On the computational complexity of the secure state-reconstruction problem

In this paper, we discuss the computational complexity of reconstructing the state of a linear system from sensor measurements that have been corrupted by an adversary. The first result establishes that the problem is, in general, NP-hard. We then introduce the notion of eigenvalue observability and...

Full description

Saved in:
Bibliographic Details
Published in:Automatica (Oxford) Vol. 136; p. 110083
Main Authors: Mao, Yanwen, Mitra, Aritra, Sundaram, Shreyas, Tabuada, Paulo
Format: Journal Article
Language:English
Published: Elsevier Ltd 01.02.2022
Subjects:
ISSN:0005-1098, 1873-2836
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract In this paper, we discuss the computational complexity of reconstructing the state of a linear system from sensor measurements that have been corrupted by an adversary. The first result establishes that the problem is, in general, NP-hard. We then introduce the notion of eigenvalue observability and show that the state can be reconstructed in polynomial time when each eigenvalue is observable by at least 2s+1 sensors and at most s sensors are corrupted by an adversary. However, there is a gap between eigenvalue observability and the possibility of reconstructing the state despite attacks — this gap has been characterized in the literature by the notion of sparse observability. To better understand this, we show that when the A matrix of the linear system has unitary geometric multiplicity, the gap disappears, i.e., eigenvalue observability coincides with sparse observability, and there exists a polynomial time algorithm to reconstruct the state provided the state can be reconstructed.
AbstractList In this paper, we discuss the computational complexity of reconstructing the state of a linear system from sensor measurements that have been corrupted by an adversary. The first result establishes that the problem is, in general, NP-hard. We then introduce the notion of eigenvalue observability and show that the state can be reconstructed in polynomial time when each eigenvalue is observable by at least 2s+1 sensors and at most s sensors are corrupted by an adversary. However, there is a gap between eigenvalue observability and the possibility of reconstructing the state despite attacks — this gap has been characterized in the literature by the notion of sparse observability. To better understand this, we show that when the A matrix of the linear system has unitary geometric multiplicity, the gap disappears, i.e., eigenvalue observability coincides with sparse observability, and there exists a polynomial time algorithm to reconstruct the state provided the state can be reconstructed.
ArticleNumber 110083
Author Mitra, Aritra
Tabuada, Paulo
Sundaram, Shreyas
Mao, Yanwen
Author_xml – sequence: 1
  givenname: Yanwen
  surname: Mao
  fullname: Mao, Yanwen
  email: yanwen.mao@ucla.edu
  organization: Department of Electrical and Computer Engineering, University of California, Los Angeles, CA 90095, USA
– sequence: 2
  givenname: Aritra
  surname: Mitra
  fullname: Mitra, Aritra
  email: amitra20@seas.upenn.edu
  organization: Department of Electrical and Systems Engineering, University of Pennsylvania, Philadelphia, PA 19104, USA
