Resilient predictive control strategy of cyber-physical systems against FDI attack

被引:13
作者
He, Ning [1 ]
Ma, Kai [1 ]
Li, Huiping [2 ]
机构
[1] Xian Univ Architecture & Technol, Sch Mech & Elect Engn, Xian, Peoples R China
[2] Northwestern Polytech Univ, Sch Matine Sci & Technol, Xian 710072, Peoples R China
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
NETWORKED CONTROL-SYSTEMS; DATA INJECTION ATTACKS;
D O I
10.1049/cth2.12289
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Self-triggered control strategy has been widely applied in cyber-physical systems, which are unavoidable to suffer various malicious cyber-attacks. This paper is aimed at solving the cyber security problem of self-triggered model predictive control in cyber-physical systems under false data injection attack, and a resilient control strategy is proposed based on control signal reconstruction. Firstly, the continuous control signal is discretely sampled at the controller side, and the key data samples are determined and protected. Then, the discretised control samples are transmitted through the network channel, based on which the control signal is reconstructed at the controlled system side according to a preset mode. It is further theoretically proved that the control signals reconstructed from the critical control samples can guarantee the feasibility and stability of the control system against the FDI attacks. Finally, a simulation verification on a robot system is conducted to verify the effectiveness of the proposed algorithm.
引用
收藏
页码:1098 / 1109
页数:12
相关论文
共 39 条
[1]  
Abbaspour A., 2019, IEEE T IND ELECTRON, V67, p7951 7962
[2]   False data injection attack (FDIA): an overview and new metrics for fair evaluation of its countermeasure [J].
Ahmed, Mohiuddin ;
Pathan, Al-Sakib Khan .
COMPLEX ADAPTIVE SYSTEMS MODELING, 2020, 8 (01)
[3]   Adaptive cyber-physical system attack detection and reconstruction with application to power systems [J].
Ao, Wei ;
Song, Yongdong ;
Wen, Changyun .
IET CONTROL THEORY AND APPLICATIONS, 2016, 10 (12) :1458-1468
[4]   Secure Fusion Estimation for Bandwidth Constrained Cyber-Physical Systems Under Replay Attacks [J].
Chen, Bo ;
Ho, Daniel W. C. ;
Hu, Guoqiang ;
Yu, Li .
IEEE TRANSACTIONS ON CYBERNETICS, 2018, 48 (06) :1862-1876
[5]   Data-Driven Resilient Automatic Generation Control Against False Data Injection Attacks [J].
Chen, Chunyu ;
Chen, Yang ;
Zhao, Junbo ;
Zhang, Kaifeng ;
Ni, Ming ;
Ren, Bixing .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (12) :8092-8101
[6]   A quasi-infinite horizon nonlinear model predictive control scheme with guaranteed stability [J].
Chen, H ;
Allgower, F .
AUTOMATICA, 1998, 34 (10) :1205-1217
[7]   Discrete non-linear inequalities and applications to boundary value problems [J].
Cheung, Wing-Sum ;
Ren, Jingli .
JOURNAL OF MATHEMATICAL ANALYSIS AND APPLICATIONS, 2006, 319 (02) :708-724
[8]   Distributed Reinforcement Learning for Cyber-Physical System With Multiple Remote State Estimation Under DoS Attacker [J].
Dai, Pengcheng ;
Yu, Wenwu ;
Wang, He ;
Wen, Guanghui ;
Lv, Yuezu .
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2020, 7 (04) :3212-3222
[9]   Event-triggered predictive control for networked control systems with DoS attacks [J].
Deng, Yurou ;
Yin, Xiuxia ;
Hu, Songlin .
INFORMATION SCIENCES, 2021, 542 :71-91
[10]   A systems and control perspective of CPS security [J].
Dibaji, Seyed Mehran ;
Pirani, Mohammad ;
Flamholz, David Bezalel ;
Annaswamy, Anuradha M. ;
Johansson, Karl Henrik ;
Chakrabortty, Aranya .
ANNUAL REVIEWS IN CONTROL, 2019, 47 :394-411