Deception attack detection based on bandwidth allocation for switched systems with quantization

被引:14
作者
Yan, Jingjing [1 ]
Xia, Yuanqing [2 ]
Feng, Xiaoliang [3 ]
Zhang, Yingqi [4 ]
机构
[1] Henan Univ Technol, Coll Elect Engn, Zhengzhou 450001, Peoples R China
[2] Beijing Inst Technol, Sch Automat, Beijing 100081, Peoples R China
[3] Shanghai Dianji Univ, Sch Elect Engn, Shanghai 201306, Peoples R China
[4] Henan Univ Technol, Sch Sci, Zhengzhou 450001, Peoples R China
基金
中国国家自然科学基金;
关键词
Switched systems; Bandwidth allocation; Attack detection; Quantization; 01 code tampering; CYBER-PHYSICAL SYSTEMS; FEEDBACK STABILIZATION; JUMP SYSTEMS;
D O I
10.1016/j.automatica.2023.111094
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article discusses a more practical deception attack on the continuous-time switched systems, i.e. a malicious attacker tampers with the binary 01 code transmitted through the network. Assume that the switching is slow enough and the attacker's energy is limited, we propose a coding transmission strategy based on bandwidth allocation, which selects a part of the network bandwidth for reverse data transmission. Under such strategy, partial detection of attacks and synchronous update of quantization rules are realized. Combined the increasing/decreasing rate of Lyapunov function with the success rate of attack detection, the sufficient conditions ensuring the mean square exponential stability of the system are given. Taking the maximum convergence rate as a performance indicator, the optimal bandwidth allocation scheme is provided for the specific values, which realizes a trade-off between attack detection rate and quantization error. Two-tank system is adopted to illustrate the effectiveness of the theoretical analysis.& COPY; 2023 Elsevier Ltd. All rights reserved.
引用
收藏
页数:10
相关论文
共 28 条
[1]   Analysis of the Least Sum-of-Minimums Estimator for Switched Systems [J].
Bako, Laurent .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (08) :3733-3740
[2]   Denial of Service Attacks on Control Systems with Packet Loss [J].
Casbolt, William ;
Esnaola, Inaki ;
Jones, Bryn .
IFAC PAPERSONLINE, 2020, 53 (02) :3488-3495
[3]   Static Output Feedback Quantized Control for Fuzzy Markovian Switching Singularly Perturbed Systems With Deception Attacks [J].
Cheng, Jun ;
Wang, Yueying ;
Park, Ju H. ;
Cao, Jinde ;
Shi, Kaibo .
IEEE TRANSACTIONS ON FUZZY SYSTEMS, 2022, 30 (04) :1036-1047
[4]   A structural approach to unknown inputs observation for switching linear systems [J].
Conte, Giuseppe ;
Perdon, Anna Maria ;
Zattoni, Elena .
AUTOMATICA, 2021, 129
[5]   Sampled-Based Consensus for Nonlinear Multiagent Systems With Deception Attacks: The Decoupled Method [J].
Cui, Ying ;
Liu, Yurong ;
Zhang, Wenbing ;
Alsaadi, Fuad E. .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2021, 51 (01) :561-573
[6]   Stealthy Actuator Signal Attacks in Stochastic Control Systems: Performance and Limitations [J].
Fang, Chongrong ;
Qi, Yifei ;
Chen, Jiming ;
Tan, Rui ;
Zheng, Wei Xing .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2020, 65 (09) :3927-3934
[7]   Resilient control under Denial-of-Service: Robust design [J].
Feng, Shuai ;
Tesi, Pietro .
AUTOMATICA, 2017, 79 :42-51
[8]   Resilient Cooperative Source Seeking of Double-Integrator Multi-Robot Systems Under Deception Attacks [J].
Fu, Weiming ;
Qin, Jiahu ;
Zheng, Wei Xing ;
Chen, Yuhang ;
Kang, Yu .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2021, 68 (05) :4218-4227
[9]   Event-triggered output feedback control for discrete Markov jump systems under deception attack [J].
Gao, Jinfeng ;
Zhao, Zhen ;
Wang, Jinxia ;
Tan, Tian ;
Ma, Miao .
JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2020, 357 (11) :6435-6452
[10]   Distributed Krein space-based attack detection over sensor networks under deception attacks [J].
Ge, Xiaohua ;
Han, Qing-Long ;
Zhong, Maiying ;
Zhang, Xian-Ming .
AUTOMATICA, 2019, 109