Electrical and Electronic Engineering - Research Publications

Permanent URI for this collection

Search Results

Now showing 1 - 10 of 12
  • Item
    Thumbnail Image
    A Robust Circle-criterion Observer-based Estimator for Discrete-time Nonlinear Systems in the Presence of Sensor Attacks and Measurement Noise
    Yang, T ; Murguia, C ; Kuijper, M ; Nešić, D ( 2018-05-11)
    We address the problem of robust state estimation and attack isolation for a class of discrete-time nonlinear systems with positive-slope nonlinearities under (potentially unbounded) sensor attacks and measurement noise. We consider the case when a subset of sensors is subject to additive false data injection attacks. Using a bank of circle-criterion observers, each observer leading to an Input-to-State Stable (ISS) estimation error, we propose a estimator that provides robust estimates of the system state in spite of sensor attacks and measurement noise; and an algorithm for detecting and isolating sensor attacks. Our results make use of the ISS property of the observers to check whether the trajectories of observers are consistent with the attack-free trajectories of the system. Simulations results are presented to illustrate the performance of the results.
  • Item
    Thumbnail Image
    A Multi-Observer Approach for Attack Detection and Isolation of Discrete-Time Nonlinear Systems
    Yang, T ; Murguia, C ; Kuijper, M ; Nešić, D ( 2018-09-13)
    We address the problem of attack detection and isolation for a class of discrete-time nonlinear systems under (potentially unbounded) sensor attacks and measurement noise. We consider the case when a subset of sensors is subject to additive false data injection attacks. Using a bank of observers, each observer leading to an Input-to-State Stable (ISS) estimation error, we propose two algorithms for detecting and isolating sensor attacks. These algorithms make use of the ISS property of the observers to check whether the trajectories of observers are “consistent” with the attack-free trajectories of the system. Simulations results are presented to illustrate the performance of the proposed algorithms.
  • Item
    Thumbnail Image
    Security Metrics of Networked Control Systems under Sensor Attacks (extended preprint)
    Murguia, C ; Shames, I ; Ruths, J ; Nesic, D ( 2018-09-14)
    As more attention is paid to security in the context of control systems and as attacks occur to real control systems throughout the world, it has become clear that some of the most nefarious attacks are those that evade detection. The term stealthy has come to encompass a variety of techniques that attackers can employ to avoid being detected. In this manuscript, for a class of perturbed linear time-invariant systems, we propose two security metrics to quantify the potential impact that stealthy attacks could have on the system dynamics by tampering with sensor measurements. We provide analysis mathematical tools (in terms of linear matrix inequalities) to quantify these metrics for given system dynamics, control structure, system monitor, and set of sensors being attacked. Then, we provide synthesis tools (in terms of semidefinite programs) to redesign controllers and monitors such that the impact of stealthy attacks is minimized and the required attack-free system performance is guaranteed.
  • Item
    Thumbnail Image
    On Privacy of Quantized Sensor Measurements through Additive Noise
    Murguia, C ; Shames, I ; Farokhi, F ; Nesic, D ( 2018-09-10)
    We study the problem of maximizing privacy of quantized sensor measurements by adding random variables. In particular, we consider the setting where information about the state of a process is obtained using noisy sensor measurements. This information is quantized and sent to a remote station through an unsecured communication network. It is desired to keep the state of the process private; however, because the network is not secure, adversaries might have access to sensor information, which could be used to estimate the process state. To avoid an accurate state estimation, we add random numbers to the quantized sensor measurements and send the sum to the remote station instead. The distribution of these random variables is designed to minimize the mutual information between the sum and the quantized sensor measurements for a desired level of distortion -- how different the sum and the quantized sensor measurements are allowed to be. Simulations are presented to illustrate our results.
  • Item
    Thumbnail Image
    Closeness of Solutions for Singularly Perturbed Systems via Averaging
    Deghat, M ; Ahmadizadeh, S ; Nesic, D ; Manzie, C ( 2018-09-20)
    This paper studies the behavior of singularly perturbed nonlinear differential equations with boundary-layer solutions that do not necessarily converge to an equilibrium. Using the average of the fast variable and assuming the boundary layer solutions converge to a bounded set, results on the closeness of solutions of the singularly perturbed system to the solutions of the reduced average and boundary layer systems over a finite time interval are presented. The closeness of solutions error is shown to be of order O(\sqrt(\epsilon)), where \epsilon is the perturbation parameter.
  • Item
    Thumbnail Image
    An Unknown Input Multi-Observer Approach for Estimation, Attack Isolation, and Control of LTI Systems under Actuator Attacks
    Yang, T ; Murguia, C ; Kuijper, M ; Nesic, D ( 2018-11-25)
    We address the problem of state estimation, attack isolation, and control for discrete-time Linear Time Invariant (LTI) systems under (potentially unbounded) actuator false data injection attacks. Using a bank of Unknown Input Observers (UIOs), each observer leading to an exponentially stable estimation error in the attack-free case, we propose an estimator that provides exponential estimates of the system state and the attack signals when a sufficiently small number of actuators are attacked. We use these estimates to control the system and isolate actuator attacks. Simulations results are presented to illustrate the performance of the results.
