Design and Implementation of Secure Networked Predictive Control Systems Under Deception Attacks

被引:213
作者
Pang, Zhong-Hua [1 ,2 ]
Liu, Guo-Ping [3 ,4 ]
机构
[1] Qingdao Technol Univ, Qingdao 266033, Peoples R China
[2] Chinese Acad Sci, Inst Automat, Beijing 100190, Peoples R China
[3] Univ Glamorgan, Fac Adv Technol, Pontypridd CF37 1DL, M Glam, Wales
[4] Harbin Inst Technol, CTGT Ctr, Harbin 150001, Peoples R China
基金
美国国家科学基金会;
关键词
Communication constraints; data confidentiality; deception attacks; experiments; recursive networked predictive control (RNPC); secure networked control systems (SNCSs); stability; STABILITY ANALYSIS; INTERNET;
D O I
10.1109/TCST.2011.2160543
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This brief addresses the security issues of data transmitted in networked control systems (NCSs), especially confidentiality, integrity and authenticity. A secure networked predictive control system (SNPCS) architecture is presented, which integrates the Data Encryption Standard (DES) algorithm, Message Digest (MD5) algorithm, timestamp strategy, and recursive networked predictive control (RNPC) method. The former three parts are used to form a secure transmission mechanism between the controller side and the plant side, which is responsible for enforcing the data confidentiality and checking the data integrity and authenticity. To guarantee the control system performance when suffering from deception attacks, the RNPC method based on round-trip time delays is proposed to compensate for the adverse effects introduced by the deception attacks as well as the network communication constraints, such as time-varying network delay, packet disorder and packet dropout. A theoretical result using the switched system theory is obtained for the closed-loop stability of the RNPC system. Practical experiments are performed to demonstrate the effectiveness of the proposed SNPCS.
引用
收藏
页码:1334 / 1342
页数:9
相关论文
共 33 条
[1]   A remote surgery experiment between Japan and Thailand over internet using a low latency CODEC system [J].
Arata, Jumpei ;
Takahashi, Hiroki ;
Pitakwatchara, Phongsaen ;
Warisawa, Shin'ichi ;
Tanoue, Kazuo ;
Konishi, Kozo ;
Ieiri, Satoshi ;
Shimizu, Shuji ;
Nakashima, Naoki ;
Okamura, Koji ;
Fujino, Yuichi ;
Ueda, Yukihiro ;
Chotiwan, Pornarong ;
Mitsuishi, Mamoru ;
Hashizume, Makoto .
PROCEEDINGS OF THE 2007 IEEE INTERNATIONAL CONFERENCE ON ROBOTICS AND AUTOMATION, VOLS 1-10, 2007, :953-959
[2]   On Wireless Links for Vehicle-to-Infrastructure Communications [J].
Belanovic, Pavle ;
Valerio, Danilo ;
Paier, Alexander ;
Zemen, Thomas ;
Ricciato, Fabio ;
Mecklenbraeuker, Christoph F. .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2010, 59 (01) :269-282
[3]  
Cardenas A., 2008, 3 USENIX WORKSH HOT
[4]  
Cardenas Alvaro A., 2008, 2008 28th International Conference on Distributed Computing Systems Workshops (ICDCS Workshops), P495, DOI 10.1109/ICDCS.Workshops.2008.40
[5]   Design and practical implementation of internet-based predictive control of a servo system [J].
Chai, Senchun ;
Liu, Guo-Ping ;
Rees, David ;
Xia, Yuanqing .
IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2008, 16 (01) :158-168
[6]   Be secure [J].
Creery, Adam A. ;
Byres, E. J. .
IEEE INDUSTRY APPLICATIONS MAGAZINE, 2007, 13 (04) :49-55
[7]   Stability analysis and control synthesis for switched systems: A switched Lyapunov function approach [J].
Daafouz, J ;
Riedinger, P ;
Iung, C .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2002, 47 (11) :1883-1887
[8]   Security for industrial communications systems [J].
Dzung, D ;
Naedele, M ;
Von Hoff, TP ;
Crevatin, MC .
PROCEEDINGS OF THE IEEE, 2005, 93 (06) :1152-1177
[9]   Industrial Wireless Sensor Networks: Challenges, Design Principles, and Technical Approaches [J].
Gungor, Vehbi C. ;
Hancke, Gerhard P. .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2009, 56 (10) :4258-4265
[10]  
Gupta Rachana A., 2008, IECON 2008 - 34th Annual Conference of IEEE Industrial Electronics Society, P2929, DOI 10.1109/IECON.2008.4758425