A polynomial-time algorithm for the secure state estimation problem under sparse sensor attacks via state decomposition technique
This paper investigates the secure state estimation problem for cyber-physical systems (CPSs) under sparse sensor attacks. In the existing results, the secure state estimation is usually established as an NP-hard problem where combinatorial candidates should be checked since the set of attacked chan...
Gespeichert in:
| Veröffentlicht in: | IEEE transactions on automatic control Jg. 68; H. 12; S. 1 - 14 |
|---|---|
| Hauptverfasser: | , |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
New York
IEEE
01.12.2023
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Schlagworte: | |
| ISSN: | 0018-9286, 1558-2523 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | This paper investigates the secure state estimation problem for cyber-physical systems (CPSs) under sparse sensor attacks. In the existing results, the secure state estimation is usually established as an NP-hard problem where combinatorial candidates should be checked since the set of attacked channels is unknown. For avoiding brute force search, a novel state decomposition technique is proposed such that the state can be reconstructed by a simple majority vote. Necessary and sufficient conditions for the observability of the decomposition elements are given, and based on the obtained conditions, an effective algorithm for designing the decomposition matrix is also proposed. Then, a polynomial-time secure state estimation strategy is constructed based on the proposed state decomposition technique. It is shown that besides <inline-formula><tex-math notation="LaTeX">\text{2}~s</tex-math></inline-formula>-sparse eigenvalue observable systems, the secure state estimation problem can be solved in polynomial time for more general cases where each decomposition element is <inline-formula><tex-math notation="LaTeX">\mathbb {B}</tex-math></inline-formula>-observable for at least <inline-formula><tex-math notation="LaTeX">2s+1</tex-math></inline-formula> sensors. Finally, the effectiveness of the proposed methods is demonstrated by two simulations showing the decrease of computational complexity and the effectiveness under different cases. |
|---|---|
| AbstractList | This paper investigates the secure state estimation problem for cyber-physical systems (CPSs) under sparse sensor attacks. In the existing results, the secure state estimation is usually established as an NP-hard problem where combinatorial candidates should be checked since the set of attacked channels is unknown. For avoiding brute force search, a novel state decomposition technique is proposed such that the state can be reconstructed by a simple majority vote. Necessary and sufficient conditions for the observability of the decomposition elements are given, and based on the obtained conditions, an effective algorithm for designing the decomposition matrix is also proposed. Then, a polynomial-time secure state estimation strategy is constructed based on the proposed state decomposition technique. It is shown that besides <inline-formula><tex-math notation="LaTeX">\text{2}~s</tex-math></inline-formula>-sparse eigenvalue observable systems, the secure state estimation problem can be solved in polynomial time for more general cases where each decomposition element is <inline-formula><tex-math notation="LaTeX">\mathbb {B}</tex-math></inline-formula>-observable for at least <inline-formula><tex-math notation="LaTeX">2s+1</tex-math></inline-formula> sensors. Finally, the effectiveness of the proposed methods is demonstrated by two simulations showing the decrease of computational complexity and the effectiveness under different cases. This article investigates the secure state estimation problem for cyber–physical systems (CPSs) under sparse sensor attacks. In the existing results, the secure state estimation is usually established as an NP-hard problem where combinatorial candidates should be checked since the set of attacked channels is unknown. For