Improved control of cyber-physical systems subject to cyber and physical attacks

被引:13
作者
Mahmoud M.S. [1 ]
Hamdan M.M. [1 ]
机构
[1] Systems Engineering Department, King Fahd University of Petroleum and Minerals, Dhahran
关键词
Cyber Physical Systems (CPS); deception attack; denial of service attack; physical attack;
D O I
10.1080/23335777.2019.1631889
中图分类号
学科分类号
摘要
Cyber-Physical Systems (CPS) are defined as integrations of computation, communication, and control in order to achieve the desired performance of physical processes. Security threats have a high possibility of affecting CPS by several cyber attacks without providing any indication about failure. One important problem, especially in power systems, is the control problem of systems under cyber attacks. In this paper, a secure observer-based controller for discrete-time CPS subject to both cyber (denial of service (DoS) and deception) and physical attacks will be presented. The occurrences of the cyber and physical attacks will be considered as Bernoulli distributed white sequences with variable conditional probabilities. A sufficient condition is first derived under which the observer-based controller is guaranteed to have the desired security level using the stochastic analysis techniques. Then, the observer and controller gains will be designed by solving a linear matrix inequality using YALMIP and MATLAB. Finally, an illustrative example is provided to demonstrate the feasibility of the proposed system. © 2019, © 2019 Informa UK Limited, trading as Taylor & Francis Group.
引用
收藏
页码:173 / 190
页数:17
相关论文
共 34 条
[1]  
Rajkumar R., Lee I., Sha L., Et al., Cyber-physical systems: the next computing revolution, Design Automation Conference (DAC), 2010 47th ACM/IEEE, pp. 731-736, (2010)
[2]  
Kim K.D., Kumar P.R., An overview and some challenges in cyber-physical systems, J Indian Inst Sci, 93, 3, pp. 341-352, (2013)
[3]  
D'Innocenzo A., Smarra F., Di Benedetto M.D., Resilient stabilization of multi-hop control networks subject to malicious attacks, Automatica, 1, 71, pp. 1-9, (2016)
[4]  
Ding D., Ql H., Xiang Y., Et al., A survey on security control and attack detection for industrial cyber-physical systems, Neurocomputing, 31, 275, pp. 1674-1683, (2018)
[5]  
Stuxnet L.R., Dissecting a cyberwarfare weapon, IEEE Secur Privacy, 9, 3, pp. 49-51, (2011)
[6]  
Teixeira A., Shames I., Sandberg H., Et al., A secure control framework for resource-limited adversaries, Automatica, 51, pp. 135-148, (2015)
[7]  
Giani A., Sastry S., Johansson K.H., Et al., The VIKING project: an initiative on resilient control of power networks, 2009 2nd International Symposium on Resilient Control Systems, pp. 31-35, (2009)
[8]  
Pasqualetti F., Dorfler F., Bullo F., Cyber-physical security via geometric control: distributed monitoring and malicious attacks, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC), pp. 3418-3425, (2012)
[9]  
Amin S., Litrico X., Sastry S., Et al., Cyber security of water SCADA systems—part I: analysis and experimentation of stealthy deception attacks, IEEE Trans Control Syst Technol, 21, 5, pp. 1963-1970, (2013)
[10]  
Mo Y., Garone E., Casavola A., Et al., False data injection attacks against state estimation in wireless sensor networks, 49th IEEE Conference on Decision and Control (CDC), pp. 5967-5972, (2010)