LaTex2Web logo

Documents Live, a web authoring and publishing system

If you see this, something is wrong

Table of contents

First published on Monday, May 12, 2025 and last modified on Monday, May 12, 2025 by François Chaplais.

Secure Filtering against Spatio-Temporal False Data Attacks under Asynchronous Sampling
arXiv
Published version: 10.48550/arXiv.2411.19765

Zishuo Li Department of Automation, Tsinghua University, Beijing, 100084, China Email

Anh Tung Nguyen Department of Information Technology, Uppsala University, PO Box 337, SE-75105, Uppsala, Sweden Email

André M. H. Teixeira Department of Information Technology, Uppsala University, PO Box 337, SE-75105, Uppsala, Sweden Email

Yilin Mo Department of Automation, Tsinghua University, Beijing, 100084, China, Email

Karl H. Johansson School of Electrical Engineering and Computer Science, KTH Royal Institute of Technology, Stockholm SE-100 44, Sweden and Digital Futures Email

Keywords: False-data manipulation, secure state estimation, time-stamp, asynchronous Kalman filter

Abstract

This paper addresses the secure state estimation problem for continuous linear time-invariant systems with non-periodic and asynchronous sampled measurements, where the sensors need to transmit not only measurements but also sampling time-stamps to the fusion center. This measurement and communication setup is well-suited for operating large-scale control systems and, at the same time, introduces new vulnerabilities that can be exploited by adversaries through (i) manipulation of measurements, (ii) manipulation of time-stamps, (iii) elimination of measurements, (iv) generation of completely new false measurements, or a combination of these attacks. To mitigate these attacks, we propose a decentralized estimation algorithm in which each sensor maintains its local state estimate asynchronously based on its measurements. The local states are synchronized through time prediction and fused after time-stamp alignment. In the absence of attacks, state estimates are proven to recover the optimal Kalman estimates by solving a weighted least square problem. In the presence of attacks, solving this weighted least square problem with the aid of \( \ell_1\) regularization provides secure state estimates with uniformly bounded error under an observability redundancy assumption. The effectiveness of the proposed algorithm is demonstrated using a benchmark example of the IEEE 14-bus system.

1 Introduction

Many real-world large-scale systems, such as power systems, water distribution networks, and transportation networks, are examples of cyber-physical systems where physical processes are tightly coupled with digital devices. These systems are monitored and controlled via wired or wireless communications, leaving the systems vulnerable to malicious attackers. Recent reports have shown the disastrous consequences of malware for industrial control systems and power grids [1, 2]. The challenge of securely estimating states under malicious activities has been widely addressed [3, 4, 5, 6, 7, 8, 9], given their crucial role in control systems. This paper contributes to secure state estimation by considering asynchronous and non-periodic measurements under false data attacks.

To deal with the problem of secure state estimation against false data injection attacks, three research directions consisting of the sliding window method, the estimator switching method, and the local decomposition-fusion method, have been developed in recent years [5, 6, 3, 4]. The sliding window method considers past sensor measurements in a finite-time horizon to provide state estimates via batch optimization [10, 5]. The estimator switching method maintains multiple parallel estimators, each utilizing measurements from a subset of all sensors [11, 6]. The local decomposition-fusion method deploys multiple decentralized estimators, each of which samples the measurement of one local sensor. Then, local state estimates are fused by a convex optimization problem to generate secure state estimates [3, 4].

Denial-of-service (DoS) attacks block the measurement transmitted to the state estimator, undoubtedly worsening the state estimation performance. To handle such attacks conducted to multiple transmission channels, a partial observer is proposed to provide reliable partial state estimates in [8]. The authors in [12] propose a detection-compensation scheme to detect the presence of DoS attacks and then effectively reconstruct missing state estimates through past available states, eventually mitigating the attack’s impact on the state estimation performance. Event-triggered mechanisms are proven to be effective against DoS attacks in synchronous sampled systems such as the dynamic event-triggered scheme proposed in [9].

The asynchronous and non-periodic sampling scheme opens up new opportunities for the adversaries. In this paper, we propose a novel false data attack model for such systems, which was also introduced in the preliminary version [13] (see Fig.  1). This attack model includes both integrity attacks such as false-data injection [7], and availability attacks such as DoS attacks [8, 9]. We also investigate the influence of time-stamp manipulation caused by malicious attackers. Apart from these attacks, generating completely new false data packages into authentic measurement streams is also a serious threat. Our attack model unifies all the above attacks into one framework including the possibility of their combinations.

Examples of spatio-temporal false data attacks that can manipulate both time-stamps and measurements.
Figure 1. Examples of spatio-temporal false data attacks that can manipulate both time-stamps and measurements.

To the best of our knowledge, little progress has been made toward studying time-stamp manipulation on state estimation performance, especially on asynchronous sampled systems. Li et al. [14] and Guo et al. [15] propose Kalman filter (KF) algorithms for non-uniformly sampled multi-rate systems. To deal with the problem of asynchronous sampled systems, the authors in [16] propose an observer for continuous-time systems with discrete measurements, resulting in a differential Riccati equation. Ding et al.[17] analyze the observability degradation problem of multi-rate and non-periodic sampled systems. For time-stamp attacks, malicious impacts of time synchronization attacks on smart grids is studied in [18].

The main contribution of the paper is a secure estimation algorithm that recovers the system state in the presence of spatio-temporal false data attacks. The algorithm has the following merits:

  1. The algorithm is built upon the decomposition of KF, which provides local state estimates. We first introduce a weighted least square optimization-based fusion of local state estimates. We show that the result of the fusion is exactly the same as the optimal state estimates obtained by KF in the absence of attacks. As a result, the proposed fusion achieves the minimum covariance estimation error.
  2. To enhance security against attacks, we improve the weighted least square optimization-based fusion by adding an \( \ell_1\) -regularization. In the absence of attacks, we provide a sufficient condition on design parameters under which state estimates provided by the \( \ell_1\) -regularized fusion, the fusion without \( \ell_1\) -regularization, and KF are identical. Therefore, the estimation performance of the \( \ell_1\) -regularized fusion remains unchanged.
  3. In the presence of attacks, the \( \ell_1\) -regularized fusion provides a secure state estimate whose estimation error is independent of attacks and is directly related to the estimation error of an oracle KF operating in the attack-free scenario. This merit highlights the effectiveness of the \( \ell_1\) -regularized fusion in mitigating the impact of attacks.

The effectiveness of the secure state estimation algorithm is validated through the IEEE 14-bus system. We conclude this section by introducing the notation that will be utilized throughout this paper.

{Notation}: The sets of positive integers, non-negative integers, and non-negative real numbers are denoted as \( {\mathbb{Z}}_{>0},{\mathbb{Z}}_{\geq0}\) , and \( {\mathbb{R}}_{\geq0}\) , respectively. For a real number \( x\) , \( \lceil x \rceil\) represents \( x\) rounded up to the nearest integer. The cardinality of a set \( {\mathcal{S}}\) is denoted as \( |{\mathcal{S}}|\) . Denote the span of row vectors of matrix \( A\) as \( \text{rowspan}(A)\) . We denote \( I\) as an identity matrix with an appropriate dimension. The spectrum of matrix \( A\) is denoted as \( \rm{sp}(A)\) . For a vector \( x\) , \( [x]_j\) stands for its \( j\) -th entry. We denote the continuous time index in a pair of parenthesis \( (\cdot)\) and the discrete-time index in a pair of brackets \( [\cdot]\) . Let \( \partial f(x)\) be the subgradient of function \( f\) at \( x\) .

2 Problem Formulation

We first introduce the system, the modeling of asynchronous measurements, and several assumptions that will be used throughout this paper. Secondly, we present a general notion of spatio-temporal false data attacks. Finally, the secure estimation problem is formulated.

2.1 Systems with asynchronous measurements

Throughout this paper, we consider a continuous linear time-invariant (LTI) system mathematically described by \( n\) states and measured by \( m\) sensors. Let us denote the state index set as \( {\mathcal{J}} \triangleq\{1,2, …, n\}\) and the sensor index set as \( {\mathcal{I}} \triangleq\{1,2, …, m\}\) . The LTI system is modeled as follows:

\[ \begin{align} \dot{x}(t)&=A x(t)+w(t), \end{align} \]

(1)

\[ \begin{align} y_i(t) &= C_i x(t) + v_i(t), ~ \forall \, i \in {\mathcal{I}}, \end{align} \]

(2)

where \( x(t) \in \mathbb{R}^{n}\) is the system state. The process noise \( w(t) \in \mathbb{R}^{n}\) is continuous zero-mean Gaussian noise with the power spectral density \( {w}(t) \sim {\mathcal{N}}(0,Q)\) , where \( Q\) is a positive definite matrix. The measurement given by sensor \( i\) is denoted by \( y_i(t) \in \mathbb{R}\) . Let us denote the measurement matrix of all the sensors \( C \triangleq [C_1^\top,\dots, C_m^\top]^\top\) where \( C_i^\top \in {\mathbb{R}}^{n}\) is given for all \( i \in {\mathcal{I}}\) . The measurement noise vector \( v(t) \triangleq [v_1(t),\dots, v_m(t)]^\top\) is zero-mean Gaussian noise with the power spectral density \( {v}(t) \sim {\mathcal{N}}(0,R(t))\) . The initial state \( x(0)\) is assumed to be a Gaussian random vector with a known covariance and is independent of measurement noises, i.e., \( x(0) \sim {\mathcal{N}}(0,\,\Sigma)\) where \( \Sigma\) is known. Let us introduce the following assumption.

Assumption 1

The measurement noise covariance \( R(t)\) is uniformly upper bounded: \( 0 \preceq R(t) \preceq \bar{R}, \forall  t\,\in\,{\mathbb{R}}_{\geq0}\) , where \( \bar{R}\) is a given constant positive definite matrix. \( \triangleleft \)

The sensors sample and send data packets to an estimator in a non-periodic and asynchronous manner, which contain not only measurements but also their sensor indices and sampling time-stamps. More specifically, the estimator receives measurement triples from sensor \( i \in {\mathcal{I}}\) , which has the following form:

\[ \begin{align} \textbf{measurement triple: }(i, \, t,\, y_i(t)), \end{align} \]

(3)

where \( i\) is the sensor index, \( t\) is the sampling time-stamp, and \( y_i(t)\) is the measurement given by sensor \( i\) .

