Active Security Control Approach Against DoS Attacks in Cyber-Physical Systems

被引:116
作者
Li, Tongxiang [1 ,2 ]
Chen, Bo [1 ,2 ]
Yu, Li [1 ,2 ]
Zhang, Wen-An [1 ,2 ]
机构
[1] Zhejiang Univ Technol, Coll Informat Engn, Hangzhou 310023, Peoples R China
[2] Zhejiang Univ Technol, Inst Cyberspace Secur, Hangzhou 310023, Peoples R China
基金
中国国家自然科学基金;
关键词
Denial-of-service attack; Actuators; Frequency control; Time measurement; Cyber-physical systems; Process control; Actively defend; cyber-physical systems (CPS); DoS attacks; experiments; security control; security transmission policy; TRIGGERED RESILIENT CONTROL; NETWORKED CONTROL-SYSTEMS;
D O I
10.1109/TAC.2020.3032598
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An active security control approach is developed in this article for cyber-physical systems (CPSs) under denial-of-service (DoS) attacks, where DoS attacks exist in both the sensor-to-controller (S-C) channel and the controller-to-actuator (C-A) channel. Due to the cost constraints of attacks, it is reasonable to consider that the number of maximum continuous DoS attacks in both the S-C and the C-A channels is bounded. Then, to defend the two-channel DoS attacks, an active security control strategy that makes full use of the unattacked intervals is designed to ensure that the control inputs are updated timely in each period. Meanwhile, a security controller that contains both the current and future control inputs is designed. Under the active security control strategy and the security controller, the addressed CPS under two-channel DoS attacks can be asymptotically stable without losing the control performance. Finally, both the simulations and experiments are given to demonstrate the effectiveness of the proposed active security control approach.
引用
收藏
页码:4303 / 4310
页数:8
相关论文
共 32 条
[1]   Security of interdependent and identical networked control systems [J].
Amin, Saurabh ;
Schwartz, Galina A. ;
Sastry, S. Shankar .
AUTOMATICA, 2013, 49 (01) :186-192
[2]  
Amin S, 2009, LECT NOTES COMPUT SC, V5469, P31, DOI 10.1007/978-3-642-00602-9_3
[3]   Risk-Sensitive Control Under Markov Modulated Denial-of-Service (DoS) Attack Strategies [J].
Befekadu, Getachew K. ;
Gupta, Vijay ;
Antsaklis, Panos J. .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2015, 60 (12) :3299-3304
[4]  
Boyd S., 1994, Linear Matrix Inequalities in System and Control Theory, V1st ed., P7
[5]   Cognitive Radio Based State Estimation in Cyber-Physical Systems [J].
Cao, Xianghui ;
Cheng, Peng ;
Chen, Jiming ;
Ge, Shuzhi Sam ;
Cheng, Yu ;
Sun, Youxian .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2014, 32 (03) :489-502
[6]   An Overview on Denial-of-Service Attacks in Control Systems: Attack Models and Security Analyses [J].
Cetinkaya, Ahmet ;
Ishii, Hideaki ;
Hayakawa, Tomohisa .
ENTROPY, 2019, 21 (02)
[7]   Secure Fusion Estimation for Bandwidth Constrained Cyber-Physical Systems Under Replay Attacks [J].
Chen, Bo ;
Ho, Daniel W. C. ;
Hu, Guoqiang ;
Yu, Li .
IEEE TRANSACTIONS ON CYBERNETICS, 2018, 48 (06) :1862-1876
[8]   Distributed Dimensionality Reduction Fusion Estimation for Cyber-Physical Systems Under DoS Attacks [J].
Chen, Bo ;
Ho, Daniel W. C. ;
Zhang, Wen-An ;
Yu, Li .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2019, 49 (02) :455-468
[9]   Input-to-State Stabilizing Control Under Denial-of-Service [J].
De Persis, Claudio ;
Tesi, Pietro .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2015, 60 (11) :2930-2944
[10]   Recursive Filtering of Distributed Cyber-Physical Systems With Attack Detection [J].
Ding, Derui ;
Han, Qing-Long ;
Wang, Zidong ;
Ge, Xiaohua .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2021, 51 (10) :6466-6476