An Encoding-Based Privacy-Preserving Security Control Strategy Under Stealthy Attacks

被引:1
作者
Liu, Jian [1 ]
Wang, Shuailong [1 ]
Zha, Lijuan [2 ]
Liu, Jinliang [3 ]
Tian, Engang [4 ]
机构
[1] Nanjing Univ Finance & Econ, Sch Comp & Artificial Intelligence, Nanjing 210023, Peoples R China
[2] Nanjing Forestry Univ, Sch Sci, Nanjing 210037, Peoples R China
[3] Nanjing Univ Informat Sci & Technol, Sch Comp Sci, Nanjing 210044, Peoples R China
[4] Univ Shanghai Sci & Technol, Sch Opt Elect & Comp Engn, Shanghai 200093, Peoples R China
来源
IEEE TRANSACTIONS ON INDUSTRIAL CYBER-PHYSICAL SYSTEMS | 2025年 / 3卷
基金
中国国家自然科学基金;
关键词
Decoding; Security; Current measurement; Fading channels; Cyber-physical systems; Observers; Electronic mail; Vectors; Time measurement; Sufficient conditions; encoding-decoding communication scheme; false data injection attacks; privacy-preserving strategy; INTEGRAL MEASUREMENTS; STATE ESTIMATION; SYSTEMS; NETWORKS;
D O I
10.1109/TICPS.2025.3542039
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper focuses on the privacy-preserving security control issue for cyber-physical systems (CPSs) via an encoding-decoding communication scheme (EDCS). To considerably contemplate the delayed data acquisition and analysis, the integral measurement model is established, which is governed by the function related to system states within a certain period. The EDCS designed has a certain resistant to the non-ideal communication network with limited bandwidth capacity and fading channels. Then the controller is constructed by utilizing the decoding data. Furthermore, in the controller-to-actuator channel, assuming the stealthy false data injection attacks occur randomly and the injected pseudo data is associated with transmission data that has been eavesdropped. By virtue of deriving sufficient conditions, the CPS with EDCS can achieve input-to-state stability as well as the corresponding controller and observer gain parameters are acquired. Eventually, the effectiveness of the designed EDCS and control algorithm is illustrated by a case study involving an autonomous underwater vehicle system.
引用
收藏
页码:208 / 217
页数:10
相关论文
共 33 条
[1]   Industrial Control Systems: Cyberattack trends and countermeasures [J].
Alladi, Tejasvi ;
Chamola, Vinay ;
Zeadally, Sherali .
COMPUTER COMMUNICATIONS, 2020, 155 :1-8
[2]  
Fan W., 2020, Automatica, V115
[3]   Consensus-Based Distributed State Estimation Over Sensor Networks With Encoding-Decoding Scheme: Accommodating Bandwidth Constraints [J].
Gao, Chen ;
Wang, Zidong ;
Hu, Jun ;
Liu, Yang ;
He, Xiao .
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2022, 9 (06) :4051-4064
[4]   Protocol-Based Tobit Kalman Filter Under Integral Measurements and Probabilistic Sensor Failures [J].
Geng, Hang ;
Wang, Zidong ;
Zou, Lei ;
Mousavi, Alireza ;
Cheng, Yuhua .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2021, 69 :546-559
[5]   Incorporating delayed and infrequent measurements in Extended Kalman Filter based nonlinear state estimation [J].
Gopalakrishnan, Ajit ;
Kaisare, Niket S. ;
Narasimhan, Shankar .
JOURNAL OF PROCESS CONTROL, 2011, 21 (01) :119-129
[6]   Impulsive Consensus of Multiagent Systems With Limited Bandwidth Based on Encoding-Decoding [J].
Han, Yiyan ;
Li, Chuandong ;
Zhang, Wanli ;
Ahmad, Hafiz Gulfam .
IEEE TRANSACTIONS ON CYBERNETICS, 2020, 50 (01) :36-47
[7]   Finite-Time Switching Resilient Control for Networked Teleoperation System With Time-Varying Delays and Random DoS Attacks [J].
Hu, Lingyan ;
Huang, Jiarun ;
Hao, Shuang ;
Liu, Shichao ;
Lu, Jiecheng ;
Chen, Bingyang .
IEEE TRANSACTIONS ON INDUSTRIAL CYBER-PHYSICAL SYSTEMS, 2024, 2 :232-243
[8]   Input-to-state stability for discrete-time nonlinear systems [J].
Jiang, ZP ;
Wang, Y .
AUTOMATICA, 2001, 37 (06) :857-869
[9]   A Survey on Network Security for Cyber-Physical Systems: From Threats to Resilient Design [J].
Kim, Sangjun ;
Park, Kyung-Joon ;
Lu, Chenyang .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2022, 24 (03) :1534-1573
[10]   Partial-Nodes-Based State Estimation for Complex Networks With Constrained Bit Rate [J].
Li, Jun-Yi ;
Wang, Zidong ;
Lu, Renquan ;
Xu, Yong .
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (02) :1887-1899