Define the set of sampling time-stamps from sensor \( i\) as \( \Gamma_i\) . Without loss of generality, the time when the estimator starts working is set as \( t_0=0\) . In order to guarantee system observability under non-uniform asynchronous measurements, we introduce the following notation. Define the set of sampling time intervals and cumulative sampling time from sensor \( i\) as follows

\[ \begin{align*} {\mathcal{T}}\triangleq \bigcup_{i=1}^m {\mathcal{T}}_i{\mathcal{T}}_i &\triangleq \left\{t_k-t_{k-1}~ | ~t_k,t_{k-1}\in\Gamma_i,k\in{\mathbb{Z}}_{>0} \right\}, \\ \widetilde{{\mathcal{T}}}\triangleq \bigcup_{i=1}^m \widetilde {\mathcal{T}}_i\widetilde{{\mathcal{T}}}_i &\triangleq \left\{t_k-t_{j}~ | ~t_k,t_j\in\Gamma_i, k>j ,k,j\in{\mathbb{Z}}_{\geq 0}\right\} . \end{align*} \]

Define the system pathological sampling interval set [17] as

\[ \begin{align*} {\mathcal{T}}^*\triangleq \left\{ T>0 ~|~ e^{\lambda_i T}=e^{\lambda_j T},~ i\neq j,\lambda_i,\lambda_j\in \rm{sp}(A) \subseteq {\mathbb{C}} \right\} . \end{align*} \]

To prevent system observability degradation problems due to discrete-time sampling, the following assumption, which is also seen in [19, 17], is introduced.

Assumption 2 (non-pathological sampling time)

Given a positive number \( T_{\max}\) , the sampling time interval sets \( {\mathcal{T}}\) and \( \tilde {\mathcal{T}}\) satisfy the following conditions: \( \sup {\mathcal{T}} \leq T_{\max}  \text{and}  \widetilde{{\mathcal{T}}}\cap {\mathcal{T}}^*=\varnothing\) , i.e., the sampling interval set is upper-bounded by \( T_{\max}\) and has no intersection with the pathological sampling interval set \( {\mathcal{T}}^*\) . \( \triangleleft \)

2.2 Spatio-temporal false data attacks

We introduce a new spatio-temporal false data attack that generalizes integrity attacks and availability attacks (see Fig. 1). More specifically, the adversary may manipulate the entire measurement triple (3) rather than only the measurement. Let us denote \( {\mathcal{S}}(t)\) as the set of all authentic measurement triples with time-stamp \( t\) :

\[ \begin{align*} {\mathcal{S}}(t) \triangleq \left\{(i, \, t, \, y_i(t))~|~i\in{\mathcal{I}} \right\}. \end{align*} \]

Moreover, \( {\mathcal{S}}^a(t)\) denotes the set of measurement triples with time-stamp \( t\) after being manipulated by the attacker. Denote the set of corrupted sensors as \( {\mathcal{C}}\) , which is supposed to be fixed over time and unknown to the operator. Now, we are ready to define the spatio-temporal false data attack as follows:

An example of secure state estimation in electricity consumption monitoring. The attacker can launch different types of spatio-temporal false data attacks on different sensors.
Figure 2. An example of secure state estimation in electricity consumption monitoring. The attacker can launch different types of spatio-temporal false data attacks on different sensors.

Definition 1 (Spatio-temporal false data attacks)

Attackers can manipulate measurement triples given by corrupted sensor \( i\in{\mathcal{C}}\) in the following four ways where \( (i, \, t, \, y_i(t)) \in {\mathcal{S}}(t) \) is an authentic measurement triple, \( y^a_i(t)\) and \( t^a\) are manipulated values from \( y_i(t)\) and \( t\) , respectively, and \( ( i, \, t^f, \, y^f_i(t))\notin {\mathcal{S}}(t)\) is a newly generated false measurement triple.

  1. false-data injection:

    \[ S^a(t) \triangleq \big[ S(t) \setminus (i, \, t, \, y_i(t)) \big] ~\bigcup~ (i, \, t, \, y^a_i(t)) \]
  2. time-stamp manipulation:

    \[ S^a(t) \triangleq \big[ S(t) \setminus (i, \, t, \,y_i(t)) \big] ~\bigcup~ (i, \, t^a, \,y_i(t)) \]
  3. denial-of-service:

    \[ {\mathcal{S}}^a(t) \triangleq {\mathcal{S}}(t)\setminus ( i, \, t, \,y_i(t)) \]
  4. false-data generation:

    \[ {\mathcal{S}}^a(t) \triangleq {\mathcal{S}}(t) ~\bigcup~ ( i, \, t^f, \, y^f_i(t) ) \]

Further, if the set of corrupted sensors satisfies \( |{\mathcal{C}}|\leq p\) , the attack is called \( p\) -sparse. \( \triangleleft \)

We mainly study \( p\) -sparse spatio-temporal false data attacks. Next, we introduce observability redundancy in the following assumption, which is a necessary condition and commonly used in literature (see [10, 8, 6, 11, 20]).

Assumption 3

The system \( (A,C)\) is \( 2p\) -sparse observable, i.e., the system \( (A,C_{{\mathcal{I}}\setminus{\mathcal{M}}})\) is observable for any subset \( {\mathcal{M}}\subset{\mathcal{I}}\) where \( |{\mathcal{M}}| = 2p\) and the matrix {\( C_{{\mathcal{I}}\setminus{\mathcal{M}}}\) } represents the matrix composed of rows of \( C\) with row indices in \( {\mathcal{I}}\setminus{\mathcal{M}}\) . \( \triangleleft \)

The manipulated time-stamp set \( \Gamma^a\) is defined as follows:

\[ \begin{align} \Gamma^a\triangleq &\bigcup_{i=1}^m \Gamma^a_i,&\Gamma^a_i\triangleq \{t~|~(i, \, t, \, y_i(t))\in{\mathcal{S}}^a(t)\}. \\\end{align} \]

(4)

Due to various delays, received measurement time-stamps may not be in increasing order, resulting in the out-of-sequence problem [21, 22, 23]. This problem is generally dealt with by utilizing a buffer that sorts received measurement triples based on their time-stamps in increasing order [21, 22, 23]. We assume a buffer before the secure estimator, enabling us to employ the following assumption.

Assumption 4

The received measurement triples are in an order such that their corresponding time-stamps are in an increasing order, i.e., \( \Gamma^a=\{t_0,t_1,t_2,\dots\}\) and \( 0 = t_0 < t_i \leq t_{i+1}, \forall \, i \in{\mathbb{Z}}_{>0}\) . \( \triangleleft \)

2.3 Secure state estimation problem

An example of state estimation problem in electricity monitoring is given in Fig. 2 where an attacker conducts spatio-temporal false data attacks. To deal with such attacks, we design a secure state estimation algorithm that provides a state estimate \( \check x(t)\) of the true state \( x(t)\) with uniformly bounded error:

\[ \begin{align} \lvert \, \check x_j[k] - x_j[k] \, \rvert \leq F(A,C,Q,\Sigma,\bar{R},\gamma),\, \forall \, j \, \in \, {\mathcal{J}}, \end{align} \]

(5)

where the design parameter \( \gamma\) is a positive scalar and \( \Sigma = {\mathbb{E}} \, [ \, x(0) x(0)^\top \, ]\) . Notice that the value of function \( F(\cdot)\) depends only on the system parameters and remains independent of attacks.

In the following section, we present the sampled-data KF and its local linear decomposition. The decomposition has the potential to support us in providing secure state estimates in the presence of spatio-temporal false data attacks. The secure state estimator will be then developed in Section 4.

3 Asynchronous Sampled-data KF and Its Decomposition

We first introduce the sampled-data KF with asynchronous sampling measurements. The remainder of the section presents the decomposition of the sampled-data KF and how it recovers state estimates provided by the sampled-data KF.

3.1 Asynchronous sampled-data KF

For linear continuous-time systems with synchronous discrete-time measurements, the sampled-data KF provides optimal state estimates by combining continuous-time prediction steps and discrete-time update steps [24]. We define the measurement availability index \( \phi_i[k]\in\{0,1\}\) where \( \phi_i[k]=1\) if sensor \( i\) has a measurement with time-stamp \( t_k\) and \( \phi_i[k]=0\) otherwise. The notation \( [k]\) stands for the discrete-time instant. Let us define the following matrices:

\[ \begin{align*} A[k]& \triangleq \exp((t_{k+1}-t_{k}) A ), C[k] \triangleq {\mathrm{diag}} (\phi[k]) \, C, \\ Q[k] &\triangleq \int_{t_k}^{t_{k+1}} \exp(\tau A) Q \exp(\tau A^\top) \, \text{d} \tau, \\ R[k] &\triangleq {\mathrm{diag}} (\phi[k]) \, R(t_k) \, {\mathrm{diag}} (\phi[k]), \end{align*} \]

where \( \phi[k]\triangleq\left(\phi_1[k],\dots, \phi_m[k]\right)^\top\) . At each sampling instant \( k\) , the system can be considered as a discrete time-variant system, on which we implement the following asynchronous sampled-data KF:

\[ \begin{align} &\textbf{Prediction steps:} \notag \\ &\hat{x}_{\text{-}}[k]=A[k-1]\hat{x}[k-1] ,\\ &P_{\text{-}}[k]=A[k-1]P[k-1]A^{\top}[k-1] + Q[k-1], \\ &\textbf{Update steps:} \notag \\ &K[k]=P_{\text{-}}[k] C^{\top}[k] \big( C[k] P_{\text{-}}[k] C^{\top}[k]+R[k] \big)^{\dagger}, \end{align} \]

(6.a)

\[ \begin{align} & P[k] = (I-K[k] C[k]) P_{\text{-}}[k], \end{align} \]

(6.b)

\[ \begin{align} & \hat{x}[k]=\hat{x}_{\text{-}}[k] + K[k] \left(y[k]-C[k] \hat{x}_{\text{-}}[k] \right) , \end{align} \]

(6.c)

where \( y[k]\triangleq y(t_k)\) , initial condition \( \hat{x}[0]=0, \, P[0]=\Sigma\) , and \( (\cdot)^\dagger\) stands for the Moore-Penrose inverse. Notice that when \( \phi_i[k]=0\) , \( C_i[k]=\boldsymbol{0}^{\top}\) and thus based on (6.a), the \( i\) -th column Kalman gain is zero, i.e., \( K_i[k]=\mathbf{0}\) . Thus, one has \( K[k]C[k]=K[k]C\) for all time index \( k\) .

