Switched projected gradient descent algorithms for secure state estimation under sparse sensor attacks
This paper investigates the secure state estimation problem of cyber–physical systems (CPSs) under sparse sensor attacks. First, a novel algorithm, which uses a switched gradient descent technique to harness the intrinsic combinatorial complexity of the secure state estimation problem, is proposed t...
Saved in:
| Published in | Automatica (Oxford) Vol. 103; pp. 503 - 514 |
|---|---|
| Main Authors | , |
| Format | Journal Article |
| Language | English |
| Published |
Elsevier Ltd
01.05.2019
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 0005-1098 1873-2836 |
| DOI | 10.1016/j.automatica.2019.02.016 |
Cover
| Abstract | This paper investigates the secure state estimation problem of cyber–physical systems (CPSs) under sparse sensor attacks. First, a novel algorithm, which uses a switched gradient descent technique to harness the intrinsic combinatorial complexity of the secure state estimation problem, is proposed to estimate the state. The computational complexity is reduced through improving the convergence rate, reducing the number of candidates to be searched, reducing the search times, and reducing the computing resources consumed by each incorrect candidate selection simultaneously. Second, based on the proposed switched gradient descent algorithm, an observer-based algorithm is proposed to efficiently update the state estimation while new measurements are available. Compared with the existing methods, the computational complexity is reduced greatly without introducing any constraint except the basic observability assumption by adopting the proposed algorithms. |
|---|---|
| AbstractList | This paper investigates the secure state estimation problem of cyber–physical systems (CPSs) under sparse sensor attacks. First, a novel algorithm, which uses a switched gradient descent technique to harness the intrinsic combinatorial complexity of the secure state estimation problem, is proposed to estimate the state. The computational complexity is reduced through improving the convergence rate, reducing the number of candidates to be searched, reducing the search times, and reducing the computing resources consumed by each incorrect candidate selection simultaneously. Second, based on the proposed switched gradient descent algorithm, an observer-based algorithm is proposed to efficiently update the state estimation while new measurements are available. Compared with the existing methods, the computational complexity is reduced greatly without introducing any constraint except the basic observability assumption by adopting the proposed algorithms. |
| Author | Lu, An-Yang Yang, Guang-Hong |
| Author_xml | – sequence: 1 givenname: An-Yang surname: Lu fullname: Lu, An-Yang email: luanyang1991@stumail.neu.edu.cn organization: College of Information Science and Engineering, Northeastern University, Shenyang 110819, PR China – sequence: 2 givenname: Guang-Hong surname: Yang fullname: Yang, Guang-Hong email: yangguanghong@ise.neu.edu.cn organization: College of Information Science and Engineering, Northeastern University, Shenyang 110819, PR China |
| BookMark | eNqNkNtKAzEQhoNUsK2-Q15g12SPyY2gxRMIXqjXYTaZbVPbTUlSxbc3awXBG72aGf6Zf2a-GZkMbkBCKGc5Z7w5X-ewj24L0WrIC8Zlzoo8CUdkykVbZoUomwmZMsbqjDMpTsgshHUqKy6KKemf3m3UKzR0590adUzZ0oOxOERqMOgxwmbpvI2rbaC98zSg3nukIUJEiiHacbsb6H4wmNQd-JBUHELqhRhBv4ZTctzDJuDZd5yTl5vr58Vd9vB4e7-4fMh0yUXMTNNo2TOoatlyAFn3dd03YCphug5RdqVouJBVJ6AVHLCWdcNkhaaoWuwKKOdEHHy1dyF47NXOp_P8h-JMjbzUWv3wUiMvxQqVhDR68WtU2_j1WPRgN_8xuDoYYHrwzaJXQSeMGo31Cawyzv5t8gkhTZPQ |
