A polynomial-time algorithm for the secure state estimation problem under sparse sensor attacks via state decomposition technique

This paper investigates the secure state estimation problem for cyber-physical systems (CPSs) under sparse sensor attacks. In the existing results, the secure state estimation is usually established as an NP-hard problem where combinatorial candidates should be checked since the set of attacked chan...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on automatic control Jg. 68; H. 12; S. 1 - 14
Hauptverfasser: Lu, An-Yang, Yang, Guang-Hong
Format: Journal Article
Sprache:Englisch
Veröffentlicht: New York IEEE 01.12.2023
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Schlagworte:
ISSN:0018-9286, 1558-2523
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract This paper investigates the secure state estimation problem for cyber-physical systems (CPSs) under sparse sensor attacks. In the existing results, the secure state estimation is usually established as an NP-hard problem where combinatorial candidates should be checked since the set of attacked channels is unknown. For avoiding brute force search, a novel state decomposition technique is proposed such that the state can be reconstructed by a simple majority vote. Necessary and sufficient conditions for the observability of the decomposition elements are given, and based on the obtained conditions, an effective algorithm for designing the decomposition matrix is also proposed. Then, a polynomial-time secure state estimation strategy is constructed based on the proposed state decomposition technique. It is shown that besides <inline-formula><tex-math notation="LaTeX">\text{2}~s</tex-math></inline-formula>-sparse eigenvalue observable systems, the secure state estimation problem can be solved in polynomial time for more general cases where each decomposition element is <inline-formula><tex-math notation="LaTeX">\mathbb {B}</tex-math></inline-formula>-observable for at least <inline-formula><tex-math notation="LaTeX">2s+1</tex-math></inline-formula> sensors. Finally, the effectiveness of the proposed methods is demonstrated by two simulations showing the decrease of computational complexity and the effectiveness under different cases.
AbstractList This paper investigates the secure state estimation problem for cyber-physical systems (CPSs) under sparse sensor attacks. In the existing results, the secure state estimation is usually established as an NP-hard problem where combinatorial candidates should be checked since the set of attacked channels is unknown. For avoiding brute force search, a novel state decomposition technique is proposed such that the state can be reconstructed by a simple majority vote. Necessary and sufficient conditions for the observability of the decomposition elements are given, and based on the obtained conditions, an effective algorithm for designing the decomposition matrix is also proposed. Then, a polynomial-time secure state estimation strategy is constructed based on the proposed state decomposition technique. It is shown that besides <inline-formula><tex-math notation="LaTeX">\text{2}~s</tex-math></inline-formula>-sparse eigenvalue observable systems, the secure state estimation problem can be solved in polynomial time for more general cases where each decomposition element is <inline-formula><tex-math notation="LaTeX">\mathbb {B}</tex-math></inline-formula>-observable for at least <inline-formula><tex-math notation="LaTeX">2s+1</tex-math></inline-formula> sensors. Finally, the effectiveness of the proposed methods is demonstrated by two simulations showing the decrease of computational complexity and the effectiveness under different cases.
This article investigates the secure state estimation problem for cyber–physical systems (CPSs) under sparse sensor attacks. In the existing results, the secure state estimation is usually established as an NP-hard problem where combinatorial candidates should be checked since the set of attacked channels is unknown. For avoiding brute force search, a novel state decomposition technique is proposed such that the state can be reconstructed by a simple majority vote. Necessary and sufficient conditions for the observability of the decomposition elements are given, and based on the obtained conditions, an effective for designing the decomposition matrix is also proposed. Then, a polynomial-time secure state estimation strategy is constructed based on the proposed state decomposition technique. It is shown that besides [Formula Omitted]-sparse eigenvalue observable systems, the secure state estimation problem can be solved in polynomial time for more general cases where each decomposition element is [Formula Omitted]-observable for at least [Formula Omitted] sensors. Finally, the effectiveness of the proposed methods is demonstrated by two simulations showing the decrease of computational complexity and the effectiveness under different cases.