In the following section, we will decompose the KF (6.c) into a linear sum of local state estimates and propose an optimization-based fusion scheme that provides a state estimate exactly the same as the one given by the KF (6.c).

3.2 Linear decomposition of the sampled-data KF

Define

\[ \begin{align} \Pi[k-1] &\triangleq A[k-1]-K[k]C A[k-1]. \end{align} \]

(7)

The local estimator at sensor \( i\) is defined as:

\[ \begin{align} \zeta_{i}[k] \triangleq \Pi[k-1] \zeta_{i}[k-1] + K_i[k] y_i[k], \end{align} \]

(8)

which is initialized as \( \zeta_{i}[0]= \mathbf{0}\) . From (6.c), (7), and (8), one obtains the following property

\[ \begin{equation} \hat{x}[k]= \sum_{i=1}^{m} \, \zeta_{i}[k] . \end{equation} \]

(9)

In the following, we show the relationship between \( \zeta_{i}[k]\) and \( x(t_k)\) , and prove that \( \zeta_{i}[k]\) is a stable estimate of \( G_i[k]{x}[k]\) where \( G_i[k]\) satisfies the following dynamics:

\[ \begin{equation} G_i[k] \triangleq \Pi[k-1] G_i[k-1] A^{-1}[k-1]+K_i[k]C_i. \end{equation} \]

(10)

Note that \( G_i[k]\) plays a crucial role in designing a secure state estimation algorithm in Section 4. Therefore, we analyze its structure and show that \( G_i[k]\) has a time-invariant form in the following.

3.3 Structure of \( G_i[k]\)

We need the following assumption to prevent the observability degradation problems.

Assumption 5

The geometric multiplicity of all the eigenvalues of \( A\) is 1. \( \triangleleft \)

Assumption 5 simplifies the observability structure of system \( (A,C)\) , which can be seen from Lemma 1 later. The use of Assumption 5 ensures that the Jordan blocks of \( A\) are linearly independent, which enables the definition of state observability, i.e., define \( {\mathcal{E}}_j\) as the index set of sensors that can observe state \( j\) , i.e.

\[ \begin{equation} {\mathcal{E}}_j\triangleq \left\{i\in \mathcal{I}O_i^{\top} \mathbf{e}_j\neq \mathbf{0} \right\}, \end{equation} \]

(11)

where \( \mathbf{e}_j\) is the canonical basis vector with 1 on the \( j\) -th entry and 0 on the other entries. Moreover,

\[ O_{i} \triangleq \big[ C_i^\top, \, (C_iA)^\top, \, \dots, \, (C_{i} A^{n-1})^\top \big]^\top \]

is the observability matrix of the system \( (A,C_i)\) . Since we focus on the observable system, the state observability index set \( {\mathcal{E}}_j\) is not empty, i.e. \( {\mathcal{E}}_j\neq \varnothing,\forall j\in{\mathcal{J}}\) . With Assumption 5, the following results characterize the structure of \( G_i[k]\) .

Lemma 1

Given the dynamics (10), if \( \text{rowspan}(G_i[0])=\text{rowspan}(O_i)\) , the following always holds \( \forall k\in{\mathbb{Z}}_{\geq 0}\) :

\[ \begin{align} \text{rowspan}(G_i[k])=\text{rowspan}(O_i)=\text{rowspan}(H_i), \end{align} \]

(12)

where \( H_i \triangleq {\mathrm{diag}} \left( {\mathbb{I}}_{{\mathcal{E}}_1}(i), \, {\mathbb{I}}_{{\mathcal{E}}_2}(i), \dots, \, {\mathbb{I}}_{{\mathcal{E}}_n}(i) \right)\) and \( \mathbb{I}_{\mathcal{E}}(i)\) is the indicator function that takes the value 1 when \( i \in {\mathcal{E}}\) and value 0 when \( i \notin {\mathcal{E}}\) . As a result, there exists an invertible matrix \( V_i[k]\) such that \( V_i[k] G_i[k]=H_i\) . \( \triangleleft \)

Lemma 2

Given the dynamics (7) and (10), if \( \sum_{i=1}^{m} G_i[0]=I\) , the following holds for all \( k\in{\mathbb{Z}}_{\geq 0}\) : \( \sum_{i=1}^{m} G_i[k]=I\) . \( \triangleleft \)

The proofs of Lemmas 1-2 are reported in the full version of this paper [25, Appendices A.5 & A.6]. The results presented in Lemmas 1-2 will be later utilized to design a state estimation fusion algorithm in the following subsection.

Remark 1

In the view of Lemmas 1-2, we initialize sequence \( G_i[k]\) as \( G_i[0] = {\mathrm{diag}} \big( {\mathbb{I}}_{{\mathcal{E}}_1}(i)/|{\mathcal{E}}_1|, \, {\mathbb{I}}_{{\mathcal{E}}_2}(i)/|{\mathcal{E}}_2|, …, \, {\mathbb{I}}_{{\mathcal{E}}_n}(i)/|{\mathcal{E}}_n|\big)\) . Recalling that we focus on observable systems and \( {\mathcal{E}}_i\neq\varnothing, \forall \, 1\leq i\leq n\) , the initialization is thus well-defined. Moreover, this initialization satisfies the assumptions in Lemmas 1-2, i.e., \( \sum_{i=1}^{m} G_i[0]=I\) and \( \text{rowspan}(G_i[0])=\text{rowspan}(O_i)\) . \( \triangleleft \)

3.4 Least-square state estimation fusion

Define the local residue as \( \epsilon_i[k]\triangleq\zeta_{i}[k]-G_i[k] x[k]\) and the global residue as \( \epsilon[k] \triangleq [\epsilon_1[k]^{\top}, …, \epsilon_m[k]^{\top}]^{\top}\) , which has a dynamics and a covariance matrix in the following lemma.

Lemma 3

For a fixed sensor \( i\) , the local residual \( \epsilon_i[k]\) satisfies the following dynamics:

\[ \begin{align} \epsilon_i[k+1]=\,&\Pi[k]\epsilon_i[k]-\Pi[k] G_i[k] A^{-1}[k] w[k] \notag \end{align} \]

(13)

\[ \begin{align} & +K_i[k+1] v_{i}[k+1]. \\\end{align} \]

(14)

Moreover, the covariance matrix of the global residue \( \epsilon[k]\) is computed as follows:

\[ \begin{equation} \rm{Cov}(\epsilon[k+1])=\boldsymbol{\Pi}[k] \rm{Cov}(\epsilon[k]) \boldsymbol{\Pi}^{\top}[k] +\boldsymbol{Q}[k], \end{equation} \]

(15)

where \( \boldsymbol{\Pi}[k]\triangleq I_m \otimes \Pi[k]\) and

\[ \begin{align*} &\boldsymbol{Q}[k]\triangleq \rm{Cov}\left(\Pi[k] G_i[k] A^{-1}[k] w[k]-K_i[k+1] v_{i}[k+1]\right) \\ &=\begin{bmatrix} \Pi[k]G_1[k]A^{-1}[k] \\ \vdots \\ \Pi[k]G_m[k]A^{-1}[k] \end{bmatrix} Q[k] \begin{bmatrix} \Pi[k] G_1[k]A^{-1}[k] \\ \vdots \\ \Pi[k] G_m[k]A^{-1}[k] \end{bmatrix}^{\top}\\ &~ +\begin{bmatrix} K_1[k+1] \\ \vdots \\ K_m[k+1] \end{bmatrix} \begin{bmatrix} K_1[k+1] \\ \vdots \\ K_m[k+1] \end{bmatrix}^{\top} \circ \left( R[k+1]\otimes \mathbf{1}_{n\times n} \right), \end{align*} \]

the notation \( \circ\) denotes the element-wise matrix multiplication, and \( \otimes\) denotes the Kronecker product. \( \triangleleft \)

The proof is report in [25, Appendix A.7]. The result of Lemma 3 shows that the \( \zeta_i[k]\) is the stable estimate of \( G_i[k]x[k]\) . The expression (15) enables us to consider the matrix sequence \( \boldsymbol{W}[k]\) that satisfies the following recursive equation

\[ \begin{equation} \boldsymbol{W}[k+1]=\boldsymbol{\Pi}[k] \boldsymbol{W}[k] \boldsymbol{\Pi}^{\top}[k] +\boldsymbol{Q}[k] . \end{equation} \]

(16)

The following lemma shows that \( \boldsymbol{W}[k]\) is non-singular.

Lemma 4

If Assumption 2 is satisfied and \( \boldsymbol{W}[k]\) is initialized to be a non-singular, i.e., \( \boldsymbol{W}[0] \succ 0\) , then there exists a positive constant scalar \( \overline{W}\) such that for all \( k\in{\mathbb{Z}}_{\geq 0}\) ,

\[ \begin{equation} 0 \prec \boldsymbol{W}[k] \preceq \overline{W}\cdot I , \end{equation} \]

(17)

where \( I\) is the identity matrix of size \( mn\times mn\) . \( \triangleleft \)

Proof

See Appendix 8.

