kth.sePublications
Change search
Link to record
Permanent link

Direct link
Publications (10 of 21) Show all publications
Alanwar, A., Gassmann, V., He, X., Said, H., Sandberg, H., Johansson, K. H. & Althoff, M. (2023). Privacy-preserving set-based estimation using partially homomorphic encryption. European Journal of Control, 71, 100786, Article ID 100786.
Open this publication in new window or tab >>Privacy-preserving set-based estimation using partially homomorphic encryption
Show others...
2023 (English)In: European Journal of Control, ISSN 0947-3580, E-ISSN 1435-5671, Vol. 71, p. 100786-, article id 100786Article in journal (Refereed) Published
Abstract [en]

The set-based estimation has gained a lot of attention due to its ability to guarantee state enclosures for safety-critical systems. However, collecting measurements from distributed sensors often requires out-sourcing the set-based operations to an aggregator node, raising many privacy concerns. To address this problem, we present set-based estimation protocols using partially homomorphic encryption that pre-serve the privacy of the measurements and sets bounding the estimates. We consider a linear discrete-time dynamical system with bounded modeling and measurement uncertainties. Sets are represented by zonotopes and constrained zonotopes as they can compactly represent high-dimensional sets and are closed under linear maps and Minkowski addition. By selectively encrypting parameters of the set repre-sentations, we establish the notion of encrypted sets and intersect sets in the encrypted domain, which enables guaranteed state estimation while ensuring privacy. In particular, we show that our protocols achieve computational privacy using the cryptographic notion of computational indistinguishability. We demonstrate the efficiency of our approach by localizing a real mobile quadcopter using ultra-wideband wireless devices.

Place, publisher, year, edition, pages
Elsevier BV, 2023
Keywords
Set-based estimation, Homomorphic encryption, Zonotopes, Constrained zonotopes
National Category
Control Engineering
Identifiers
urn:nbn:se:kth:diva-326585 (URN)10.1016/j.ejcon.2023.100786 (DOI)000967698800001 ()2-s2.0-85151403204 (Scopus ID)
Note

QC 20230508

Available from: 2023-05-08 Created: 2023-05-08 Last updated: 2023-05-08Bibliographically approved
Xing, Y., He, X., Fang, H. & Johansson, K. H. (2023). Recursive Network Estimation for a Model With Binary-Valued States. IEEE Transactions on Automatic Control, 68(7), 3872-3887
Open this publication in new window or tab >>Recursive Network Estimation for a Model With Binary-Valued States
2023 (English)In: IEEE Transactions on Automatic Control, ISSN 0018-9286, E-ISSN 1558-2523, Vol. 68, no 7, p. 3872-3887Article in journal (Refereed) Published
Abstract [en]

This paper studies how to estimate the weighted adjacency matrix of a network out of the state sequence of a model with binary-valued states, by using a recursive algorithm. In the considered system, agents display and exchange these binary-valued states generated from intrinsic quantizers. It is shown that stability of the model and identifiability of the system parameters can be guaranteed under continuous random noise. Under standard Gaussian noise, the problem of estimating the real-valued weighted adjacency matrix and the unknown quantization threshold is transformed to an optimization problem via a maximum likelihood approach. It is further verified that the unique solution of the optimization problem is the true parameter vector. A recursive algorithm for the estimation problem is then proposed based on stochastic approximation techniques. Its strong consistency is established and convergence rate analyzed. Numerical simulations are provided to illustrate developed results. 

