Attack detection and secure correction control for cyber-physical systems subject to actuator deception attacks

被引:0
作者
He, Ke [1 ]
Long, Yue [1 ]
Li, Tieshan [1 ,2 ]
机构
[1] Univ Elect Sci & Technol China, Sch Automat Engn, Chengdu, Peoples R China
[2] Univ Elect Sci & Technol China, Yangtze Delta Region Inst, Huzhou, Peoples R China
来源
2023 35TH CHINESE CONTROL AND DECISION CONFERENCE, CCDC | 2023年
关键词
cyber-physical systems; attack detection; actuator attacks; attack reconstruction; security correction control;
D O I
10.1109/CCDC58219.2023.10326906
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper investigates the attack detection and secure correction control problems for cyber-physical systems (CPSs) under actuator attacks. First, by designing the sliding mode observer, the estimation of system states can be obtained. Then, the attack signal is reconstructed by using the signal obtained by the observer and the robust differentiator, attack detection is also considered with the reconstructed signal. In addition, compensation of attacks in control strategy is also addressed for plants. We consider the problem of designing state-feedback controller with attack signal compensation that stabilize the system despite actuator attacks. Finally, simulation results are given to illustrate the effectiveness and potential of the proposed technique.
引用
收藏
页码:3356 / 3361
页数:6
相关论文
共 21 条
  • [1] Adaptive cyber-physical system attack detection and reconstruction with application to power systems
    Ao, Wei
    Song, Yongdong
    Wen, Changyun
    [J]. IET CONTROL THEORY AND APPLICATIONS, 2016, 10 (12) : 1458 - 1468
  • [2] Security Control for Discrete-Time Stochastic Nonlinear Systems Subject to Deception Attacks
    Ding, Derui
    Wang, Zidong
    Han, Qing-Long
    Wei, Guoliang
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2018, 48 (05): : 779 - 789
  • [3] Gill H., 2008, VISION REALITY CYBER
  • [4] On convergence of tracking differentiator
    Guo, Bao-Zhu
    Zhao, Zhi-Liang
    [J]. INTERNATIONAL JOURNAL OF CONTROL, 2011, 84 (04) : 693 - 701
  • [5] From PID to Active Disturbance Rejection Control
    Han, Jingqing
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2009, 56 (03) : 900 - 906
  • [6] Intrusion Detection in Cyber-Physical Systems: Techniques and Challenges
    Han, Song
    Xie, Miao
    Chen, Hsiao-Hwa
    Ling, Yun
    [J]. IEEE SYSTEMS JOURNAL, 2014, 8 (04): : 1049 - 1059
  • [7] Khan R., 2016, P 4 INT S ICS SCADA, P5363
  • [8] On Topology Attack of a Smart Grid: Undetectable Attacks and Countermeasures
    Kim, Jinsub
    Tong, Lang
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (07) : 1294 - 1305
  • [9] Consensus of linear multi-agent systems by distributed event-triggered strategy with designable minimum inter-event time
    Li, Meilin
    Long, Yue
    Li, Tieshan
    Chen, C. L. Philip
    [J]. INFORMATION SCIENCES, 2022, 609 : 644 - 659
  • [10] Distributed Fault-Tolerant Containment Control Protocols for the Discrete-Time Multiagent Systems via Reinforcement Learning Method
    Li, Tieshan
    Bai, Weiwei
    Liu, Qi
    Long, Yue
    Chen, C. L. Philip
    [J]. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2023, 34 (08) : 3979 - 3991