– sequence: 3
  givenname: Shreyas
  surname: Sundaram
  fullname: Sundaram, Shreyas
  email: sundara2@purdue.edu
  organization: School of Electrical and Computer Engineering at Purdue University, West Lafayette, IN 47907, USA
– sequence: 4
  givenname: Paulo
  surname: Tabuada
  fullname: Tabuada, Paulo
  email: tabuada@ucla.edu
  organization: Department of Electrical and Computer Engineering, University of California, Los Angeles, CA 90095, USA
BookMark eNqNkNtKAzEQhoNUsK2-w77ArpPsKb0RtHik0Bu9DtnsBFN2NyXJin17064geKNXw8_MfMx8CzIb7ICEJBQyCrS63mVyDLaXwSiZMWA0oxSA52dkTnmdp4zn1YzMAaBMKaz4BVl4v4uxoJzNyct2SMI7Jsr2-zFEih1kd0odfppwSKw-9T2q0cUSRzB1qOzggxvVcT7ZO9t02F-Scy07j1ffdUneHu5f10_pZvv4vL7dpKrIi5DWrMkbqHTdsFKtNJOa6wbqpuVyBbotodQaSt6yuiqwqVrFlGIV6kLKoqK6yJfkZuIqZ713qIUy0-XBSdMJCuJoRuzEjxlxNCMmMxHAfwH2zvTSHf6zejetYnzww6ATXhkcFLYmSgmiteZvyBd8uokf
CitedBy_id crossref_primary_10_1016_j_ifacol_2025_01_199
crossref_primary_10_1016_j_automatica_2023_110876
crossref_primary_10_1016_j_automatica_2023_111454
crossref_primary_10_1109_LCSYS_2023_3284393
crossref_primary_10_1109_TAC_2022_3200951
crossref_primary_10_1109_TAC_2024_3397158
crossref_primary_10_1109_TAC_2024_3459413
crossref_primary_10_1109_TAC_2024_3451216
crossref_primary_10_1109_TCSI_2025_3559987
crossref_primary_10_1109_OJCSYS_2025_3567867
crossref_primary_10_1016_j_ifacol_2024_08_522
crossref_primary_10_1016_j_ins_2025_122256
crossref_primary_10_1109_TCNS_2023_3247562
crossref_primary_10_1049_cth2_12287
crossref_primary_10_1109_TAC_2023_3278839
crossref_primary_10_1016_j_ifacol_2023_10_1580
crossref_primary_10_1002_rnc_6264
Cites_doi 10.1109/TSP.2018.2813330
10.1109/TIT.2005.858979
10.1016/j.automatica.2019.06.039
10.1109/TAC.2015.2492159
10.1109/TAC.2013.2266831
10.3182/20110828-6-IT-1002.01721
10.1109/JSAC.2013.130413
10.1145/3203245
10.1109/TAC.2018.2798998
10.1109/CDC.2010.5717544
10.1145/2767386.2767399
10.1016/j.ins.2017.07.029
10.1137/S0097539792240406
10.1145/1755952.1755976
10.1109/CDC.2012.6426257
10.1109/TAC.2010.2088690
10.1016/j.automatica.2018.10.052
10.1006/jcom.1995.1005
10.1109/MSP.2011.67
10.1109/Allerton.2011.6120187
10.1109/TAC.2014.2303233
10.1109/CDC.2016.7798671
10.1109/JPROC.2018.2849003
10.1109/MCS.2014.2364723
ContentType Journal Article
Copyright 2021 Elsevier Ltd
Copyright_xml – notice: 2021 Elsevier Ltd
DBID AAYXX
CITATION
DOI 10.1016/j.automatica.2021.110083
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1873-2836
ExternalDocumentID 10_1016_j_automatica_2021_110083
S0005109821006129
GrantInformation_xml – fundername: Army Research Laboratory, USA
  grantid: W911NF-17-2-0196
  funderid: http://dx.doi.org/10.13039/100006754
– fundername: NSF, USA
  grantid: 1740047
– fundername: UC-NL, USA
  grantid: LFR-18-548554
– fundername: NSF CAREER, USA
  grantid: 1653648
GroupedDBID --K
--M
-~X
.DC
.~1
0R~
1B1
1~.
1~5
23N
3R3
4.4
457
4G.
5GY
5VS
6TJ
7-5
71M
8P~
9JN
9JO
AAAKF
AAAKG
AABNK
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AARIN
AAXUO
ABDEX
ABFNM
ABFRF
ABJNI
ABMAC
ABUCO
ABXDB
ABYKQ
ACBEA
ACDAQ
ACGFO
ACGFS
ACNNM
ACRLP
ADBBV
ADEZE
ADIYS
ADMUD
ADTZH
AEBSH
AECPX
AEFWE
AEKER
AENEX
AFFNX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHJVU
AHPGS
AI.