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2023
Keywords
Behavioral sciences, Binary-valued states, Estimation, Heuristic algorithms, identifiability, Maximum likelihood estimation, network estimation, Neurons, Quantization (signal), quantized identification, Standards, stochastic approximation, Approximation algorithms, Approximation theory, Behavioral research, Gaussian noise (electronic), Optimization, Stochastic models, Stochastic systems, Behavioral science, Binary-valued state, Heuristics algorithm, Maximum-likelihood estimation, Stochastic approximations, Weighted adjacency matrixes
National Category
Control Engineering
Identifiers
urn:nbn:se:kth:diva-326669 (URN)10.1109/TAC.2022.3195268 (DOI)001021499000003 ()2-s2.0-85135764182 (Scopus ID)
Note

QC 20250520

Available from: 2023-05-10 Created: 2023-05-10 Last updated: 2025-05-20Bibliographically approved
He, X., Xing, Y., Wu, J. & Johansson, K. H. (2022). EVENT-TRIGGERED DISTRIBUTED ESTIMATION WITH DECAYING COMMUNICATION RATE. SIAM Journal of Control and Optimization, 60(2), 992-1017
Open this publication in new window or tab >>EVENT-TRIGGERED DISTRIBUTED ESTIMATION WITH DECAYING COMMUNICATION RATE
2022 (English)In: SIAM Journal of Control and Optimization, ISSN 0363-0129, E-ISSN 1095-7138, Vol. 60, no 2, p. 992-1017Article in journal (Refereed) Published
Abstract [en]

We study distributed estimation of a high-dimensional static parameter vector through a group of sensors whose communication network is modeled by a fixed directed graph. Different from existing time-triggered communication schemes, an event-triggered asynchronous scheme is investigated in order to reduce communication while preserving estimation convergence. A distributed estimation algorithm with a single step size is first proposed based on an event-triggered communication scheme with a time-dependent decaying threshold. With the event-triggered scheme, each sensor sends its estimate to neighbor sensors only when the difference between the current estimate and the last sent-out estimate is larger than the triggering threshold. Different sensors can have different step sizes and triggering thresholds, enabling the parameter estimation process to be conducted in a fully distributed way. We prove that the proposed algorithm has mean-square and almost-sure convergence, respectively, under an integrated condition of sensor network topology and sensor measurement matrices. The condition is satisfied if the topology is a balanced digraph containing a spanning tree and the system is collectively observable. The collective observability is the possibly mildest condition, since it is a spatially and temporally collective condition of all sensors and allows sensor measurement matrices to be time-varying, stochastic, and nonstationary. Moreover, we provide estimates for the convergence rates, which are related to the step size as well as the triggering threshold. Furthermore, as an essential metric of sensor communication intensity in the event-triggered distributed algorithms, the communication rate is proved to decay to zero with a certain speed almost surely as time goes to infinity. In addition, we show that it is feasible to tune the threshold and the step size such that requirements of algorithm convergence and communication rate decay are satisfied simultaneously. We also show that given the step size, adjusting the decay speed of the triggering threshold can lead to a tradeoff between the convergence rate of the estimation error and the decay speed of the communication rate. Specifically, increasing the decay speed of the threshold would make the communication rate decay faster but reduce the convergence rate of the estimation error. Numerical simulations are provided to illustrate the developed results.

Place, publisher, year, edition, pages
Society for Industrial & Applied Mathematics (SIAM), 2022
Keywords
distributed estimation, sensor network, event-triggered communications, communication rate
National Category
Control Engineering
Identifiers
urn:nbn:se:kth:diva-312674 (URN)10.1137/21M1405083 (DOI)000790477400017 ()2-s2.0-85130708384 (Scopus ID)
Note

QC 20220524

Available from: 2022-05-24 Created: 2022-05-24 Last updated: 2023-02-21Bibliographically approved
He, X., Ren, X., Sandberg, H. & Johansson, K. H. (2022). How to Secure Distributed Filters Under Sensor Attacks. IEEE Transactions on Automatic Control, 67(6), 2843-2856
Open this publication in new window or tab >>How to Secure Distributed Filters Under Sensor Attacks
2022 (English)In: IEEE Transactions on Automatic Control, ISSN 0018-9286, E-ISSN 1558-2523, Vol. 67, no 6, p. 2843-2856Article in journal (Refereed) Published
Abstract [en]

