Table of Contents Author Guidelines Submit a Manuscript
Complexity
Volume 2018 (2018), Article ID 1240149, 8 pages
https://doi.org/10.1155/2018/1240149
Research Article

Attack Detection/Isolation via a Secure Multisensor Fusion Framework for Cyberphysical Systems

1Concordia Institute for Information System Engineering, Concordia University, Montreal, QC, H3H-1M8, Canada
2College of Automation, Nanjing University of Science and Technology, Nanjing 210094, China

Correspondence should be addressed to Arash Mohammadi

Received 14 September 2017; Accepted 9 January 2018; Published 11 February 2018

Academic Editor: Carlos Gershenson

Copyright © 2018 Arash Mohammadi et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. F. Pasqualetti, F. Dorfler, and F. Bullo, “Attack detection and identification in cyber-physical systems,” IEEE Transactions on Automatic Control, vol. 58, no. 11, pp. 2715–2729, 2013. View at Publisher · View at Google Scholar · View at Scopus
  2. M. Pajic, R. Mangharam, O. Sokolsky, D. Arney, J. Goldman, and I. Lee, “Model-driven safety analysis of closed-loop medical systems,” IEEE Transactions on Industrial Informatics, vol. 10, no. 1, pp. 3–16, 2014. View at Publisher · View at Google Scholar · View at Scopus
  3. S. Xin, Q. Guo, H. Sun, B. Zhang, J. Wang, and C. Chen, “Cyber-physical modeling and cyber-contingency assessment of hierarchical control systems,” IEEE Transactions on Smart Grid, vol. 6, no. 5, pp. 2375–2385, 2015. View at Publisher · View at Google Scholar · View at Scopus
  4. K. Sampigethaya and R. Poovendran, “Aviation cyber-physical systems: Foundations for future aircraft and air transport,” Proceedings of the IEEE, vol. 101, no. 8, pp. 1834–1855, 2013. View at Publisher · View at Google Scholar · View at Scopus
  5. S. K. Khaitan and J. D. McCalley, “Design techniques and applications of cyberphysical systems: A survey,” IEEE Systems Journal, vol. 9, no. 2, pp. 350–365, 2015. View at Publisher · View at Google Scholar · View at Scopus
  6. B. Martinez, X. Vilajosana, I. Vilajosana, and M. Dohler, “Lean Sensing: Exploiting Contextual Information for Most Energy-Efficient Sensing,” IEEE Transactions on Industrial Informatics, vol. 11, no. 5, pp. 1156–1165, 2015. View at Publisher · View at Google Scholar · View at Scopus
  7. J. Kim, L. Tong, and R. J. Thomas, “Subspace methods for data attack on state estimation: a data driven approach,” IEEE Transactions on Signal Processing, vol. 63, no. 5, pp. 1102–1114, 2015. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  8. J. Zhang, R. S. Blum, X. Lu, and D. Conus, “Asymptotically optimum distributed estimation in the presence of attacks,” IEEE Transactions on Signal Processing, vol. 63, no. 5, pp. 1086–1101, 2015. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  9. Y. Mo and B. Sinopoli, “Secure estimation in the presence of integrity attacks,” Institute of Electrical and Electronics Engineers Transactions on Automatic Control, vol. 60, no. 4, pp. 1145–1151, 2015. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  10. H. Fawzi, P. Tabuada, and S. Diggavi, “Secure estimation and control for cyber-physical systems under adversarial attacks,” Institute of Electrical and Electronics Engineers Transactions on Automatic Control, vol. 59, no. 6, pp. 1454–1467, 2014. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  11. S. Huang, K. K. Tan, and T. H. Lee, “Fault diagnosis and fault-tolerant control in linear drives using the Kalman filter,” IEEE Transactions on Industrial Electronics, vol. 59, no. 11, pp. 4285–4292, 2012. View at Publisher · View at Google Scholar · View at Scopus
  12. G. Liang, J. Zhao, F. Luo, S. R. Weller, and Z. Y. Dong, “A Review of False Data Injection Attacks Against Modern Power Systems,” IEEE Transactions on Smart Grid, vol. 8, no. 4, pp. 1630–1638, 2017. View at Publisher · View at Google Scholar · View at Scopus
  13. J. Wei, “A data-driven cyber-physical detection and defense strategy against data integrity attacks in smart grid systems,” in Proceedings of the IEEE Global Conference on Signal and Information Processing, GlobalSIP 2015, pp. 667–671, USA, December 2015. View at Publisher · View at Google Scholar · View at Scopus
  14. U. A. Khan and A. M. Stankovic, “Secure distributed estimation in cyber-physical systems,” in Proceedings of the 2013 38th IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2013, pp. 5209–5213, Canada, May 2013. View at Publisher · View at Google Scholar · View at Scopus
  15. J. Lu and R. Niu, “Sparse attacking strategies in multi-sensor dynamic systems maximizing state estimation errors,” in Proceedings of the 41st IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2016, pp. 3151–3155, China, March 2016. View at Publisher · View at Google Scholar · View at Scopus
  16. J. Lu, Resilient dynamic state estimation in the presence of false information injection attacks, ProQuest LLC, Ann Arbor, MI, 2016. View at MathSciNet
  17. J. Lu and R. Niu, “Malicious attacks on state estimation in multi-sensor dynamic systems,” in Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, WIFS 2014, pp. 89–94, USA, December 2014. View at Publisher · View at Google Scholar · View at Scopus
  18. R. Da, “Failure detection of dynamical systems with the state chi-square test,” Journal of Guidance, Control, and Dynamics, vol. 17, no. 2, pp. 271–277, 1994. View at Publisher · View at Google Scholar · View at Scopus
  19. K. N. Plataniotis, D. Androutsos, and A. N. Venetsanopoulos, “Nonlinear filtering of non-Gaussian noise,” Journal of Intelligent and Robotic Systems, vol. 19, no. 2, pp. 207–231, 1997. View at Publisher · View at Google Scholar · View at Scopus
  20. D. Titterton and J. Weston, Strapdown Inertial Navigation Technology, IET, Stevenage, UK, 2nd edition, 2004. View at Publisher · View at Google Scholar
  21. INS TOOLBOX 3.0, “INS TOOLBOX 3.0,” http://gpsoftnav.com/products/ins-toolbox-3-0/.
  22. SATNAV TOOLBOX 3.0 FOR MATLAB, “SATNAV TOOLBOX 3.0 FOR MATLAB,” http://gpsoftnav.com/products/satellite-navigation-satnav-toolbox-3-0/.