The results of Lemmas 1 and 4 show the non-singularity of matrices \( V_i[k]\) and \( \boldsymbol{W}[k]\) , enabling us to propose a state estimation fusion that provides a state estimate \( x_{\text{ls}}[k]\) by solving the following least square problem:

\[ \begin{align} \underset{{x_{\text{ls}}}[k], \theta[k]}{\text{minimize}}&~ \frac{1}{2} \theta[k]^{\top} \boldsymbol{\tilde W}^{-1}[k] \theta[k] \end{align} \]

(18.a)

\[ \begin{align} \text { subject to}&~ \boldsymbol{V}[k] \boldsymbol{\zeta} [k]= \boldsymbol{H} x_{\text{ls}}[k] + \theta[k] \end{align} \]

(18.b)

where \( \boldsymbol{\zeta}[k] \triangleq \big[ \zeta_1^\top[k],\,\zeta_2^\top[k],\dots,\,\zeta_m^\top[k] \big]^\top,   \boldsymbol{H} \triangleq \big[ H_1^\top,\,H_2^\top,\dots,\,H_m^\top \big]^\top,   \tilde{\boldsymbol{W}}[k] \triangleq \boldsymbol{V}[k] \boldsymbol{W}[k] \boldsymbol{V}^\top[k],  \boldsymbol{V}[k] \triangleq \text{blkdiag}(V_1[k],\,V_2[k],\dots,\,V_m[k])\) , and blkdiag\( (\cdot)\) stands for a block diagonal matrix. Note that \( \zeta_i[k]\) is defined in (8) while matrices \( V_i[k]\) and \( H_i\) are defined in Lemma 1. The following theorem shows that the minimizer \( x_{\text{ls}}[k]\) of (18) can exactly recover the Kalman state estimate \( \hat{x}[k]\) based on local estimators \( \zeta_{i}[k]\) .

Theorem 1

Suppose that \( x_{\text{ls}}[k]\) is the solution to the problem (18) and there exists a strictly positive definite Hermitian matrix \( \boldsymbol{W}[0]\) . Then, the solution \( x_{\text{ls}}[k]\) equals to the asynchronous sampled-data Kalman state estimate \( \hat{x}[k]\) defined in (6.c), i.e., \( x_{\text{ls}}[k]=\hat{x}[k]\) . \( \triangleleft \)

Proof

See Appendix 9.

Remark 2

Instead of directly computing the state estimate in (9), we solve the least square problem (18) to obtain the state estimate, which has the same result, as proven in Theorem 1. Although the least square (18) is more complex, it has a decentralized form and its improved version is secure against spatio-temporal attacks, as will be introduced in the next section. \( \triangleleft \)

4 Secure State Estimator

In this section, we propose a secure state estimation algorithm against \( p\) -sparse spatio-temporal false data attacks introduced in Definition 1. Prior to the algorithm, we present an analysis of spatio-temporal attacks in the following subsection.

4.1 Attack analysis

In this subsection, we carry out an analysis of spatio-temporal attacks to show how malicious activities impact state estimates.

False-data injection: this attack remains correct time-stamps, but manipulates measurements. More specifically, at sampling-time \( k\) , one can formulate the false-data injection as follows:

\[ \begin{align} y_i^a[k] \triangleq y_i[k] + a_i[k], ~\text{if}~ \phi_i[k] = 1 ~\text{and}~i \in {\mathcal{C}}, \\\end{align} \]

(19)

where \( y_i^a[k]\) is the attacked measurement, \( y_i[k]\) is the correct measurement, and \( a_i[k]\) is the attack signal. The correct time-stamp guarantees the correctness of \( \Pi[k-1]\) in (8). As a consequence, the impact of the false data injected into the measurement can be described in the local estimator as follows:

\[ \begin{align} \zeta_i[k] \triangleq \zeta_i^o[k] + \zeta_i^f[k], \end{align} \]

(20)

where \( \zeta_i^o[k]\) is the oracle local estimator computed by (8) and \( \zeta_i^f[k] \triangleq {\mathbb{I}}_{{\mathbb{Z}}_{>0}}(k) \sum_{\ell=0}^{k-1} \big( \prod_{p = 0}^{k-1-\ell} \Pi[k-1-p] \big) K_i[\ell]a_i[\ell] + K_i[k] a_i[k]\) is the malicious impact. Denote \( \boldsymbol{\zeta}^o[k] \triangleq \big[ \zeta_1^{o\top}[k],…,\zeta_m^{o\top}[k] \big]^\top\) .

Time-stamp manipulation: this attack remains the correct measurement, but manipulates the time-stamp from the correct time-stamp \( t\) to the attacked time-stamp \( t^a (t^a \neq t)\) . Although the measurement \( y_i(t)\) remains unchanged, the time-stamp manipulation consequently forces the estimator to treat \( y_i(t)\) at the attacked time-stamp \( t^a\) . As a consequence, there is a mismatch of the measurement at time-stamp \( t^a\) , which is \( y_i(t) - y_i(t^a)\) . One can formulate the measurement at time \( t^a\) received by the estimator as follows: \( y_i(t^a) = y_i(t^a) + \big( y_i(t) - y_i(t^a) \big),  \text{if} i \in {\mathcal{C}}\) . This formulation enables us to convert the time-stamp manipulation at time \( t\) into the false-data manipulation at time \( t^a\) . Therefore, the malicious impact can be described in the local estimator as shown in (20).

Denial-of-service: this attack strategy, motivated by jamming attacks such as [26], can be viewed by the time-stamp manipulation where the attacked time-stamp \( t^a\) is set at infinity.

False-data generation: this attack strategy can be described as the combination of false-data injection and time-stamp manipulation. As a result, the malicious impact of the false-data generation can also be described in the local estimator (20).

In summary, the malicious impact of spatio-temporal attacks can be formulated as the false data injected into the local estimators of the corrupted sensors in (20). This formulation enables us to design the secure fusion in the following.

4.2 Secure fusion

In light of the previous analysis, the malicious impact of the attacks can be isolated at separate local estimators that correspond to corrupted sensors. This observation enables us to improve the least square problem (18) in the following secure fusion where its minimizer \( \check x[k]\) is a secure state estimate:

\[ \begin{align} \underset{{\check{x}}[k], \, \mu[k], \, \vartheta[k]}{\text{minimize}}&~ \frac{1}{2} \mu[k]^{\top} \, \tilde{\boldsymbol{W}}^{-1}[k] \, \mu[k] + \gamma \left\lVert\vartheta[k]\right\rVert_1 \\ \text { subject to}&~ \boldsymbol{V}[k]\boldsymbol{\zeta}[k]= \boldsymbol{H} \check{x}[k]+\mu[k] + \vartheta[k]. \\\end{align} \]

(21.a)

In the remainder of this section, we analyze the minimizer \( \check x[k]\) without and with spatio-temporal attacks. The analysis will take the solution to (18) in the absence of attacks as ground truth, i.e., the solution \( (x_\text{ls}[k],\,\theta[k])\) obtained by solving (18) with \( \boldsymbol{\zeta}[k] = \boldsymbol{\zeta}^o[k]\) .

Recall the least square optimization problem (18), its minimizer \( \theta[k]\) (see Appendix 9) can be computed by the following: \( \theta[k] = \big[ I - \boldsymbol{G}[k] \big( \bf{1}_m^\top \otimes I \big) \big] \boldsymbol{\zeta}[k]\) , which enables us to evaluate the solution to the problem (21) in the absence of the attacks in the next theorem.

Theorem 2

Consider the least square problems (18) and (21) with a given \( \gamma > 0\) , let \( (x_{\text{ls}}[k]\) , \( \theta[k])\) be the minimizer for the problem (18) and \( (\check{x}[k]\) , \( \mu[k]\) , \( \vartheta[k])\) be the minimizer for the problem (21). In the absence of the attacks, if the following condition holds

\[ \begin{align} \gamma > \| \tilde{\boldsymbol{W}}^{-1}[k] \theta[k] \|_{{\infty}}, \end{align} \]

(22)

then \( {\check{x}}[k]=x_{\text{ls}}[k]\) , \( \mu[k] = \theta[k]\) , and \( \vartheta[k] = 0\) . \( \triangleleft \)

Proof

See Appendix 10.

Let us make use of the following definition of a function that will help us in evaluating the minimizer \( \check x[k]\) of (21) against spatio-temporal attacks in the subsequent theorem.

Definition 2

Given an \( n\) -dimensional vector \( x \in {\mathbb{R}}^n\) and a positive integer \( a\) , we define a function \( h_a: {\mathbb{R}}^n \rightarrow {\mathbb{R}}\) such that \( h_a(x)\) takes the \( a\) -th largest value of the vector \( x\) .

Theorem 3 (Secure fusion)

Consider the least square problems (18) and (21) with a given \( \gamma > 0\) , let \( (x_{\text{ls}}[k], \, \theta[k])\) be the minimizer for the problem (18) in the absence of attacks and \( (\check x[k], \, \mu[k], \, \vartheta[k])\) be the minimizer for the problem (21) in the presence of attacks. In the presence of attacks, the error between \( x_{\text{ls}}[k]\) and \( \check x[k]\) has the following upper bound:

\[ \begin{align} \big \lvert \big[ \check x[k] \big]_j - \big[ x_{\text{ls}}[k] \big]_j \big \rvert \leq &\max \big \{ \big \lvert h_c \big( \eta^j[k] \big) \big \rvert ,~ \big \lvert -h_c \big( -\eta^j[k] \big) \big \rvert \big \}, \notag \\ & \forall \, j \in J, \end{align} \]

(23)

where the function \( h_c(\cdot)\) is defined in Definition 2, \( \eta^j[k]\) is a \( \lvert {\mathcal{E}}_j \setminus {\mathcal{C}} \rvert\) -dimensional vector where its \( i\) -th element \( [\eta^j[k]]_i \triangleq [\theta_i[k]]_j + \gamma \, \boldsymbol{e}_{n(i-1)+j}^\top \tilde{\boldsymbol{W}}[k] \check \vartheta[k] (\forall \, i \in {\mathcal{E}}_j \setminus {\mathcal{C}})\) , with

\[ \begin{align} \check \vartheta[k] \in \partial \lVert \boldsymbol{V}[k] \boldsymbol{\zeta}^f[k] - \vartheta[k] \big \rVert_1c \triangleq \big \lceil \frac{\lvert {\mathcal{E}}_j \setminus {\mathcal{C}} \rvert - \lvert {\mathcal{E}}_j \bigcap {\mathcal{C}} \rvert}{2} \big \rceil. \tag*{\( \triangleleft \)} \\\end{align} \]

(24)

Proof

See Appendix 11.

