Synthesis of resilient fallback control system under cyber-attacks via supervisory control

被引:0
|
作者
Sakata, Kousei [1 ]
Sawada, Kenji [2 ]
Ogura, Takashi [1 ]
Fujita, Junya [1 ]
Matsumoto, Noritaka [1 ]
机构
[1] Hitachi Ltd, Res & Dev Grp, Hitachi, Ibaraki, Japan
[2] Univ Electro Commun, Dept Mech Engn & Intelligent Syst, Choufu, Tokyo, Japan
关键词
Industrial control system; control system security; fallback control system; discrete event system; supervisory control;
D O I
10.1080/01691864.2024.2329947
中图分类号
TP24 [机器人技术];
学科分类号
080202 ; 1405 ;
摘要
Industrial control systems (ICS) require system design and operation under cyber-attacks. This study aims to design a fallback control system that can switch from normal control to fallback control and verify its superiority. The target system is a factory automation (FA) system consisting of a normal programmable logic controller (PLC) and a fallback PLC. In this system, we design a fallback logic that takes over control in the case of cyber-attacks. The design of this logic requires a system model that manages smooth state transitions between normal control and fallback control in an integrated manner under cyber-attacks. In response, we model a control program in the framework of discrete event systems (DESs) and apply supervisory control to derive a supervisor model that can manage the system in an integrated manner. To ensure the controllability of the FA system during cyber-attacks, we design a control specification that includes a detection function to enable rapid switching of the control state. As a result, we generate the fallback logic from the supervisor model with guaranteed controllability under cyber-attacks and implement it in a fallback PLC to verify the effectiveness of the proposed logic.
引用
收藏
页码:659 / 671
页数:13
相关论文
共 50 条
  • [1] Cyber-Attacks With Resource Constraints on Discrete Event Systems Under Supervisory Control
    Zhaoyang He
    Naiqi Wu
    Rong Su
    Zhiwu Li
    IEEE/CAA Journal of Automatica Sinica, 2025, 12 (03) : 585 - 595
  • [2] Cyber-Attacks with Resource Constraints on Discrete Event Systems Under Supervisory Control
    He, Zhaoyang
    Wu, Naiqi
    Su, Rong
    Li, Zhiwu
    IEEE-CAA JOURNAL OF AUTOMATICA SINICA, 2025, 12 (03) : 585 - 595
  • [3] Design of Resilient Supervisory Control for Autonomous Connected Vehicles Approaching Unsignalized Intersection in presence of Cyber-Attacks
    De Tommasi, Gianmaria
    Motta, Carlo
    Petrillo, Alberto
    Santini, Stefania
    IFAC PAPERSONLINE, 2023, 56 (02): : 587 - 592
  • [4] Fallback Control for Isochronous Energy Storage Systems in Autonomous Microgrids Under Denial-of-Service Cyber-Attacks
    Chlela, Marline
    Mascarella, Diego
    Joos, Geza
    Kassouf, Marthe
    IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (05) : 4702 - 4711
  • [5] Secure Control for Networked Control Systems under Multiple Cyber-attacks
    Wu, Yuliang
    Qu, Gang
    Wu, Jing
    Long, Chengnian
    Li, Shaoyuan
    2023 AMERICAN CONTROL CONFERENCE, ACC, 2023, : 1966 - 1971
  • [6] Software measure in cyber-attacks on production control system
    Kawanaka, Takaaki
    Matsumaru, Masanobu
    Rokugawa, Shuichi
    COMPUTERS & INDUSTRIAL ENGINEERING, 2014, 76 : 378 - 386
  • [7] Resilient Leader-Following Formation Control For a Fleet of Unmanned Aerial Vehicles Under Cyber-Attacks
    Trejo, Juan Antonio Vazquez
    Guenard, Adrien
    Adam-Medina, Manuel
    Ciarletta, Laurent
    Ponsart, Jean-Christophe
    Theilliol, Didier
    2023 INTERNATIONAL CONFERENCE ON UNMANNED AIRCRAFT SYSTEMS, ICUAS, 2023, : 731 - 737
  • [8] Resilient Tracking Control of Networked Control Systems Under Cyber Attacks
    Mousavinejad, Eman
    Ge, Xiaohua
    Han, Qing-Long
    Yang, Fuwen
    Vlacic, Ljubo
    IEEE TRANSACTIONS ON CYBERNETICS, 2021, 51 (04) : 2107 - 2119
  • [9] Stabilization for networked control systems under stochastic cyber-attacks
    Wei, Lili
    Liu, Jinliang
    PROCEEDINGS OF THE 36TH CHINESE CONTROL CONFERENCE (CCC 2017), 2017, : 8020 - 8025
  • [10] Memory-based event-triggered control for networked control system under cyber-attacks
    Nafir, Noureddine
    Khemissat, Abdel Mouneim
    Farrag, Mohamed Emad
    Rouamel, Mohamed
    IET CONTROL THEORY AND APPLICATIONS, 2024, 18 (13): : 1739 - 1750