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
APLSM
ASPBG
AVWKF
AXJTR
AZFZN
BJAXD
BKOJK
BLXMC
CS3
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
F5P
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-2
G-Q
GBLVA
HAMUX
HLZ
HVGLF
HZ~
H~9
IHE
J1W
JJJVA
K-O
KOM
LG9
LY7
M41
MO0
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
Q38
R2-
RIG
ROL
RPZ
RXW
SBC
SDF
SDG
SDP
SES
SET
SEW
SPC
SPCBC
SSB
SSD
SST
SSZ
T5K
T9H
TAE
TN5
VH1
WH7
WUQ
X6Y
XFK
XPP
ZMT
~G-
77I
9DU
AATTM
AAXKI
AAYWO
AAYXX
ABUFD
ABWVN
ACLOT
ACRPL
ACVFH
ADCNI
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AGQPQ
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
CITATION
EFKBS
~HD
ID FETCH-LOGICAL-c434t-72b3b06f7b25c9f2af8fb07bd8a90fd505ff058d2764eb6dc2cc26ef4aa461f43
ISICitedReferencesCount 18
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000820880400030&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0005-1098
IngestDate Sat Nov 29 06:58:21 EST 2025
Tue Nov 18 22:34:59 EST 2025
Fri Feb 23 02:41:01 EST 2024
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Keywords Eigenvalue and sparse observability
Resilient state secure state-reconstruction
Polynomial time algorithm
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c434t-72b3b06f7b25c9f2af8fb07bd8a90fd505ff058d2764eb6dc2cc26ef4aa461f43
OpenAccessLink https://www.sciencedirect.com/science/article/am/pii/S0005109821006129?via%3Dihub
ParticipantIDs crossref_citationtrail_10_1016_j_automatica_2021_110083
crossref_primary_10_1016_j_automatica_2021_110083
elsevier_sciencedirect_doi_10_1016_j_automatica_2021_110083
PublicationCentury 2000
PublicationDate February 2022
2022-02-00
PublicationDateYYYYMMDD 2022-02-01
PublicationDate_xml – month: 02
  year: 2022
  text: February 2022
PublicationDecade 2020
PublicationTitle Automatica (Oxford)
PublicationYear 2022
Publisher Elsevier Ltd
Publisher_xml – name: Elsevier Ltd
References Khachiyan (b14) 1995; 11
Shoukry, Tabuada (b29) 2015; 61
Smith (b31) 2015; 35
Chen, Kar, Moura (b6) 2018
(b32) 2017
Chen, Kar, Moura (b5) 2018; 66
Chong, Wakaiki, Hespanha (b7) 2015
Tiwari, Dutertre, Jovanović, de Candia, Lincoln, Rushby (b35) 2014
Tseng, Lewis, & Vaidya, Nitin H. (2015). Fault-tolerant consensus in directed graphs. In
Fawzi, Tabuada, Diggavi (b11) 2014; 59
Amin, Saurabh, Litrico, Xavier, Sastry, S Shankar, & Bayen, Alexandre M (2010).Stealthy deception attacks on water SCADA systems. In
Pasqualetti, Dörfler, Bullo (b26) 2013; 58
(pp. 2709–2714).
(pp. 451–460).
Shoukry, Nuzzo, Sangiovanni-Vincentelli, Seshia, Pappas, Tabuada (b28) 2018; 106
Lu, Yang (b19) 2017; 417
Smith (b30) 2011; 44
LeBlanc, Zhang, Sundaram, Koutsoukos (b18) 2013
(pp. 3418–3425).
Langner (b15) 2011; 9
(pp. 161–170).
Gupta, Abhishek, Langbort, Cédric, & Başar, Tamer (2010). Optimal control in the presence of an intelligent jammer with limited actions. In
Su, Shahrampour (b33) 2019
Mao, Mitra, Sundaram, Tabuada (b20) 2019
Pasqualetti, Fabio, Dörfler, Florian, & Bullo, Francesco (2012). Cyber-physical security via geometric control: Distributed monitoring and malicious attacks. In
Yong, Foo, Frazzoli (b37) 2016
Chen (b4) 1998
.
Fawzi, Hamza, Tabuada, Paulo, & Diggavi, Suhas (2011). Secure state-estimation for dynamical systems under active adversaries. In
Cárdenas, Amin, Sastry (b3) 2008
Deghat, Ugrinovskii, Shames, Langbort (b9) 2019; 99
LeBlanc, Zhang, Koutsoukos, Sundaram (b17) 2013; 31
Giraldo, Urbina, Cardenas, Valente, Faisal, Ruths (b12) 2018; 51
Mitra, Aritra, & Sundaram, Shreyas (2016). Secure distributed observers for a class of linear time invariant systems in the presence of Byzantine adversaries. In
Mitra, Sundaram (b23) 2019; 108
(pp. 337–344).