  • Item
    Thumbnail Image
    Adaptive Scan for Atomic Force Microscopy Based on Online Optimisation: Theory and Experiment
    Wang, K ; Ruppert, MG ; Manzie, C ; Nesic, D ; Yong, YK ( 2019-02-11)
    A major challenge in Atomic Force Microscopy (AFM) is to reduce the scan duration while retaining the image quality. Conventionally, the scan rate is restricted to a sufficiently small value in order to ensure a desirable image quality as well as a safe tip-sample contact force. This usually results in a conservative scan rate for samples that have a large variation in aspect ratio and/or for scan patterns that have a varying linear velocity. In this paper, an adaptive scan scheme is proposed to alleviate this problem. A scan line-based performance metric balancing both imaging speed and accuracy is proposed, and the scan rate is adapted such that the metric is optimised online in the presence of aspect ratio and/or linear velocity variations. The online optimisation is achieved using an extremum-seeking (ES) approach, and a semi-global practical asymptotic stability (SGPAS) result is shown for the overall system. Finally, the proposed scheme is demonstrated via both simulation and experiment.
  • Item
    Thumbnail Image
    A Multi-Observer Based Estimation Framework for Nonlinear Systems under Sensor Attacks
    Yang, T ; Murguia, C ; Kuijper, M ; Nesic, D ( 2019-04-06)
    We address the problem of state estimation and attack isolation for general discrete-time nonlinear systems when sensors are corrupted by (potentially unbounded) attack signals. For a large class of nonlinear plants and observers, we provide a general estimation scheme, built around the idea of sensor redundancy and multi-observer, capable of reconstructing the system state in spite of sensor attacks and noise. This scheme has been proposed by others for linear systems/observers and here we propose a unifying framework for a much larger class of nonlinear systems/observers. Using the proposed estimator, we provide a n isolation algorithm to pinpoint attacks on sensors during sliding time windows. Simulation results are presented to illustrate the performance of our tools.
  • Item
    Thumbnail Image
    An Unknown Input Multi-Observer Approach for Estimation and Control under Adversarial Attacks
    Yang, T ; Murguia, C ; Kuijper, M ; Nesic, D ( 2019-04-06)
    We address the problem of state estimation, attack isolation, and control of discrete-time linear time-invariant systems under (potentially unbounded) actuator and sensor false data injection attacks. Using a bank of unknown input observers, each observer leading to an exponentially stable estimatio n error (in the attack-free case), we propose an observer-based estimator that provides exponential estimates of the system state in spite of actuator and sensor attacks. Exploiting sensor and actuator redundancy, the estimation scheme is guaranteed t o work if a sufficiently small subset of sensors and actuators are under attack. Using the proposed estimator, we provide tools for reconstructing and isolating actuator and sensor attacks; and a control scheme capable of stabilizing the closed-loop dynamics by switching off isolated actuators. Simulation results are presented to illustrate the performance of our tools.
  • Item
    Thumbnail Image
    Information-Theoretic Privacy through Chaos Synchronization and Optimal Additive Noise
    Murguia, C ; Shames, I ; Farokhi, F ; Nesic, D ( 2019-06-03)
    We study the problem of maximizing privacy of data sets by adding random vectors generated via synchronized chaotic oscillators. In particular, we consider the setup where information about data sets, queries, is sent through public (unsecured) communication channels to a remote station. To hide private features (specific entries) within the data set, we corrupt the response to queries by adding random vectors. We send the distorted query (the sum of the requested query and the random vector) through the public channel. The distribution of the additive random vector is designed to minimize the mutual information (our privacy metric) between private entries of the data set and the distorted query. We cast the synthesis of this distribution as a convex program in the probabilities of the additive random vector. Once we have the optimal distribution, we propose an algorithm to generate pseudorandom realizations from this distribution using trajectories of a chaotic oscillator. At the other end of the channel, we have a second chaotic oscillator, which we use to generate realizations from the same distribution. Note that if we obtain the same realizations on both sides of the channel, we can simply subtract the realization from the distorted query to recover the requested query. To generate equal realizations, we need the two chaotic oscillators to be synchronized, i.e., we need them to generate exactly the same trajectories on both sides of the channel synchronously in time. We force the two chaotic oscillators into exponential synchronization using a driving signal. Exponential synchronization implies that trajectories of the oscillators converge to each other exponentially fast for all admissible initial conditions and are perfectly synchronized in the limit only. Thus, in finite time, there is always a “small” difference between their trajectories. To implement our algorithm, we assume (as it is often done in related work) that systems have been operating for sufficiently long time so that this small difference is negligible and oscillators are practically synchronized. We quantify the worst-case distortion induced by assuming perfect synchronization, and show that this distortion vanishes exponentially fast. Simulations are presented to illustrate our results.