| CitedBy_id | crossref_primary_10_1002_oca_3096 crossref_primary_10_1109_TSMC_2022_3213516 crossref_primary_10_1002_rnc_6428 crossref_primary_10_1109_TCYB_2020_2975042 crossref_primary_10_1109_TIFS_2022_3206419 crossref_primary_10_1109_TSMC_2020_2970040 crossref_primary_10_1002_acs_3720 crossref_primary_10_1016_j_automatica_2023_110999 crossref_primary_10_1016_j_automatica_2022_110759 crossref_primary_10_1109_TSMC_2020_3035768 crossref_primary_10_1016_j_cja_2020_07_037 crossref_primary_10_3934_era_2023340 crossref_primary_10_1109_TCNS_2023_3247562 crossref_primary_10_1109_TFUZZ_2020_2990772 crossref_primary_10_1080_21642583_2020_1834465 crossref_primary_10_1002_mde_3551 crossref_primary_10_1109_TCNS_2021_3112774 crossref_primary_10_1109_TCSII_2023_3311786 crossref_primary_10_1016_j_neucom_2024_127272 crossref_primary_10_1002_rnc_4890 crossref_primary_10_1016_j_jfranklin_2022_09_001 crossref_primary_10_1109_TSMC_2023_3344876 crossref_primary_10_1016_j_automatica_2022_110388 crossref_primary_10_1016_j_automatica_2022_110740 crossref_primary_10_1109_TCSI_2021_3090402 crossref_primary_10_1109_TCSII_2020_2964650 crossref_primary_10_1109_TSMC_2020_3041121 crossref_primary_10_1016_j_amc_2020_125284 crossref_primary_10_1016_j_automatica_2023_110927 crossref_primary_10_1109_TCYB_2021_3049508 crossref_primary_10_1002_rnc_6481 crossref_primary_10_1109_TASE_2023_3319334 crossref_primary_10_1109_TCNS_2022_3203356 crossref_primary_10_1109_TICPS_2024_3435648 crossref_primary_10_1049_iet_cta_2019_1140 crossref_primary_10_1002_acs_3094 crossref_primary_10_1007_s11071_020_05905_y crossref_primary_10_1016_j_ins_2023_119452 crossref_primary_10_1002_rnc_6144 crossref_primary_10_1109_TAC_2023_3275965 crossref_primary_10_1109_TAC_2023_3307391 |
| Cites_doi | 10.1109/CDC.2011.6160641 10.1109/TAC.2010.2088690 10.1109/TCST.2015.2462741 10.1049/iet-cta.2014.1013 10.1109/TCST.2013.2280899 10.1109/MCS.2014.2364725 10.1016/j.amc.2015.10.062 10.1109/TAC.2016.2565062 10.1016/j.ins.2017.07.029 10.1109/JPROC.2011.2161428 10.1109/TAC.2013.2266831 10.1109/MSP.2011.67 10.1049/iet-cta.2015.1147 10.1109/CDC.2015.7403131 10.1109/ACC.2015.7171098 10.1109/JAS.2016.7373757 10.1109/TCAD.2016.2523937 10.1109/TAC.2017.2676679 10.1109/TAC.2014.2363897 10.1145/3078621 10.1007/978-3-642-40349-1_4 10.1109/MCS.2014.2364709 10.1109/TSG.2016.2581588 10.1016/j.automatica.2017.09.028 10.1109/TAC.2014.2303233 10.1109/TAC.2015.2492159 |
| ContentType | Journal Article |
| Copyright | 2019 Elsevier Ltd |
| Copyright_xml | – notice: 2019 Elsevier Ltd |
| DBID | AAYXX CITATION |
| DOI | 10.1016/j.automatica.2019.02.016 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1873-2836 |
| EndPage | 514 |
| ExternalDocumentID | 10_1016_j_automatica_2019_02_016 S0005109819300597 |
| GrantInformation_xml | – fundername: Funds of National Science of China grantid: 61621004; 61420106016; 61773097 – fundername: Research Fund of State Key Laboratory of Synthetical Automation for Process Industries grantid: 2018ZCX03 |
| GroupedDBID | --K --M -~X .DC .~1 0R~ 1B1 1~. 1~5 23N 3R3 4.4 457 4G. 5GY 5VS 6TJ 7-5 71M 8P~ 9JN 9JO AAAKF AAAKG AABNK AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AARIN AAXUO ABDEX ABFNM ABFRF ABJNI ABMAC ABUCO ABXDB ABYKQ ACBEA ACDAQ ACGFO ACGFS ACNNM ACRLP ADBBV ADEZE ADIYS ADMUD ADTZH AEBSH AECPX AEFWE AEKER AENEX AFFNX AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHJVU AHPGS AI. AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ APLSM ASPBG AVWKF AXJTR AZFZN BJAXD BKOJK BLXMC CS3 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 F5P FDB FEDTE FGOYB FIRID FNPLU FYGXN G-2 G-Q GBLVA HAMUX HLZ HVGLF HZ~ H~9 IHE J1W JJJVA K-O KOM LG9 LY7 M41 MO0 N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. Q38 R2- RIG ROL RPZ RXW SBC SDF SDG SDP SES SET SEW SPC SPCBC SSB SSD SST SSZ T5K T9H TAE TN5 VH1 WH7 WUQ X6Y XFK XPP ZMT ~G- 77I AATTM AAXKI AAYWO AAYXX ABWVN ACLOT ACRPL ACVFH ADCNI ADNMO AEIPS AEUPX AFJKZ AFPUW AGQPQ AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP CITATION EFKBS ~HD |
