Professional Documents
Culture Documents
Abstract— Cyber attacks on cyber-physical systems bring characterizes the influence of the error caused by the noise
new challenges to existing methods of fault detection and fault and the error caused by the adversary injected bias. Secure
tolerant estimation. In this paper, an approach is proposed estimation of a vector state despite an attack in the plant has
for the secure state estimation in cyber-physical systems with
switching attacks. The attack signal causes a switch in the been considered in [4]. The maximum number of attacks that
system behaviour. We consider only two system modes, nom- can be detected and corrected has been provided. The number
inal mode and attacked mode. As the switching sequence is of attacked sensors is assumed to be constant. An algorithm
unknown, information coming from IT cybersecurity layer is for state estimation using a moving horizon approach during
used to guide the switching signal of the observer mode. The an attack was proposed in [4]. The method has been extended
residual signal provided by the switched observer also influences
the switching signal of the observer. The stability of the resulting to scenarios in which the set of nodes under attack can
estimation error dynamics is proven. An example is given to change over time in [5]. The proposed approach was applied
illustrate the advantage of the proposed approach over two to systems subjected to a random and bounded noise in [6].
other switching observer schemes. There are several ways to model a cyber attack on a CPS.
A cyber attack can be modelled explicitly as manipulated
I. INTRODUCTION
control input signals or manipulated measurements, [7].
The quality of state estimate influences the control per- Another way to model the CPS under cyber attacks is to
formance. A recent trend in the process control is a change differentiate between nominal and attacked system modes
from isolated systems to fully interconnected systems. This and the attack signal caused a switch between different
trend makes Industrial Control Systems (ICS) similar to modes. Then the system under attack can be modelled by
traditional Information Technology (IT) systems. That makes Markov jump systems [8] or hidden Markov models [9].
ICS vulnerable to cyber threats. After a local network is When the cyber attack is considered as a signal that changes
connected with global Internet, a physical access to devices the system dynamics from nominal to the attacked one, then
on the plant is no longer a requirement to harm a system. the attack signal can be viewed as a switching signal that
The ability of hackers to destroy physical equipment was defines system mode. Nominal mode then corresponds to
demonstrated by a labour experiment in 2007 [1]. After this an attack-free case, while one or several attacked modes
explicit demonstration of possible consequences of a cyber correspond to different attack scenarios. Such point of view
attack on ICS, a new challenge for a control society was brings the topic on cyber security to a well-established area
established. A connection between cyber and physical worlds of switched systems. There are papers which consider the
is highlighted in the new term Cyber-Physical System (CPS). switching sequence (the sequence that determines system
The biggest difference between classic control systems and mode) as an unknown parameter (see, [10]–[14]). Such
CPS is a trust in communication networks to transmit mea- works do not implicitly consider a cyber attack but still can
surements and control packets, which allows the possibility be applied to the detection of cyber attacks.
of attacks against physical plants. In this work, we also consider a CPS as a hybrid system.
In the past few years, secure estimation despite a cyber A cyber attack induces a change in the system dynamics. The
attack has been considered. An estimation of a scalar state system is described by a set of different modes, one of them
when a subset of available measurements is under adversary corresponds to the nominal system behaviour and another
control can be found in [2]. The work provides the optimal corresponds to a cyber attack on the system. When the cyber
estimator when the attacker can manipulate less than half of attack occurs, the system switches from the nominal mode
the measurements. The authors have also shown that if more to the attacked mode.
than half measurements are under attack then the optimal The field of computer science provides also some ap-
worst-case estimator should ignore all measurements and be proaches to detect a security threat. Different Intrusion De-
based solely on the apriori information of the system state tection Systems (IDSs) have been reviewed in [15]. Despite
distribution. The case when less than half the measurements many differences between traditional IT cyber security and
are attacked has been also considered in [3]. The idea of the CPS security highlighted in [16], the IDS can be integrated
work is to combine the local estimate into a more secure state into the control procedure. The example of such combination
estimate by a minimization problem. An objective function is given in [17]. The authors introduced overall CPS as a
∗ The
system with multiple layers, namely, physical layer, control
authors are with Institute for Automatic Control,
University of Kaiserslautern, Kaiserslautern 67663, Germany layer, communication layer, network layer, supervisory layer,
martyn@rhrk.uni-kl.de, pzhang@eit.uni-kl.de and management layer. The interaction between different
357
Attacker are equal, i.e. x̂(p − 1) = x(p − 1). Then the observer output
Θ(𝑘) and the plant output are equal too, i.e. ŷ(p − 1) = y(p − 1).
