Resilient strategy design for cyber-physical system under DoS attack over a multi-channel framework

被引:49
作者
Yuan, Huanhuan [1 ]
Xia, Yuanqing [1 ]
机构
[1] Beijing Inst Technol, Sch Automat, Beijing 100081, Peoples R China
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
Resilient strategy; Cyber-physical system; Denial-of-service attack; Multi-channel transmission; Delta domain; NETWORKED CONTROL-SYSTEMS; STOCHASTIC NONLINEARITIES; STATE ESTIMATION; GAME; SECURITY; PRIVACY;
D O I
10.1016/j.ins.2018.04.082
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper is concerned with the design of resilient strategy for a class of cyber-physical system (CPS) under denial-of-service (DoS) attack. The DoS attack occurring in wireless network between sensor and remote estimation is considered. For the addressed CPS, a minimax control strategy is designed in the presence of DoS attack in delta domain under imperfect state measurements (IPSM). Then, a novel multi-channel transmission framework is constructed to reduce the probability of being attacked, where transmitter chooses a single channel to send data packet and meanwhile the DoS attacker decides a target channel to attack. Taking account of the control system performance, a two-player Markov stochastic game is built to model the interactive decision-making of both sides under energy budget constraints. Dynamic programming and value iteration methods are applied for the control strategy and power transmission strategy design, respectively. Numerical simulations are presented to illustrate the validity of the scheme. (C) 2018 Elsevier Inc. All rights reserved.
引用
收藏
页码:312 / 327
页数:16
相关论文
共 45 条
[1]   Secure design for cloud control system against distributed denial of service attack [J].
Ali Y. ;
Xia Y. ;
Ma L. ;
Hammad A. .
Control Theory and Technology, 2018, 16 (01) :14-24
[2]  
[Anonymous], 2005, WIRELESS COMMUNICATI
[3]  
[Anonymous], 1994, P 11 INT C INT C MAC
[4]  
Batar T., 2008, HOO OPTIMAL CONTROL
[5]   Event-based security control for discrete-time stochastic systems [J].
Ding, Derui ;
Wang, Zidong ;
Wei, Guoliang ;
Alsaadi, Fuad E. .
IET CONTROL THEORY AND APPLICATIONS, 2016, 10 (15) :1808-1815
[6]   A multi-channel transmission schedule for remote state estimation under DoS attacks [J].
Ding, Kemi ;
Li, Yuzhe ;
Quevedo, Daniel E. ;
Dey, Subhrakanti ;
Shi, Ling .
AUTOMATICA, 2017, 78 :194-201
[7]   Security and Privacy in Cyber-Physical Systems: A Survey of Surveys [J].
Giraldo, Jairo ;
Sarkar, Esha ;
Cardenas, Alvaro A. ;
Maniatakos, Michail ;
Kantarcioglu, Murat .
IEEE DESIGN & TEST, 2017, 34 (04) :7-17
[8]   Distributed Attack Detection and Secure Estimation of Networked Cyber-Physical Systems Against False Data Injection Attacks and Jamming Attacks [J].
Guan, Yanpeng ;
Ge, Xiaohua .
IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS, 2018, 4 (01) :48-59
[9]   Artificial-Noise-Aided Secure Transmission Scheme With Limited Training and Feedback Overhead [J].
Hu, Jianwei ;
Cai, Yueming ;
Yang, Nan ;
Zhou, Xiangyun ;
Yang, Weiwei .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2017, 16 (01) :193-205
[10]   Defending unknown attacks on cyber-physical systems by semi-supervised approach and available unlabeled data [J].
Huda, Shamsul ;
Miah, Suruz ;
Hassan, Mohammad Mehedi ;
Islam, Rafiqul ;
Yearwood, John ;
Alrubaian, Majed ;
Almogren, Ahmad .
INFORMATION SCIENCES, 2017, 379 :211-228