It is worth noting that the vectors \( \eta^j[k]\) in Theorem 3 are independent of information provided by attacked sensors for all \( j \in {\mathcal{J}}\) by definition and \( \check \vartheta[k]\) is bounded in a range \( [-1,1]\) . Consequently, the result of Theorem 3 shows us that the upper bound of the estimation error under spatio-temporal attacks, which is \( \big \lvert \big[ \check x[k] \big]_j - x[k] \big]_j \big \rvert \leq \big \lvert \big[ \check x[k] \big]_j - \big[ x_{\text{ls}}[k] \big]_j \big \rvert + \big \lvert \big[ x_{\text{ls}}[k] \big]_j - \big[ x[k] \big]_j \big \rvert\) , is independent of the malicious activities for all \( j \in {\mathcal{J}}\) . Thus, the secure state estimate \( \check x[k]\) is resilient to such attacks, satisfying uniform error bound (5).

5 Simulation Results

To validate the obtained results, the proposed secure state estimation algorithm (21) is implemented in the IEEE 14-bus system [27], which contains 28 state variables (a phase angle and an angular frequency variables for each bus) and 42 sensors (an electric power, a phase angle, and an angular frequency sensors for each bus). The code for the simulation can be found at By levering the structure of the block diagonal \( \boldsymbol{V}[k]\) and the asynchronous sampling, the elements of \( \boldsymbol{V}[k] \boldsymbol{\zeta}[k]\) in (21), which correspond to off-sampling sensors, are true since they are computed based on system modeling. Consequently, we can set elements of \( \vartheta[k]\) in (21), which correspond to those true values, are zero in the implementation. In the following, we validate the results obtained in Theorems 1-3.

In the first scenario, we conduct the state estimation using KF, the proposed least square (18), and the proposed secure least square (21) with two different values of \( \gamma\) , i.e., \( \gamma = 2\) and \( \gamma = 400\) , in the absence of attacks. The estimation errors of the three methods are shown in Fig. 3. No noticeable difference is witnessed among the three methods, validating the results of Theorems 1-2.

The estimation error comparison among using the sampled-data KF (eq:asy_kalman) and the least square problem (pb:least_square), and the least square problem (pb:least_square_secure) with two different values of ) in the absence of the attack. No vividly observable difference is witnessed among the state estimates provided by KF, (pb:least_square), and (pb:least_square_secure) with = 400) , which validates the results of Theorems&amp;#160;th:least_square and th:LS_noattack.
Figure 3. The estimation error comparison among using the sampled-data KF (6) and the least square problem (18), and the least square problem (21) with two different values of \( \gamma\) in the absence of the attack. No vividly observable difference is witnessed among the state estimates provided by KF, (18), and (21) with \( \gamma = 400\) , which validates the results of Theorems 1 and 2.

It remains to validate the result of Theorem 3. In the second scenario, we conduct spatio-temporal attacks: false data injection on the phase angle sensor of bus \( 3\) , time-stamp manipulation on the power sensor of bus \( 5\) , DoS on the angular frequency sensor of bus \( 4\) , and false data generation on the power sensor of bus \( 2\) (see Fig. 4). The state estimates provided by the sampled-data KF (6) without attacks and the secure least square problem (21) with \( \gamma =2\) under attacks are illustrated in Fig. 5. A clearly observable difference between the estimation errors is witnessed in Fig. 6. While the state estimate provided by the secure least square problem (21) is resilient to the attacks, that provided by the sampled-data KF exhibits a very large error. This illustration shows the effectiveness of our proposed secure state estimation algorithm.

The spatio-temporal attacks are launched on sensors of buses 2, 3, 4, and 5 where false data injection on the phase angle sensor of bus 3, time-stamp manipulation on the power sensor of bus 5, denial-of-service on the angular frequency sensor of bus 4, and fake data generation on the power sensor of bus 2.
Figure 4. The spatio-temporal attacks are launched on sensors of buses 2, 3, 4, and 5 where false data injection on the phase angle sensor of bus 3, time-stamp manipulation on the power sensor of bus 5, denial-of-service on the angular frequency sensor of bus 4, and fake data generation on the power sensor of bus 2.
The horizontal axes represent time in seconds. The least-square problem (pb:least_square_secure) provides a resilient state estimate against the attacks while the KF fails to provide a resilient state estimate.
Figure 5. The horizontal axes represent time in seconds. The least-square problem (21) provides a resilient state estimate against the attacks while the KF fails to provide a resilient state estimate.
The estimation error comparison between using the KF (eq:asy_kalman) and the secure least square problem (pb:least_square_secure). 
 The estimation error of the secure least square problem (pb:least_square_secure) is unaffected by the attacks and close to the oracle KF without attacks, validating Theorem&amp;#160;th:secure_fusion.
Figure 6. The estimation error comparison between using the KF (6) and the secure least square problem (21). The estimation error of the secure least square problem (21) is unaffected by the attacks and close to the oracle KF without attacks, validating Theorem 3.

6 Conclusion

This paper presents a secure state estimation algorithm for continuous LTI systems with non-periodic and asynchronous measurements under spatio-temporal false data attacks. The secure state estimation is developed based on the decomposition of the sampled-data KF to provide the state estimate which is exactly the same as the one provided by the sampled-data KF in the absence of attacks and resilient to spatio-temporal false data attacks. The effectiveness of the proposed secure state estimation is validated through an IEEE benchmark for power systems.

Appendix

8 Proof of Lemma 4

Before showing the proof of Lemma 4, we present the following supporting results. Their proofs can be found in [25].

Lemma 5

Denote sub-blocks \( \boldsymbol{W}_{i j}[k] \in \mathbb{Rb}^{n \times n}\) where \( \boldsymbol{W}[k]=\left(\boldsymbol{W}_{i j}[k]\right)_{m \times m}\) . For all sensor index \( i\in{\mathcal{I}}\) and arbitrary time \( k\in{\mathbb{Z}}_{\geq 0}\) , we have that \( \sum_{j=1}^{m} \boldsymbol{W}_{i j}[k]=P[k] G_i^{\top}[k]\) . \( \triangleleft \)

Proposition 1 (Stability of Asynchronous KF [16])

Suppose that Assumptions 1 and 2 hold. The estimation covariance \( P(t)\) of the sampled-data KF defined in (6) satisfies the following properties:

\[ \begin{equation} \underline{p} I \preceq P(t)\preceq\overline{p} I, \, \forall \, t\geq0 , \end{equation} \]

(25)

where \( \underline{p},\,\overline{p}\) are constant scalars regardless to the sampling times. \( \triangleleft \)

Proof of Lemma 4: We first prove the upper bound. Based on Lemma 5, we have \( \sum_{j=1}^{m}\boldsymbol{W}_{ij}[k]=P[k]G^{\top}_i[k]\) for all \( k\in{\mathbb{Z}}_{\geq 0}\) . Summing both sides over \( i\) and recalling that \( \sum_{i=1}^{m}G_i[k]=I\) from Lemma 2, one obtains \( \sum_{i=1}^{m}\sum_{j=1}^{m}\boldsymbol{W}_{ij}[k]=P[k]\) , where \( P[k]\) is the estimation covariance of asynchronous Kalman estimator defined in (6.b). On the other hand, the result of Proposition 1 can yield \( \underline{\alpha}\cdot I \preceq P[k] \preceq \overline{\alpha}\cdot I\) , resulting in that for each index \( i\) , the diagonal block satisfy \( \boldsymbol{W}_{ii}[k]\preceq \overline{\alpha} I\) considering that every block \( \boldsymbol{W}_{ij}[k]\) is semi-positive definite. As a result, there exists a constant \( \overline{W}\) such that \( \boldsymbol{W}[k]\preceq \overline{W}\cdot I\) holds for all time index \( k\) . \(\square\)

9 Proof of Theorem 1

Firstly, since \( \boldsymbol{V}[k]\) is non-singular based on Lemma 1, we multiply both sides of (18.b) with \( \boldsymbol{V}^{-1}[k]\) . After using the notations \( \boldsymbol{G}[k] \triangleq \big[ G_1^\top[k],\,G_2^\top[k],…,\,G_m^\top[k] \big]^\top\) and \( \hat \theta[k] = \boldsymbol{V}^{-1}[k] \theta[k]\) , one obtains the following least square problem, equivalent to (18):

\[ \begin{align} \underset{{x_{\text{ls}}}[k], \hat \theta[k]}{\text{minimize}}&~ \frac{1}{2} \hat \theta[k]^{\top} \boldsymbol{W}^{-1}[k] \hat \theta[k] \\ \text { subject to}&~ \boldsymbol{\zeta} [k]= \boldsymbol{G}[k] x_{\text{ls}}[k]+ \hat \theta[k] . \\\end{align} \]

(26.a)

Secondly, we prove that if the initial value of \( \boldsymbol{W}[k]\) is Hermitian and strictly positive definite and satisfies \( \sum_{j=1}^{m} \boldsymbol{W}_{ij}[0]=\Sigma\cdot G_i^{\top}[0]\) , for all \( i\in{\mathcal{I}}\) , then Theorem 1 holds. This initialization \( \boldsymbol{W}[0]\) and Lemma 5 imply that the following holds for all \( k\in{\mathbb{Z}}_{\geq 0}\) :

\[ \begin{equation} \begin{bmatrix} I & \cdots & I \end{bmatrix} \boldsymbol{W}[k]=P[k]\begin{bmatrix} G_{1}^{\top}[k] & \cdots & G_{m}^{\top}[k] \end{bmatrix}, \end{equation} \]

(27)

which resulting in

\[ \boldsymbol{G}^{\top}[k]\boldsymbol{W}^{-1}[k]\boldsymbol{G}[k]=P^{-1}[k]\begin{bmatrix} I & \cdots & I \end{bmatrix}\boldsymbol{G}^{\top}[k]. \]