We study how to secure distributed filters for linear time-invariant systems with bounded noise under false-data injection attacks. A malicious attacker is able to arbitrarily manipulate the observations for a time-varying and unknown subset of the sensors. We first propose a recursive distributed filter consisting of two steps at each update. The first step employs a saturation-like scheme, which gives a small gain if the innovation is large corresponding to a potential attack. The second step is a consensus operation of state estimates among neighboring sensors. We prove the estimation error is upper bounded if the parameters satisfy a condition. We further analyze the feasibility of the condition and connect it to sparse observability in the centralized case. When the attacked sensor set is known to be time-invariant, the secured filter is modified by adding an online local attack detector. The detector is able to identify the attacked sensors whose observation innovations are larger than the detection thresholds. Also, with more attacked sensors being detected, the thresholds will adaptively adjust to reduce the space of the stealthy attack signals.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2022
Keywords
Detectors, Estimation error, Observability, Observers, Robustness, Technological innovation, Upper bound, Invariance, Linear systems, Detection threshold, Distributed filters, Estimation errors, False data injection attacks, Linear time invariant systems, Potential attack, State estimates, Time invariants, Time varying control systems
National Category
Control Engineering
Identifiers
urn:nbn:se:kth:diva-311174 (URN)10.1109/TAC.2021.3092603 (DOI)000803343800015 ()2-s2.0-85113224396 (Scopus ID)
Note

QC 20250328

Available from: 2022-05-18 Created: 2022-05-18 Last updated: 2025-03-28Bibliographically approved
He, X., Ren, X., Sandberg, H. & Johansson, K. H. (2022). Secured Filters Based on Saturated Innovations. In: Security and Resilience of Control Systems: Theory and Applications (pp. 3-29). Springer Nature
Open this publication in new window or tab >>Secured Filters Based on Saturated Innovations
2022 (English)In: Security and Resilience of Control Systems: Theory and Applications, Springer Nature , 2022, p. 3-29Chapter in book (Other academic)
Abstract [en]

In this chapter, we study how to design secure centralized and distributed filters for linear time-invariant systems with bounded noise under false data injection attacks in sensor networks. An adversary is able to compromise a subset of sensors and manipulate the measurements arbitrarily. We provide two motivating examples for this problem setup from smart buildings and autonomous vehicles. Then we design a centralized filter based on a saturation method, which gives a small gain if the innovation is large enough, indicating the high likelihood of compromised measurements. The estimation error of the secure centralized filter is proved to be asymptotically upper-bounded. Moreover, a secure two-time-scale distributed filter is obtained by modifying the centralized filter and employing an estimate consensus approach. Boundedness of the estimation error of the distributed filter is proved. Numerical simulations are provided in the end to show the usefulness of the two filters.

Place, publisher, year, edition, pages
Springer Nature, 2022
Series
Lecture Notes in Control and Information Sciences, ISSN 0170-8643 ; 489
National Category
Control Engineering
Identifiers
urn:nbn:se:kth:diva-318016 (URN)10.1007/978-3-030-83236-0_1 (DOI)2-s2.0-85123634038 (Scopus ID)
Note

QC 20220916

Part of book: ISBN 978-3030832353

Available from: 2022-09-16 Created: 2022-09-16 Last updated: 2022-09-16Bibliographically approved
He, X., Hashemi, E. & Johansson, K. H. (2021). Distributed control under compromised measurements: Resilient estimation, attack detection, and vehicle platooning. Automatica, 134, 109953, Article ID 109953.
Open this publication in new window or tab >>Distributed control under compromised measurements: Resilient estimation, attack detection, and vehicle platooning
2021 (English)In: Automatica, ISSN 0005-1098, E-ISSN 1873-2836, Vol. 134, p. 109953-, article id 109953Article in journal (Refereed) Published
Abstract [en]

We study how to design a secure observer-based distributed controller such that a group of vehicles can achieve accurate state estimates and formation control even if the measurements of a subset of vehicle sensors are compromised by a malicious attacker. We propose an architecture consisting of a resilient observer, an attack detector, and an observer-based distributed controller. The distributed detector is able to update three sets of vehicle sensors: the ones surely under attack, surely attack free, and suspected to be under attack. The adaptive observer saturates the measurement innovation through a preset static or time-varying threshold, such that the potentially compromised measurements have limited influence on the estimation. Essential properties of the proposed architecture include: (1) The detector is fault-free, and the attacked and attack-free vehicle sensors can be identified in finite time; (2) The observer guarantees both real-time error bounds and asymptotic error bounds, with tighter bounds when more attacked or attack-free vehicle sensors are identified by the detector; (3) The distributed controller ensures closed-loop stability. The effectiveness of the proposed methods is evaluated through simulations by an application to vehicle platooning.

