Active Defense-Based Resilient Sliding Mode Control Under Denial-of-Service Attacks

被引:125
作者
Wu, Chengwei [1 ]
Wu, Ligang [1 ]
Liu, Jianxing [1 ]
Jiang, Zhong-Ping [2 ]
机构
[1] Harbin Inst Technol, Dept Control Sci & Engn, Harbin 150001, Heilongjiang, Peoples R China
[2] NYU, Tandon Sch Engn, Dept Elect & Comp Engn, Brooklyn, NY 11201 USA
基金
中国国家自然科学基金; 美国国家科学基金会;
关键词
Defense mechanism; resilient sliding mode control; game theory; DoS attack; ADAPTIVE OPTIMAL-CONTROL; RISK-SENSITIVE CONTROL; STOCHASTIC-SYSTEMS; NETWORKED CONTROL; LINEAR-SYSTEMS; GAME; DESIGN;
D O I
10.1109/TIFS.2019.2917373
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper investigates the problem of the resilient control for cyber-physical systems (CPSs) in the presence of malicious sensor denial-of-service (DoS) attacks, which result in the loss of state information. The concepts of DoS frequency and DoS duration are introduced to describe the DoS attacks. According to the attack situation, that is, whether the attack is successfully implemented or not, the original physical system is rewritten as a switched version. A resilient sliding mode control scheme is designed to guarantee that the physical process is exponentially stable, which is a foundation of the main results. Then, a zero-sum game is employed to establish an effective mixed defense mechanism. Furthermore, a defense-based resilient sliding mode control scheme is proposed and the desired control performance is achieved. Compared with the existing results, the differences mainly lie in two aspects, that is, one where a switched model is obtained, based on which the average dwell-time like approach is utilized to derive the resilient control scheme, and the other where the zero-sum game in employed to make the attacks satisfy the concepts of DoS frequency and DoS duration. Finally, simulation results are given to demonstrate the effectiveness of the proposed resilient control approach.
引用
收藏
页码:237 / 249
页数:13
相关论文
共 44 条
[1]   Model-free Q-learning designs for linear discrete-time zero-sum games with application to H-infinity control [J].
Al-Tamimi, Asma ;
Lewis, Frank L. ;
Abu-Khalaf, Murad .
AUTOMATICA, 2007, 43 (03) :473-481
[2]   Cyber Security of Water SCADA Systems-Part I: Analysis and Experimentation of Stealthy Deception Attacks [J].
Amin, Saurabh ;
Litrico, Xavier ;
Sastry, Shankar ;
Bayen, Alexandre M. .
IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2013, 21 (05) :1963-1970
[3]  
[Anonymous], IEEE T CIRCUITS SYST
[4]   Risk-Sensitive Control Under Markov Modulated Denial-of-Service (DoS) Attack Strategies [J].
Befekadu, Getachew K. ;
Gupta, Vijay ;
Antsaklis, Panos J. .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2015, 60 (12) :3299-3304
[5]  
Befekadu GK, 2011, P AMER CONTR CONF, P643
[6]   Value iteration and adaptive dynamic programming for data-driven adaptive optimal control design [J].
Bian, Tao ;
Jiang, Zhong-Ping .
AUTOMATICA, 2016, 71 :348-360
[7]   Defending against flooding-based distributed denial-of-service attacks: A tutorial [J].
Chang, RKC .
IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (10) :42-51
[8]   Networked control of nonlinear systems under Denial-of-Service [J].
De Persis, C. ;
Tesi, P. .
SYSTEMS & CONTROL LETTERS, 2016, 96 :124-131
[9]   Input-to-State Stabilizing Control Under Denial-of-Service [J].
De Persis, Claudio ;
Tesi, Pietro .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2015, 60 (11) :2930-2944
[10]   Discrete-Time Switched Linear Systems State Feedback Design With Application to Networked Control [J].
Deaecto, Grace S. ;
Souza, Matheus ;
Geromel, Jose C. .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2015, 60 (03) :877-881