Resilient model predictive reset control for cyber-physical systems subject to hybrid attacks

被引:0
作者
Geng, Qing [1 ]
Wu, Defu [1 ]
Liu, Fucai [1 ]
Hua, Changchun [1 ]
机构
[1] Yanshan Univ, Coll Elect Engn, Key Lab Ind Comp Control Engn Hebei Prov, Qinhuangdao 066004, Peoples R China
基金
中国国家自然科学基金;
关键词
Cyber-physical systems; Resilient model predictive control; Jamming attack; False data injection attack; NETWORKED CONTROL-SYSTEMS; SECURITY;
D O I
10.1016/j.ins.2025.122002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper investigates a resilient model predictive reset control strategy for cyber-physical systems (CPSs) with state and input constraints under hybrid attacks. Jamming attacks are modeled using Stackelberg game theory and result in packet loss. A malicious false data injection attacker randomly injects fault signals to manipulate the control inputs. A channel reset strategy is proposed to ensure that the auxiliary controller can safely transmit the prediction signals to the buffer for storage. The primary controller exerts its utility in the absence of a jamming attack, whereas once the false data attack is detected, compensation and computation are performed using predictive values computed by the auxiliary controller, which can improve the system control performance. The predictive signals computed by the auxiliary controller are only used when an attack is detected in the MPC strategy proposed in this article. Furthermore, the feasibility of the proposed reset control strategy is discussed. Finally, the effectiveness and benefits of the model predictive reset control strategy proposed in this paper are verified through a numerical example.
引用
收藏
页数:12
相关论文
共 30 条
  • [1] Hassan M.U., Rehmani M.H., Chen J., Differential privacy techniques for cyber physical systems: a survey, IEEE Commun. Surv. Tutor., 22, 1, pp. 746-789, (2020)
  • [2] Zhou Z., Wang B., Dong M., Ota K., Secure and efficient vehicle-to-grid energy trading in cyber physical systems: integration of blockchain and edge computing, IEEE Trans. Syst. Man Cybern. Syst., 50, 1, pp. 43-57, (2020)
  • [3] Gao X., Peng M., Tse C.K., Cascading failure analysis of cyber-physical power systems considering routing strategy, IEEE Trans. Circuits Syst. II, Express Briefs, 70, 1, pp. 136-140, (2023)
  • [4] Ge X., Han Q., Wu Q., Zhang X., Resilient and safe platooning control of connected automated vehicles against intermittent denial-of-service attacks, IEEE/CAA J. Autom. Sin., 10, 5, pp. 1234-1251, (2023)
  • [5] Ma Y., Li Z., Neural network-based secure event-triggered control of uncertain industrial cyber-physical systems against deception attacks, Inf. Sci., 633, pp. 504-516, (2023)
  • [6] Pirayesh H., Zeng H., Jamming attacks and anti-jamming strategies in wireless networks: a comprehensive survey, IEEE Commun. Surv. Tutor., 24, 2, pp. 767-809, (2022)
  • [7] Nourian A., Madnick S., A systems theoretic approach to the security threats in cyber physical systems applied to stuxnet, IEEE Trans. Dependable Secure Comput., 15, 1, pp. 2-13, (2018)
  • [8] Nemati A., Peimani M., Mobayen S., Sayyedfattahi S., Adaptive non-singular finite time control of nonlinear disturbed cyber-physical systems with actuator cyber-attacks and time-varying delays, Inf. Sci., 612, pp. 1111-1126, (2022)
  • [9] Song H., Ding D., Dong H., Yi X., Distributed filtering based on Cauchy-kernel-based maximum correntropy subject to randomly occurring cyber-attacks, Automatica, 135, (2022)
  • [10] Zhao Y., Du X., Zhou C., Tian Y., Anti-saturation resilient control of cyber-physical systems under actuator attacks, Inf. Sci., 608, pp. 1245-1260, (2022)