Place, publisher, year, edition, pages
Elsevier BV, 2021
Keywords
Resilient estimation, Attack detection, Distributed control, Compromised measurements, Sensor attacks
National Category
Control Engineering
Identifiers
urn:nbn:se:kth:diva-304197 (URN)10.1016/j.automatica.2021.109953 (DOI)000707897700003 ()2-s2.0-85116801836 (Scopus ID)
Note

QC 20211103

Available from: 2021-11-03 Created: 2021-11-03 Last updated: 2022-06-25Bibliographically approved
He, X., Johansson, K. H. & Fang, H. (2021). Distributed Design of Robust Kalman Filters Over Corrupted Channels. IEEE Transactions on Signal Processing, 69, 2422-2434
Open this publication in new window or tab >>Distributed Design of Robust Kalman Filters Over Corrupted Channels
2021 (English)In: IEEE Transactions on Signal Processing, ISSN 1053-587X, E-ISSN 1941-0476, Vol. 69, p. 2422-2434Article in journal (Refereed) Published
Abstract [en]

We study distributed filtering for a class of uncertain systems over corrupted communication channels. We propose a distributed robust Kalman filter with stochastic gains, through which upper bounds of the conditional mean square estimation errors are calculated online. We present a robust collective observability condition, under which the mean square error of the distributed filter is proved to be uniformly upper bounded if the network is strongly connected. For better performance, we modify the filer by introducing a switching fusion scheme based on a sliding window. It provides a smaller upper bound of the conditional mean square error. Numerical simulations are provided to validate the theoretical results and show that the filter scales to large networks.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2021
Keywords
Kalman filters, Noise measurement, Temperature measurement, Uncertainty, Temperature sensors, Symmetric matrices, Pollution measurement, Sensor network, distributed filtering, robust Kalman filter, corrupted channel
National Category
Control Engineering
Identifiers
urn:nbn:se:kth:diva-296128 (URN)10.1109/TSP.2021.3070779 (DOI)000645052600012 ()2-s2.0-85103914413 (Scopus ID)
Note

QC 20210531

Available from: 2021-05-31 Created: 2021-05-31 Last updated: 2022-06-25Bibliographically approved
Lindström, M., Sasahara, H., He, X., Sandberg, H. & Johansson, K. H. (2021). Power Injection Attacks in Smart Distribution Grids with Photovoltaics. In: Proceedings European Control Conference, ECC 2021: . Paper presented at 2021 European Control Conference, ECC 2021, Virtual Event / Delft, The Netherlands, June 29 - July 2, 2021 (pp. 529-534). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Power Injection Attacks in Smart Distribution Grids with Photovoltaics
Show others...
2021 (English)In: Proceedings European Control Conference, ECC 2021, Institute of Electrical and Electronics Engineers (IEEE) , 2021, p. 529-534Conference paper, Published paper (Refereed)
Abstract [en]

In order to protect smart distribution grids from intrusions, it is important to understand possible risks and impacts of attacks. We study the worst-case attack strategy of a power injection attack against the physical layer of a smart distribution grid with a high penetration of photovoltaic resources. We derive both the worst attack signal and worst attack location: The worst attack signal is a step function which switches its sign at the final stage, and the worst attack location is the node with the largest impedance to the grid substation. Numerical examples on a European benchmark model verify the developed results. Finally, both theoretical and numerical results are used to discuss feasible defense strategies against power injection attacks.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2021
National Category
Control Engineering
Identifiers
urn:nbn:se:kth:diva-311029 (URN)10.23919/ECC54610.2021.9655167 (DOI)000768455200080 ()2-s2.0-85124892473 (Scopus ID)
Conference
2021 European Control Conference, ECC 2021, Virtual Event / Delft, The Netherlands, June 29 - July 2, 2021
Note