Author Lu, An-Yang
Yang, Guang-Hong
Author_xml – sequence: 1
  givenname: An-Yang
  orcidid: 0000-0002-9132-3483
  surname: Lu
  fullname: Lu, An-Yang
  organization: College of Information Science and Engineering, Northeastern University, Shenyang, P.R. China
– sequence: 2
  givenname: Guang-Hong
  orcidid: 0000-0002-8911-0112
  surname: Yang
  fullname: Yang, Guang-Hong
  organization: College of Information Science and Engineering, Northeastern University, Shenyang, P.R. China
BookMark eNp9kDtPwzAURi1UJEphZ2CwxJziR-LYY1XxkiqxlDlynRvqksTBdpE68s9xHwNiYLq60nf8XZ9LNOpdDwjdUDKllKj75Ww-ZYTxKWellFydoTEtCpmxgvERGhNCZaaYFBfoMoRNWkWe0zH6nuHBtbvedVa3WbQdYN2-O2_jusON8ziuAQcwW59G1BEwhJTS0boeD96tWujwtq_B4zBoH_bhPiROx6jNR8BfVp_AGozrBhfsgY1g1r393MIVOm90G-D6NCfo7fFhOX_OFq9PL_PZIjNMsZjVigM1UtVCc1UrkJoSWTdMKyE5YbJc5UowQYHkuuSyNrQglJDS8AIULVZ8gu6O76arU22I1cZtfZ8qKyaVYowqKVKKHFPGuxA8NNXg03f9rqKk2ouukuhqL7o6iU6I-IMYGw-Cote2_Q-8PYIWAH71UE4EL_kPhqqO6A
CODEN IETAA9
CitedBy_id crossref_primary_10_1016_j_automatica_2024_111964
crossref_primary_10_1002_rnc_70156
crossref_primary_10_1002_acs_3710
crossref_primary_10_1177_09596518241302480
crossref_primary_10_1109_TITS_2024_3506916
crossref_primary_10_1016_j_automatica_2025_112347
crossref_primary_10_1109_TAC_2025_3552018
crossref_primary_10_1109_TSG_2024_3454637
crossref_primary_10_1109_TCSI_2024_3414474
crossref_primary_10_1109_TCNS_2025_3526720
crossref_primary_10_1109_JIOT_2025_3578330
crossref_primary_10_1109_TCYB_2025_3574157
crossref_primary_10_1016_j_ifacol_2024_08_522
crossref_primary_10_1109_TAES_2024_3371406
crossref_primary_10_1109_TNSE_2025_3561741
crossref_primary_10_1007_s42452_025_07251_3
crossref_primary_10_1080_23307706_2025_2526811
crossref_primary_10_1109_TIFS_2023_3340098
Cites_doi 10.1109/TAC.2017.2761762
10.1016/j.automatica.2019.06.019
10.1109/TSIPN.2017.2749959
10.1109/TAC.2020.2998733
10.1109/TAC.2020.3004326
10.1109/TAC.2019.2953210
10.1109/MSP.2011.67
10.1016/j.automatica.2020.109117
10.1109/TCNS.2017.2701504
10.1109/TAC.2019.2891405
10.1109/TCYB.2019.2915124
10.1109/ICCPS.2014.6843720
10.1145/1952982.1952995
10.1109/TAC.2019.2914655
10.1109/JSYST.2013.2260915
10.1007/s11045-012-0172-9
10.1109/TAC.2013.2266831
10.1109/TAC.2014.2303233
10.1109/TAC.2019.2949877
10.1109/TAC.2015.2422491
10.1016/j.automatica.2022.110172
10.1109/TVT.2016.2604759
10.1109/ISIT.2015.7282993
10.1109/TAC.2019.2945032
10.1109/WD.2013.6686528
10.1109/TCNS.2016.2607420
10.1109/TAC.2021.3090739
10.1016/j.automatica.2021.109872
10.1016/j.automatica.2021.110083
10.1109/JPROC.2011.2161428
10.1109/TSG.2016.2581588
10.1109/TAC.2010.2088690
10.1109/JPROC.2012.2189792
10.1109/TAC.2015.2492159
10.1145/1755952.1755976
10.1109/TAC.2020.2987307
10.1109/TAC.2017.2676679
10.1109/TAC.2020.2989275
10.1016/j.ins.2017.07.029
10.1109/ACC.2015.7171098
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
7SP
7TB
8FD
FR3
JQ2
L7M
L~C
L~D
DOI 10.1109/TAC.2023.3278839
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Mechanical & Transportation Engineering Abstracts
Technology Research Database
Engineering Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Mechanical & Transportation Engineering Abstracts
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Engineering Research Database
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Technology Research Database
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1558-2523
EndPage 14
ExternalDocumentID 10_1109_TAC_2023_3278839
10130637
Genre orig-research
GrantInformation_xml – fundername: Funds of the National Natural Science Foundation of China
  grantid: 61621004; 62103091; U1908213
– fundername: National Key Research and Development Program of China
  grantid: 2020YFE0201100
– fundername: Research Fund of State Key Laboratory of Synthetical Automation for Process Industries
  grantid: 2018ZCX03
GroupedDBID -~X
.DC
0R~
29I
4.4
5GY
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFO
ACGFS
ACIWK
ACNCT
AENEX
AGQYO
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ASUFR
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
F5P
HZ~
IFIPE
IPLJI
JAVBF
LAI
M43
MS~
O9-
OCL
P2P
RIA
RIE
RNS
TAE
TN5
~02
3EH
5VS
AAYXX
AETIX
AGSQL
AI.