On the other hand, the solution to (26) is given by

\[ \begin{align*} x_{\text{ls}}[k]=\left(\boldsymbol{G}^{\top}[k]\boldsymbol{W}^{-1}[k]\boldsymbol{G}[k]\right)^{-1}\boldsymbol{G}^{\top}[k]\boldsymbol{W}^{-1}[k]\boldsymbol{\zeta}[k]. \end{align*} \]

Since \( \sum_{i=1}^{m}G_i[k]=I\) from Lemma 2, we finally concludes that

\[ \begin{align*} x_{\text{ls}}[k]=P[k]\boldsymbol{G}^{\top}[k] \boldsymbol{W}^{-1}[k]\boldsymbol{\zeta}[k]= \begin{bmatrix} I& \cdots& I \end{bmatrix}\boldsymbol{\zeta}[k]=\hat{x}[k], \end{align*} \]

where the second equality comes from (27) and the third equality comes from (9). Finally, the existence of \( \boldsymbol{W}[0]\) is shown in [25, Appendix A.9]. \(\square\)

10 Proof of Theorem 2

Let us introduce two new variables \( \alpha[k]\) and \( \beta[k]\) as the deviations between the two solutions to the problems (18) and (21) such that \( \alpha[k] \triangleq \check{x}[k] - x_{\text{ls}}[k]\) and \( \beta[k] \triangleq \mu[k] - \theta[k]\) . The proof will be completed if we show that \( \alpha[k] = 0\) and \( \beta[k] = 0\) in the absence of the attacks. It is worth noting that the absence of the attacks implies the same \( \boldsymbol{\zeta}[k]\) in (18) and (21), resulting in \( \boldsymbol{H} \alpha[k] + \beta[k] + \vartheta[k] = 0\) . As a result of utilizing the new deviation variables \( \alpha[k]\) and \( \beta[k]\) , solving (21) is equivalent to solving the following problem:

\[ \begin{align} \underset{{\alpha}[k], \beta[k], \vartheta[k]}{\text{minimize}}& \frac{1}{2} \beta[k]^\top \tilde{\boldsymbol{W}}^{-1} [k]\beta[k] + \theta[k]^\top \tilde{\boldsymbol{W}}^{-1}[k] \beta[k] + \gamma \left\lVert\vartheta[k]\right\rVert_1 \notag \\ \text{subject to}~&~ \boldsymbol{H} \alpha[k] + \beta[k] + \vartheta[k] = 0. \end{align} \]

(28)

Let us consider the second term of the objective function (28) which can be rewritten based on its constraint as follows:

\[ \begin{align} \theta[k]^\top \tilde{\boldsymbol{W}}^{-1}[k] \beta[k] = - \theta[k]^\top \tilde{\boldsymbol{W}}^{-1}[k] \vartheta[k], \end{align} \]

(29)

where the equality comes from the fact that \( \theta[k]^\top \tilde{\boldsymbol{W}}^{-1}[k] \boldsymbol{H} = 0\) based on the KKT condition of the problem (18).

On the other hand, the condition (22) implies the following property for an arbitrary vector \( \vartheta[k]\) :

\[ \begin{align} \gamma \left\lVert\vartheta[k]\right\rVert_1 \geq \theta[k]^\top \tilde{\boldsymbol{W}}^{-1}[k] \vartheta[k], \\\end{align} \]

(30)

where the equality occurs if, and only if, \( \vartheta[k] = 0\) . This result together with (29) implies that the minimum value of the objective (28) is zero if, and only if, \( \tilde{\boldsymbol{W}}^{-1} [k] \beta[k] =0\) and \( \vartheta[k] = 0\) . The empty null space of \( \tilde{\boldsymbol{W}}^{-1} [k]\) gives us \( \beta[k] = 0\) . As a consequence, the constraint (28) results in \( \alpha[k] = 0\) since the matrix \( \boldsymbol{H}\) has an empty null space. The proof is completed. \(\square\)

11 Proof of Theorem 3

Before going to the proof of Theorem 3, let us introduce a support result in the following lemma.

Lemma 6

Given a scalar variable \( x\) , let us consider the following function: \( f(x) = \sum_{i = 1}^a \, \lvert x + \omega_i \rvert + \sum_{j = 1}^b \, \lvert x + \nu_j \rvert\) , where \( a\) and \( b\) are given positive integers; \( \omega_i\) and \( \nu_j\) are given real numbers for all \( 1 \leq i \leq a\) and \( 1 \leq j \leq b\) . We denote \( c \triangleq \left \lceil{\frac{b-a}{2}}\right \rceil\) and \( \nu \triangleq \big[ \nu_1, \, \nu_2, \, …, \nu_b \big]^\top\) . Suppose that the minimum value of \( f(x)\) occurs at the optimal solution \( x^\star\) . If \( b \geq a + 1\) , then the upper bound of \( x^\star\) only depends on the value of \( \nu\) in the following: \( \lvert x^\star \rvert \leq \max \big \{ \lvert h_c(\nu) \rvert, \, \lvert h_c(-\nu) \rvert \big \}\) , where \( \max\{y,\,z\}\) takes the greater value between \( y\) and \( z\) . \( \triangleleft \)

Proof of Theorem 3: Recall the analysis in Section 4.1 and (20), let us consider the problem (18) with the oracle local estimator \( \boldsymbol{\zeta}^o[k]\) . Note that the fusion does not know the oracle value of \( \boldsymbol{\zeta}^o[k]\) to find the optimal state estimate \( x_{\text{ls}}[k]\) . However, this optimal solution \( (x_{\text{ls}}[k],\, \theta[k])\) can be utilized as a ground truth. On the other hand, we consider the problem (21) in the presence of the attacks, i.e., the corrupted local estimator \( \boldsymbol{\zeta}[k] \neq \boldsymbol{\zeta}^o[k]\) where \( \zeta_i[k]\) is defined in (20).

Let us reuse the two deviation variables \( \alpha[k]\) and \( \beta[k]\) in Appendix 10 such that \( \alpha[k] \triangleq \check{x}[k] - x_{\text{ls}}[k]\) and \( \beta[k] \triangleq \mu[k] - \theta[k]\) . Next, we plan to show that \( \left\lVert\alpha[k]\right\rVert\) lies in a small ball and is independent of the malicious activities. The constraint of (21) in the presence of attacks and the constraint of (18) in the absence of attacks give us the following relationship: \( \beta[k] = \boldsymbol{V}[k] \boldsymbol{\zeta}^f[k] - \boldsymbol{H} \alpha[k] - \vartheta[k]\) . As a consequence, solving (21) in the presence of attacks is equivalent to solving the following problem:

\[ \begin{align} \underset{{\alpha}[k], \beta[k], \vartheta[k]}{\text{minimize}}& \frac{1}{2} \beta[k]^\top \tilde{\boldsymbol{W}}^{-1} [k]\beta[k] + \theta[k]^\top \tilde{\boldsymbol{W}}^{-1}[k] \beta[k] + \gamma \left\lVert \vartheta[k]\right\rVert_1 \notag \\ \text{subject to}~&~ \beta[k] = \boldsymbol{V}[k] \boldsymbol{\zeta}^f[k] - \boldsymbol{H} \alpha[k] - \vartheta[k]. \end{align} \]

(31)

Let us denote \( \hat \vartheta[k] \triangleq \boldsymbol{V}[k] \boldsymbol{\zeta}^f[k] - \vartheta[k]\) and \( \check \vartheta[k] \in \partial\big \lVert \hat \vartheta[k] \big \rVert_1\) , i.e., the sub-gradient with respect to \( \vartheta[k]\) . It is worth noting that the \( i\) -th element of the sub-gradient \( \check \vartheta[k]\) takes a value between \( -1\) and \( 1\) . Since \( \boldsymbol{V}[k]\) is a block diagonal matrix, we have the following property: \( \boldsymbol{V}_i[k] \boldsymbol{\zeta}^f_i[k] \neq 0\) when \( i \in {\mathcal{C}}\) and \( \boldsymbol{V}_i[k] \boldsymbol{\zeta}^f_i[k] = 0\) otherwise.

With the help of the KKT condition of (18), which is \( \theta[k]^\top \tilde{\boldsymbol{W}}^{-1}[k] \boldsymbol{H} = 0\) , the optimization problem (31) can be solved by considering the following optimization problem:

\[ \begin{align} \underset{\alpha[k],\, \hat \vartheta[k]}{\text{minimize}}~ L(\alpha[k],\,\hat \vartheta[k]), \end{align} \]

(32)

where

\[ \begin{align} & L(\alpha[k],\,\hat \vartheta[k]) \triangleq \theta[k]^\top \tilde{\boldsymbol{W}}^{-1}[k] \hat \vartheta[k] + \gamma \left\lVert\boldsymbol{V}[k] \boldsymbol{\zeta}^f[k] - \hat \vartheta[k]\right\rVert_1 \notag \\ & + \frac{1}{2} \bigg( \hat \vartheta[k] - \boldsymbol{H} \alpha[k] \bigg)^\top \tilde{\boldsymbol{W}}^{-1}[k] \bigg( \hat \vartheta[k] - \boldsymbol{H} \alpha[k] \bigg) \end{align} \]

(33)

Let us denote \( (\hat \vartheta^\star[k],\,\alpha^\star[k])\) as the solution to (32), which satisfies

\[ \begin{align} &\frac{\partial L(\alpha[k],\,\hat \vartheta[k])}{\partial \hat \vartheta[k]} (\hat \vartheta^\star[k],\,\alpha^\star[k]) = \hat \vartheta^\star[k] - \boldsymbol{H} \alpha^\star[k] \notag \\ & + \theta[k] + \gamma \tilde{\boldsymbol{W}}[k] \check \vartheta[k] = 0. \end{align} \]

(34)