Mitra, Sundaram (b22) 2018; 63
Natarajan (b24) 1995; 24
Sundaram, Hadjicostis (b34) 2010; 56
Cormen, Leiserson, Rivest, Stein (b8) 2009
Laub (b16) 2004
Candes, Tao (b2) 2005; 51
(pp. 1096–1101).
Sandberg, Henrik, Teixeira, André, & Johansson, Karl H. (2010). On security indices for state estimators in power networks. In
Smith (10.1016/j.automatica.2021.110083_b30) 2011; 44
(10.1016/j.automatica.2021.110083_b32) 2017
Pasqualetti (10.1016/j.automatica.2021.110083_b26) 2013; 58
Chen (10.1016/j.automatica.2021.110083_b5) 2018; 66
Fawzi (10.1016/j.automatica.2021.110083_b11) 2014; 59
Natarajan (10.1016/j.automatica.2021.110083_b24) 1995; 24
Giraldo (10.1016/j.automatica.2021.110083_b12) 2018; 51
Tiwari (10.1016/j.automatica.2021.110083_b35) 2014
Chong (10.1016/j.automatica.2021.110083_b7) 2015
Shoukry (10.1016/j.automatica.2021.110083_b29) 2015; 61
Cárdenas (10.1016/j.automatica.2021.110083_b3) 2008
10.1016/j.automatica.2021.110083_b21
Chen (10.1016/j.automatica.2021.110083_b6) 2018
10.1016/j.automatica.2021.110083_b25
Candes (10.1016/j.automatica.2021.110083_b2) 2005; 51
10.1016/j.automatica.2021.110083_b27
Deghat (10.1016/j.automatica.2021.110083_b9) 2019; 99
Chen (10.1016/j.automatica.2021.110083_b4) 1998
Khachiyan (10.1016/j.automatica.2021.110083_b14) 1995; 11
LeBlanc (10.1016/j.automatica.2021.110083_b18) 2013
Laub (10.1016/j.automatica.2021.110083_b16) 2004
Lu (10.1016/j.automatica.2021.110083_b19) 2017; 417
Mitra (10.1016/j.automatica.2021.110083_b23) 2019; 108
Cormen (10.1016/j.automatica.2021.110083_b8) 2009
LeBlanc (10.1016/j.automatica.2021.110083_b17) 2013; 31
10.1016/j.automatica.2021.110083_b1
Mao (10.1016/j.automatica.2021.110083_b20) 2019
Mitra (10.1016/j.automatica.2021.110083_b22) 2018; 63
Shoukry (10.1016/j.automatica.2021.110083_b28) 2018; 106
Yong (10.1016/j.automatica.2021.110083_b37) 2016
Su (10.1016/j.automatica.2021.110083_b33) 2019
10.1016/j.automatica.2021.110083_b10
Smith (10.1016/j.automatica.2021.110083_b31) 2015; 35
10.1016/j.automatica.2021.110083_b13
10.1016/j.automatica.2021.110083_b36
Sundaram (10.1016/j.automatica.2021.110083_b34) 2010; 56
Langner (10.1016/j.automatica.2021.110083_b15) 2011; 9
References_xml – volume: 59
  start-page: 1454
  year: 2014
  end-page: 1467
  ident: b11
  article-title: Secure estimation and control for cyber-physical systems under adversarial attacks
  publication-title: IEEE Transactions on Automatic Control
– volume: 417
  start-page: 454
  year: 2017
  end-page: 464
  ident: b19
  article-title: Secure state estimation for cyber-physical systems under sparse sensor attacks via a switched Luenberger observer
  publication-title: Information Sciences
– reference: Fawzi, Hamza, Tabuada, Paulo, & Diggavi, Suhas (2011). Secure state-estimation for dynamical systems under active adversaries. In
– start-page: 1237
  year: 2013
  end-page: 1242
  ident: b18
  article-title: Resilient continuous-time consensus in fractional robust networks
  publication-title: Proc. of the American control conference
– year: 2009
  ident: b8
  article-title: Introduction to algorithms
– year: 2008
  ident: b3
  article-title: Research challenges for the security of control systems
  publication-title: HotSec
– reference: Sandberg, Henrik, Teixeira, André, & Johansson, Karl H. (2010). On security indices for state estimators in power networks. In
– reference: (pp. 451–460).
