Previous |  Up |  Next

Article

Title: Event-triggered control of cyber-physical systems under asynchronous denial of service attacks (English)
Author: Peng, Huaye
Author: Peng, Chen
Author: Shao, Yong
Author: Zeng, Deliang
Language: English
Journal: Kybernetika
ISSN: 0023-5954 (print)
ISSN: 1805-949X (online)
Volume: 56
Issue: 2
Year: 2020
Pages: 340-362
Summary lang: English
.
Category: math
.
Summary: This paper addresses event-triggered control cyber-physical systems under asynchronous denial of service attacks. First, a general attack model is given, which allows us to conveniently model the asynchronous denial of service attacks within measurement and control channels in a unified framework. Then, under a delicate event triggered communication mechanism, a refined switching control mechanism is proposed to account for various attack intervals and non-attack intervals. Furthermore, sufficient conditions are derived for guaranteing the input to state stability (ISS) of the resulting closed-loop system. Finally, a simulation example of unmanned ground vehicle (UGV) is given to demonstrate the validity of the proposed main results. (English)
Keyword: DoS attack
Keyword: event-triggered mechanism
Keyword: cyber-physical system
MSC: 93A99
idZBL: Zbl 07250728
idMR: MR4103721
DOI: 10.14736/kyb-2020-2-0340
.
Date available: 2020-09-02T09:10:58Z
Last updated: 2021-02-23
Stable URL: http://hdl.handle.net/10338.dmlcz/148304
.
Reference: [1] Amin, S., Schwartz, G. A., Sastry, S.: Security of interdependent and identical networked control systems..Automatica 49 (2013), 186-192. MR 2999960, 10.1016/j.automatica.2012.09.007
Reference: [2] Cardenas, A. A., Amin, S., al, S. Sastry et: Secure control: Towards survivable cyber-physical systems..In: Proc. 28th International Conference on Distributed Computing Systems Workshops, Beijing 2008, pp. 495-500. 10.1109/icdcs.workshops.2008.40
Reference: [3] Cetinkaya, A., Ishii, H., Hayakawa, T.: Networked control under random and malicious packet losses..IEEE Trans. Automat. Control 62 (2017), 2434-2449. MR 3641456, 10.1109/tac.2016.2612818
Reference: [4] Chang, Y. H., Hu, Q., Qie, Tomlin, C. J.: Secure estimation based Kalman filter for cyber-physical systems against sensor attacks..Automatica 95 (2018), 399-412. MR 3851476, 10.1016/j.automatica.2018.06.010
Reference: [5] Ding, D., Han, Q.-L., al, Z. Wang et: A survey on model-based distributed control and filtering for industrial cyber-physical systems..IEEE Trans. Industr. Inform. 15 (2019), 2483-2499. 10.1109/tii.2019.2905295
Reference: [6] Farwell, J. P., Rohozinski, R.: Stuxnet and the future of cyber war..Survival 53 (2011), 23-40. 10.1080/00396338.2011.555586
Reference: [7] Feng, S., Tesi, P.: Resilient control under denial-of-service: Robust design..Automatica 79 (2017), 42-51. MR 3627964, 10.1016/j.automatica.2017.01.031
Reference: [8] Ge, X., Han, Q.-L., Wang, Z.: A threshold-parameter-dependent approach to designing distributed event-triggered $H_{\infty}$ consensus filters over sensor networks..IEEE Trans. Cybernet. 49 (2019), 1148-1159. 10.1109/tcyb.2017.2789296
Reference: [9] Ge, X., Han, Q.-L., al, X.-M. Zhang et: Distributed event-triggered estimation over sensor networks: A survey..IEEE Trans. Cybernet. 50 (2019), 3, 1306-1320 10.1109/tcyb.2019.2917179
Reference: [10] Ge, X., Han, Q.-L., Zhong, M., Zhang, X.-M.: Distributed Krein space-based attack detection over sensor networks under deception attacks..Automatica 109 (2019), 108557. MR 3998774, 10.1016/j.automatica.2019.108557
Reference: [11] Heemels, W. P. M. H., Donkers, M. C. F., Teel, A. R.: Periodic event-triggered control for linear systems..IEEE Trans. Automat. Control 58 (2013), 847-861. MR 3038789, 10.1109/tac.2012.2220443
Reference: [12] Hu, S., Yue, D., al, Q.-L. Han et: Observer-based event-triggered control for networked linear systems subject to denial-of-service attacks..IEEE Trans. Cybernet. (2019), 1-13. MR 3632431, 10.1109/tcyb.2019.2903817
Reference: [13] Hu, S., Yue, D., Xie, X., Chen, X., Yin, X.: Resilient event-triggered controller synthesis of networked control systems under periodic DoS jamming attacks..IEEE Trans. Cybernet. 49 (2019), 4271-4281. 10.1109/tcyb.2018.2861834
Reference: [14] Kim, S., Won, Y., Park, I.-H., Eun, Y., Park, K.-J.: Cyber-physical vulnerability analysis of communication-based train control..IEEE Internet Things J. 6 (2019), 6353-6362. 10.1109/jiot.2019.2919066
Reference: [15] Kwon, Ch., Hwang, I.: Cyber attack mitigation for cyber-physical systems: hybrid system approach to controller design..IET Control Theory Appl. 10 (2016), 731-741. MR 3525310, 10.1049/iet-cta.2014.1013
Reference: [16] Liang, G., Weller, S. R., Zhao, J., Luo, F., Dong, Z. Y.: The 2015 Ukraine blackout: Implications for false data injection attacks..IEEE Trans. Power Syst. 32 (2017), 3317-3318. 10.1109/tpwrs.2016.2631891
