Attack detection and security state estimation of cyber-physical systems

被引:0
|
作者
Gao Y. [1 ]
Ren W. [1 ,3 ]
Wu R. [1 ]
Wang W. [2 ]
Yi S. [1 ]
Han B. [2 ]
机构
[1] China Information Technology Security Evaluation Center, Beijing
[2] School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing
[3] College of Electronics and Information Engineering, Sichuan University, Chengdu
关键词
Abnormal state detection; Cyber-physical systems; Detector; Observer; Safe state estimation;
D O I
10.16511/j.cnki.qhdxxb.2021.21.008
中图分类号
学科分类号
摘要
In the Industry 4.0 context, cyber-physical systems (CPS) need effective security and control capabilities. This study analyzes attack detection and security state estimation based on a cyber-physical system model attacked by an actuator. The attack detection uses a finite time attack detector that ensures that existing attacks can be accurately detected within a preset time limit. An observer is then designed to estimate the system state. A theoretical analysis shows that the observer ensures that the system can immediately adjust when attacked and that the system will reach a safe, stable state. Simulations verify the effectiveness of this method. © 2021, Tsinghua University Press. All right reserved.
引用
收藏
页码:1234 / 1239
页数:5
相关论文
共 19 条
  • [1] CONTI M, DAS S K, BISDIKIAN C, Et al., Looking ahead in pervasive computing: Challenges and opportunities in the era of cyber-physical convergence, Pervasive and Mobile Computing, 8, pp. 2-21, (2012)
  • [2] CHIEN D., Systems and methods for suppressing denial of service attacks
  • [3] LI B, XIAO G, LU R, Et al., On feasibility and limitations of detecting false data injection attacks on power grid state estimation using D-FACTS devices, IEEE Transactions on Industrial Informatics, 16, 2, pp. 854-864, (2020)
  • [4] TEIXEIRA A, AMIN S, SANDBERG H, Et al., Cyber security analysis of state estimators in electric power systems, 49th IEEE Conference on Decision and Control, pp. 5991-5998, (2010)
  • [5] MO Y, SINOPOLI B., Secure control against replay attacks, 47th Annual Allerton Conference on Communication, Control, and Computing, pp. 911-918, (2010)
  • [6] WANG C Q., Elastic control of information physical system under false data injection attack, (2018)
  • [7] QIN J, LI M, SHI L, Et al., Optimal denial-of-service attack scheduling with energy constraint over packet-dropping networks, IEEE Transactions on Automatic Control, 63, 6, pp. 1648-1663, (2018)
  • [8] ZHUANG K X, SUN Z W., A detection model for denial of service attacks in industrial information physics systems, Control Theory and Application, 37, 3, pp. 629-638, (2020)
  • [9] AO W, SONG Y, WEN C, Et al., Finite time attack detection and supervised secure state estimation for CPSs with malicious adversaries, Information Sciences, 451-452, pp. 67-82, (2018)
  • [10] CHONG M S, WAKAIKI M, HESPANHA J P., Observability of linear systems under adversarial attacks, American Control Conference, pp. 2439-2444, (2015)