– reference: Gupta, Abhishek, Langbort, Cédric, & Başar, Tamer (2010). Optimal control in the presence of an intelligent jammer with limited actions. In
– reference: Pasqualetti, Fabio, Dörfler, Florian, & Bullo, Francesco (2012). Cyber-physical security via geometric control: Distributed monitoring and malicious attacks. In
– year: 2004
  ident: b16
  article-title: Matrix analysis for scientists and engineers
– volume: 35
  start-page: 82
  year: 2015
  end-page: 92
  ident: b31
  article-title: Covert misappropriation of networked control systems: Presenting a feedback structure
  publication-title: IEEE Control Systems Magazine
– year: 2019
  ident: b33
  article-title: Finite-time guarantees for Byzantine-resilient distributed state estimation with noisy measurements
  publication-title: IEEE Transactions on Automatic Control
– start-page: 5368
  year: 2019
  end-page: 5373
  ident: b20
  article-title: When is the secure state-reconstruction problem hard?
  publication-title: Proc. of the 58th IEEE conference on decision and control
– volume: 58
  start-page: 2715
  year: 2013
  end-page: 2729
  ident: b26
  article-title: Attack detection and identification in cyber-physical systems
  publication-title: IEEE Transactions on Automatic Control
– reference: (pp. 161–170).
– volume: 51
  start-page: 4203
  year: 2005
  end-page: 4215
  ident: b2
  article-title: Decoding by linear programming
  publication-title: IEEE Transactions on Information Theory
– volume: 31
  start-page: 766
  year: 2013
  end-page: 781
  ident: b17
  article-title: Resilient asymptotic consensus in robust networks
  publication-title: IEEE Journal on Selected Areas in Communications
– volume: 9
  start-page: 49
  year: 2011
  end-page: 51
  ident: b15
  article-title: Stuxnet: Dissecting a cyberwarfare weapon
  publication-title: IEEE Security & Privacy
– reference: Mitra, Aritra, & Sundaram, Shreyas (2016). Secure distributed observers for a class of linear time invariant systems in the presence of Byzantine adversaries. In
– volume: 51
  start-page: 1
  year: 2018
  end-page: 36
  ident: b12
  article-title: A survey of physics-based attack detection in cyber-physical systems
  publication-title: ACM Computing Surveys
– reference: (pp. 3418–3425).
– volume: 44
  start-page: 90
  year: 2011
  end-page: 95
  ident: b30
  article-title: A decoupled feedback structure for covertly appropriating networked control systems
  publication-title: IFAC Proceedings Volumes
– volume: 99
  start-page: 369
  year: 2019
  end-page: 381
  ident: b9
  article-title: Detection and mitigation of biasing attacks on distributed estimation networks
  publication-title: Automatica
– reference: (pp. 2709–2714).
– volume: 63
  start-page: 3689
  year: 2018
  end-page: 3704
  ident: b22
  article-title: Distributed observers for LTI systems
  publication-title: IEEE Transactions on Automatic Control
– start-page: 85
  year: 2014
  end-page: 94
  ident: b35
  article-title: Safety envelope for security
  publication-title: Proc. of the 3rd international conference on high confidence networked systems
– reference: Tseng, Lewis, & Vaidya, Nitin H. (2015). Fault-tolerant consensus in directed graphs. In
– volume: 108
  year: 2019
  ident: b23
  article-title: Byzantine-resilient distributed observers for LTI systems
  publication-title: Automatica
– start-page: 2439
  year: 2015
  end-page: 2444
  ident: b7
  article-title: Observability of linear systems under adversarial attacks
  publication-title: Proc. of the American control conference
– reference: .
– volume: 66
  start-page: 2455
  year: 2018
  end-page: 2469
  ident: b5
  article-title: Resilient distributed estimation through adversary detection
  publication-title: IEEE Transactions on Signal Processing
– volume: 56
  start-page: 1495
  year: 2010
  end-page: 1508
  ident: b34
  article-title: Distributed function calculation via linear iterative strategies in the presence of malicious agents
  publication-title: IEEE Transactions on Automatic Control
– reference: (pp. 337–344).
