Cyber-attack detection and resilient operation of nonlinear processes under economic model predictive control

被引:30
作者
Chen, Scarlett [1 ]
Wu, Zhe [1 ]
Christofides, Panagiotis D. [1 ,2 ]
机构
[1] Univ Calif Los Angeles, Dept Chem & Biomol Engn, Los Angeles, CA 90095 USA
[2] Univ Calif Los Angeles, Dept Elect & Comp Engn, Los Angeles, CA 90095 USA
关键词
Cyber-attacks; Attack detection; Neural networks; Process control; Model predictive control; Nonlinear processes; OPTIMIZATION;
D O I
10.1016/j.compchemeng.2020.106806
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This work proposes resilient operation strategies for nonlinear processes that are vulnerable to targeted cyber-attacks, as well as detection and handling of standard types of cyber-attacks. Working with a general class of nonlinear systems, a modified Lyapunov-based Economic Model Predictive Controller (LEMPC) using combined closed-loop and open-loop control action implementation schemes is proposed to optimize economic benefits in a time-varying manner while maintaining closed-loop process stability. Although sensor measurements may be vulnerable to cyber-attacks, the proposed controller design and operation strategy ensure that the process will maintain stability and stay resilient against particular types of destabilizing cyber-attacks. Data-based cyber-attack detectors are developed using sensor data via machine-learning methods, and these detectors are periodically activated and applied online in the context of process operation. Using a continuously stirred tank reactor example, simulation results demonstrate the effectiveness of the resilient control strategy in maintaining stable and economically optimal operation in the presence of cyber-attacks. The detection results produced by the detection algorithm demonstrate the capability of the proposed method in identifying the presence of a cyber-attack, as well as in differentiating between different types of cyber-attacks. Upon successful detection of the cyberattacks, the impact of cyber-attacks can be mitigated by replacing the attacked sensors by secure back-up sensors, and secure operation will resume with the process operated under the proposed resilient LEMPC control strategy. (C) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:15
相关论文
共 47 条
[1]   Survey on Anomaly Detection using Data Mining Techniques [J].
Agrawal, Shikha ;
Agrawal, Jitendra .
KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS 19TH ANNUAL CONFERENCE, KES-2015, 2015, 60 :708-713
[2]   Toward Wireless Control in Industrial Process Automation: A Case Study at a Paper Mill [J].
Ahlen, Anders ;
Akerberg, Johan ;
Eriksson, Markus ;
Isaksson, Alf J. ;
Iwaki, Takuya ;
Johansson, Karl Henrik ;
Knorn, Steffi ;
Lindh, Thomas ;
Sandberg, Henrik .
IEEE CONTROL SYSTEMS MAGAZINE, 2019, 39 (05) :36-57
[3]   Cyber Security of Water SCADA Systems-Part I: Analysis and Experimentation of Stealthy Deception Attacks [J].
Amin, Saurabh ;
Litrico, Xavier ;
Sastry, Shankar ;
Bayen, Alexandre M. .
IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2013, 21 (05) :1963-1970
[4]   Economic optimization using model predictive control with a terminal cost [J].
Amrit, Rishi ;
Rawlings, James B. ;
Angeli, David .
ANNUAL REVIEWS IN CONTROL, 2011, 35 (02) :178-186
[5]  
ardenas C, 2011, ASIACCS, P355, DOI DOI 10.1145/1966913.1966959
[6]   Cybersecurity in industrial control systems: Issues, technologies, and challenges [J].
Asghar, Muhammad Rizwan ;
Hu, Qinwen ;
Zeadally, Sherali .
COMPUTER NETWORKS, 2019, 165
[7]   Cyber physical systems security: Analysis, challenges and solutions [J].
Ashibani, Yosef ;
Mahmoud, Qusay H. .
COMPUTERS & SECURITY, 2017, 68 :81-97
[8]  
Bishop C. M., 2006, Pattern Recognition and Machine Learning, DOI DOI 10.1117/1.2819119
[9]  
Burden Frank, 2008, V458, P25
[10]   A Preliminary Design-Phase Security Methodology for Cyber-Physical Systems [J].
Carter, Bryan ;
Adams, Stephen ;
Bakirtzis, Georgios ;
Sherburne, Tim ;
Beling, Peter ;
Horowitz, Barry ;
Fleming, Cody .
SYSTEMS, 2019, 7 (02)