Reference: [17] Liu, J., Yang, M., al, X. Xie et: Finite-time ${H}_\infty$ filtering for state-dependent uncertain systems with event-triggered mechanism and multiple attacks..IEEE Trans. Circuits Systems I: Regular Papers /2019), 1-14.. MR 4086773
Reference: [18] Lu, A.-Y., Yang, G.-H.: Input-to-state stabilizing control for cyber-physical systems with multiple transmission channels under denial of service..IEEE Trans. Automat. Control 63 (2018), 1813-1820. MR 3807663, 10.1109/tac.2017.2751999
Reference: [19] Millan, P., Orihuela, L., al, I. Jurado et: Distributed estimation in networked systems under periodic and event-based communication policies..Int. J. Systems Sci. 46 (2015), 139-151. MR 3268947, 10.1080/00207721.2013.775387
Reference: [20] Peng, C., Sun, H. T.: Switching-like event-triggered control for networked control systems under malicious denial of service attacks..IEEE Trans. Automat. Control (2020) MR 4083387, 10.1109/tac.2020.2989773
Reference: [21] Mo, Y., Weerakkody, S., Sinopoli, B.: Physical authentication of control systems: Designing watermarked control inputs to detect counterfeit sensor outputs..IEEE Control Systems Mag. 35 (2015), 93-109. MR 3311291, 10.1109/mcs.2014.2364724
Reference: [22] Muehlebach, M., Trimpe, S.: Distributed event-based state estimation for networked systems: An LMI approach..IEEE Trans. Automat. Control 63 (2018), 269-276. MR 3744847, 10.1109/tac.2017.2726002
Reference: [23] Pasqualetti, F., Dorfler, F., Bullo, F.: Attack detection and identification in cyber-physical systems..IEEE Trans. Automat. Control 58 (2013), 2715-2729. MR 3125984, 10.1109/tac.2013.2266831
Reference: [24] Peng, C., Li, J., Fei, M.: Resilient event-triggering $H_\infty$ load frequency control for multi-area power systems with energy-limited DoS attacks..IEEE Trans. Power Syst. 32 (2017), 4110-4118. 10.1109/tpwrs.2016.2634122
Reference: [25] Peng, C., Ma, S., Xie, X.: Observer-based non-PDC control for networked T-S fuzzy systems with an event-triggered Communication..IEEE Trans. Cybernet. 47 (2017), 2279-2287. 10.1109/tcyb.2017.2659698
Reference: [26] Peng, C., Sun, H., Yang, M., Wang, Y.: A survey on security communication and control for smart grids under malicious cyber attacks..IEEE Trans. Systems Man Cybernet.: Systems 49 (2019), 1554-1569. MR 0697005, 10.1109/tsmc.2018.2884952
Reference: [27] Persis, C. de, Tesi, P.: Input-to-state stabilizing control under denial-of-service..IEEE Trans. Automat. Control 60 (2015), 2930-2944. MR 3419582, 10.1109/tac.2015.2416924
Reference: [28] Seuret, A., Gouaisbaut, F.: Wirtinger-based integral inequality: Application to time-delay systems..Automatica 49 (2013), 2860-2866. MR 3084475, 10.1016/j.automatica.2013.05.030
Reference: [29] Sun, Y.-Ch., Yang, G.-H.: Event-triggered resilient control for cyber-physical systems under asynchronous DoS attacks..Inform. Sci. 465 (2018), 340-352. MR 3846182, 10.1016/j.ins.2018.07.030
Reference: [30] Tabuada, P.: Event-triggered real-time scheduling of stabilizing control tasks..IEEE Trans. Automat. Control 52 (2007), 1680-1685. MR 2352444, 10.1109/tac.2007.904277
Reference: [31] Do, L. Van, Fillatre, L., al, I. Nikiforov et: Security of SCADA systems against cyber-physical attacks..IEEE Aerospace Electron. Systems Mag. 32 (2017), 28-45. 10.1109/maes.2017.160047
Reference: [32] Xiaon, S., Han, Q.-L., Ge, X., Zhang, Y.: Secure distributed finite-time filtering for positive systems over sensor networks under deception attacks..IEEE Trans. Cybernet. 50 (2019), 3, 1220-1229. 10.1109/tcyb.2019.2900478
Reference: [33] Xie, X., Yue, D., Peng, Ch.: Relaxed real-time scheduling stabilization of discrete-time takagi-sugeno fuzzy systems via a alterable-weights-based ranking switching mechanism..IEEE Trans. Cybernet. 26 (2018), 3808-3819. 10.1109/tfuzz.2018.2849701
Reference: [34] Zhang, X.-M., Han, Q.-L., al, X. Ge et: Networked control systems: A survey of trends and techniques..IEEE/CAA J. Automat. Sinica (2019), 1-17. MR 3841465, 10.1109/JAS.2019.1911651
Reference: [35] Zhang, X.-M., Han, Q.-L., al, X. Ge et: Resilient control design based on a sampled-data model for a class of networked control systems under denial-of-service attacks..IEEE Trans. Cybernet. (2019), 1-11.
Reference: [36] Zhang, X.-M., Han, Q.-L., Seuret, A., Gouaisbaut, F.: An improved reciprocally convex inequality and an augmented Lyapunov-Krasovskii functional for stability of linear systems with time-varying delay..Automatica 84 (2017), 221-226. MR 3689887, 10.1016/j.automatica.2017.04.048
.

Files

Files Size Format View
Kybernetika_56-2020-2_8.pdf 723.6Kb application/pdf View/Open
Back to standard record
Partner of
EuDML logo