| ID | FETCH-LOGICAL-c318t-d66c9f0a45971aa95f55f6ad48dbbee9b3861894b8a781ae5956094ed247eb2a3 |
| IEDL.DBID | .~1 |
| ISSN | 0005-1098 |
| IngestDate | Wed Oct 01 05:20:21 EDT 2025 Thu Apr 24 22:57:11 EDT 2025 Fri Feb 23 02:23:48 EST 2024 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | Switched gradient descent algorithm Secure state estimation Cyber–physical systems Pre-processing method Luenberger observer |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c318t-d66c9f0a45971aa95f55f6ad48dbbee9b3861894b8a781ae5956094ed247eb2a3 |
| PageCount | 12 |
| ParticipantIDs | crossref_primary_10_1016_j_automatica_2019_02_016 crossref_citationtrail_10_1016_j_automatica_2019_02_016 elsevier_sciencedirect_doi_10_1016_j_automatica_2019_02_016 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | May 2019 2019-05-00 |
| PublicationDateYYYYMMDD | 2019-05-01 |
| PublicationDate_xml | – month: 05 year: 2019 text: May 2019 |
| PublicationDecade | 2010 |
| PublicationTitle | Automatica (Oxford) |
| PublicationYear | 2019 |
| Publisher | Elsevier Ltd |
| Publisher_xml | – name: Elsevier Ltd |
| References | Mo, Chabukswar, Sinopoli (b15) 2014; 22 Shoukry, Tabuada (b25) 2016; 61 Pasqualetti, F., Dörfler, F., & Bullo, F. (2015b). A divide-and-conquer approach to distributed attack identification. In Pasqualetti, Dorfler, Bullo (b19) 2015; 35 Zheng, Deng, Anguluri, Zhu, Pasqualetti (b30) 2016; 35 An, Yang (b2) 2017 (pp. 2439–2444). (pp. 55–72). Mo, Kim, Brancik, Dickinson, Lee, Perrig, Sinopoli (b16) 2012; 100 Farraj, Hammad, Kundur (b6) 2018; 9 Sundaram, Hadjicostis (b26) 2011; 56 Shoukry, Chong, Wakaiki, Nuzzo, Sangiovanni-Vincentelli, Seshia, Hespanha, Tabuada (b22) 2018; 2 Pasqualetti, F., Dörfler, F., & Bullo, F. (2011). Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design. In Teixeira, Sou, Sandberg, Johansson (b27) 2015; 35 Lu, Yang (b12) 2017; 417 Shoukry, Y., Martin, P. D., Tabuada, P., & Srivastava, M. B. (2013). Non-invasive spoofing attacks for anti-lock braking systems. In (pp. 5801–5807). Persis, Postoyan (b21) 2017; 62 An, Yang (b1) 2017 Kwon, Hwang (b10) 2016; 10 Pasqualetti, Dörfler, Bullo (b18) 2013; 58 Shoukry, Nuzzo, Puggelli, Sangiovanni-Vincentelli, Seshia, Tabuada (b24) 2017; 62 Guan, Yang, Chen, Dai, Y. (b8) 2016; 3 (pp. 2195–2201). Lu, Yang (b13) 2018 Zhang, Cheng, Shi, Chen (b29) 2016; 24 Antsaklis (b3) 2014; 59 Chong, M. S., Wakaiki, M., & Hespanha, J. P. (2015). Observability of linear systems under adversarial attacks. In Manandhar, Cao, Hu, Liu (b14) 2014; 1 Hu, Wang, Han, Liu (b9) 2018; 87 Zhai, Lu, Li, Zhang (b28) 2016; 273 Ao, Song, Wen (b4) 2016; 10 Fawzi, Tabuada, Diggavi (b7) 2014; 59 Langner (b11) 2011; 9 Teixeira (10.1016/j.automatica.2019.02.016_b27) 2015; 35 Persis (10.1016/j.automatica.2019.02.016_b21) 2017; 62 Shoukry (10.1016/j.automatica.2019.02.016_b24) 2017; 62 Antsaklis (10.1016/j.automatica.2019.02.016_b3) 2014; 59 Zhang (10.1016/j.automatica.2019.02.016_b29) 2016; 24 Langner (10.1016/j.automatica.2019.02.016_b11) 2011; 9 An (10.1016/j.automatica.2019.02.016_b1) 2017 Zhai (10.1016/j.automatica.2019.02.016_b28) 2016; 273 10.1016/j.automatica.2019.02.016_b5 Kwon (10.1016/j.automatica.2019.02.016_b10) 2016; 10 Pasqualetti (10.1016/j.automatica.2019.02.016_b18) 2013; 58 Farraj (10.1016/j.automatica.2019.02.016_b6) 2018; 9 Pasqualetti (10.1016/j.automatica.2019.02.016_b19) 2015; 35 10.1016/j.automatica.2019.02.016_b20 Lu (10.1016/j.automatica.2019.02.016_b13) 2018 Fawzi (10.1016/j.automatica.2019.02.016_b7) 2014; 59 10.1016/j.automatica.2019.02.016_b23 Guan (10.1016/j.automatica.2019.02.016_b8) 2016; 3 Hu (10.1016/j.automatica.2019.02.016_b9) 2018; 87 Ao (10.1016/j.automatica.2019.02.016_b4) 2016; 10 Lu (10.1016/j.automatica.2019.02.016_b12) 2017; 417 Mo (10.1016/j.automatica.2019.02.016_b15) 2014; 22 Shoukry (10.1016/j.automatica.2019.02.016_b25) 2016; 61 Shoukry (10.1016/j.automatica.2019.02.016_b22) 2018; 2 An (10.1016/j.automatica.2019.02.016_b2) 2017 Zheng (10.1016/j.automatica.2019.02.016_b30) 2016; 35 Sundaram (10.1016/j.automatica.2019.02.016_b26) 2011; 56 Manandhar (10.1016/j.automatica.2019.02.016_b14) 2014; 1 Mo (10.1016/j.automatica.2019.02.016_b16) 2012; 100 10.1016/j.automatica.2019.02.016_b17 |
| References_xml | – volume: 87 start-page: 176 year: 2018 end-page: 183 ident: b9 article-title: State estimation under false data injection attacks: security analysis and system protection publication-title: Automatica – reference: (pp. 2195–2201). – volume: 2 year: 2018 ident: b22 article-title: Smt-based observer design for cyber-physical systems under sensor attacks publication-title: ACM Transactions on Cyber-Physical Systems – volume: 35 start-page: 699 year: 2016 end-page: 711 ident: b30 article-title: Cross-layer codesign for secure cyber-physical systems publication-title: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems – reference: (pp. 5801–5807). – volume: 61 start-page: 2079 year: 2016 end-page: 2091 ident: b25 article-title: Event-triggered state observers for sparse sensor noise/attacks publication-title: IEEE Transactions on Automatic Control – volume: 24 start-page: 843 year: 2016 end-page: 852 ident: b29 article-title: Optimal dos attack scheduling in wireless networked control system publication-title: IEEE Transactions on Control Systems Technology – reference: (pp. 2439–2444). – volume: 35 start-page: 24 year: 2015 end-page: 45 ident: b27 article-title: Secure control systems: a quantitative risk management approach publication-title: IEEE Control Systems – year: 2017 ident: b2 article-title: Distributed secure state estimation under sensor attacks: vote-location nonconvex optimization approach publication-title: Automatica – volume: 10 start-page: 1458 year: 2016 end-page: 1468 ident: b4 article-title: Adaptive cyber-physical system attack detection and reconstruction with application to power systems publication-title: IET Control Theory Applications – year: 2018 ident: b13 article-title: Secure switched observers for cyber-physical systems under sparse sensor attacks: a set cover approach publication-title: IEEE Transactions on Automatic Control – volume: 35 start-page: 110 year: 2015 end-page: 127 ident: b19 article-title: Control-theoretic methods for cyberphysical security: geometric principles for optimal cross-layer resilient control systems publication-title: IEEE Control Systems – reference: Shoukry, Y., Martin, P. D., Tabuada, P., & Srivastava, M. B. (2013). Non-invasive spoofing attacks for anti-lock braking systems. In – volume: 273 start-page: 767 year: 2016 end-page: 792 ident: b28 article-title: Simultaneous fault detection and control for switched linear systems with mode-dependent average dwell-time publication-title: Applied Mathematics and Computation – volume: 62 start-page: 4917 year: 2017 end-page: 4932 ident: b24 article-title: Secure state estimation