avoiding brute force search, a novel state decomposition technique is proposed such that the state can be reconstructed by a simple majority vote. Necessary and sufficient conditions for the observability of the decomposition elements are given, and based on the obtained conditions, an effective for designing the decomposition matrix is also proposed. Then, a polynomial-time secure state estimation strategy is constructed based on the proposed state decomposition technique. It is shown that besides [Formula Omitted]-sparse eigenvalue observable systems, the secure state estimation problem can be solved in polynomial time for more general cases where each decomposition element is [Formula Omitted]-observable for at least [Formula Omitted] sensors. Finally, the effectiveness of the proposed methods is demonstrated by two simulations showing the decrease of computational complexity and the effectiveness under different cases. |
| Author | Lu, An-Yang Yang, Guang-Hong |
| Author_xml | – sequence: 1 givenname: An-Yang orcidid: 0000-0002-9132-3483 surname: Lu fullname: Lu, An-Yang organization: College of Information Science and Engineering, Northeastern University, Shenyang, P.R. China – sequence: 2 givenname: Guang-Hong orcidid: 0000-0002-8911-0112 surname: Yang fullname: Yang, Guang-Hong organization: College of Information Science and Engineering, Northeastern University, Shenyang, P.R. China |
| BookMark | eNp9kDtPwzAURi1UJEphZ2CwxJziR-LYY1XxkiqxlDlynRvqksTBdpE68s9xHwNiYLq60nf8XZ9LNOpdDwjdUDKllKj75Ww-ZYTxKWellFydoTEtCpmxgvERGhNCZaaYFBfoMoRNWkWe0zH6nuHBtbvedVa3WbQdYN2-O2_jusON8ziuAQcwW59G1BEwhJTS0boeD96tWujwtq_B4zBoH_bhPiROx6jNR8BfVp_AGozrBhfsgY1g1r393MIVOm90G-D6NCfo7fFhOX_OFq9PL_PZIjNMsZjVigM1UtVCc1UrkJoSWTdMKyE5YbJc5UowQYHkuuSyNrQglJDS8AIULVZ8gu6O76arU22I1cZtfZ8qKyaVYowqKVKKHFPGuxA8NNXg03f9rqKk2ouukuhqL7o6iU6I-IMYGw-Cote2_Q-8PYIWAH71UE4EL_kPhqqO6A |
| CODEN | IETAA9 |
| CitedBy_id | crossref_primary_10_1016_j_automatica_2024_111964 crossref_primary_10_1002_rnc_70156 crossref_primary_10_1002_acs_3710 crossref_primary_10_1177_09596518241302480 crossref_primary_10_1109_TITS_2024_3506916 crossref_primary_10_1016_j_automatica_2025_112347 crossref_primary_10_1109_TAC_2025_3552018 crossref_primary_10_1109_TSG_2024_3454637 crossref_primary_10_1109_TCSI_2024_3414474 crossref_primary_10_1109_TCNS_2025_3526720 crossref_primary_10_1109_JIOT_2025_3578330 crossref_primary_10_1109_TCYB_2025_3574157 crossref_primary_10_1016_j_ifacol_2024_08_522 crossref_primary_10_1109_TAES_2024_3371406 crossref_primary_10_1109_TNSE_2025_3561741 crossref_primary_10_1007_s42452_025_07251_3 crossref_primary_10_1080_23307706_2025_2526811 crossref_primary_10_1109_TIFS_2023_3340098 |
| Cites_doi | 10.1109/TAC.2017.2761762 10.1016/j.automatica.2019.06.019 10.1109/TSIPN.2017.2749959 10.1109/TAC.2020.2998733 10.1109/TAC.2020.3004326 10.1109/TAC.2019.2953210 10.1109/MSP.2011.67 10.1016/j.automatica.2020.109117 10.1109/TCNS.2017.2701504 10.1109/TAC.2019.2891405 10.1109/TCYB.2019.2915124 10.1109/ICCPS.2014.6843720 10.1145/1952982.1952995 10.1109/TAC.2019.2914655 10.1109/JSYST.2013.2260915 10.1007/s11045-012-0172-9 10.1109/TAC.2013.2266831 10.1109/TAC.2014.2303233 10.1109/TAC.2019.2949877 10.1109/TAC.2015.2422491 10.1016/j.automatica.2022.110172 10.1109/TVT.2016.2604759 10.1109/ISIT.2015.7282993 10.1109/TAC.2019.2945032 10.1109/WD.2013.6686528 10.1109/TCNS.2016.2607420 10.1109/TAC.2021.3090739 10.1016/j.automatica.2021.109872 10.1016/j.automatica.2021.110083 10.1109/JPROC.2011.2161428 10.1109/TSG.2016.2581588 10.1109/TAC.2010.2088690 10.1109/JPROC.2012.2189792 10.1109/TAC.2015.2492159 10.1145/1755952.1755976 10.1109/TAC.2020.2987307 10.1109/TAC.2017.2676679 10.1109/TAC.2020.2989275 10.1016/j.ins.2017.07.029 10.1109/ACC.2015.7171098 |
| ContentType | Journal Article |
| Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023 |
| Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023 |
| DBID | 97E RIA RIE AAYXX CITATION 7SC 7SP 7TB 8FD FR3 JQ2 L7M L~C L~D |
| DOI | 10.1109/TAC.2023.3278839 |