– volume: 61
  start-page: 2079
  year: 2015
  end-page: 2091
  ident: b29
  article-title: Event-triggered state observers for sparse sensor noise/attacks
  publication-title: IEEE Transactions on Automatic Control
– reference: (pp. 1096–1101).
– volume: 24
  start-page: 227
  year: 1995
  end-page: 234
  ident: b24
  article-title: Sparse approximate solutions to linear systems
  publication-title: SIAM Journal on Computing
– reference: Amin, Saurabh, Litrico, Xavier, Sastry, S Shankar, & Bayen, Alexandre M (2010).Stealthy deception attacks on water SCADA systems. In
– year: 1998
  ident: b4
  article-title: Linear system theory and design
– year: 2018
  ident: b6
  article-title: Topology free resilient distributed estimation
– volume: 11
  start-page: 138
  year: 1995
  end-page: 153
  ident: b14
  article-title: On the complexity of approximating extremal determinants in matrices
  publication-title: Journal of Complexity
– volume: 106
  start-page: 1655
  year: 2018
  end-page: 1679
  ident: b28
  article-title: Smc: Satisfiability modulo convex programming
  publication-title: Proceedings of the IEEE
– year: 2017
  ident: b32
  article-title: Special issue on secure control of cyber physical systems, vol. 4
– start-page: 308
  year: 2016
  end-page: 315
  ident: b37
  article-title: Robust and resilient estimation for cyber-physical systems under adversarial attacks
  publication-title: Proc. of the American control conference
– volume: 66
  start-page: 2455
  issue: 9
  year: 2018
  ident: 10.1016/j.automatica.2021.110083_b5
  article-title: Resilient distributed estimation through adversary detection
  publication-title: IEEE Transactions on Signal Processing
  doi: 10.1109/TSP.2018.2813330
– year: 2018
  ident: 10.1016/j.automatica.2021.110083_b6
– volume: 51
  start-page: 4203
  issue: 12
  year: 2005
  ident: 10.1016/j.automatica.2021.110083_b2
  article-title: Decoding by linear programming
  publication-title: IEEE Transactions on Information Theory
  doi: 10.1109/TIT.2005.858979
– year: 2008
  ident: 10.1016/j.automatica.2021.110083_b3
  article-title: Research challenges for the security of control systems
– start-page: 308
  year: 2016
  ident: 10.1016/j.automatica.2021.110083_b37
  article-title: Robust and resilient estimation for cyber-physical systems under adversarial attacks
– start-page: 1237
  year: 2013
  ident: 10.1016/j.automatica.2021.110083_b18
  article-title: Resilient continuous-time consensus in fractional robust networks
– volume: 108
  year: 2019
  ident: 10.1016/j.automatica.2021.110083_b23
  article-title: Byzantine-resilient distributed observers for LTI systems
  publication-title: Automatica
  doi: 10.1016/j.automatica.2019.06.039
– volume: 61
  start-page: 2079
  issue: 8
  year: 2015
  ident: 10.1016/j.automatica.2021.110083_b29
  article-title: Event-triggered state observers for sparse sensor noise/attacks
  publication-title: IEEE Transactions on Automatic Control
  doi: 10.1109/TAC.2015.2492159
– volume: 58
  start-page: 2715
  issue: 11
  year: 2013
  ident: 10.1016/j.automatica.2021.110083_b26
  article-title: Attack detection and identification in cyber-physical systems
  publication-title: IEEE Transactions on Automatic Control
  doi: 10.1109/TAC.2013.2266831
– volume: 44
  start-page: 90
  issue: 1
  year: 2011
  ident: 10.1016/j.automatica.2021.110083_b30
  article-title: A decoupled feedback structure for covertly appropriating networked control systems
  publication-title: IFAC Proceedings Volumes
  doi: 10.3182/20110828-6-IT-1002.01721
– volume: 31
  start-page: 766
  issue: 4
  year: 2013
  ident: 10.1016/j.automatica.2021.110083_b17
  article-title: Resilient asymptotic consensus in robust networks
  publication-title: IEEE Journal on Selected Areas in Communications
  doi: 10.1109/JSAC.2013.130413
– year: 2017
  ident: 10.1016/j.automatica.2021.110083_b32
– start-page: 2439
  year: 2015
  ident: 10.1016/j.automatica.2021.110083_b7
  article-title: Observability of linear systems under adversarial attacks
– volume: 51
  start-page: 1
  issue: 4
  year: 2018
  ident: 10.1016/j.automatica.2021.110083_b12
  article-title: A survey of physics-based attack detection in cyber-physical systems
