore, the information fusion scheme finally produces a state estimate that is most likely to have the minimum variance and to be unbiased.
Assuming that there exist only Gaussian disturbances/noises without any attacks, a basic information fusion Kalman filter scheme was proposed in [24,25]. The local observers in [24,25] were designed using a Kalman filter for the entire state variable with a single sensor, and a fusion algorithm generates the optimal state estimate with the minimum variance. However, as highlighted in [26], some components of the error covariance may diverge if a single-sensor system is not observable, and this can induce numerical computation problems in practice. This problem can be solved by reducing the target state space to an observable subspace and designing a Kalman filter for the reduced observable subsystem. The idea of decomposing a single-sensor system into the observable subsystem and the unobservable subsystem was proposed in [15] for the secure state estimator design under bounded disturbances/noises, and in [27] for the distributed Luenberger observer design of sensor networks. Hence, adopting this idea and designing the Kalman filter for the observable subsystem, the problem of divergent error covariance does not occur, and we derive the optimal information fusion algorithm even when the size of the local information is different each other.
The contributions of this paper can be summarized as follows:
-
(1)
The proposed algorithm successfully estimates the state variable under sparse sensor attacks as well as Gaussian disturbances/noises. Our algorithm ensures the minimum variance, while [19] simply guarantees that its covariance is no worse than the worst case scenario with high probability;
-
(2)
We only assume that the system is redundant observable, which is known as an equivalent condition for the secure state estimation to be solvable under sparse sensor attacks. Note that [20] requires additional assumptions to reformulate the problem as a convex problem, and further, the combination of Kalman filter and the secure estimator implicitly supposes that the estimation error for the attack signal follows a zero-mean Gaussian distribution, which may not be true when the attack signal is intelligently designed in a coordinated way. The reference [21] needs the system matrix to be nonsingular, and both references [20] and [21] have additional assumptions about the closed-loop system;
-
(3)
The construction of the local observer is completely decentralized, and the overall size of the observer is relatively small. As the combinatorial logic is embedded in the fusion center, we do not have to prepare all possible combinations of observers. Note that [19] does not utilize any decomposition, and thus, it asks for all combinations of observers. The local decomposition presented in [21] is not fully decentralized because the decomposition is performed using the global information of the output matrix and the Kalman gain;
-
(4)
As a by-product obtained during the derivation process, the optimal decentralized information fusion Kalman filter scheme is developed based on the observability decomposition. Compared with the results in [24,25], the proposed scheme does not suffer from the numerical computational errors resulting from the diverging error covariance matrix. The algorithm in this paper guarantees that each error covariance matrix in the local observer converges by the observability decomposition, and this method can also be widely used for the multi-sensor information fusion Kalman filters that do not consider any attacks.
The rest of the paper is organized as follows. The remaining of this section introduces the notation used throughout the paper. The system model and problem formulation are given in Section 2. Section 3 presents the optimal multi-sensor information fusion Kalman filter based on the observability decomposition. We then give the attack detection algorithm by test and the attack-resilient state estimation scheme by the multiple hypothesis test in Section 4. Finally, simulation results with a servo motor system are given in Section 5, and we provide our concluding remarks in Section 6. The preliminary results of this paper were studied in [28].
Notation: Throughout this paper, the following notations are adopted. For a set S, the number of elements in the set S is denoted by . For a column vector and its -th element , denotes the number of nonzero elements of the vector y, that is, where the symbol is used to represent the subset of natural numbers . The number of nonzero elements of a vector y is defined by the norm, and it is written as . We say that the vector y is -sparse if its norm is less than or equal to , that is, .
For an index set and a vector (or a matrix ), (or ) denotes the vector (or the matrix) obtained from y (or C) by eliminating all -th rows such that . Similarly, for two index sets and a matrix , denotes the matrix obtained from P by eliminating all -th rows and all -th columns such that and .
Let a finite sequence with given. A stacked vector is said to be partitioned by the sequence if for all . For , an index set represents the -th partition among total p partitions when a vector is partitioned by the sequence . This notation is extended to a subset where denotes . A vector partitioned by the sequence , is said to be (-stacked) -sparse if .
2. System Modeling and Problem Formulation
The plant and the attack model under consideration are presented, and the problem formulation is given in this section.
2.1. Plant Modeling with Gaussian Disturbances and Noises
A discrete-time linear time invariant (LTI) system under Gaussian disturbances and noises given by
| (1) |
is considered. In the plant dynamics of (1), is the state variable vector, is the control input vector, and is the sensor output vector. Furthermore, the dynamics is disrupted by the process disturbance , and the sensors are corrupted by the measurement noise . There are a total of p sensors that measure the system outputs, and the -th sensor’s measurement at time k is denoted by
where is the -th row of the output matrix C, which implies that . Here, stochastic assumptions on the disturbance , the noise and the initial state of the system (1) are formally stated as follows.
Assumption 1.
The disturbance and measurement noise are independent and identically distributed (i.i.d.) white Gaussian process with zero-mean and covariance matrices Q and R, respectively. More specifically,
where the symbol represents the expected value of a random variable and is the Kronecker delta function. Furthermore, the initial state is a Gaussian distributed random variable with the mean and covariance matrix ,
and is independent of and .
