Suppr超能文献

针对一类频域受限传感器和执行器攻击的信息物理系统可靠控制策略。

Reliable Control Policy of Cyber-Physical Systems Against a Class of Frequency-Constrained Sensor and Actuator Attacks.

出版信息

IEEE Trans Cybern. 2018 Dec;48(12):3432-3439. doi: 10.1109/TCYB.2018.2815758. Epub 2018 Mar 27.

Abstract

This paper is concerned with reliable control problems of cyber-physical systems against a class of frequency-constrained sensor and actuator attacks. We consider a continuous-time linear physical system equipped with an observer-based abnormal detector, and it is assumed that control signals and partial sensor outputs transmitted via network layers are vulnerable to cyber attacks. With the use of detection mechanisms of the abnormal monitor, an upper bound of the worst stealthy attacks is obtained, which is composed of the information of the detector's threshold, the attack's structure, and frequency characteristic. By exploiting the bound information, a novel attack compensator, which can stabilize the system with a nearly desired system performance, is proposed for a situation where an attack may occur without triggering an alarm. Finally, the effectiveness of the proposed control policy is verified by a numerical example.

摘要

本文研究了一类频域受限传感器和执行器攻击下的网络物理系统可靠控制问题。考虑了一类带有基于观测器的异常检测机制的连续时间线性物理系统,假设通过网络层传输的控制信号和部分传感器输出易受到网络攻击。利用异常监测器的检测机制,得到了最坏隐蔽攻击的一个上界,它由检测器的阈值、攻击的结构和频率特性的信息组成。利用该界信息,提出了一种新的攻击补偿器,当攻击可能发生而不会触发报警时,该补偿器可以使系统具有几乎期望的系统性能。最后,通过数值例子验证了所提出的控制策略的有效性。

相似文献

1
Reliable Control Policy of Cyber-Physical Systems Against a Class of Frequency-Constrained Sensor and Actuator Attacks.
IEEE Trans Cybern. 2018 Dec;48(12):3432-3439. doi: 10.1109/TCYB.2018.2815758. Epub 2018 Mar 27.
3
A Novel Cyber Attack Detection Method in Networked Control Systems.
IEEE Trans Cybern. 2018 Nov;48(11):3254-3264. doi: 10.1109/TCYB.2018.2843358. Epub 2018 Jun 26.
4
Summation Detector for False Data-Injection Attack in Cyber-Physical Systems.
IEEE Trans Cybern. 2020 Jun;50(6):2338-2345. doi: 10.1109/TCYB.2019.2915124. Epub 2019 Jun 3.
5
Data-Driven Methods for Stealthy Attacks on TCP/IP-Based Networked Control Systems Equipped With Attack Detectors.
IEEE Trans Cybern. 2019 Aug;49(8):3020-3031. doi: 10.1109/TCYB.2018.2837874. Epub 2018 Jun 5.
6
Stealthy false data injection attacks with resource constraints against multi-sensor estimation systems.
ISA Trans. 2022 Aug;127:32-40. doi: 10.1016/j.isatra.2022.02.045. Epub 2022 Mar 4.
7
A Secure Control Learning Framework for Cyber-Physical Systems Under Sensor and Actuator Attacks.
IEEE Trans Cybern. 2021 Sep;51(9):4648-4660. doi: 10.1109/TCYB.2020.3006871. Epub 2021 Sep 15.
8
Reliable cooperative control and plug-and-play operation for networked heterogeneous systems under cyber-physical attacks.
ISA Trans. 2020 Sep;104:62-72. doi: 10.1016/j.isatra.2019.10.007. Epub 2019 Oct 24.
9
Attack estimation and state reconstruction for cyber-physical systems with state delay via reduced-order observer.
ISA Trans. 2024 Jan;144:11-17. doi: 10.1016/j.isatra.2023.10.013. Epub 2023 Oct 16.

文献AI研究员

20分钟写一篇综述,助力文献阅读效率提升50倍。

立即体验

用中文搜PubMed

大模型驱动的PubMed中文搜索引擎

马上搜索

文档翻译

学术文献翻译模型,支持多种主流文档格式。

立即体验