for cyber physical systems under sensor attacks: a satisfiability modulo theory approach publication-title: IEEE Transactions on Automatic Control – volume: 62 start-page: 808 year: 2017 end-page: 823 ident: b21 article-title: A lyapunov redesign of coordination algorithms for cyber-physical systems publication-title: IEEE Transactions on Automatic Control – volume: 9 start-page: 1205 year: 2018 end-page: 1215 ident: b6 article-title: A cyber-physical control framework for transient stability in smart grids publication-title: IEEE Transactions on Smart Grid – reference: Pasqualetti, F., Dörfler, F., & Bullo, F. (2011). Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design. In – volume: 9 start-page: 49 year: 2011 end-page: 51 ident: b11 article-title: Stuxnet: dissecting a cyberwarfare weapon publication-title: IEEE Security Privacy – volume: 22 start-page: 1369 year: 2014 end-page: 1407 ident: b15 article-title: Detecting integrity attacks on scada systems publication-title: IEEE Transactions on Control Systems Technology – reference: Pasqualetti, F., Dörfler, F., & Bullo, F. (2015b). A divide-and-conquer approach to distributed attack identification. In – volume: 1 start-page: 370 year: 2014 end-page: 379 ident: b14 article-title: Detection of faults and attacks including false data injection attack in smart grid using kalman filter publication-title: IEEE Transactions on Control Systems Technology – reference: Chong, M. S., Wakaiki, M., & Hespanha, J. P. (2015). Observability of linear systems under adversarial attacks. In – year: 2017 ident: b1 article-title: Supervisory nonlinear state observers for location-varying sparse attacks publication-title: Automatica – volume: 417 start-page: 454 year: 2017 end-page: 464 ident: b12 article-title: Secure state estimation for cyber-physical systems under sparse sensor attacks via a switched luenberger observer publication-title: Information Sciences – volume: 59 start-page: 1454 year: 2014 end-page: 1467 ident: b7 article-title: Secure estimation and control for cyber-physical systems under adversarial attacks publication-title: IEEE Transactions on Automatic Control – volume: 58 start-page: 2715 year: 2013 end-page: 2729 ident: b18 article-title: Attack detection and identification in cyber-physical systems publication-title: IEEE Transactions on Automatic Control – volume: 100 start-page: 195 year: 2012 end-page: 209 ident: b16 article-title: Cyber-physical security of a smart grid infrastructure publication-title: Proceedings of the IEEE – volume: 3 start-page: 1 year: 2016 end-page: 14 ident: b8 article-title: A comprehensive overview of cyber-physical systems: from perspective of feedback system publication-title: IEEE/CAA Journal of Automatica Sinica – volume: 56 start-page: 1495 year: 2011 end-page: 1508 ident: b26 article-title: Distributed function calculation via linear iterative strategies in the presence of malicious agents publication-title: IEEE Transactions on Automatic Control – reference: (pp. 55–72). – volume: 59 start-page: 3117 year: 2014 end-page: 3119 ident: b3 article-title: Goals and challenges in cyber-physical systems research editorial of the editor in chief publication-title: IEEE Transactions on Automatic Control – volume: 10 start-page: 731 year: 2016 end-page: 741 ident: b10 article-title: Cyber attack mitigation for cyber-physical systems: hybrid system approach to controller design publication-title: IET Control Theory Applications – ident: 10.1016/j.automatica.2019.02.016_b17 doi: 10.1109/CDC.2011.6160641 – volume: 56 start-page: 1495 issue: 7 year: 2011 ident: 10.1016/j.automatica.2019.02.016_b26 