2.2. Attack Modeling with Sparse Sensor Attacks
Among various attack scenarios [3], we consider false data injection attacks on sensors. Adversarial attackers can inject arbitrary inputs to some (not all) sensors so that a part of the measurements is compromised. Some additive inputs may be induced by cyber or physical tampering with the sensors, or adversaries may penetrate into the communication network on the output side of the plant because those communication links are not secure. In both cases, the attack is characterized by the attack vector as in
| (2) |
where denotes sensor readings with a potential attack, while is the original healthy sensor data affected by the measurement noise only. Similarly, represents the total sensor contamination signal including both the noise n and the attack a.
Here, it is assumed that the adversaries can compromise only a part of the sensors, not all of them. Assuming that the attacker’s resources are limited, we suppose that the attacker can contaminate up to out of p measurement outputs. Therefore, a formal condition on the sparsity of the attack vector a can be given as follows.
Assumption 2.
The sensor attack vector is -sparse for all , that is, . Moreover, it holds that
This assumption tells more than for all , in the sense that the compromised sensor channels are not altered for all time. In practice, this may be the case because it takes quite a long time and much effort to infiltrate into a new sensor from a malicious attacker’s point of view. Thus, without loss of generality, it can be assumed that the attack channels remain the same in the long term although it is not revealed to the controller which channels are attacked. However, if the attacked sensor channel changes but does not change frequently, the resilient state estimation scheme to be presented is still applicable. We will simply refer to this assumption as a “-sparse sensor attack”.
2.3. Problem Formulation
For the given discrete-time LTI system (1) under Assumptions 1 and 2, this paper investigates how to design an estimator that can recover the state variable x correctly. First, the Gaussian distributed disturbances/noises are handled appropriately, and the optimality in the sense of minimum variance should be recovered. Second, the security against the sparse sensor attack is enhanced, and the attack-resilient estimation with the unbiased state estimate should be achieved. More specifically, this paper considers the problem of proposing a secure and robust state estimation algorithm that generates the estimate that is most likely to have the minimum variance and to be unbiased. In this process, the concept of “redundant observability”, which characterizes the ability of coping with the sparse sensor attack, is utilized to ensure successful state estimation.
The basic condition for the observability of the system (1) with the attack model (2) satisfying Assumption 2, is given in the following assumption. Note that the assumption of “ redundant observability” is an equivalent condition for the system to be observable under -sparse sensor attacks ([15], Proposition 2,3,6). Here, the state estimation problem becomes challenging because this redundant observability does not guarantee for the entire states to be recovered with only a single sensor.
Assumption 3.
The system (1), or the pair , is redundant observable. In other words, each pair is observable for any satisfying .
3. Optimal Information Fusion Kalman Filter Based on Observability Decomposition
3.1. Kalman Observability Decomposition with Single Sensor
Since conventional Luenburger observers or Kalman filters typically have the form of
the whole state estimates are affected by the single sensor attack signal due to the observer gain K. In other words, any single non-zero component of a can alter all components of the state estimate . Hence, we design a collection of observers where each local observer utilizes only a single sensor information so that an attack signal for one sensor channel only interferes with the corresponding local observer and leaves other local observers unaffected.
Consider a single-output system
| (3) |
where the -th component of in (2), , is the output and the dynamics is given by (1). Since the pair is not necessarily observable, an estimator of the system (3) generally recovers only an (observable) portion of the full state x. The Kalman observability decomposition, which clearly describes the observable portion of the system, is now briefly introduced. For the single-output system (3), the observability matrix is written as
| (4) |
and we denote as the rank of the observability matrix . The null space of , , is the so-called unobservable subspace, and the column range space of , , is often called the observable subspace.
One can define the similarity transformation as
| (5) |
where is the matrix whose columns are th orthonormal basis of and is the matrix whose columns are the orthonormal basis of . Here, the size of those matrices is determined by
Note that the observable subspace is the span of column vectors in and the unobservable subspace is the span of column vectors in . Since the matrix is orthogonal, we have
Moreover, because the unobservable subspace is A-invariant, any columns of belong to . Therefore, the Kalman observability decomposition of the system (3) is obtained by the transformation (5) as
| (6) |
Finally, the state is decomposed into the observable sub-state and the unobservable sub-state . Further, the observable part of (6) can simply be written as
| (7) |
where and .
3.2. Decentralized Multi-Sensor Kalman Filter
Even though the Kalman filter can be applied to unobservable linear systems, the error covariance matrix may not converge in that case. According to ([29], Theorem 26), the detectability of the system is a sufficient condition for the convergence of the error covariance matrix in Kalman filtering. Since detectability is a slightly weaker concept than observability, the results in this paper dealing with observability can be generalized to the concept of detectability with slight modifications. The design of local state estimators for the observable subsystem (7) in the form of Kalman filters using only single sensor information, is derived in this subsection. By its construction, the pair , or simply denoted as , is observable, and thus, the error covariance matrix of the Kalman filter designed for the system (7) converges to a positive semidefinite matrix ([29], Theorem 26).
Now, we design a decentralized Kalman filter with each single sensor output, which constitutes the local observer. Then, the design of an information fusion scheme, which collects all the information on state estimates and error covariance matrices from the decentralized Kalman filters, will be discussed in the next subsection. For the simplicity of the derivation, we assume that there are no attacks at this time, that is, . Thus, and are interpreted as and , respectively, in this section.
