Self Attack Detection and State Estimation Algorithm in Distributed Observer System under Combination Attack

Shotaro Sato, Toru Namerikawa, Zhihua Qu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

A problem of attack detection and state estimation in continuous time distributed observer system under combination attack which is defined as in the presence of measurement attack and observer communication attack is considered in this paper. We adopt the notion of virtual state to design an algorithm for attack detection. The algorithm is distributedly used in each local observer and does not need nonlocal information, thus it can be run by only itself. Additionally, we derive the inequality relationship between system graph connectivity and the number of the allowable attacked observer to achieve the detection and estimation with the proposed algorithm as a necessary and sufficient condition. A simple numerical example, finally, illustrates the effectiveness of the proposed algorithm.

Original languageEnglish
Title of host publication2020 59th IEEE Conference on Decision and Control, CDC 2020
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages5011-5016
Number of pages6
ISBN (Electronic)9781728174471
DOIs
Publication statusPublished - 2020 Dec 14
Event59th IEEE Conference on Decision and Control, CDC 2020 - Virtual, Jeju Island, Korea, Republic of
Duration: 2020 Dec 142020 Dec 18

Publication series

NameProceedings of the IEEE Conference on Decision and Control
Volume2020-December
ISSN (Print)0743-1546

Conference

Conference59th IEEE Conference on Decision and Control, CDC 2020
Country/TerritoryKorea, Republic of
CityVirtual, Jeju Island
Period20/12/1420/12/18

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Modelling and Simulation
  • Control and Optimization

Fingerprint

Dive into the research topics of 'Self Attack Detection and State Estimation Algorithm in Distributed Observer System under Combination Attack'. Together they form a unique fingerprint.

Cite this