article-title: Distributed function calculation via linear iterative strategies in the presence of malicious agents publication-title: IEEE Transactions on Automatic Control doi: 10.1109/TAC.2010.2088690 – volume: 24 start-page: 843 issue: 3 year: 2016 ident: 10.1016/j.automatica.2019.02.016_b29 article-title: Optimal dos attack scheduling in wireless networked control system publication-title: IEEE Transactions on Control Systems Technology doi: 10.1109/TCST.2015.2462741 – volume: 10 start-page: 731 issue: 7 year: 2016 ident: 10.1016/j.automatica.2019.02.016_b10 article-title: Cyber attack mitigation for cyber-physical systems: hybrid system approach to controller design publication-title: IET Control Theory Applications doi: 10.1049/iet-cta.2014.1013 – volume: 22 start-page: 1369 issue: 4 year: 2014 ident: 10.1016/j.automatica.2019.02.016_b15 article-title: Detecting integrity attacks on scada systems publication-title: IEEE Transactions on Control Systems Technology doi: 10.1109/TCST.2013.2280899 – volume: 35 start-page: 110 issue: 1 year: 2015 ident: 10.1016/j.automatica.2019.02.016_b19 article-title: Control-theoretic methods for cyberphysical security: geometric principles for optimal cross-layer resilient control systems publication-title: IEEE Control Systems doi: 10.1109/MCS.2014.2364725 – volume: 273 start-page: 767 year: 2016 ident: 10.1016/j.automatica.2019.02.016_b28 article-title: Simultaneous fault detection and control for switched linear systems with mode-dependent average dwell-time publication-title: Applied Mathematics and Computation doi: 10.1016/j.amc.2015.10.062 – volume: 62 start-page: 808 issue: 2 year: 2017 ident: 10.1016/j.automatica.2019.02.016_b21 article-title: A lyapunov redesign of coordination algorithms for cyber-physical systems publication-title: IEEE Transactions on Automatic Control doi: 10.1109/TAC.2016.2565062 – volume: 417 start-page: 454 year: 2017 ident: 10.1016/j.automatica.2019.02.016_b12 article-title: Secure state estimation for cyber-physical systems under sparse sensor attacks via a switched luenberger observer publication-title: Information Sciences doi: 10.1016/j.ins.2017.07.029 – volume: 100 start-page: 195 issue: 1 year: 2012 ident: 10.1016/j.automatica.2019.02.016_b16 article-title: Cyber-physical security of a smart grid infrastructure publication-title: Proceedings of the IEEE doi: 10.1109/JPROC.2011.2161428 – volume: 58 start-page: 2715 issue: 11 year: 2013 ident: 10.1016/j.automatica.2019.02.016_b18 article-title: Attack detection and identification in cyber-physical systems publication-title: IEEE Transactions on Automatic Control doi: 10.1109/TAC.2013.2266831 – volume: 9 start-page: 49 issue: 3 year: 2011 ident: 10.1016/j.automatica.2019.02.016_b11 article-title: Stuxnet: dissecting a cyberwarfare weapon publication-title: IEEE Security Privacy doi: 10.1109/MSP.2011.67 – volume: 10 start-page: 1458 issue: 12 year: 2016 ident: 10.1016/j.automatica.2019.02.016_b4 article-title: Adaptive cyber-physical system attack detection and reconstruction with application to power systems publication-title: IET Control Theory Applications doi: 10.1049/iet-cta.2015.1147 – year: 2017 ident: 10.1016/j.automatica.2019.02.016_b1 article-title: Supervisory nonlinear state observers for location-varying sparse attacks publication-title: Automatica – ident: 10.1016/j.automatica.2019.02.016_b20 doi: 10.1109/CDC.2015.7403131 – ident: 10.1016/j.automatica.2019.02.016_b5 doi: 10.1109/ACC.2015.7171098 – volume: 3 start-page: 1 issue: 1 year: 2016 ident: 10.1016/j.automatica.2019.02.016_b8 article-title: A comprehensive overview