  publication-title: ACM Computing Surveys
  doi: 10.1145/3203245
– volume: 63
  start-page: 3689
  issue: 11
  year: 2018
  ident: 10.1016/j.automatica.2021.110083_b22
  article-title: Distributed observers for LTI systems
  publication-title: IEEE Transactions on Automatic Control
  doi: 10.1109/TAC.2018.2798998
– ident: 10.1016/j.automatica.2021.110083_b13
  doi: 10.1109/CDC.2010.5717544
– year: 2019
  ident: 10.1016/j.automatica.2021.110083_b33
  article-title: Finite-time guarantees for Byzantine-resilient distributed state estimation with noisy measurements
  publication-title: IEEE Transactions on Automatic Control
– ident: 10.1016/j.automatica.2021.110083_b36
  doi: 10.1145/2767386.2767399
– volume: 417
  start-page: 454
  year: 2017
  ident: 10.1016/j.automatica.2021.110083_b19
  article-title: Secure state estimation for cyber-physical systems under sparse sensor attacks via a switched Luenberger observer
  publication-title: Information Sciences
  doi: 10.1016/j.ins.2017.07.029
– start-page: 5368
  year: 2019
  ident: 10.1016/j.automatica.2021.110083_b20
  article-title: When is the secure state-reconstruction problem hard?
– volume: 24
  start-page: 227
  issue: 2
  year: 1995
  ident: 10.1016/j.automatica.2021.110083_b24
  article-title: Sparse approximate solutions to linear systems
  publication-title: SIAM Journal on Computing
  doi: 10.1137/S0097539792240406
– year: 1998
  ident: 10.1016/j.automatica.2021.110083_b4
– ident: 10.1016/j.automatica.2021.110083_b1
  doi: 10.1145/1755952.1755976
– ident: 10.1016/j.automatica.2021.110083_b25
  doi: 10.1109/CDC.2012.6426257
– volume: 56
  start-page: 1495
  issue: 7
  year: 2010
  ident: 10.1016/j.automatica.2021.110083_b34
  article-title: Distributed function calculation via linear iterative strategies in the presence of malicious agents
  publication-title: IEEE Transactions on Automatic Control
  doi: 10.1109/TAC.2010.2088690
– volume: 99
  start-page: 369
  year: 2019
  ident: 10.1016/j.automatica.2021.110083_b9
  article-title: Detection and mitigation of biasing attacks on distributed estimation networks
  publication-title: Automatica
  doi: 10.1016/j.automatica.2018.10.052
– year: 2009
  ident: 10.1016/j.automatica.2021.110083_b8
– volume: 11
  start-page: 138
  issue: 1
  year: 1995
  ident: 10.1016/j.automatica.2021.110083_b14
  article-title: On the complexity of approximating extremal determinants in matrices
  publication-title: Journal of Complexity
  doi: 10.1006/jcom.1995.1005
– volume: 9
  start-page: 49
  issue: 3
  year: 2011
  ident: 10.1016/j.automatica.2021.110083_b15
  article-title: Stuxnet: Dissecting a cyberwarfare weapon
  publication-title: IEEE Security & Privacy
  doi: 10.1109/MSP.2011.67
– ident: 10.1016/j.automatica.2021.110083_b10
  doi: 10.1109/Allerton.2011.6120187
– volume: 59
  start-page: 1454
  issue: 6
  year: 2014
  ident: 10.1016/j.automatica.2021.110083_b11
  article-title: Secure estimation and control for cyber-physical systems under adversarial attacks
  publication-title: IEEE Transactions on Automatic Control
  doi: 10.1109/TAC.2014.2303233
– ident: 10.1016/j.automatica.2021.110083_b21
  doi: 10.1109/CDC.2016.7798671
– volume: 106
  start-page: 1655
  issue: 9
  year: 2018
  ident: 10.1016/j.automatica.2021.110083_b28
  article-title: Smc: Satisfiability modulo convex programming
  publication-title: Proceedings of the IEEE
  doi: 10.1109/JPROC.2018.2849003
– year: 2004
  ident: 10.1016/j.automatica.2021.110083_b16
– volume: 35
  start-page: 82
  issue: 1
  year: 2015
  ident: 10.1016/j.automatica.2021.110083_b31
  article-title: Covert misappropriation of networked control systems: Presenting a feedback structure
  publication-title: IEEE Control Systems Magazine
  doi: 10.1109/MCS.2014.2364723
– start-page: 85
  year: 2014
  ident: 10.1016/j.automatica.2021.110083_b35
  article-title: Safety envelope for security
– ident: 10.1016/j.automatica.2021.110083_b27
SSID ssj0004182
Score 2.5222743
Snippet In this paper, we discuss the computational complexity of reconstructing the state of a linear system from sensor measurements that have been corrupted by an...