Stochastic assumptions on the disturbance and the noise of the system (1) are formally stated in Assumption 1 where the covariance matrix R of the measurement noise is partitioned as
Finally, the assumption for each measurement noise (which is the same as in this section) of the system (3) can be written as follows:
The local observer is designed by a Kalman filter for the observable subsystem (7). To this end, let be the estimate of based on observations from to . Similarly, is the estimate of after we process the measurement at time k. Following the conventional notations in a Kalman filter, we use the terms and to denote the estimation error covariance of and , respectively. Thus, We have
| (8) |
Then, the Kalman filter has the following form of
| (9) |
where
| (10a) |
| (10b) |
| (10c) |
| (10d) |
| (10e) |
with initial value of
The above Equations (10) describe the recursive form of how the state estimate , the Kalman gain , and the error covariance matrix evolve. The error covariance of the -th local observer defined in (8), is governed by Equations (10d) and (10e), which ensure that the covariance matrix can be calculated by the following recursive form:
| (11) |
with the initial value of
Similarly, the error cross covariance of the -th and -th local observers can be defined by
| (12) |
and the recursive formula for is derived here. To this end, define the estimation error
| (13) |
and we have that
| (14a) |
| (14b) |
By substituting (14a) into (14b), the dynamics of the error is obtained as
| (15) |
The errors and for may be correlated; thus, by using (15), the error cross covariance between and can be computed recursively. From the recursive form of (15), note that is a linear combination of elements in
| (16) |
Therefore, by Assumption 1, we have (i) and are orthogonal, (ii) and are orthogonal, and (iii) and are orthogonal. Using these facts, one can derive the recursive form of the error cross covariance between and as follows:
| (17) |
with the initial value of
3.3. Optimal Information Fusion Based on Observability Decomposition
Based on the equivalence in (5) and the definition in (13), we have
| (18) |
Stacking Equations (18) for all leads to the following equation of
| (19) |
Finally, (19) is written in a compact form as
| (20) |
where the matrix
| (21) |
is composed of the similarity transformation matrices ’s and is used for a simple notation of . In Equation (20),
denotes the size of the stacked vector.
It should be noted that all the information in (20) except the actual state , are known or accessible to us. In Section 3.1, the matrix is generated from the orthonormal basis of the observable subspace where is the observability matrix given by (4). In Section 3.2, each local observer in (9) provides the state estimate for the observable sub-state . Now, the stochastic properties of the last term
are analyzed. First, its mean is zero because is a linear combination of elements in (16) by the Formula (15), and Assumption 1 ensures that every component in (16) has a zero mean. Second, the covariance matrix of can be obtained since the error covariance matrix is computed by each local observer in (11), and the error cross covariance matrix is generated by the second layer of the multi-sensor Kalman filter in (17) with collected information from local observers (see Figure 1 for the structure of the proposed Kalman filter). In summary, we have
| (22) |
where
| (23) |
which can be recursively computed by (11) and (17). Finally, Equation (20) depicts a linear model with the measured data vector , the known matrix , the noise vector with a zero-mean Gaussian distribution, and the unknown vector x to be estimated.
Figure 1.
Structure of decentralized multi-sensor information fusion Kalman filter.
Based on the statistical estimation and detection theory [30,31], an elaborate derivation process to recover the optimal estimate of x in (20), is now presented. The minimum variance unbiased estimator (MVUE) for the data model (20) with satisfying is introduced as follows.
Theorem 1
([30], Theorem 4.2). For the measurement with and such that for some , the minimum variance unbiased estimator (MVUE) of x is
(24) and the corresponding covariance matrix of is
(25) which achieves the minimum covariance in the sense that for any type of estimator .
Proof.
The results directly follows from the Gauss–Markov Theorem ([30], Theorem 6.1). However, we provide a direct proof for the readers convenience, and it follows the procedure in the proof of ([24], Theorem 1) or ([25], Theorem 1). We introduce a linear unbiased estimator
and, from the unbiased assumption, it follows that
Thus, we have
(26) Let the covariance matrix of the estimation error be . Then, the estimation error is obtained that
and the covariance matrix can be computed as
In order to find the minimum variance estimator, set the trace of the covariance matrix as the performance index
The Lagrangian [32] associated with J becomes
where is a matrix representing the Lagrange multipliers. By solving
we have
(27) Combining (26) and (27) results in the following equation of
Therefore, the matrix inversion lemma ([33], Section 2.3) yields the solution as
Thus, we have . Finally, the MVUE of x in (24), is obtained from , and the corresponding covariance matrix in (25) is computed by . □
Theorem 1 explains how the optimal estimate is computed. The information fusion center calculates the MVUE by (24) and its covariance by (25). In summary, the whole structure of the decentralized multi-sensor information fusion Kalman filter is shown in Figure 1. The first layer is composed of the local observer , which generates the estimate and the Kalman gains as given in (9) and (10). A part of the local observer , denoted as , provides the error covariance matrix . The second layer collects the Kalman gain ’s from the first layer and gives the error cross covariance matrix by (17). Finally, the third layer operates as an optimal information fusion center as described in Theorem 1 and computes the optimal estimate with the minimum covariance.
Remark 1.
