The joint task of detecting attacks and securely monitoring the state of a cyber-physical system is addressed over a cluster-based network wherein multiple fusion nodes collect data from sensors and cooperate in a neighborwise fashion in order to accomplish the task. The attack detection-state estimation problem is formulated in the context of random set theory by representing joint information on the attack presence/absence, on the system state and on the attack signal in terms of a Hybrid Bernoulli Random Set (HBRS) density. Then, combining previous results on HBRS recursive Bayesian filtering with novel results on Kullback-Leibler averaging of HBRSs, a novel distributed HBRS filter is developed and its effectiveness is tested on a case-study concerning wide-area monitoring of a power network.
Distributed joint attack detection and secure state estimation / Forti, Nicola; Battistelli, Giorgio; Chisci, Luigi; Suqi, Li; Wang, Bailu; Sinopoli, Bruno. - In: IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS. - ISSN 2373-776X. - STAMPA. - 4:(2018), pp. 96-110. [10.1109/TSIPN.2017.2760804]
Distributed joint attack detection and secure state estimation
Forti, Nicola;Battistelli, Giorgio;Chisci, Luigi;Sinopoli, Bruno
2018
Abstract
The joint task of detecting attacks and securely monitoring the state of a cyber-physical system is addressed over a cluster-based network wherein multiple fusion nodes collect data from sensors and cooperate in a neighborwise fashion in order to accomplish the task. The attack detection-state estimation problem is formulated in the context of random set theory by representing joint information on the attack presence/absence, on the system state and on the attack signal in terms of a Hybrid Bernoulli Random Set (HBRS) density. Then, combining previous results on HBRS recursive Bayesian filtering with novel results on Kullback-Leibler averaging of HBRSs, a novel distributed HBRS filter is developed and its effectiveness is tested on a case-study concerning wide-area monitoring of a power network.I documenti in FLORE sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.