Title:
|
Dual-terminal event triggered control for cyber-physical systems under false data injection attacks (English) |
Author:
|
Wang, Zhiwen |
Author:
|
Xu, Xiangnan |
Author:
|
Sun, Hongtao |
Author:
|
Li, Long |
Language:
|
English |
Journal:
|
Kybernetika |
ISSN:
|
0023-5954 (print) |
ISSN:
|
1805-949X (online) |
Volume:
|
56 |
Issue:
|
2 |
Year:
|
2020 |
Pages:
|
323-339 |
Summary lang:
|
English |
. |
Category:
|
math |
. |
Summary:
|
This paper deals with the problem of security-based dynamic output feedback control of cyber-physical systems (CPSs) with the dual-terminal event triggered mechanisms (DT-ETM) under false data injection (FDI) attacks. Considering the limited attack energy, FDI attacks taking place in transmission channels are modeled as extra bounded disturbances for the resulting closed-loop system, thus enabling $H_{\infty}$ performance analysis with a suitable $\varrho$ attenuation level. Then two buffers at the controller and actuator sides are skillfully introduced to cope with the different transmission delays in such a way to facilitate the subsequent security analysis. Next, a dynamic output feedback security control (DOFSC) model based on the DT-ETM schemes under FDI attacks is well constructed. Furthermore, novel criteria for stability analysis and robust stabilization are carefully derived by exploiting Lyapunov-Krasovskii theory and LMIs technique. Finally, an illustrative example is provided to show the effectiveness of the proposed method. (English) |
Keyword:
|
cyber-physical system |
Keyword:
|
FDI attacks |
Keyword:
|
Event-triggered mechanisms |
Keyword:
|
dynamic output feedback security control |
MSC:
|
93B36 |
MSC:
|
93C05 |
MSC:
|
93D15 |
idZBL:
|
Zbl 07250727 |
idMR:
|
MR4103720 |
DOI:
|
10.14736/kyb-2020-2-0323 |
. |
Date available:
|
2020-09-02T09:09:16Z |
Last updated:
|
2021-02-23 |
Stable URL:
|
http://hdl.handle.net/10338.dmlcz/148303 |
. |
Reference:
|
[1] Ashibani, Y., Mahmoud, Q. H.: Cyber physical systems security: analysis, challenges and solutions..Computers Security 68 (2017), 81-97. |
Reference:
|
[2] Ding, D., Han, Q.-L., Wang, Z., Ge, X.: A survey on model-based distributed control and filtering for industrial cyber-physical systems..IEEE Trans. Industr. Inform. 15(2019), 5, 2483-2499. |
Reference:
|
[3] Ding, D., Wang, Z., Ho, D., Wei, G.: Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks..Automatica 78 (2017), 231-240. MR 3614098, |
Reference:
|
[4] García-Rivera, M., Barreiro, A.: Analysis of networked control systems with drops and variable delays..Automatica 43 (2007), 2054-2059. MR 2571732, |
Reference:
|
[5] Ge, X., Han, Q.-L., Wang, Z.: A threshold-parameter-dependent approach to designing distributed event-triggered $H_{\infty}$ consensus filters over sensor networks..IEEE Trans. Cybernet. 49 (2019), 1148-1159. |
Reference:
|
[6] Ge, X., Han, Q.-L., Zhang, X.-M., Ding, D., Yang, F.: Resilient and secure remote monitoring for a class of cyber-physical systems against attacks..Inform. Sci. (2019). MR 4038642, |
Reference:
|
[7] Ge, X., Han, Q.-L., Zhang, X.-M., Ding, L., Yang, F.: Distributed event-triggered estimation over sensor networks: A survey..IEEE Trans. Cybernet., to be published. |
Reference:
|
[8] Ge, X., Han, Q.-L., Zhong, M., Zhang, X.-M.: Distributed Krein space-based attack detection over sensor networks under deception attacks..Automatica 109 (2019), 108557. MR 3998774, |
Reference:
|
[9] Humayed, A., Lin, J., Li, F., Luo, B.: Cyber-physical systems security - a survey..IEEE Internet Things J. 4 (2017), 1802-1831. |
Reference:
|
[10] Liang, G., Weller, S. R., Zhao, J., Luo, F., Dong, Z.: The 2015 ukraine blackout: implications for false data injection attacks..IEEE Trans. Power Systems 32 (2017), 3317-.3318. |
Reference:
|
[11] Liu, C., Li, H., Shi, Y., Xu, D.: Distributed event-triggered gradient method for constrained convex minimization..IEEE Trans. Automat. Control (2019). |