Note that Gauss–Markov Theorem ([30], Theorem 6.1) gives the best linear unbiased estimator (BLUE) for the measurement where is a random variable, whose probability density function (PDF) is not restricted to a Gaussian distribution, with a zero mean and covariance P. Since the BLUE is also the MVUE for Gaussian data, the results of Theorem 1 also follow directly from the Gauss–Markov Theorem. The state estimate given in Theorem 1 is the optimal estimate since it achieves the minimum variance with an unbiased mean. A special case of Theorem 1 is considered in ([24], Theorem 1) and ([25], Theorem 1) for an information fusion scheme; however, the scheme in [24,25] may not be successful for a system whose local systems with a single sensor are not observable because the covariance matrix P could diverge in that case, whereas the covariance matrix P does not diverge in our scheme due to the Kalman observability decomposition.
4. Attack Resilient and Secure State Estimation by Decentralized Kalman Filter
4.1. Effect of Sparse Sensor Attack on Information Fusion Kalman FIlter
In the previous section, we assumed that all sensors were attack-free, that is, . Hence, and in (3) and (7) were regarded as non-attacked noise and output , respectively. The effects of a sparse sensor attack satisfying Assumption 2 on the information fusion Kalman filter developed in Section 3 are investigated in this subsection.
By linearity, the Kalman filter in (10) can be divided into two parts with as in
| (28a) |
| (28b) |
| (28c) |
| (28d) |
Note that and have the same dynamics with (10a), while the incoming signal is divided into two parts with and assigned to the dynamics of and , respectively. Similarly, and have the same dynamics with (10b), whereas the incoming signal is solely assigned to the dynamics of . By setting the initial conditions as
it easily follows from (10a) and (10b) that
| (29) |
Finally, the local observer in (9) is divided into and , as follows:
| (30a) |
| (30b) |
Now, define the attack-free estimation error
| (31) |
and we have that
| (32a) |
which is the same as (14) and (15) with replaced by . By (29) and (31), the total state-estimation error defined in (13) satisfies
| (33) |
and, from (30b) and (32c), its dynamic equation is given as follows:
| (34) |
which is a rewrite of (15) using the fact .
For notational simplicity, , , and are denoted by , , and , respectively. Then, Equation (19) becomes
| (35) |
which can be written in a compact form as
| (36) |
The above Equation (36) is nothing but (20) with replaced by . The properties of v are exactly identical with those of in (22) because the derivation in (22) is under the assumption of meaning in this case. Thus, we have
| (37) |
where simply denotes in (23). The attack-induced signal evolves according to Equation (30b) (or equivalently (28b) and (28d)) with an initial value of . Therefore, we have for the healthy sensor with , while generally holds for the attacked sensor with . Finally, the stacked error vector partitioned by the sequence , is (-stacked) -sparse by Assumption 2.
4.2. Detection of Sparse Sensor Attack
In the previous subsection, the measurement data have the form with unknown signals x, v, and e where the noise-induced signal v can be considered as a random variable whose distribution is and the attack-induced signal e is (-stacked) -sparse. To investigate the properties of the matrix in the measurement data, we borrow the definition of (-stacked) -error detectability and its characterization from [15]. There is a slight modification in the following Definition 1 and Lemma 1 from [15]. They do not append any additional zeros, whereas [15] adds additional zeros to match the size of all partitioned vectors and matrices.
Definition 1
([15], Definition 1). For a finite sequence with , a coding matrix is said to be (-stacked) -error detectable if, for all and (-stacked) -sparse such that , it holds that .
Accordingly, the matrix is not (-stacked) -error detectable if and only if there exist satisfying , and (-stacked) -sparse such that . In other words, the matrix is (-stacked) -error undetectable if and only if there exist a non-zero and (-stacked) -sparse such that . Typically, in terms of vectors, the vector is said to be undetectable with respect to if for some .
Lemma 1
([15], Proposition 1). For a finite sequence with and a matrix , the followings are equivalent:
- (i)
The matrix is (-stacked) -error detectable.
- (ii)
For every set satisfying , has full column rank.
- (iii)
For any where , the vector is not (-stacked) -sparse.
With the estimate of x obtained by MVUE of (24) in Theorem 1, we can calculate the estimated output and generate a residual signal r, which is a difference between the real measurement and the estimated output, that is, . Then, the residual r becomes another random variable whose distribution is also Gaussian. Finally, the mean and covariance of the Gaussian distributed random variable r is computed in the following theorem.
Theorem 2.
For the measurement where has full column rank and v satisfies with , let and
(38) where . Then, the residual r is Gaussian distributed with mean and covariance ,
(39) Furthermore, for some if and only if the mean of r, , satisfies . In other words, e is undetectable with respect to Φ if and only if .
Proof.
First, the mean of r is computed as follows.
(40) Second, because it easily follows that
the covariance matrix is calculated as
Moreover, note that
because of (40), and
Since is a projection matrix and it projects onto the range space of , , we have if and only if . This implies that if and only if . This completes the proof. □
Theorem 2 clarifies the mean and covariance of the Gaussian random variable r, and further, characterization of undetectable attacks with statistical analysis is also given. Now, one can derive a detection criterion of (-stacked) -sparse errors based on the property of the residual signal r, assuming that is (-stacked) -error detectable and that is actually (-stacked) -sparse. This detection strategy is summarized in the following theorem.
Theorem 3.
For a finite sequence with and the measurement where is (-stacked) -error detectable, is (-stacked) -sparse, and satisfies with , let
be given. Then, if and only if . Moreover, when , the vector x is exactly recovered by the expectation value of , that is, , which means that is an unbiased estimate of x.
