Sensor and Actuator Intrusion Detection for Cyber-Physical Systems via Adaptive Estimation Algorithm

Author(s):  
Jiayi Su ◽  
Yuqin Weng ◽  
Susan C. Schneider ◽  
Edwin E. Yaz

Abstract In this work, a new approach to detect sensor and actuator intrusion for Cyber-Physical Systems using a bank of Kalman filters is presented. The case where the unknown type of the intrusion signal is considered first, using two Kalman filters in a bank to provide the conditional state estimates, then the unknown type of intrusion signal can be detected properly via the adaptive estimation algorithm. The case where the target (either sensor or actuator) of the intrusion signal is unknown is also considered, using four Kalman filters in a bank designed to detect if the intrusion signal is about to affect healthy sensor or actuator signal. To test these methods, a DC motor speed control system subject to attack by different types of sensor and actuator signals is simulated. Simulations show that different types of sensor and actuator intrusion signals can be detected properly without the knowledge of the nature and the type of these signals.

2018 ◽  
Vol 41 (6) ◽  
pp. 1571-1579 ◽  
Author(s):  
Hao Zhang ◽  
Chen Peng ◽  
Hongtao Sun ◽  
Dajun Du

This paper investigates the state estimation problem for cyber physical systems under sparse attacks. Firstly, the fundamental state estimation problem is transferred to an optimization problem with a unique solution. Secondly, an adaptive estimation method for sparse attacks is proposed, which convergence property is well proved. The advantage of proposed method is that the step-size can be adaptively adjusted based on the dynamic estimation errors. Therefore, the computing time is less than some existing methods while guaranteeing the desired performance. Then, a suitable state feedback is designed to improve the computing speed while enhancing the resiliency for the destroyed system. Finally, the speed performance and accuracy of proposed algorithm are verified by two numerical examples.


2021 ◽  
Vol 5 (3) ◽  
pp. 1-32
Author(s):  
Georgios Bakirtzis ◽  
Cody H. Fleming ◽  
Christina Vasilakopoulou

Cyber-physical systems require the construction and management of various models to assure their correct, safe, and secure operation. These various models are necessary because of the coupled physical and computational dynamics present in cyber-physical systems. However, to date the different model views of cyber-physical systems are largely related informally, which raises issues with the degree of formal consistency between those various models of requirements, system behavior, and system architecture. We present a category-theoretic framework to make different types of composition explicit in the modeling and analysis of cyber-physical systems, which could assist in verifying the system as a whole. This compositional framework for cyber-physical systems gives rise to unified system models, where system behavior is hierarchically decomposed and related to a system architecture using the systems-as-algebras paradigm. As part of this paradigm, we show that an algebra of (safety) contracts generalizes over the state of the art, providing more uniform mathematical tools for constraining the behavior over a richer set of composite cyber-physical system models, which has the potential of minimizing or eliminating hazardous behavior.


Sensors ◽  
2020 ◽  
Vol 20 (4) ◽  
pp. 1090 ◽  
Author(s):  
Yongkai Fan ◽  
Guanqun Zhao ◽  
Kuan-Ching Li ◽  
Bin Zhang ◽  
Gang Tan ◽  
...  

The trustworthiness of data is vital data analysis in the age of big data. In cyber-physical systems, most data is collected by sensors. With the increase of sensors as Internet of Things (IoT) nodes in the network, the security risk of data tampering, unauthorized access, false identify, and others are overgrowing because of vulnerable nodes, which leads to the great economic and social loss. This paper proposes a security scheme, Securing Nodes in IoT Perception Layer (SNPL), for protecting nodes in the perception layer. The SNPL is constructed by novel lightweight algorithms to ensure security and satisfy performance requirements, as well as safety technologies to provide security isolation for sensitive operations. A series of experiments with different types and numbers of nodes are presented. Experimental results and performance analysis show that SNPL is efficient and effective at protecting IoT from faulty or malicious nodes. Some potential practical application scenarios are also discussed to motivate the implementation of the proposed scheme in the real world.


Author(s):  
Beatrix-May Balaban ◽  
Ioan Stefan Sacala ◽  
Alina Claudia Petrescu-Nita ◽  
Florin Pop

Entropy ◽  
2019 ◽  
Vol 21 (6) ◽  
pp. 543
Author(s):  
Stephen Fox ◽  
Adrian Kotelba

Optimal psychomotor work can be expressed in terms of the principle of least psychomotor action (PLPA). Modelling psychomotor action encompasses modelling workers, work, and interactions between them that involve different types of situated entropy. Modelling of psychomotor workers encompasses three types of workers: human, cyborg, and robot. The type of worker and the type of work interact to affect positioning actions, performing actions, and perfecting actions undertaken in psychomotor tasks. There are often disturbances in psychomotor work, for example due to weather conditions, which have a determining influence on what work can be undertaken with least psychomotor action by different types of workers. In this paper, findings are reported from a study focused on the modelling disturbances in psychomotor work. Five contributions are provided. First, a heuristic framework for modelling disturbances and their effects is provided. In addition to PLPA and situated entropy, this framework encompasses Markov processes, the theory of perturbations, and calculus of variations. Second, formulae and ratios are provided for heuristic modelling of effects on internal action (Sint) from disturbances to psychomotor work. Third, formulae and ratios are provided for heuristic modelling of effects on external action (Se). Fourth, examples are provided of heuristic modelling of disturbances in psychomotor work. Fifth, formulae and examples show how task complexity can be modelled heuristically in terms of microstates across the cyber domain and the physical domain of cyber-physical systems. Overall, the study reported in this paper addresses variational aspects of PLPA.


Sign in / Sign up

Export Citation Format

Share Document