of cyber-physical systems: from perspective of feedback system publication-title: IEEE/CAA Journal of Automatica Sinica doi: 10.1109/JAS.2016.7373757 – volume: 35 start-page: 699 issue: 5 year: 2016 ident: 10.1016/j.automatica.2019.02.016_b30 article-title: Cross-layer codesign for secure cyber-physical systems publication-title: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems doi: 10.1109/TCAD.2016.2523937 – volume: 62 start-page: 4917 issue: 10 year: 2017 ident: 10.1016/j.automatica.2019.02.016_b24 article-title: Secure state estimation for cyber physical systems under sensor attacks: a satisfiability modulo theory approach publication-title: IEEE Transactions on Automatic Control doi: 10.1109/TAC.2017.2676679 – volume: 59 start-page: 3117 issue: 12 year: 2014 ident: 10.1016/j.automatica.2019.02.016_b3 article-title: Goals and challenges in cyber-physical systems research editorial of the editor in chief publication-title: IEEE Transactions on Automatic Control doi: 10.1109/TAC.2014.2363897 – volume: 2 issue: 1 year: 2018 ident: 10.1016/j.automatica.2019.02.016_b22 article-title: Smt-based observer design for cyber-physical systems under sensor attacks publication-title: ACM Transactions on Cyber-Physical Systems doi: 10.1145/3078621 – year: 2017 ident: 10.1016/j.automatica.2019.02.016_b2 article-title: Distributed secure state estimation under sensor attacks: vote-location nonconvex optimization approach publication-title: Automatica – ident: 10.1016/j.automatica.2019.02.016_b23 doi: 10.1007/978-3-642-40349-1_4 – volume: 35 start-page: 24 issue: 1 year: 2015 ident: 10.1016/j.automatica.2019.02.016_b27 article-title: Secure control systems: a quantitative risk management approach publication-title: IEEE Control Systems doi: 10.1109/MCS.2014.2364709 – volume: 9 start-page: 1205 issue: 2 year: 2018 ident: 10.1016/j.automatica.2019.02.016_b6 article-title: A cyber-physical control framework for transient stability in smart grids publication-title: IEEE Transactions on Smart Grid doi: 10.1109/TSG.2016.2581588 – year: 2018 ident: 10.1016/j.automatica.2019.02.016_b13 article-title: Secure switched observers for cyber-physical systems under sparse sensor attacks: a set cover approach publication-title: IEEE Transactions on Automatic Control – volume: 1 start-page: 370 issue: 4 year: 2014 ident: 10.1016/j.automatica.2019.02.016_b14 article-title: Detection of faults and attacks including false data injection attack in smart grid using kalman filter publication-title: IEEE Transactions on Control Systems Technology – volume: 87 start-page: 176 year: 2018 ident: 10.1016/j.automatica.2019.02.016_b9 article-title: State estimation under false data injection attacks: security analysis and system protection publication-title: Automatica doi: 10.1016/j.automatica.2017.09.028 – volume: 59 start-page: 1454 issue: 6 year: 2014 ident: 10.1016/j.automatica.2019.02.016_b7 article-title: Secure estimation and control for cyber-physical systems under adversarial attacks publication-title: IEEE Transactions on Automatic Control doi: 10.1109/TAC.2014.2303233 – volume: 61 start-page: 2079 issue: 8 year: 2016 ident: 10.1016/j.automatica.2019.02.016_b25 article-title: Event-triggered state observers for sparse sensor noise/attacks publication-title: IEEE Transactions on Automatic Control doi: 10.1109/TAC.2015.2492159 |
| SSID | ssj0004182 |
| Score | 2.4934244 |
| Snippet | This paper investigates the secure state estimation problem of cyber–physical systems (CPSs) under sparse sensor attacks. First, a novel algorithm, which uses... |
| SourceID | crossref elsevier |
