TY - JOUR
T1 - Sparse Actuator Attack Detection and Identification
T2 - A Data-Driven Approach
AU - Zhao, Zhengen
AU - Xu, Yunsong
AU - Li, Yuzhe
AU - Zhao, Yu
AU - Wang, Bohui
AU - Wen, Guanghui
N1 - Publisher Copyright:
© 2013 IEEE.
PY - 2023/6/1
Y1 - 2023/6/1
N2 - This article aims to investigate the data-driven attack detection and identification problem for cyber-physical systems under sparse actuator attacks, by developing tools from subspace identification and compressive sensing theories. First, two sparse actuator attack models (additive and multiplicative) are formulated and the definitions of I/O sequence and data models are presented. Then, the attack detector is designed by identifying the stable kernel representation of cyber-physical systems, followed by the security analysis of data-driven attack detection. Moreover, two sparse recovery-based attack identification policies are proposed, with respect to sparse additive and multiplicative actuator attack models. These attack identification policies are realized by the convex optimization methods. Furthermore, the identifiability conditions of the presented identification algorithms are analyzed to evaluate the vulnerability of cyber-physical systems. Finally, the proposed methods are verified by the simulations on a flight vehicle system.
AB - This article aims to investigate the data-driven attack detection and identification problem for cyber-physical systems under sparse actuator attacks, by developing tools from subspace identification and compressive sensing theories. First, two sparse actuator attack models (additive and multiplicative) are formulated and the definitions of I/O sequence and data models are presented. Then, the attack detector is designed by identifying the stable kernel representation of cyber-physical systems, followed by the security analysis of data-driven attack detection. Moreover, two sparse recovery-based attack identification policies are proposed, with respect to sparse additive and multiplicative actuator attack models. These attack identification policies are realized by the convex optimization methods. Furthermore, the identifiability conditions of the presented identification algorithms are analyzed to evaluate the vulnerability of cyber-physical systems. Finally, the proposed methods are verified by the simulations on a flight vehicle system.
KW - Actuator attacks
KW - attack detection and identification
KW - Cyber'physical systems
KW - data-driven
KW - sparse attacks
UR - http://www.scopus.com/inward/record.url?scp=85151340459&partnerID=8YFLogxK
U2 - 10.1109/TCYB.2023.3252570
DO - 10.1109/TCYB.2023.3252570
M3 - 文章
C2 - 37028391
AN - SCOPUS:85151340459
SN - 2168-2267
VL - 53
SP - 4054
EP - 4064
JO - IEEE Transactions on Cybernetics
JF - IEEE Transactions on Cybernetics
IS - 6
ER -