Proof.
From Theorem 2, the (-stacked) -sparse e satisfies for some if and only if . However, any non-zero for some is not (-stacked) -sparse by Lemma 1. (iii) since is (-stacked) -error detectable. Therefore, the (-stacked) -sparse should be zero, and the result directly follows. Furthermore, the property of an unbiased estimate (with minimum variance) is easily obtained from Theorem 1. □
From the observation of Theorems 2 and 3, the problem of detecting a non-zero (-stacked) -sparse error signal e with a (-stacked) -error detectable coding matrix can be rephrased as: Given the residual signal r, which comes from the Gaussian distribution , determine if or . Therefore, the statistical decision theory [31] is helpful in this situation. More precisely, the test for fault detection [22,23], which is widely used to detect unwanted error signals, such as faults or attacks, can be applied.
One can simply apply the test to detect the presence of error signals in the (-stacked) measurement given by (36), and its operating scheme is summarized in Algorithm 1. Initially, the attack detection alarm indicator f is set to 0, and then the residual r is computed according to Equation (38). Without any error signal (that is, ), the residual r follows a Gaussian distribution , which is shown in (39). Now, define the standardized residual whose distribution becomes . Thus, the 2-norm of denoted by is an observation from a random variable , which satisfies a distribution with degrees of freedom (DOF),
This means that g cannot be far away from zero. Finally, when g is greater than a threshold , the attack detection alarm is triggered by setting . Here, is the predetermined threshold value, and it decides the probability of false alarm and the probability of error detection. For example, when the threshold is chosen such that
| (41) |
where denotes the PDF of the distribution, the probability of false alarm becomes . As the probability of false alarm becomes smaller, the probability of error detection also decreases, which implies that there is a trade-off between the small false alarm and the high error detection ratio. Thus, one needs to choose as a good compromise between these two conflicting requirements.
| Algorithm 1 Detection scheme based on the test |
|
Input: Output: f Initialization: 1: 2: 3: 4: 5: if then 6: 7: else if then 8: 9: end if |
4.3. Secure State Estimation under a Sparse Sensor Attack
In this subsection, an attack-resilient and secure state estimation scheme, which reconstructs the optimal estimate for the state x under Assumptions 1–3, is developed. First, characterization of the matrix defined in (21) under Assumption 3 is given as follows.
Lemma 2
([15], Proposition 1,2,3,6). For a finite sequence with for where is the observability matrix given in (4), the followings are equivalent:
- (i)
The pair is redundant observable.
- (ii)
The matrix Φ is (-stacked) -error detectable.
- (iii)
For every set satisfying , has full column rank.
- (iv)
The pair is observable under -sparse sensor attacks.
Note that the redundancy for observability is , which is twice the sparsity of the attack signal. This is the key point of constructing the state estimation algorithm. We can examine each subset of sensors whose size is . In other words, we have number of subsets where and for . Since is (-stacked) -error detectable by Assumption 3 and Lemma 2.(ii), it easily follows that is -error detectable for with . This means that, even after removing any sensors, the remaining outputs still have redundancy for observability. Therefore, the detection scheme of Theorem 3, which relies on the (-stacked) -error detectability of the coding matrix, can be applied for each subset satisfying .
The configuration of the secure state estimator, which replaces the information fusion center in Figure 1, is sketched in Figure 2, and its operation is described in Algorithm 2. Before explaining the operation, let denote where and P are given in (21) and (23), respectively. Furthermore, the notation for a sub-matrix is slightly abused for simplicity. For example, , , and denote
respectively, where . Recall that denotes the matrix obtained from P by eliminating all -th rows and all -th columns such that and .
Figure 2.
Configuration of the resilient estimation scheme with Gaussian disturbance/noise.
Initially, an attack-free index set , a state estimate , a standardized residual’s norm g, and a fault alarm signal f, are set to , , 0, and 0, respectively. The algorithm continually checks if there is any attack in the index set based on Algorithm 1. For the given index set , the algorithm essentially calculates the MVUE , the residual , the standardized residual , and its 2-norm only with the measurement and covariance data from the subset . Recall from Theorem 2 that, if for all , we have where , and thus, is an observation from a random variable , which satisfies a distribution with DOF,
| (42) |
Therefore, g is used to detect the presence of attack in the subset by the test. We compare g with the threshold , which is designed before running the algorithm and determines the probability of false alarm and the probability of error detection. If , the index set is declared to be attack-free by setting and the algorithm simply maintains the selected optimal index set . Otherwise, when g is greater than the threshold , the attack detection alarm is triggered by setting , and the algorithm starts the process of searching new attack-free index set.