Nominal Consequently, at the moment of the attack (i.e. at the time
𝑢(𝑘) 𝑦(𝑘)
Plant k = p), the state estimate equals to the plant state x̂(p) = x(p).
control Attacked output
signal Plant signal
Furthermore, two cases should be considered. Let J0→1
denote the threshold for the residual signal when the system
IDS changes from mode 0 to mode 1.
Θ(𝑘) • If C1 6= C0 , the change from one mode to another is
𝑥(𝑘)
Observer immediately visible and the threshold J0→1 at time k = p
estimated
nominal plant states is set to
Observer 𝑦(𝑘)
attacked plant estimated
J0→1 (p) = y(p) − ŷ(p) = (C1 −C0 )x̂(p). (8)
output
• If C1 = C0 , the fluctuation in the residual signal caused
by changing mode is not immediately visible and can
Fig. 2. Switched observer based on IDS signal
be visible only at the next step k = p + 1. The threshold
J0→1 at time k = p + 1 is set to
C. Residual based switched observer J0→1 (p + 1) = y(p + 1) − ŷ(p + 1) =
(9)
Because the IDS algorithm is provided by third parties, C((A1 − A0 )x̂(p) + (B1 − B0 )u(p))
it is difficult to know beforehand how good the detection J1→0 can be calculated in a similar manner. When J0→1 (p) 6=
quality would be. The main question that arises in this work 0 this value can be immediately used in the cyber attack
whether it is it possible to improve the state estimation detection algorithm, but if J0→1 (p) = 0 as in the case when
quality by a combination of IDS information with one that C1 = C0 , the next value should be calculated and if it is
is provided by the system itself, so-called residual based not zero, it can be used to detect change from one mode to
estimation. Observer in each mode has a residual signal another.
r(k) = y(k) − ŷ(k). (4) Equation (9) shows the dependence on the threshold of the
control signal u(k). For example, if (B1 − B0 )u(p) = (A0 −
The residual signal carries information about correspondence A1 )x̂(p), then J0→1 (p+1) = 0 and can not provide any useful
of the system mode to the current mode of the observer. The information.
residual signal can be a basis of the residual based estimation To overcome this disadvantage, the approach proposed in
in the idea that residual signal should be close to zero when this paper combines both methods, IDS based as well as
the mode of the observer coincides with the mode of the residual based switched observer.
plant. Details of such statement are evaluated by analyzing
the change in the residual signal caused by a mode change. IV. T HE PROPOSED APPROACH
D. Threshold to detect a cyber attack In this section, an approach is proposed to combine the
information of the IDS with the residual based method.
When the residual signal (4) is used to determine which To show the basic idea, we describe an algorithm of the
observer mode of the switched observer is now to use, the proposed approach for the case when C1 = C0 .
threshold for the residual signal should be calculated.
In this section we consider the system (1) without noise, A. Algorithm of the proposed approach
i.e. w = v = 0, the noise will be taken into account in Section Let Θ̂(k) be the IDS signal and Θ̂(k) ¯ be the attack
IV. Assume that an attack happens at time k = p and system estimation got by proposed approach.
will change its state space representation from the nominal Given the plant model (1), the improved observer is
mode (A0 , B0 ,C0 ) to the attacked mode (A1 , B1 ,C1 ), namely described by the following algorithm.
x(p) = A0 x(p − 1) + B0 u(p − 1) Algorithm 1:
(5)
y(p − 1) = C0 x(p − 1) Step 1 Initialize x̂(k) and let k = 0.
Step 2 Calculate an estimated output for the current time
and
k by
x(p + 1) = A1 x(p) + B1 u(p) ŷ(k) = CΘ̂(k) x̂(k) (10)
(6)
y(p) = C1 x(p),
Note that the estimated output ŷ(k) at time k
The observer, meanwhile, remains in the nominal mode, i.e. depends indeed on the state x̂(k) that got in the
x̂(p) = A0 x̂(p − 1) + B0 u(p − 1) + L0 (y(p − 1) − ŷ(p − 1)) previous step at time k − 1.
ŷ(p − 1) = C0 x̂(p − 1) Step 3 Calculate the residual signal r(k) by (4).