| SourceType | Enrichment Source Index Database Publisher |
| StartPage | 503 |
| SubjectTerms | Cyber–physical systems Luenberger observer Pre-processing method Secure state estimation Switched gradient descent algorithm |
| Title | Switched projected gradient descent algorithms for secure state estimation under sparse sensor attacks |
| URI | https://dx.doi.org/10.1016/j.automatica.2019.02.016 |
| Volume | 103 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Baden-Württemberg Complete Freedom Collection (Elsevier) customDbUrl: eissn: 1873-2836 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0004182 issn: 0005-1098 databaseCode: GBLVA dateStart: 20110101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVESC databaseName: Elsevier SD Complete Freedom Collection [SCCMFC] customDbUrl: eissn: 1873-2836 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0004182 issn: 0005-1098 databaseCode: ACRLP dateStart: 19950101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals [SCFCJ] customDbUrl: eissn: 1873-2836 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0004182 issn: 0005-1098 databaseCode: AIKHN dateStart: 19950101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVESC databaseName: ScienceDirect (Elsevier) customDbUrl: eissn: 1873-2836 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0004182 issn: 0005-1098 databaseCode: .~1 dateStart: 19950101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVLSH databaseName: Elsevier Journals customDbUrl: mediaType: online eissn: 1873-2836 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0004182 issn: 0005-1098 databaseCode: AKRWK dateStart: 19630101 isFulltext: true providerName: Library Specific Holdings |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3PS8MwFA5jXvQg_sSfIwevdUubtgmexnBMxV10sFtJmmRO5ja2DG_-7ealrZsgKHhrmz4oL2nee-H7vofQlck5CRNFg5AKHVATxQEzoQkiTSLKNJHMiz0_9pPegN4P42ENdSouDMAqy72_2NP9bl0-aZbebM7HY-D4woLiLqSB5DoHRjmlKXQxuP5YwzwoYYViuFfc5KxE8xQYL7GyM6-MCgpEhHv1Tuh8_lOI2gg73T20W-aLuF180j6q6ekB2tlQETxE5ul9DL5XuDxWcVejhYdyWawKuSYsJqPZYmxf3pbYpal4CcfsGns6EQahjYLBiIFS5kbnrtx1o67Ede8Ka4GIf4QG3dvnTi8o2ycEuftRbaCSJOemJajzDRGCxyaOTSIUZUpKrbmMWEIYp5KJlBGhYyiVONUqpKmrt0V0jOrT2VSfIJxzbaTLnEwunYsNYYaRhOeKAk-XKnOK0spjWV5qi0OLi0lWgches7WvM_B11gozN3CKyJflvNDX-IPNTTUp2be1krkw8Kv12b-sz9E23BWQxwtUt4uVvnRpiZUNv-4aaKt999DrfwIeRuaW |
| linkProvider | Elsevier |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV07T8MwELZKGYAB8RTl6YE1tE6cxBYTqqgKtF1opW6WE9slqLRVm4qN344vD1okJJDYolxOii4X3531fZ8RujYxJ26gqONSqR1qPN9hxjWOp4lHmSYRy8Seu72gPaCPQ39YQc2SCwOwymLtz9f0bLUu7tSLaNZnSQIcX0gobksaSK7zcANtUt8NYQK7-VjhPChhuWR4JrnJWQHnyUFecplOM2lUkCAiPJPvhKPPf6pRa3WntYd2i4YR3-XvtI8qenKAdtZkBA-ReX5PIPgKF_sq9mo0z7BcKVa5XhOW49F0nqQvbwts-1S8gH12jTM-EQaljZzCiIFTZq0zO-9aq51x7bMyTYGJf4QGrft-s-0U5yc4sf1TU0cFQcxNQ1IbHCIl943vm0AqylQUac0jjwWEcRoxGTIitQ-zEqdauTS0A7f0jlF1Mp3oE4Rjrk1kWycTR5SGhjDDSMBjRYGoS5WpobCMmIgLcXE442IsShTZq1jFWkCsRcMV1lBD5Mtzlgts_MHntvwo4luyCFsHfvU-_Zf3Fdpq97sd0XnoPZ2hbbDk-MdzVE3nS31he5Q0usxy8BOC5ugr |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Switched+projected+gradient+descent+algorithms+for+secure+state+estimation+under+sparse+sensor+attacks&rft.jtitle=Automatica+%28Oxford%29&rft.au=Lu%2C+An-Yang&rft.au=Yang%2C+Guang-Hong&rft.date=2019-05-01&rft.issn=0005-1098&rft.volume=103&rft.spage=503&rft.epage=514&rft_id=info:doi/10.1016%2Fj.automatica.2019.02.016&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_automatica_2019_02_016 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0005-1098&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0005-1098&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0005-1098&client=summon |