Reference:
|
[12] Liu, C., Li, H., Shi, Y., Xu, D.: Co-design of event trigger and feedback policy in robust model predictive control..IEEE Trans. Automat. Control (2019). MR 4052877, |
Reference:
|
[13] Liu, Y., Ning, P., Reiter, M.: False data injection attacks against state estimation in electric power grids..ACM Trans. Inform. System Security 14 (2011), 1-33. |
Reference:
|
[14] Lu, A.-Y., Yang, G.-H.: False data injection attacks against state estimation in the presence of sensor failures..Inform. Sci. 508 (2020), 92-104. MR 3998228, |
Reference:
|
[15] Lu, A.-Y., Yang, G.-H.: Malicious attacks on state estimation against distributed control systems..IEEE Trans. Automat. Control (2019). |
Reference:
|
[16] Pang, Z., Liu, G., Zhou, D., Hou, F., Sun, D.: Two-channel false data injection attacks against output tracking control of networked systems..IEEE Trans. Industr. Electron. 63 (2016), 3242-3251. |
Reference:
|
[17] Park, P., Ko, J. W., Jeong, C.: Reciprocally convex approach to stability of systems with time-varying delays..Automatica 47 (2011), 235-238. MR 2878269, |
Reference:
|
[18] Peng, C., Sun, H., Yang, M., Wang, Y.: A survey on security communication and control for smart grids under malicious cyber attacks..IEEE Trans. Systems Man Cybernet.: Systems. 49 (2019), 1554-1569. MR 0697005, |
Reference:
|
[19] Peng, D., Dong, J., Cai, Z., Zhang, C., Peng, Q.: A study on stability of cyber-physical systems under false data injection attacks..J. Automat. 45 (2019), 196-205. |
Reference:
|
[20] Shi, L., Dai, Q., Ni, Y.: Review of network attacks in power information physical fusion system environment..Electr. Power Syst. Res. 163 (2018), 396-412. |
Reference:
|
[21] Song, L., Wu, J., Long, C., Li, S.: Asynchronous event-triggered output feedback control for cps under data injection attacks..In: 37th Chinese Automation Congress (2018), Xi'an, pp. 2530-2535. |
Reference:
|
[22] Song, Z., Zhai, J., Ye, H.: Global adaptive output-feedback control for switched uncertain nonlinear systems..Kybernetika 53 (2017), 263-281. MR 3661352, |
Reference:
|
[23] Teixeira, A., Shames, I., Sandberg, H., H.Johansson, K.: A secure control framework for resource-limited adversaries..Automatica 51 (2015), 135-148. MR 3284762, |
Reference:
|
[24] Wang, Q., Tai, W., Tang, Y., Ni, M.: A review of the false data injection attack against the cyber physical power system..J. Automat. 45 (2019), 72-83. |
Reference:
|
[25] Wang, D., Wu, S., Zhang, W., Wang, G., Wu, F., Okubo, S.: Model following control system with time delays..Kybernetika 52 (2016), 478-495. MR 3532518, |
Reference:
|
[26] Xiao, S., Han, Q.-L., Ge, X., Zhang, Y.: Secure distributed finite-time filtering for positive systems over sensor networks under deception attacks..IEEE Trans. Cybernet., to be published. |
Reference:
|
[27] Yan, S., Nguang, S. K., Zhang, L.: Nonfragile integral-based event-triggered control of uncertain cyber-physical systems under cyber-attacks..Complexity ID 8194606 (2019), 14 pages. |
Reference:
|
[28] Yu, W., Deng, Z., Zhou, H., Zeng, X.: Distributed event-triggered algorithm for optimal resource allocation of multi-agent systems..Kybernetika 53 (2017), 747-764. MR 3750101, |
Reference:
|
[29] Zeng, W., Chow, M.-Y.: Optimal tradeoff between performance and security networked control systems based on coevolutionary algorithms..IEEE Trans. Industr. Electr. 59 (2012), 3016-3025. |
Reference:
|
[30] Zhang, X.-M., Han, Q.-L.: Event-triggered dynamic output feedback control for networked control systems..IET Control Theory Appl. 8 (2014), 226-234. MR 3202366, |
Reference:
|
[31] Zhang, X.-M., Han, Q.-L., Ge, X., Ding, D., Ding, L., Yue, D., Peng, C.: Networked control systems: a survey of trends and techniques..IEEE/CAA J. Automat. Sinica, to be published. MR 3748030, |
. |