Then, substituting (34) into (33) and leveraging \( \theta[k]^\top \tilde{\boldsymbol{W}}^{-1}[k] \boldsymbol{H} = 0\) , which is the KKT condition of (18), give us the following:

\[ \begin{align} &L(\hat \vartheta^\star[k],\,\alpha^\star[k]) = -\frac{1}{2}\theta^\top[k] \tilde{\boldsymbol{W}}^{-1}[k] \theta[k] + \frac{1}{2} \gamma^2 \check \vartheta^\top[k] \tilde{\boldsymbol{W}}[k] \check \vartheta[k] \notag \\ &+ \gamma \sum_{i \, \in \, {\mathcal{C}}} ~ \sum_{j \in {\mathcal{J}}} \bigg \lvert \big[ V_i[k]\zeta^f_i[k] + \theta_i[k] \big]_j - \big[ H_i \alpha^\star[k] \big]_j \notag \\ & + \gamma \, \boldsymbol{e}_{n(i-1)+j}^\top \tilde{\boldsymbol{W}}[k] \check \vartheta[k] \bigg \rvert + \gamma \sum_{i \, \in \, {\mathcal{I}} \setminus {\mathcal{C}}} ~ \sum_{j \in {\mathcal{J}}} \bigg \lvert [\theta_i[k]]_j \notag \\ & + \gamma \, \boldsymbol{e}_{n(i-1)+j}^\top \tilde{\boldsymbol{W}}[k] \check \vartheta[k] - \big[ H_i \alpha^\star[k] \big]_j \bigg \rvert. \\\end{align} \]

(35)

For the state with index \( j\) , let us recall the index set of sensors that observe state \( j\) , which was denoted as \( {\mathcal{E}}_j\) in (11), and the structure of the matrix \( H_i\) in Lemma 1, resulting in

\[ \begin{align} \big[ H_i \alpha^\star[k] \big]_j = \left\{ \begin{array}{l} [\alpha^\star[k]]_j, ~~ \text{if}~ i \, \in \, {\mathcal{E}}_j, \\ 0,~~ \text{otherwise}, \end{array}\right. \\\end{align} \]

(36)

where \( [\alpha^\star[k]]_j\) is the \( j\) -th element of \( \alpha^\star[k]\) . In the following, we consider the function \( L_j(\hat \vartheta^\star[k],\,\alpha^\star[k])\) that is a collection of terms containing \( [\alpha^\star[k]]_j\) in \( L(\hat \vartheta^\star[k],\,\alpha^\star[k])\) as follows:

\[ \begin{align} &L_j(\hat \vartheta^\star[k],\,\alpha^\star[k]) = \sum_{i \, \in \, {\mathcal{E}}_j \bigcap {\mathcal{C}}} \, \bigg \lvert [ V_i[k] \zeta^f_i[k] + \theta_i[k] ]_j - [\alpha^\star[k]]_j \notag \\ & + \gamma \, \boldsymbol{e}_{n(i-1)+j}^\top \tilde{\boldsymbol{W}}[k] \check \vartheta[k] \bigg \rvert + \sum_{i \, \in \, {\mathcal{E}}_j \setminus {\mathcal{C}}} \, \bigg \lvert [\theta_i[k]]_j \notag \\ & + \gamma \, \boldsymbol{e}_{n(i-1)+j}^\top \tilde{\boldsymbol{W}}[k] \check \vartheta[k] - [\alpha^\star[k]]_j \bigg \rvert. \end{align} \]

(37)

Due to the fact that the system is \( 2p\) -observable, one has \( 2 \lvert {\mathcal{E}}_j \bigcap {\mathcal{C}} \rvert \leq 2 \lvert {\mathcal{C}} \rvert \leq 2p < \lvert {\mathcal{E}}_j \rvert\) , resulting in \( \lvert {\mathcal{E}}_j \bigcap {\mathcal{C}} \rvert < \lvert {\mathcal{E}}_j \setminus {\mathcal{C}} \rvert\) . This result implies that the number of \( [\alpha^\star[k]]_j\) in the first term of (37) is less than that of \( [\alpha^\star[k]]_j\) in the second term of (37). This observation enables us to apply the result of Lemma 6 to (37) together with the definition \( [\alpha^\star[k]]_j = \big[ \check x[k] \big]_j - \big[ x_{\text{ls}}[k] \big]_j\) , resulting in (23). The proof is completed. \(\square\)

12 Proof of Lemma 1

The second equality of (12) holds by the definition of the observability matrix \( O_i\) and \( H_i\) . By induction method, we show the first equality of (12). Let us assume \( \text{rowspan}(G_i[k])= \text{rowspan}(O_i)\) . We need to show that \( \text{rowspan}(G_i[k+1])= \text{rowspan}(O_i)\) .

According to Assumption 5, one obtains

\[ \text{rowspan}(G_i[k]A^{-1}[k])= \text{rowspan}(O_iA^{-1}[k])=\text{rowspan}(O_i) \]

and \( \text{rowspan}(\Pi[k]G_i[k]A^{-1}[k])= \text{rowspan}(O_i)\) . Moreover, since \( \text{rowspan}(K_i[k+1]C_i)\subseteq \text{rowspan}(O_i)\) and one obtains that \( \text{rowspan}(G_i[k+1]) \subseteq \text{rowspan}(O_i)\) .

If \( ((A[k]-K[k+1]CA[k])G_i[k] A^{-1}[k] +K_i[k+1]C_i )^\top \boldsymbol{e}_j = 0\) , we alter \( K_i[k+1]\) slightly so that the equation does not hold while the performance of the estimator is not influenced. As a result, \( \text{rowspan}((A[k]-K[k+1]CA[k])G_i[k] A^{-1}[k] +K_i[k+1]C_i)=\text{rowspan}(G_i[k+1])\) and the proof is completed. \(\square\)

13 Proof of Lemma 2

The proof is presented by the induction. Assume that \( \sum_{i=1}^{m} G_i[k]=I\) and we show that \( \sum_{i=1}^{m} G_i[k+1]=I\) :

\[ \begin{align*} \sum_{i=1}^{m} G_i[k+1] =&\sum_{i=1}^{m} \Pi[k] G_i[k] A^{-1}[k]+K_i[k+1]C_i[k+1]\\ =& \, \Pi[k]A^{-1}[k]+K[k+1]C = I, \end{align*} \]

where the second equality comes from the assumption that \( \sum_{i=1}^{m} G_i[k]=I\) and the last equality comes from the definition of \( \Pi[k]\) in (7). \(\square\)

14 Proof of Lemma 3

According to the definition of \( \epsilon_i[k]\) , we have

\[ \begin{align*} &\epsilon_{i}[k+1] = \zeta_{i}[k+1]-G_{i}[k+1] x[k+1] \\ =\,& \Pi[k]\zeta_{i}[k] +K_i[k+1]\left(C_i A[k] x[k]+C_i w[k]+v_{i}[k+1]\right) \\ &-G_{i}[k+1] \left(A[k] x[k]+ w[k]\right)\\ =\,&\Pi[k] \zeta_{i}[k]- \left(G_{i}[k+1] A[k]-K_i[k+1] C_i A[k]\right) x[k] \\ &-\left(G_{i}[k+1]-K_i[k+1] C_i\right) w[k]+K_i[k+1] v_{i}[k+1] \\ =\,&\Pi[k] \left(\zeta_{i}[k]-G_{i}[k] x[k]\right) -\Pi[k] G_i[k] A^{-1}[k] w[k]\\ &+K_i[k+1] v_{i}[k+1], \end{align*} \]

where the last equality comes from (10). The proof is completed. \(\square\)

15 Proof of Lemma 5

According to (16), we know that \( \boldsymbol{W}_{i j}[k]\) satisfies:

\[ \begin{align*} \boldsymbol{W}_{i j}[k+1]= &\Pi[k] \boldsymbol{W}_{i j}[k] \Pi^{\top}[k]+ \\ &\Pi[k]G_i[k]A^{-1}[k] Q[k] \left(\Pi[k]G_j[k]A^{-1}[k]\right)^{\top}+ \\ &K_i[k+1]K_j^{\top}[k+1] \circ \left( R_{i j}[k+1]\otimes \mathbf{1}_{n\times n} \right), \end{align*} \]

where scalar \( R_{i j}[k+1]\) is the element of the matrix \( R[k+1]\) on \( i\) -th row and \( j\) -th column. On the other hand, since \( \sum_{i=0}^{m}G_i[k]=I\) is shown in Lemma 2, one finds that

\[ \begin{align} &\sum_{i=1}^{m} \boldsymbol{W}_{i j}[k+1] \notag \\ =&\Pi[k] \left(\sum_{i=1}^{m} \boldsymbol{W}_{i j}[k]\right) \Pi^{\top}[k] \notag\\ & +\left(I-K[k+1]C\right)Q[k]\left(\Pi[k]G_j[k]A^{-1}[k]\right)^{\top} \notag\\ & + K[k+1]R_j[k+1]K_j^{\top}[k+1]. \end{align} \]

(38)

In the following, we prove that \( P[k]G_j^{\top}[k]\) satisfies the same dynamics with \( \sum_{i=1}^{m} \boldsymbol{W}_{i j}[k]\) , where \( P[k]\) is defined in (6.b). According to (6), \( P[k]\) and \( K[k]\) satisfy the following:

\[ \begin{align} &P[k+1]=\left(I-K[k+1]C\right) \left(A[k]P[k]A^{\top}[k] +Q[k]\right), \notag \\ &K[k+1]R[k+1]=\Pi[k]P[k]A^{\top}[k]C^{\top}[k+1] \notag \\ &+\left(I-K[k+1]C\right)Q[k]C^{\top}[k+1]. \end{align} \]

(39)

Considering the dynamics of \( G_j[k]\) in (10) gives us the following:

\[ \begin{align} &P[k+1]G_j^{\top}[k+1] \notag \\ =&\Pi[k]P[k]A^{\top}[k] G_j^{\top}[k+1] +\left(I-K[k+1]C\right)Q[k]G_j^{\top}[k+1] \notag \\ =&\Pi[k]P[k] G_j^{\top}[k] \Pi^{\top}[k]+\Pi[k]P[k]A^{\top}[k] C_j^{\top}[k+1] K_j^{\top}[k+1] \notag \\ &+\left(I-K[k+1]C\right)Q[k]G_j^{\top}[k+1] \notag \\ =&\Pi[k]P[k] G_j^{\top}[k] \Pi^{\top}[k] \notag \\ &+\left(I-K[k+1]C\right)Q[k]\left(\Pi[k] G_j[k] A^{-1}[k]\right)^{\top} \notag \\ &+\left(\Pi[k]P[k]A^{\top}[k]+\left(I-K[k+1]C\right)Q[k]\right)\times \notag \\ & C_j^{\top}[k+1] K_j^{\top}[k+1]. \end{align} \]

