Stochastic stability analysis of networked control systems with random cryptographic protection under random zero-measurement attacks

被引:4
作者
Gao, Meng-zhou [1 ,2 ,3 ]
Feng, Dong-qin [1 ]
机构
[1] Zhejiang Univ, State Key Lab Ind Control Technol, Hangzhou 310027, Zhejiang, Peoples R China
[2] Hangzhou Dianzi Univ, Sch Cyberspace, Hangzhou 310018, Zhejiang, Peoples R China
[3] Shanghai Key Lab Integrated Adm Technol Informat, Shanghai 200240, Peoples R China
基金
中国国家自然科学基金;
关键词
Networked control systems; Security; Cyber attacks; Stochastic stability; Cryptographic protection; SECURITY; ENERGY;
D O I
10.1631/FITEE.1700334
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security issues in networked control systems (NCSs) have received increasing attention in recent years. However, security protection often requires extra energy consumption, computational overhead, and time delays, which could adversely affect the real-time and energy-limited system. In this paper, random cryptographic protection is implemented. It is less expensive with respect to computational overhead, time, and energy consumption, compared with persistent cryptographic protection. Under the consideration of weak attackers who have little system knowledge, ungenerous attacking capability and the desire for stealthiness and random zero-measurement attacks are introduced as the malicious modification of measurements into zero signals. NCS is modeled as a stochastic system with two correlated Bernoulli distributed stochastic variables for implementation of random cryptographic protection and occurrence of random zero-measurement attacks; the stochastic stability can be analyzed using a linear matrix inequality (LMI) approach. The proposed stochastic stability analysis can help determine the proper probability of running random cryptographic protection against random zero-measurement attacks with a certain probability. Finally, a simulation example is presented based on a vertical take-off and landing (VTOL) system. The results show the effectiveness, robustness, and application of the proposed method, and are helpful in choosing the proper protection mechanism taking into account the time delay and in determining the system sampling period to increase the resistance against such attacks.
引用
收藏
页码:1098 / 1111
页数:14
相关论文
共 27 条
  • [1] Cyber Security of Water SCADA Systems-Part I: Analysis and Experimentation of Stealthy Deception Attacks
    Amin, Saurabh
    Litrico, Xavier
    Sastry, Shankar
    Bayen, Alexandre M.
    [J]. IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2013, 21 (05) : 1963 - 1970
  • [2] Bennett CB, 2010, PUBLIC HEALTH 21ST C, P1
  • [3] A Layered Encryption Mechanism for Networked Critical Infrastructures
    Cao, Huayang
    Zhu, Peidong
    Lu, Xicheng
    Gurtov, Andrei
    [J]. IEEE NETWORK, 2013, 27 (01): : 12 - 18
  • [4] Observer-Based Event-Triggering Consensus Control for Multiagent Systems With Lossy Sensors and Cyber-Attacks
    Ding, Derui
    Wang, Zidong
    Ho, Daniel W. C.
    Wei, Guoliang
    [J]. IEEE TRANSACTIONS ON CYBERNETICS, 2017, 47 (08) : 1936 - 1947
  • [5] Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks
    Ding, Derui
    Wang, Zidong
    Ho, Daniel W. C.
    Wei, Guoliang
    [J]. AUTOMATICA, 2017, 78 : 231 - 240
  • [6] On scheduling of deception attacks for discrete-time networked systems equipped with attack detectors
    Ding, Derui
    Wei, Guoliang
    Zhang, Sunjie
    Liu, Yurong
    Alsaadi, Fuad E.
    [J]. NEUROCOMPUTING, 2017, 219 : 99 - 106
  • [7] Distributed Secure Coordinated Control for Multiagent Systems Under Strategic Attacks
    Feng, Zhi
    Wen, Guanghui
    Hu, Guoqiang
    [J]. IEEE TRANSACTIONS ON CYBERNETICS, 2017, 47 (05) : 1273 - 1284
  • [8] On co-design of filter and fault estimator against randomly occurring nonlinearities and randomly occurring deception attacks
    Hu, Jun
    Liu, Steven
    Ji, Donghai
    Li, Shanqiang
    [J]. INTERNATIONAL JOURNAL OF GENERAL SYSTEMS, 2016, 45 (05) : 619 - 632
  • [9] Design optimization for security- and safety-critical distributed real-time applications
    Jiang, Wei
    Pop, Paul
    Jiang, Ke
    [J]. MICROPROCESSORS AND MICROSYSTEMS, 2017, 52 : 401 - 415
  • [10] ROBUST-CONTROL WITH STRUCTURED PERTURBATIONS
    KEEL, LH
    BHATTACHARYYA, SP
    HOWZE, JW
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 1988, 33 (01) : 68 - 78