(7) Step 4 Compare the amplitude of the residual signal r(k)
To show the basic idea of threshold selection, assume also with the amplitude of the residual signal on a pre-
that before an attack the observer state and the plant state vious step r(k − 1). If |r(k)| > |r(k − 1)| + δ , where
358
δ is a noise dependent uncertainty, then it could be switched observer of the proposed approach is actually the
concluded that the IDS signal does not coincide switched observer (3) with improved switching.
with the attack signal on the previous step, i.e. For the switched system (1) and the switched observer (3)
Θ̂(k − 1) 6= Θ(k − 1). The attack estimation signal, a new variable is introduced
¯ − 1) could be
provided by proposed approach, Θ̂(k
e(k)
estimated by minimizing the distance between the ē(k) = (14)
x(k)
residual signal and thresholds of different modes
The dynamic of the whole system would be
¯ − 1) = arg min |r(k) − J
Θ̂(k | (11)
¯
Θ̂(k−2)→
j={0,1} j B − BΘ̂¯
ē(k + 1) =MΘ(k),Θ̂¯ ē(k) + Θ(k) u(k) (15)
BΘ(k)
where j is the system mode at time k − 1 and
¯ − 2) is the estimate of the system mode at
Θ̂(k where
k − 2 got by proposed approach, J0→1 and J1→0 MΘ(k),Θ̂¯ =
are given in Section III.D, J0→0 = J1→1 = 0. As
(16)
AΘ̂¯ − LΘ̂¯ CΘ̂¯ AΘ(k) − AΘ̂¯ − LΘ̂¯ CΘ(k) + LΘ̂¯ CΘ̂¯
will be shown at Step 6, the state estimate x̂(k) is
calculated using the information of the IDS signal 0 AΘ(k)
¯ − 1)
at the previous step. When the value of Θ̂(k The error dynamic (15) has overall 4 possibilities under
is different from Θ̂(k − 1), the state estimate at different values of Θ(k) and Θ̂, ¯ as we consider a system
time k should be recalculated using the information with only two modes.
¯ − 1). With the new value of x̂(k), a new
of Θ̂(k Now two observer gain matrices L0 and L1 should be
estimate ŷ(k) is also recalculated, i.e. selected for (3). The observer gains should be designed
in such a way that (2) is satisfied for some m, where
x̂(k) = AΘ̂(k−1)
¯ x̂(k − 1) + BΘ̂(k−1)
¯ u(k − 1)+
Qσ (k) = MΘ(k),Θ̂(k)
¯ , Q1 = MΘ=0,Θ̂=0
¯ , Q2 = MΘ=0,Θ̂=1
¯ , Q3 =
LΘ̂(k−1)
¯ (y(k − 1) − ŷ(k − 1)) (12) MΘ=1,Θ̂=0
¯ , Q4 = MΘ=1,Θ̂=1¯ , namely
ŷ(k) = CΘ̂(k)
¯ x̂(k)
A0 − L0C0 0
Q1 =
Step 5 Calculate the estimated state x̂(k + 1) at the next 0 A0
time point by A1 − L1C1 A0 − A1 − L1C0 + L1C1
Q2 =
0 A0
x̂(k +1) = AΘ̂(k) x̂(k)+BΘ̂(k) u(k)+LΘ̂(k) (y(k)− ŷ(k)) (17)
A − L0C0 A1 − A0 − L0C1 + L0C0
(13) Q3 = 0
0 A1
Step 6 Let k = k + 1 and go to Step 2.
A − L1C1 0
A schematic description of the algorithm is given in Fig. 3. Q4 = 1
0 A1
𝑥(k + 1) 𝑥(k)
𝑢(k) 𝐵𝑛 Θ
𝑧 −1
𝐶𝑛 Θ 𝑦(k) V. A DVANTAGES OF PROPOSED APPROACH
𝐵𝑎 𝐶𝑎
𝐴𝑛 Θ
C2 = c2 6= 0, where c1 6= c2 . One can see that the initial state
𝑧 −1
𝐴𝑎 of each subsystem is observable, nevertheless, the initial state
𝐿𝑛 Θ x0 of subsystem one is indistinguishable with the initial state
𝐿𝑎
c1 x0 /c2 of subsystem two.
𝑥(k) 𝑥(k − 1)
𝑧 −1 𝐵𝑛
𝐵𝑎
Θ
𝑧 −1 Several works have already defined observability for a
𝐴𝑛 Θ
switched system (see [12], [21] and citations therein). There
𝐴𝑎
are several different kinds of observability in switched sys-
tems:
Fig. 3. Model of the switched observer when a switching signal is based
on the proposed scheme • observability of the initial state,
• observability of the current state,
• switching time observability,
B. Selection of observer gains • mode observability.
To select observer gains of the switched observer in In the following, the switching time observability will
the proposed approach, the switched observer (3) can be be considered. Actually, the object of the interest is to
analyzed. The stability condition of switched systems, in- detect system mode, but for a case with two modes, the
troduced in Lemma 1, is given for arbitrary switching and detection of the switching time always implies the detection
359
of mode, when the initial mode is known. Since switch time The poles of the plant in the attacked mode are
observability usually more relaxed, switch time observability
eig(A1 ) = {0.9000, 0.9756} (25)
would be considered.