AIBXA
ALLEH
CITATION
EJD
H~9
IAAWW
IBMZZ
ICLAB
IDIHD
IFJZH
VH1
VJK
7SC
7SP
7TB
8FD
FR3
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c292t-d93e1c89d6a39d9e8a108df2a96830287b496261e04a738dc1501007c35e915b3
IEDL.DBID RIE
ISICitedReferencesCount 27
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001122871700094&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0018-9286
IngestDate Mon Jun 30 10:20:00 EDT 2025
Tue Nov 18 22:16:47 EST 2025
Sat Nov 29 05:41:09 EST 2025
Mon Aug 04 05:48:51 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 12
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c292t-d93e1c89d6a39d9e8a108df2a96830287b496261e04a738dc1501007c35e915b3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-9132-3483
0000-0002-8911-0112
PQID 2899221986
PQPubID 85475
PageCount 14
ParticipantIDs ieee_primary_10130637
crossref_primary_10_1109_TAC_2023_3278839
crossref_citationtrail_10_1109_TAC_2023_3278839
proquest_journals_2899221986
PublicationCentury 2000
PublicationDate 2023-12-01
PublicationDateYYYYMMDD 2023-12-01
PublicationDate_xml – month: 12
  year: 2023
  text: 2023-12-01
  day: 01
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE transactions on automatic control
PublicationTitleAbbrev TAC
PublicationYear 2023
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref35
ref12
ref34
ref15
ref37
ref14
ref36
ref31
ref30
ref11
ref33
ref10
ref32
ref2
ref1
ref17
ref39
ref16
ref38
ref19
ref18
ref24
ref23
ref26
ref25
ref20
ref22
ref21
ref28
ref27
ref29
ref8
ref7
ref9
ref4
ref3
ref6
ref5
ref40
References_xml – ident: ref40
  doi: 10.1109/TAC.2017.2761762
– ident: ref13
  doi: 10.1016/j.automatica.2019.06.019
– ident: ref31
  doi: 10.1109/TSIPN.2017.2749959
– ident: ref11
  doi: 10.1109/TAC.2020.2998733
– ident: ref32
  doi: 10.1109/TAC.2020.3004326
– ident: ref8
  doi: 10.1109/TAC.2019.2953210
– ident: ref15
  doi: 10.1109/MSP.2011.67
– ident: ref17
  doi: 10.1016/j.automatica.2020.109117
– ident: ref30
  doi: 10.1109/TCNS.2017.2701504
– ident: ref25
  doi: 10.1109/TAC.2019.2891405
– ident: ref19
  doi: 10.1109/TCYB.2019.2915124
– ident: ref36
  doi: 10.1109/ICCPS.2014.6843720
– ident: ref16
  doi: 10.1145/1952982.1952995
– ident: ref20
  doi: 10.1109/TAC.2019.2914655
– ident: ref6
  doi: 10.1109/JSYST.2013.2260915
– ident: ref39
  doi: 10.1007/s11045-012-0172-9
– ident: ref18
  doi: 10.1109/TAC.2013.2266831
– ident: ref23
  doi: 10.1109/TAC.2014.2303233
– ident: ref22
  doi: 10.1109/TAC.2019.2949877
– ident: ref7
  doi: 10.1109/TAC.2015.2422491
– ident: ref10
  doi: 10.1016/j.automatica.2022.110172
– ident: ref2
  doi: 10.1109/TVT.2016.2604759
– ident: ref35
  doi: 10.1109/ISIT.2015.7282993
– ident: ref27
  doi: 10.1109/TAC.2019.2945032
– ident: ref3
  doi: 10.1109/WD.2013.6686528
– ident: ref37
  doi: 10.1109/TCNS.2016.2607420
– ident: ref9
  doi: 10.1109/TAC.2021.3090739
– ident: ref21
  doi: 10.1016/j.automatica.2021.109872
– ident: ref28
  doi: 10.1016/j.automatica.2021.110083
– ident: ref12
  doi: 10.1109/JPROC.2011.2161428
– ident: ref1
  doi: 10.1109/TSG.2016.2581588
– ident: ref5
  doi: 10.1109/TAC.2010.2088690
– ident: ref4
  doi: 10.1109/JPROC.2012.2189792
– ident: ref38
  doi: 10.1109/TAC.2015.2492159
– ident: ref29
  doi: 10.1145/1755952.1755976
– ident: ref14
  doi: 10.1109/TAC.2020.2987307
– ident: ref24
  doi: 10.1109/TAC.2017.2676679
– ident: ref26
  doi: 10.1109/TAC.2020.2989275
– ident: ref34
  doi: 10.1016/j.ins.2017.07.029
– ident: ref33
  doi: 10.1109/ACC.2015.7171098
SSID ssj0016441
Score 2.551115
Snippet This paper investigates the secure state estimation problem for cyber-physical systems (CPSs) under sparse sensor attacks. In the existing results, the secure...