| Algorithm 2 Operation of the resilient estimation with Gaussian disturbance/noise |
|
Input: , , ⋯, , , , ⋯, , Output: , , g, f Initialization: , , , 1: while system (1) is running do 2: 3: 4: 5: 6: if then 7: 8: else if then 9: 10: for satisfying do 11: 12: 13: 14: 15: end for 16: 17: end if 18: end while |
In order to find a new attack-free index set and, consequently, to recover the state x from the new index set, we search all subsets ’s in whose size is . For a detailed explanation, let
be the set . For each subset where , the computing module calculates the MVUE , the residual , the standardized residual , and its 2-norm only with the measurement and covariance data from the subset . Now, the new optimal subset is decided by the maximum likelihood (ML) decision rule with the values of ’s, and the selector chooses the optimal index set by the ML decision rule. To this end, we wish to distinguish between hypotheses, , which are given as follows:
Let us denote as a random variable such that is a single observation from , whereas denotes a random variable such that
with and is the PDF of the distribution. Note that, if the sensors indexed by are attack-free, then the random variable as well as follows the distribution with DOF. The ML decision rule choose the hypothesis and the corresponding optimal index set that maximize the likelihood , which is the PDF of being equal to the observation under the hypothesis (that is, under the condition that there is no attack signal in the measurements indexed by ). Therefore, we have
where the last equality comes from the fact that under the hypothesis so that it follows the PDF of the distribution. Therefore, from the index set corresponding to the ML hypothesis , the MVUE of the newly selected optimal index set , , becomes the final suboptimal estimate of x.
Remark 2.
The proposed algorithm selects the subset of sensors , which is most likely to be attack-free with . Moreover, if the selected set is actually attack-free, it gives the minimum variance with unbiased estimation. In short, Algorithm 2 generates a state estimate, which is most likely to have minimum variance with unbiased mean. However, we say that it is a suboptimal estimate of x instead of the optimal estimate because the decentralized multi-sensor information fusion Kalman filter cannot ensure to achieve the centralized optimal covariance even without attack as illustrated in ([24], Section 5).
Remark 3.
Note that Algorithm 2 needs to prepare candidates and compare all those candidates. The time complexity of the error correction algorithm depends on the number of combinations , and thus, it has the polynomial time complexity of . Therefore, the proposed algorithm may not be scalable for very large p with due to the combinatorial nature of the algorithm. The time complexity could be reduced by imposing additional restrictive assumptions as done in [20,21] which reformulate the problem into a convex optimization problem. However, in our scheme demanding minimal assumptions, the comibinatorial algorithm only needs to operate when an attack is detected. In addition, most of the time, only the attack detection algorithm requiring a small amount of computation, is executed. Another advantage of the proposed algorithm is that its space complexity is linear with the number of sensors p, that is, . The total memory size required for local observers is , whereas if all possible combinations of estimator candidates are configured as real observers, the observer’s size becomes .
5. Simulation Results
We consider a motor-controlled multi-DOF torsion system [34] as depicted in Figure 3. A continuous-time state-space model of the system when the control input is the torque () generated by the servo motor is given by
| (43) |
with the matrices
| (44) |
where
are the state variable and the output measurement, respectively. Here, the unit for angular positions ’s and the unit for angular velocities ’s are () and (), respectively. The parameters are borrowed from [34], and we have that , () for the moment of inertia, , () for the viscous damping ratio, and ( for the flexible stiffness.
Figure 3.
Motor control system of multi-DOF torsion modules.
Note that the dynamics are the same as those of the three inertia system considered in [15]; however, Figure 3 additionally considers the servo motor system given as follows:
| (45) |
which generates the torque () from the input voltage of u (). The parameters for the servo system are also borrowed from [34], and we have that for the gearbox efficiency, for the total gear ratio, for the motor efficiency, () for the motor current torque constant, () for the motor back electromotive force (EMF) constant, and () for the motor armature resistance. Thus, the final continuous-time plant with the voltage u () as an input signal is obtained as
| (46) |
with the matrices
| (47) |
and the same as in (44). Finally, the zero-order hold equivalent model of (46) is used for the discrete-time model in (1), and the matrices are calculated by
| (48) |
with the sampling time of (). By examining all possible combinations of sensors, it follows that the system in (1) with A and C given in (48) is 2-redundant observable, and hence it is observable under 1-sparse sensor attack by Lemma 2.
In addition, the disturbance d and the noise n are assumed to satisfy Assumption 1 with
and the initial state of the system (46) satisfies as stated in Assumption 1 with the mean and the covariance given by
The simulation is performed under 1-sparse sensor attack on the third sensor with the signal shown in Figure 4b, which is made to mimic the motion pattern by the natural frequency as observed in Figure 4c,d. Moreover, the attack starts at 2 second, which is the same time when the square pulse input u is injected into the system as described in Figure 4a. Even under the attack signal, the resilient state estimation with multi-sensor information fusion Kalman filter based on the observability decomposition developed in Section 3 and Section 4 works well. The states are recovered with a small error as demonstrated in Figure 4c,d, which are the state estimation results for and , respectively.
Figure 4.
Plot of signals in a multi-DOF torsion system.
In this simulation, the threshold for the attack detection is chosen by in (41) so that the cumulative density function (CDF) satisfies where is the PDF of a random variable , which satisfies a distribution with DOF, as stated in (42). Since Figure 4e shows that the 2-norm of the standardized residual, g, exceeds the threshold at the instant of 2 second, which is the initiation time of the attack, it is judged that there is an attack (the lines from 8 to 9 in Algorithm 2) and the estimation scheme begins to search the indices of attack-free sensors (the lines from 10 to 16 in Algorithm 2). As a result of the search algorithm, a new set of sensor indices is found by the ML decision rule (the line 16 in Algorithm 2), and the attacked third senor is excluded from 2 second as depicted in Figure 4f.
