Opacity Enforcement for Confidential Robust Control in Linear Cyber-Physical Systems

被引:45
作者
An, Liwei [1 ]
Yang, Guang-Hong [1 ,2 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Peoples R China
[2] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang 110819, Peoples R China
基金
中国国家自然科学基金;
关键词
Interference; Aerospace electronics; Linear systems; Radar; Jamming; Security; Privacy; Cyber-physical systems (CPSs); interference attenuation capacity (IAC); linear systems; opacity; Q-learning; DISCRETE-EVENT SYSTEMS; THEORETIC METHODS; SECURITY; VALIDATION; OBSERVERS;
D O I
10.1109/TAC.2019.2925498
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Opacity, a confidentiality property, is an increasing concern in cyber-physical systems (CPSs) that are vulnerable to an intruder which intends to reveal a "secret" of a system. This note presents a new framework for opacity and considers the problem of enforcing opacity in CPSs modeled as linear time-invariant systems. The confidential information involves the CPS' interference attenuation capacity (IAC), called the secret. A system is opaque if the intruder never infers the secret IAC from an observation mapping of system output. To guarantee the confidentiality requirement, an effective algorithm is proposed for synthesizing opacity-enforcing controllers by using a new approximation-based Q-learning. A main advantage of this method is that it does not require any knowledge of the system dynamics matrices. A simulation example is presented to sustain the theoretical results.
引用
收藏
页码:1234 / 1241
页数:8
相关论文
共 42 条
[11]   Supervisory Control for Opacity [J].
Dubreil, Jeremy ;
Darondeau, Philippe ;
Marchand, Herve .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2010, 55 (05) :1089-1100
[12]   Enforcement and validation (at runtime) of various notions of opacity [J].
Falcone, Ylies ;
Marchand, Herve .
DISCRETE EVENT DYNAMIC SYSTEMS-THEORY AND APPLICATIONS, 2015, 25 (04) :531-570
[13]   Stuxnet and the Future of Cyber War [J].
Farwell, James P. ;
Rohozinski, Rafal .
SURVIVAL, 2011, 53 (01) :23-40
[14]   Overview of discrete event systems opacity: Models, validation, and quantification [J].
Jacob, Romain ;
Lesage, Jean-Jacques ;
Faure, Jean-Marc .
ANNUAL REVIEWS IN CONTROL, 2016, 41 :135-146
[15]   Enforcement of opacity by public and private insertion functions [J].
Ji, Yiding ;
Wu, Yi-Chin ;
Lafortune, Stephane .
AUTOMATICA, 2018, 93 :369-378
[16]  
Johnston S. L., 1979, RADAR ELECT COUNTER
[17]   Model-free H∞ control design for unknown linear discrete-time systems via Q-learning with LMI [J].
Kim, J. -H. ;
Lewis, F. L. .
AUTOMATICA, 2010, 46 (08) :1320-1326
[18]   Subspace Methods for Data Attack on State Estimation: A Data Driven Approach [J].
Kim, Jinsub ;
Tong, Lang ;
Thomas, Robert J. .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2015, 63 (05) :1102-1114
[19]   Reinforcement Learning for Partially Observable Dynamic Processes: Adaptive Dynamic Programming Using Measured Output Data [J].
Lewis, F. L. ;
Vamvoudakis, Kyriakos G. .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 2011, 41 (01) :14-25
[20]   Fault detection in finite frequency domain for Takagi-Sugeno fuzzy systems with sensor faults [J].
Li, Xiao-Jian ;
Yang, Guang-Hong .
IEEE TRANSACTIONS ON CYBERNETICS, 2014, 44 (08) :1446-1458