This article investigates the secure state estimation problem for cyber–physical systems (CPSs) under sparse sensor attacks. In the existing results, the...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1
SubjectTerms Algorithms
Combinatorial analysis
Cyber-physical systems
Decoding
Decomposition
Effectiveness
Eigenvalues
Force
Matrix decomposition
Observability
Observability (systems)
polynomial-time algorithm
Polynomials
secure state estimation
Security
Sparse matrices
sparse sensor attack
state decomposition technique
State estimation
Title A polynomial-time algorithm for the secure state estimation problem under sparse sensor attacks via state decomposition technique
URI https://ieeexplore.ieee.org/document/10130637
https://www.proquest.com/docview/2899221986
Volume 68
WOSCitedRecordID wos001122871700094&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE Electronic Library (IEL)
  customDbUrl:
  eissn: 1558-2523
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0016441
  issn: 0018-9286
  databaseCode: RIE
  dateStart: 19630101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09T8MwELVoxQADn0UUCvLAwpA2sZPYHquKiqliKFK3yLEdqFTSKkkrMfLP8SVuVQmBxJQMvijSi893uXv3EHrI_AzYH8IzPjNeGHHtpbHmXhiEUaYUjVQsa7EJNpnw2Uy8OLJ6zYUxxtTNZ6YPt3UtXy_VGn6V2R1uPW5MWQu1GGMNWWtXMoCDvXG7dgcTvqtJ-mIwHY76IBPep8RmfKALvncG1aIqPzxxfbyMT__5YmfoxMWReNgAf44OTH6BjvemC16iryFeLRefwDuWCw9E5LFcvC2LefX-gW2sim3sh0v4324vEHNimLjRUBmxE5rBwDErsHU7RQmL89LayaoCZj7ezKUz1AZa013_F97Nhe2g1_HTdPTsOcUFTxFBKk8LagLFhY4lFVoYLgOf64xIEcOcMM7SUNgMKDB-KBnlWtlwEtosLKZGBFFKr1A7X-bmGmECFVE_ZEqQLMxIKi0-TDDQXqcso6qLBlsMEuXGkYMqxiKp0xJfJBa1BFBLHGpd9LizWDWjOP5Y2wGU9tY1AHVRb4tz4jZrmUDOSazn5vHNL2a36Aie3rSx9FC7KtbmDh2qTTUvi_v6O_wGNSXbRg
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1Ba9swFH6s2aDdYeu2lmXNVh162cGJLcmWdAxhoWVt6CGF3IwiyVsgS4rtBnbsP6-erYRA2aAn-6CHDZ_19J7f-94HcFHEBbI_VORi4SKeShvNMysjnvC0MIalJtON2ISYTORspm4DWb3hwjjnmuYz18fbppZv1-YBf5X5He49bsbEAbxOOadJS9faFQ3waG8dr9_DVO6qkrEaTIejPgqF9xn1OR8qg--dQo2syjNf3Bww4_cvfLVjeBciSTJsof8Ar9zqI7zdmy_4CR6H5H69_IvMY72MUEae6OWvdbmof_8hPlolPvojFf5x9xeMOgnO3GjJjCRIzRBkmZXEO56ywsWrytvpukZuPtksdDC0DpvTQwcY2U2GPYG78Y_p6DIKmguRoYrWkVXMJUYqm2mmrHJSJ7G0BdUqw0lhUsy58jlQ4mKuBZPW-IASGy08qk4l6ZydQme1XrnPQCjWRGMujKIFL-hce3yEEqi-zkTBTBcGWwxyEwaSoy7GMm8Sk1jlHrUcUcsDal34vrO4b4dx_GftCaK0t64FqAu9Lc552K5Vjlkn9b5bZl_-YXYOh5fTm-v8-mry8wyO8EltU0sPOnX54L7CG7OpF1X5rfkmnwDDLN6N
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Polynomial-Time+Algorithm+for+the+Secure+State+Estimation+Problem+Under+Sparse+Sensor+Attacks+via+State+Decomposition+Technique&rft.jtitle=IEEE+transactions+on+automatic+control&rft.au=Lu%2C+An-Yang&rft.au=Yang%2C+Guang-Hong&rft.date=2023-12-01&rft.issn=0018-9286&rft.eissn=1558-2523&rft.volume=68&rft.issue=12&rft.spage=7451&rft.epage=7465&rft_id=info:doi/10.1109%2FTAC.2023.3278839&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TAC_2023_3278839
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0018-9286&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0018-9286&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0018-9286&client=summon