6. Conclusions
In this paper, the multi-sensor information fusion Kalman filter proposed in [24,25] was improved using the observability decomposition to ensure the convergence of the error covariance matrix of each local observer. The local observer of a decentralized Kalman filter with only a single sensor was designed for an observable subspace instead of the entire n-dimensional state vector without any global information. Then, the proposed decentralized information fusion Kalman filter was applied to the secure state estimation problem where some of sensors were compromised by a malicious attacker.
To cope with the zero-mean Gaussian distributed disturbances/noises, a local Kalman filter replaced the partial Luenberger observer designed in [15], where bounded disturbances/noises were considered in the state estimation problem under sparse sensor attacks. When there was no attack, the proposed algorithm guaranteed an optimal state estimate in the sense of minimum variance, and it generated a state estimate that was most likely to have the minimum variance with an unbiased mean in the presence of sparse sensor attacks.
The proposed algorithm can be applied to cyber-physical systems, including complex sensor networks operating based on linear dynamics under sparse sensor attacks as well as Gaussian disturbances/noises. We imposed the minimal assumption of the redundant observability, which is known to be the equivalent condition to solve the problem. Furthermore, the computational time was alleviated by running only a relatively light attack detection scheme for most of the execution time, and the memory size of the observer was reduced by constructing local observers only for observable subspaces.
One possible direction of future research is to develop a distributed attack-resilient state estimator. While this paper proposed a decentralized Kalman filter scheme, the fusion center collects all the data from each sensors. Although the construction of local Kalman filters is decentralized, the information fusion method is still centralized. Therefore, it is necessary to develop a fully distributed attack-resilient state estimation technique for a general sensor network without any central information fusion center.
Abbreviations
The following abbreviations are used in this manuscript:
| LTI | Linear Time Invariant |
| i.i.d. | independent and identically distributed |
| MVUE | Minimum Variance Unbiased Estimator |
| BLUE | Best Linear Unbiased Estimator |
| Probability Density Function | |
| DOF | Degrees Of Freedom |
| ML | Maximum Likelihood |
| EMF | ElectroMotive Force |
| CDF | Cumulative Density Function |
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
Not applicable.
Conflicts of Interest
The authors declare no conflict of interest.
Funding Statement
This work was supported by the Materials & Components Technology Development Program (20017351, Development of Servo System Technology with a Current Response of 6.2 kHz and Power Regeneration for Automated Manufacturing Equipment Application) funded by the Ministry of Trade, Industry & Energy (MOTIE, Korea).
Footnotes
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.
References
- 1.Pasqualetti F., Dörfler F., Bullo F. Attack detection and identification in cyber-physical systems. IEEE Trans. Autom. Control. 2013;58:2715–2729. doi: 10.1109/TAC.2013.2266831. [DOI] [Google Scholar]
- 2.Sandberg H., Amin S., Johansson K.H. Cyberphysical security in networked control systems: An introduction to the issue. IEEE Control Syst. Mag. 2015;35:20–23. [Google Scholar]
- 3.Teixeira A., Shames I., Sandberg H., Johansson K.H. A secure control framework for resource-limited adversaries. Automatica. 2015;51:135–148. doi: 10.1016/j.automatica.2014.10.067. [DOI] [Google Scholar]
- 4.Zhang X., Zhu F., Zhang J., Liu T. Attack isolation and location for a complex network cyber-physical system via zonotope theory. Neurocomputing. 2022;469:239–250. doi: 10.1016/j.neucom.2021.10.070. [DOI] [Google Scholar]
- 5.Langner R. Stuxnet: Dissecting a cyberwarfare weapon. IEEE Secur. Priv. 2011;9:49–51. doi: 10.1109/MSP.2011.67. [DOI] [Google Scholar]
- 6.Wright A. Hacking cars. Commun. ACM. 2011;54:18–19. doi: 10.1145/2018396.2018403. [DOI] [Google Scholar]
- 7.Ten C.-W., Liu C.-C., Manimaran G. Vulnerability assessment of cybersecurity for SCADA systems. IEEE Trans. Power Syst. 2008;23:1836–1846. doi: 10.1109/TPWRS.2008.2002298. [DOI] [Google Scholar]
- 8.Dutta A., Langbort C. Confiscating flight control system by stealthy output injection attack. J. Aerosp. Inf. Syst. 2017;14:203–213. doi: 10.2514/1.I010494. [DOI] [Google Scholar]
- 9.Liu Y., Ning P., Reiter M.K. False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. 2011;14:13:1–13:33. doi: 10.1145/1952982.1952995. [DOI] [Google Scholar]