Part of proceedings ISBN 978-94-6384-236-5

QC 20220421

Available from: 2022-04-21 Created: 2022-04-21 Last updated: 2022-06-25Bibliographically approved
Hashemi, E., He, X. & Johansson, K. H. (2020). A Dynamical Game Approach for Integrated Stabilization and Path Tracking for Autonomous Vehicles. In: 2020 American control conference (ACC): . Paper presented at American Control Conference (ACC), JUL 01-03, 2020, Denver, CO (pp. 4108-4113). IEEE
Open this publication in new window or tab >>A Dynamical Game Approach for Integrated Stabilization and Path Tracking for Autonomous Vehicles
2020 (English)In: 2020 American control conference (ACC), IEEE , 2020, p. 4108-4113Conference paper, Published paper (Refereed)
Abstract [en]

A new game theory based framework is proposed for path tracking and stabilization of autonomous vehicles. In the developed framework, vehicle body and corner traction control strategies are formulated in terms of players in a differential game. An integrated stability and path tracking control based on a non-cooperative differential game is developed. It includes bidirectional slip effect and wheel dynamics, which reflect more accurate longitudinal and lateral dynamics in harsh maneuvers and scenarios with sudden changes in the path planners trajectories. The open-loop and closed-loop Nash equilibrium control strategies are obtained by solving a two-player linear-quadratic differential game for the dynamical system of the overall tracking error. The performance of the proposed control strategy is validated with software simulations in various driving conditions.

Place, publisher, year, edition, pages
IEEE, 2020
Series
Proceedings of the American Control Conference, ISSN 0743-1619
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:kth:diva-292081 (URN)10.23919/ACC45564.2020.9147462 (DOI)000618079804005 ()2-s2.0-85089559423 (Scopus ID)
Conference
American Control Conference (ACC), JUL 01-03, 2020, Denver, CO
Note

QC 20210329

Available from: 2021-03-29 Created: 2021-03-29 Last updated: 2023-04-04Bibliographically approved
Liu, Q., He, X. & Fang, H. (2020). Asymptotic properties of distributed social sampling algorithm. Science China Information Sciences, 63(1), Article ID 112202.
Open this publication in new window or tab >>Asymptotic properties of distributed social sampling algorithm
2020 (English)In: Science China Information Sciences, ISSN 1674-733X, E-ISSN 1869-1919, Vol. 63, no 1, article id 112202Article in journal (Refereed) Published
Abstract [en]

Social sampling is a novel randomized message passing protocol inspired by social communication for opinion formation in social networks. In a typical social sampling algorithm, each agent holds a sample from the empirical distribution of social opinions at initial time, and it collaborates with other agents in a distributed manner to estimate the initial empirical distribution by randomly sampling a message from current distribution estimate. In this paper, we focus on analyzing the theoretical properties of the distributed social sampling algorithm over random networks. First, we provide a framework based on stochastic approximation to study the asymptotic properties of the algorithm. Then, under mild conditions, we prove that the estimates of all agents converge to a common random distribution, which is composed of the initial empirical distribution and the accumulation of quantized error. Besides, by tuning algorithm parameters, we prove the strong consistency, namely, the distribution estimates of agents almost surely converge to the initial empirical distribution. Furthermore, the asymptotic normality of estimation error generated by distributed social sample algorithm is addressed. Finally, we provide a numerical simulation to validate the theoretical results of this paper.

Place, publisher, year, edition, pages
Science in China Press, 2020
Keywords
asymptotic normality, opinion formation, random networks, social networks, social sampling, stochastic approximation
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:kth:diva-267857 (URN)10.1007/s11432-019-9890-5 (DOI)000517247500001 ()2-s2.0-85077030243 (Scopus ID)
Note

QC 20200220

Available from: 2020-02-20 Created: 2020-02-20 Last updated: 2022-06-26Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0002-5744-1371

Search in DiVA

Show all publications