SourceID crossref
elsevier
SourceType Enrichment Source
Index Database
Publisher
StartPage 110083
SubjectTerms Eigenvalue and sparse observability
Polynomial time algorithm
Resilient state secure state-reconstruction
Title On the computational complexity of the secure state-reconstruction problem
URI https://dx.doi.org/10.1016/j.automatica.2021.110083
Volume 136
WOSCitedRecordID wos000820880400030&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals 2021
  customDbUrl:
  eissn: 1873-2836
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0004182
  issn: 0005-1098
  databaseCode: AIEXJ
  dateStart: 19950101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Na9tAEF3cpIf2UPpJ0qRFh97KltVK2tWSkykJbWiSQlxwT2J2pYWEIAfHSf3zO_shyW4NTSm9CFliLXvmeXkzfjNDyDvQZZZxMDSzaU5zqyTVwirKAH_lQtdMgff0F3l6Wk6n6utoZLtamLsr2bblcqmu_6ur8Ro625XO_oW7-zfFC3iOTscjuh2P93L8WRAuGj-uoUv1eeV4s4z6C3f_xiXaXXtZJJvUh8V9K9n3ccrMKnEd3y5mvrsr-Aaly6CJ77MIJ-BTrt-h_THUlp1cLOYhbTt3Z8P_Ty55EYB47qAEPa-fgL6FGjrJ4mw1J4HhLFvTd_TFMoMyKWy-rulpGDr9oQn7bSkzigxHrG3I4eVvm3vIM1w6aU_8xhjf89RVMrAwDeeX1tnnnqHiEzGudVROPSDbXBYKd7_t8efD6fFQQZuWoa98_IhR8xWUgJuft5nIrJCTyVPyJEYVyTig4RkZNe1z8nil1-QLcnzWJuj3ZA0XyYCLZGb9_YCLZBMukoiLl-Tb0eHk4ycaB2lQk2f5gkquM82ElZoXRlkOtrSaSV2XoJitkQRby4qy5lLkjRa14cZw0dgcIBepzbNXZKudtc0OSQwyVga2AQzrkWkLldaZQWtg2FMXoItdIjurVCZ2mXfDTq6qTk54WQ32rJw9q2DPXZL2K69Dp5V7rDnoDF9FxhiYYIWY-ePq1_-0eo88GqC_T7bQF80b8tDcLS5u5m8jwH4CyRKY0w
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=On+the+computational+complexity+of+the+secure+state-reconstruction+problem&rft.jtitle=Automatica+%28Oxford%29&rft.au=Mao%2C+Yanwen&rft.au=Mitra%2C+Aritra&rft.au=Sundaram%2C+Shreyas&rft.au=Tabuada%2C+Paulo&rft.date=2022-02-01&rft.pub=Elsevier+Ltd&rft.issn=0005-1098&rft.eissn=1873-2836&rft.volume=136&rft_id=info:doi/10.1016%2Fj.automatica.2021.110083&rft.externalDocID=S0005109821006129
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0005-1098&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0005-1098&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0005-1098&client=summon