The purpose of this section is to check when the switching so, the system is becoming slower and the proper observer
time of the switched system could not be detected, in other gain is determined by the pole placement with
words, which condition a switched system with two modes
should satisfy so that its modes would be detectable in eig(A1 − L1C) = {0.8392, 0.7552} (26)
principle. and the resulting observer gain is
Before introducing a condition for observability recall the
−0.0754
description of the system dynamics on a moving window that L1 = (27)
0.3567
described by
It can be shown that chosen L0 and L1 satisfies (2) for
y[ν] (k) = O [ν] x(k − ν) + Γ[ν] u[ν] (k) (18)
m = 9 which confirms stability of the estimation error under
where ν is the length of a moving window, and O [ν] , Γ[ν] arbitrary switching sequence.
are the correspondent matrices. In the simulation, the attack signal is generated as a
In [12] and [21] it is stated that the switched system (1) Markov process with the state transition matrix
is switching time observable iff
0.8 0.2
h i P= (28)
rank Oi[2n] − O [2n]
j =n (19) 0.1 0.9
and strong switching time observable iff and the initial state
1
h i Θ(0) = (29)
rank Oi[2n] − O [2n] Γ
[2n]
− Γ
[2n] [2n] [2n]
= n + rank(Γi − Γ j ) 0
j i j
(20) Note that the system (1) with coefficient matrices (21)
where i and j represent different system modes and n is the satisfies (19) but does not satisfy (20). That means that
system order. the system is switching time observable, but not strong
To sum up, the residual signal can distinguish between observable. This is because the system’s transfer function has
two modes in the system (1) when the system satisfies (19). zeros and for some values of control signal the output can be
Moreover, the residual signal can distinguish between two equal to zero when the state vector is not a zero vector. As it
modes for any control signal if the system satisfies (20). was shown before for some values u(k) thresholds from (9)
In other words, when the system satisfies (19) but does not could be equal to zero, that would make the residual based
satisfy (20), the switched observer with a switching signal observer impossible to distinguish between system modes.
based solely on the residual signal can not guarantee mode Fig. 4 shows control input u and system output y.
detectability for all possible control signals.
VI. EXAMPLE
An example is given in this section to illustrate the pro-
posed approach. The switched observer got by the proposed
approach is compared with the switched observer based only
on IDS and the switched observer based on the residual
signal.
Fig. 4. Residual signals r for different estimation methods
The plant (1) is characterized by the matrices
0.9050 0.0160 0.9050 0.0187 Fig. 5 shows residual signals r provided by different
A0 = , A1 = (21)
0.0160 0.7048 0.0187 0.9706 estimation methods, namely the proposed switched observer
0.0479
0.0480
given in Algorithm 1, the IDS based observer described in
B0 = , B1 = , C0 = C1 = 1 1 Section III.B, and the residual based switched observer. The
0.0342 0.0399
residual based switched observer is got by the proposed
The noise is generated as a zero mean Gaussian random approach, assuming the IDS signal is not available (i.e.
variable with variance equal 0.05. Θ̂(k) = 0).
As the poles of the nominal plant are Fig. 6 shows the real attack signal and the estimated attack
eig(A0 ) = {0.9063, 0.7036} (22) got by different methods. The attack signal is a binary signal
and has only two values with 0 representing the nominal
The observer gain is determined by the pole placement with mode and 1 representing the attacked mode. Signals are
eig(A0 − L0C) = {0.4185, 0.6479} (23) spread over Signal axes for illustrative purposes. Table I gives
the state estimation error x − x̂ and the attack estimation error
and the resulting observer gain is Θ − Θ̂ evaluated by the l2 -norm for these three methods.
0.5827 Both Fig. 4-6 and Table I show the better performance of
L0 = (24)
−0.0393 the proposed approach over the other two methods.
360
TABLE I
C OMPARISON OF METHODS
Proposed IDS based Residual
approach approach based
Attack estimation error
||Θ − Θ̂||2 10 15.6 12.6
State estimation error
||x − x̂||2 5.9 16.9 7.1
361