(40)

From (38)-(40), one obtains \( \sum_{j=1}^{m} \boldsymbol{W}_{i j}[k]=P[k] G_i^{\top}[k]\) . \(\square\)

16 The construction of \( W[0]\)

Construct

\[ \begin{align*} \boldsymbol{W}[0]\triangleq \boldsymbol{D} \circ \left(\mathbf{1}_{m\times m}\otimes \Sigma\right) , \end{align*} \]

where

\[ \begin{align*} \boldsymbol{D}\triangleq \begin{bmatrix} \boldsymbol{D}_{11} & \boldsymbol{D}\boldsymbol{D}_{12} & \cdots & \boldsymbol{D}_{1m}\\ \boldsymbol{D}_{21} & \boldsymbol{D}_{22} & \cdots & \boldsymbol{D}_{1m}\\ \vdots & \vdots & \ddots & \vdots\\ \boldsymbol{D}_{m1} & \boldsymbol{D}_{m2} & \cdots & \boldsymbol{D}_{mm}\\ \end{bmatrix}. \end{align*} \]

One can verify that, if the following three constraints are satisfied, \( \boldsymbol{W}[0]\) is Hermitian, strictly positive definite and satisfies \( \sum_{j=1}^{m} \boldsymbol{W}_{ij}[0]=\Sigma\cdot G_i^{\top}[0]\) .

  1. \( \boldsymbol{D}=\boldsymbol{D}^\top\) ,
  2. \( \boldsymbol{D}\succ 0\) ,
  3. \( \sum_{j=1}^{m} \boldsymbol{D}_{ij}= G_i[0]\) for all \( i\in{\mathcal{I}}\) .

We design the blocks \( \boldsymbol{D}_{ij}\) to be the following diagonal matrices:

\[ \begin{align} \boldsymbol{D}_{ij}\triangleq \left\{ \begin{array}{l} -I_n, \text{ if } i\neq j, \\ G_i[0]+(m-1)\cdot I_n, \text{ if } i= j, \end{array}\right. \end{align} \]

(41)

where \( I_n\) represents an \( n\times n\) identity matrix.

By definition (41), the conditions (1) and (3) are satisfied. We proceed to prove that \( \boldsymbol{D}\) is positive definite. Denote \( \boldsymbol{D}^{[k]}_{ij}\) as the \( k\) -th diagonal element of \( \boldsymbol{D}_{ij}\) . We have that \( \boldsymbol{D}^{[k]}_{ii}\geq\sum_{j\neq i}\left| \boldsymbol{D}^{[k]}_{ij} \right|\) for all \( k\in{\mathcal{J}}\) since \( G_i[0]\) is non-negative diagonal matrix. According to Gershgorin circle theorem, \( \boldsymbol{D}\) is positive semi-definite.

We proceed to prove that \( \boldsymbol{D}\) is positive definite after elementary matrix operation. Since the system is observable, for each state index \( j\in{\mathcal{J}}\) , there exists a sensor \( i\) such that \( i\in{\mathcal{E}}_j\) . Denote such index \( i\) as \( \iota(j)\) . For each \( j\in{\mathcal{J}}\) , we do the following examination procedure. For all \( i\in{\mathcal{I}}\) , if \( i\notin {\mathcal{E}}_j\) , then multiply the \( 1/\boldsymbol{D}^{(j)}_{\iota(j)j}\) times of \( (\iota(j)-1)n+j\) -th row of \( \boldsymbol{D}\) on \( (i-1)n+j\) -th row of \( \boldsymbol{D}\) . After this elementary matrix operation, one can verify that every diagonal matrix of \( \boldsymbol{D}\) satisfies \( \boldsymbol{D}^{[k]}_{ii}>\sum_{j\neq i}\left| \boldsymbol{D}^{[k]}_{ij} \right|\) for all \( k\in{\mathcal{J}}\) . Therefore, \( \boldsymbol{D}\) is positive definite according to the fact that matrix rank does not degrade after an elementary matrix operation. \(\square\)

References

[1] Nicolas Falliere and Liam O Murchu and Eric Chien W32. stuxnet dossier White paper, symantec corp., security response 2011 5 6 29

[2] Nir Kshetri and Jeffrey Voas Hacking power grids: A current problem Computer 2017 50 12 91–95

[3] Xinghua Liu and Yilin Mo and Emanuele Garone Local decomposition of Kalman filters and its application for secure state estimation IEEE Trans. Automat. Contr 2020 66 10 5037–5044

[4] Zishuo Li and Yilin Mo Efficient secure state estimation against sparse integrity attack for regular linear system International Journal of Robust and Nonlinear Control 2023 33 1 209–236

[5] Yasser Shoukry and Paulo Tabuada Event-triggered state observers for sparse sensor noise/attacks IEEE Trans. Automat. Contr 2015 61 8 2079–2091

[6] Y. Nakahira and Y. Mo Attack-Resilient \( \mathcal{H}_2\) , \( \mathcal{H}_\infty\) , and \( \ell_1\) State Estimator IEEE Trans. Automat. Contr 2018 63 12 4353-4360 10.1109/TAC.2018.2819686

[7] Liang Hu and Zidong Wang and Qing-Long Han and Xiaohui Liu State estimation under false data injection attacks: Security analysis and system protection Automatica 2018 87 176 - 183 https://doi.org/10.1016/j.automatica.2017.09.028

[8] An-Yang Lu and Guang-Hong Yang Resilient observer-based control for cyber-physical systems with multiple transmission channels under denial-of-service IEEE Trans. Cybern 2019 50 11 4796–4807

[9] Yan Liu and Guang-Hong Yang Resilient event-triggered distributed state estimation for nonlinear systems against DoS attacks IEEE Trans. Cybern 2021 52 9 9076–9089

[10] Hamza Fawzi and Paulo Tabuada and Suhas Diggavi Secure estimation and control for cyber-physical systems under adversarial attacks IEEE Trans. Automat. Contr 2014 59 6 1454–1467

[11] S. Mishra, Y. Shoukry, N. Karamchandani, S. N. Diggavi, and P. Tabuada, “Secure state estimation against sensor attacks in the presence of noise,'' IEEE Transactions on Control of Network Systems, vol. 4, no. 1, pp. 49–59, 2017.

[12] Lei Su and Dan Ye A cooperative detection and compensation mechanism against denial-of-service attack for cyber-physical systems Information Sciences 2018 444 122–134

[13] Zishuo Li and Anh Tung Nguyen and André MH Teixeira and Yilin Mo and Karl H Johansson Secure state estimation with asynchronous measurements against malicious measurement-data and time-stamp manipulation 2023 62nd IEEE CDC 2023 7073–7080 IEEE

[14] W. Li, S. L. Shah, and D. Xiao, “Kalman filters in non-uniformly sampled multirate systems: For fdi and beyond,'' Automatica, vol. 44, no. 1, pp. 199–208, 2008.

[15] Guo Hui-dong and Zhang Xin-hua and Xu Lin-zhou and Song Yuan and Xu Ce and Tang Shao-bo Asynchronous Multisensor Data Fusion Based on Minimum Trace of Error Covariance 2006 9th International Conference on Information Fusion 2006 1-5 10.1109/ICIF.2006.301673

[16] A. Feddaoui, N. Boizot, E. Busvelle, and V. Hugel, “High-gain extended kalman filter for continuous-discrete systems with asynchronous measurements,'' Int. J. Control, vol. 93, no. 8, pp. 2001–2014, 2020.

[17] F. Ding, L. Qiu, and T. Chen, “Reconstruction of continuous-time systems from their non-uniformly sampled discrete-time systems,'' Automatica, vol. 45, no. 2, pp. 324–332, 2009.

[18] Z. Zhang, S. Gong, A. D. Dimitrovski, and H. Li, “Time synchronization attack in smart grid: Impact and analysis,'' IEEE Transactions on Smart Grid, vol. 4, no. 1, pp. 87–98, 2013.

[19] Muhammad, G. Mustafa, A. Q. Khan, and M. Abid, “On the observability of non-uniformly sampled systems,'' in 2014 12th International Conference on Frontiers of Information Technology, 2014, pp. 87–90.

[20] Liwei An and Guang-Hong Yang Secure state estimation against sparse sensor attacks with adaptive switching mechanism IEEE Trans. Automat. Contr 2017 63 8 2596–2603

[21] N. Kaempchen and K. C. J. Dietmayer, “Data synchronization strategies for multi-sensor fusion,'' in World Congress on Intelligent Transport Systems, 2003.

[22] A. Westenberger, M. Gabb, M. Muntzinger, M. Fritzsche, and K. Dietmayer, “State and existence estimation with out-of-sequence measurements for a collision avoidance system,'' in 2013 IEEE Intelligent Vehicles Symposium (IV), 2013, pp. 612–617.

[23] K. J. Uribe-Murcia, Y. S. Shmaliy, C. K. Ahn, and S. Zhao, “Unbiased fir filtering for time-stamped discretely delayed and missing data,'' IEEE Trans. Automat. Contr, vol. 65, no. 5, pp. 2155–2162, 2020.

[24] Simo Särkkä Recursive Bayesian inference on stochastic differential equations Helsinki University of Technology 2006

[25] Zishuo Li and Anh Tung Nguyen and André MH Teixeira and Yilin Mo and Karl H Johansson Secure Filtering against Spatio-Temporal False Data Attacks under Asynchronous Sampling arXiv preprint arXiv:2411.19765 2024

[26] Yuzhe Li and Ling Shi and Peng Cheng and Jiming Chen and Daniel E Quevedo Jamming attacks on remote state estimation in cyber-physical systems: A game-theoretic approach IEEE Trans. Automat. Contr 2015 60 10 2831–2836

[27] George N Korres A robust algorithm for power system state estimation with equality constraints IEEE Transactions on Power Systems 2010 25 3 1531–1541