- 10.Fawzi H., Tabuada P., Diggavi S. Secure estimation and control for cyber-physical systems under adversarial attacks. IEEE Trans. Autom. Control. 2014;59:1454–1467. doi: 10.1109/TAC.2014.2303233. [DOI] [Google Scholar]
- 11.Chen Y., Kar S., Moura J.M.F. Cyber-physical systems: Dynamic sensor attacks and strong observability; Proceedings of the 40th IEEE International Conference on Acoustics, Speech and Signal Processing; Brisbane, Australia. 19–24 April 2015; pp. 1752–1756. [Google Scholar]
- 12.Shoukry Y., Tabuada P. Event-triggered state observers for sparse sensor noise/attacks. IEEE Trans. Autom. Control. 2016;61:2079–2091. doi: 10.1109/TAC.2015.2492159. [DOI] [Google Scholar]
- 13.Shoukry Y., Nuzzo P., Puggelli A., Sangiovanni-Vincentelli A.L., Seshiz S.A., Tabuada P. Secure state estimation for cyber physical systems under sensor attacks: A satisfiability modulo theory approach. IEEE Trans. Autom. Control. 2017;62:4917–4932. doi: 10.1109/TAC.2017.2676679. [DOI] [Google Scholar]
- 14.An L., Yang G.-H. State estimation under sparse sensor attacks: A constrained set partitioning approach. IEEE Trans. Autom. Control. 2019;64:3861–3868. doi: 10.1109/TAC.2018.2885063. [DOI] [Google Scholar]
- 15.Lee C., Shim H., Eun Y. On redundant observability: From security index to attack detection and resilient state estimation. IEEE Trans. Autom. Control. 2019;64:775–782. doi: 10.1109/TAC.2018.2837107. [DOI] [Google Scholar]
- 16.Candès E.J., Tao T. Decoding by linear programming. IEEE Trans. Inf. Theory. 2005;51:4203–4215. doi: 10.1109/TIT.2005.858979. [DOI] [Google Scholar]
- 17.Donoho D.L. Compressed sensing. IEEE Trans. Inf. Theory. 2006;52:1289–1306. doi: 10.1109/TIT.2006.871582. [DOI] [Google Scholar]
- 18.Pajic M., Lee I., Pappas G.J. Attack-resilient state estimation for noisy dynamical systems. IEEE Trans. Control Netw. Syst. 2017;4:82–92. doi: 10.1109/TCNS.2016.2607420. [DOI] [Google Scholar]
- 19.Mishra S., Shoukry Y., Karamchandani N., Diggavi S., Tabuada P. Secure state estimation against sensor attacks in the presence of noise. IEEE Trans. Control Netw. Syst. 2017;4:49–59. doi: 10.1109/TCNS.2016.2606880. [DOI] [Google Scholar]
- 20.Chang Y.H., Hu Q., Tomlin C.J. Secure estimation based Kalman filter for cyber-physical systems against sensor attacks. Automatica. 2018;95:399–412. doi: 10.1016/j.automatica.2018.06.010. [DOI] [Google Scholar]
- 21.Liu X., Mo Y., Garone E. Local decomposition of Kalman filters and its application for secure state estimation. IEEE Trans. Autom. Control. 2021;66:5037–5044. doi: 10.1109/TAC.2020.3044854. [DOI] [Google Scholar]
- 22.Mehra R.K., Peschon J. An innovations approach to fault detection and diagnosis in dynamic systems. Automatica. 1971;7:637–640. doi: 10.1016/0005-1098(71)90028-8. [DOI] [Google Scholar]
- 23.Brumback B., Srinath M. A chi-square test for fault-detection in Kalman filters. IEEE Trans. Autom. Control. 1987;32:552–554. doi: 10.1109/TAC.1987.1104658. [DOI] [Google Scholar]
- 24.Sun S.-L., Deng Z.-L. Multi-sensor optimal information fusion Kalman filter. Automatica. 2004;40:1017–1023. doi: 10.1016/j.automatica.2004.01.014. [DOI] [Google Scholar]
- 25.Sun S.-L. Multi-sensor optimal information fusion Kalman filters with applications. Aerosp. Sci. Technol. 2004;8:57–62. doi: 10.1016/j.ast.2003.08.003. [DOI] [Google Scholar]
- 26.Kim J., Shim H., Wu J. On distributed optimal Kalman-Bucy filtering by averaging dynamics of heterogeneous agents; Proceedings of the 55th IEEE Conference on Decision and Control; Las Vegas, NV, USA. 12–14 December 2016; pp. 6309–6314. [Google Scholar]
- 27.Kim T., Lee C., Shim H. Completely decentralized design of distributed observer for linear systems. IEEE Trans. Autom. Control. 2020;65:4664–4678. doi: 10.1109/TAC.2019.2962360. [DOI] [Google Scholar]
- 28.Lee C. Ph.D. Dissertation. Seoul National University; Seoul, Korea: 2018. Attack-Resilient Feedback Control Systems: Secure State Estimation under Sensor Attacks. [Google Scholar]
- 29.Simon D. Optimal State Estimation: Kalman, H Infinity, and Nonlinear Approaches. Wiley-Interscience; Hoboken, NJ, USA: 2006. [Google Scholar]
- 30.Kay S.M. Fundamentals of Statistical Signal Processing, Volume I: Estimation Theory. Prentice Hall PTR; Upper Saddle River, NJ, USA: 1993. [Google Scholar]
- 31.Kay S.M. Fundamentals of Statistical Signal Processing, Volume II: Detection Theory. Prentice Hall PTR; Upper Saddle River, NJ, USA: 1993. [Google Scholar]
- 32.Boyd S., Vandenberghe L. Convex Optimization. Cambridge University Press; Cambridge, UK: 2004. [Google Scholar]
- 33.Zhou K., Doyle J.C. Essentials of Robust Control. Prentice Hall; Upper Saddle River, NJ, USA: 1998. [Google Scholar]
- 34.Quanser Inc. Multi-DOF Torsion Experiment User Manual. Quanser Inc.; Markham, ON, Canada: 2012. [Google Scholar]
Associated Data
This section collects any data citations, data availability statements, or supplementary materials included in this article.
Data Availability Statement
Not applicable.