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Mechanical & Transportation Engineering Abstracts Technology Research Database Engineering Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Mechanical & Transportation Engineering Abstracts Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Engineering Research Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Technology Research Database |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1558-2523 |
| EndPage | 14 |
| ExternalDocumentID | 10_1109_TAC_2023_3278839 10130637 |
| Genre | orig-research |
| GrantInformation_xml | – fundername: Funds of the National Natural Science Foundation of China grantid: 61621004; 62103091; U1908213 – fundername: National Key Research and Development Program of China grantid: 2020YFE0201100 – fundername: Research Fund of State Key Laboratory of Synthetical Automation for Process Industries grantid: 2018ZCX03 |
| GroupedDBID | -~X .DC 0R~ 29I 4.4 5GY 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFO ACGFS ACIWK ACNCT AENEX AGQYO AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ASUFR ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS F5P HZ~ IFIPE IPLJI JAVBF LAI M43 MS~ O9- OCL P2P RIA RIE RNS TAE TN5 ~02 3EH 5VS AAYXX AETIX AGSQL AI. AIBXA ALLEH CITATION EJD H~9 IAAWW IBMZZ ICLAB IDIHD IFJZH VH1 VJK 7SC 7SP 7TB 8FD FR3 JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-c292t-d93e1c89d6a39d9e8a108df2a96830287b496261e04a738dc1501007c35e915b3 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 27 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001122871700094&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0018-9286 |
| IngestDate | Mon Jun 30 10:20:00 EDT 2025 Tue Nov 18 22:16:47 EST 2025 Sat Nov 29 05:41:09 EST 2025 Mon Aug 04 05:48:51 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 12 |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c292t-d93e1c89d6a39d9e8a108df2a96830287b496261e04a738dc1501007c35e915b3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0002-9132-3483 0000-0002-8911-0112 |
| PQID | 2899221986 |
| PQPubID | 85475 |
| PageCount | 14 |
| ParticipantIDs | ieee_primary_10130637 crossref_primary_10_1109_TAC_2023_3278839 crossref_citationtrail_10_1109_TAC_2023_3278839 proquest_journals_2899221986 |
| PublicationCentury | 2000 |
| PublicationDate | 2023-12-01 |
| PublicationDateYYYYMMDD | 2023-12-01 |
| PublicationDate_xml | – month: 12 year: 2023 text: 2023-12-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York |
| PublicationTitle | IEEE transactions on automatic control |
| PublicationTitleAbbrev | TAC |
| PublicationYear | 2023 |
| Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| References | ref13 ref35 ref12 ref34 ref15 ref37 ref14 ref36 ref31 ref30 ref11 ref33 ref10 ref32 ref2 ref1 ref17 ref39 ref16 ref38 ref19 ref18 ref24 ref23 ref26 ref25 ref20 ref22 ref21 ref28 ref27 ref29 ref8 ref7 ref9 ref4 ref3 ref6 ref5 ref40 |
| References_xml | – ident: ref40 doi: 10.1109/TAC.2017.2761762 – ident: ref13 doi: 10.1016/j.automatica.2019.06.019 – ident: ref31 doi: 10.1109/TSIPN.2017.2749959 – ident: ref11 doi: 10.1109/TAC.2020.2998733 – ident: ref32 doi: 10.1109/TAC.2020.3004326 – ident: ref8 doi: 10.1109/TAC.2019.2953210 – ident: ref15 doi: 10.1109/MSP.2011.67 – ident: ref17 doi: 10.1016/j.automatica.2020.109117 – ident: ref30 doi: 10.1109/TCNS.2017.2701504 – ident: ref25 doi: 10.1109/TAC.2019.2891405 – ident: ref19 doi: 10.1109/TCYB.2019.2915124 – ident: ref36 doi: 10.1109/ICCPS.2014.6843720 – ident: ref16 doi: 10.1145/1952982.1952995 – ident: ref20 doi: 10.1109/TAC.2019.2914655 – ident: ref6 doi: 10.1109/JSYST.2013.2260915 – ident: ref39 doi: 10.1007/s11045-012-0172-9 – ident: ref18 doi: 10.1109/TAC.2013.2266831 – ident: ref23 doi: 10.1109/TAC.2014.2303233 – ident: ref22 doi: 10.1109/TAC.2019.2949877 – ident: ref7 doi: 10.1109/TAC.2015.2422491 – ident: ref10 doi: 10.1016/j.automatica.2022.110172 – ident: ref2 doi: 10.1109/TVT.2016.2604759 – ident: ref35 doi: 10.1109/ISIT.2015.7282993 – ident: ref27 doi: 10.1109/TAC.2019.2945032 – ident: ref3 doi: 10.1109/WD.2013.6686528 – ident: ref37 doi: 10.1109/TCNS.2016.2607420 – ident: ref9 doi: 10.1109/TAC.2021.3090739 – ident: ref21 doi: 10.1016/j.automatica.2021.109872 – ident: ref28 doi: 10.1016/j.automatica.2021.110083 – ident: ref12 doi: 10.1109/JPROC.2011.2161428 – ident: ref1 doi: 10.1109/TSG.2016.2581588 – ident: ref5 doi: 10.1109/TAC.2010.2088690 – ident: ref4 doi: 10.1109/JPROC.2012.2189792 – ident: ref38 doi: 10.1109/TAC.2015.2492159 – ident: ref29 doi: 10.1145/1755952.1755976 – ident: ref14 doi: 10.1109/TAC.2020.2987307 – ident: ref24 doi: 10.1109/TAC.2017.2676679 – ident: ref26 doi: 10.1109/TAC.2020.2989275 – ident: ref34 doi: 10.1016/j.ins.2017.07.029 – ident: ref33 doi: 10.1109/ACC.2015.7171098 |
| SSID | ssj0016441 |
| Score | 2.551115 |
| Snippet | This paper investigates the secure state estimation problem for cyber-physical systems (CPSs) under sparse sensor attacks. In the existing results, the secure... This article investigates the secure state estimation problem for cyber–physical systems (CPSs) under sparse sensor attacks. In the existing results, the... |
| SourceID | proquest crossref ieee |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 1 |
| SubjectTerms | Algorithms Combinatorial analysis Cyber-physical systems Decoding Decomposition Effectiveness Eigenvalues Force Matrix decomposition Observability Observability (systems) polynomial-time algorithm Polynomials secure state estimation Security Sparse matrices sparse sensor attack state decomposition technique State estimation |
| Title | A polynomial-time algorithm for the secure state estimation problem under sparse sensor attacks via state decomposition technique |
| URI | https://ieeexplore.ieee.org/document/10130637 https://www.proquest.com/docview/2899221986 |
| Volume | 68 |
| WOSCitedRecordID | wos001122871700094&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Electronic Library (IEL) customDbUrl: eissn: 1558-2523 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0016441 issn: 0018-9286 databaseCode: RIE dateStart: 19630101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09T8MwELVoxQADn0UUCvLAwpA2sZPYHquKiqliKFK3yLEdqFTSKkkrMfLP8SVuVQmBxJQMvijSi893uXv3EHrI_AzYH8IzPjNeGHHtpbHmXhiEUaYUjVQsa7EJNpnw2Uy8OLJ6zYUxxtTNZ6YPt3UtXy_VGn6V2R1uPW5MWQu1GGMNWWtXMoCDvXG7dgcTvqtJ-mIwHY76IBPep8RmfKALvncG1aIqPzxxfbyMT__5YmfoxMWReNgAf44OTH6BjvemC16iryFeLRefwDuWCw9E5LFcvC2LefX-gW2sim3sh0v4324vEHNimLjRUBmxE5rBwDErsHU7RQmL89LayaoCZj7ezKUz1AZa013_F97Nhe2g1_HTdPTsOcUFTxFBKk8LagLFhY4lFVoYLgOf64xIEcOcMM7SUNgMKDB-KBnlWtlwEtosLKZGBFFKr1A7X-bmGmECFVE_ZEqQLMxIKi0-TDDQXqcso6qLBlsMEuXGkYMqxiKp0xJfJBa1BFBLHGpd9LizWDWjOP5Y2wGU9tY1AHVRb4tz4jZrmUDOSazn5vHNL2a36Aie3rSx9FC7KtbmDh2qTTUvi_v6O_wGNSXbRg |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1Ba9swFH6s2aDdYeu2lmXNVh162cGJLcmWdAxhoWVt6CGF3IwiyVsgS4rtBnbsP6-erYRA2aAn-6CHDZ_19J7f-94HcFHEBbI_VORi4SKeShvNMysjnvC0MIalJtON2ISYTORspm4DWb3hwjjnmuYz18fbppZv1-YBf5X5He49bsbEAbxOOadJS9faFQ3waG8dr9_DVO6qkrEaTIejPgqF9xn1OR8qg--dQo2syjNf3Bww4_cvfLVjeBciSTJsof8Ar9zqI7zdmy_4CR6H5H69_IvMY72MUEae6OWvdbmof_8hPlolPvojFf5x9xeMOgnO3GjJjCRIzRBkmZXEO56ywsWrytvpukZuPtksdDC0DpvTQwcY2U2GPYG78Y_p6DIKmguRoYrWkVXMJUYqm2mmrHJSJ7G0BdUqw0lhUsy58jlQ4mKuBZPW-IASGy08qk4l6ZydQme1XrnPQCjWRGMujKIFL-hce3yEEqi-zkTBTBcGWwxyEwaSoy7GMm8Sk1jlHrUcUcsDal34vrO4b4dx_GftCaK0t64FqAu9Lc552K5Vjlkn9b5bZl_-YXYOh5fTm-v8-mry8wyO8EltU0sPOnX54L7CG7OpF1X5rfkmnwDDLN6N |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Polynomial-Time+Algorithm+for+the+Secure+State+Estimation+Problem+Under+Sparse+Sensor+Attacks+via+State+Decomposition+Technique&rft.jtitle=IEEE+transactions+on+automatic+control&rft.au=Lu%2C+An-Yang&rft.au=Yang%2C+Guang-Hong&rft.date=2023-12-01&rft.issn=0018-9286&rft.eissn=1558-2523&rft.volume=68&rft.issue=12&rft.spage=7451&rft.epage=7465&rft_id=info:doi/10.1109%2FTAC.2023.3278839&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TAC_2023_3278839 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0018-9286&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0018-9286&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0018-9286&client=summon |