Interval observer design of discrete-time systems under stealthy attacks

被引:0
|
作者
Liu K. [1 ]
Zhang Q.-R. [1 ]
Guo H. [1 ]
Liu T. [2 ]
Xia Y.-Q. [1 ]
机构
[1] School of Automation, Beijing Institute of Technology, Beijing
[2] School of Information, Beijing Wuzi University, Beijing
基金
中国国家自然科学基金;
关键词
Interval observer; Networked control system; Stealthy attacks;
D O I
10.7641/CTA.2020.90618
中图分类号
学科分类号
摘要
This paper investigates the security estimation of networked control system under stealthy attacks. Firstly, the upper and lower bounds of the attack signals are obtained according to the condition that the attacks remain stealthy. Secondly, based on the bounds of the attacks, an interval observer is designed in the original coordinates. Furthermore, the design conditions of the gain matrix are relaxed by a transformation of coordinates, and the design method of this interval observer is given. Then, an approach is proposed to calculate the optimal observer gain based on the theory of H∞filtering, and the optimal gain matrix is obtianed by solving a linear matrix inequality. Finally, a numerical example is given to verify the effectiveness of the proposed method. © 2020, Editorial Department of Control Theory & Applications South China University of Technology. All right reserved.
引用
收藏
页码:1673 / 1680
页数:7
相关论文
共 26 条
  • [1] GUPTA R A, CHOWMY, Networked control system: Overview and research trends, IEEE Transactions on Industrial Electronics, 57, 7, pp. 2527-2535, (2010)
  • [2] LIU K, SELIVANOV A, FRIDMAN E., Survey on time-delay approach to networked control, Annual Reviews in Control, 48, pp. 57-79, (2019)
  • [3] ZHAN Xisheng, WU Jie, GUAN Zhihong, Et al., Stability analysis of networked system based on packet dropouts and bandwidth constraints, Control Theory & Applications, 31, 8, pp. 1111-1115, (2014)
  • [4] TEIXEIRA A, SOU K C, SANDBERG H, Et al., Secure control systems: a quantitative risk management approach, IEEE Control Systems Magazine, 35, 1, pp. 24-45, (2015)
  • [5] DING D R, HAN Q L, XIANG Y, Et al., A survey on security control and attack detection for industrial cyber-physical systems, Neurocomputing, 275, 1, pp. 1674-1683, (2018)
  • [6] WU Yiming, DING Jiajun, HE Xiongxiong, Et al., Secure consensus control for multi-agent systems under communication delay, Control Theory & Applications, 33, 8, pp. 1039-1045, (2016)
  • [7] GIRALDO J, URBINA D, CARDENAS A, Et al., A survey of physicsbased attack detection in cyber-physical systems, ACM Computing Surveys (CSUR), 51, 4, (2018)
  • [8] MOUSAVINEJAD E, YANG F, HAN Q L, Et al., A novel cyber attack detection method in networked control systems, IEEE Transactions on Cybernetics, 48, 11, pp. 3254-3264, (2018)
  • [9] LU Genghong, FENG Dongqin, Industrial control system network security situation awareness modeling and algorithm implementation, Control Theory & Applications, 33, 8, pp. 1054-1060, (2016)
  • [10] MO Y L, SINOPOLI B., On the performance degradation of cyberphysical systems under stealthy integrity attacks, IEEE Transactions on Automatic Control, 61, 9, pp. 2618-2624, (2016)