• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

针对一类频域受限传感器和执行器攻击的信息物理系统可靠控制策略。

Reliable Control Policy of Cyber-Physical Systems Against a Class of Frequency-Constrained Sensor and Actuator Attacks.

出版信息

IEEE Trans Cybern. 2018 Dec;48(12):3432-3439. doi: 10.1109/TCYB.2018.2815758. Epub 2018 Mar 27.

DOI:10.1109/TCYB.2018.2815758
PMID:29994296
Abstract

This paper is concerned with reliable control problems of cyber-physical systems against a class of frequency-constrained sensor and actuator attacks. We consider a continuous-time linear physical system equipped with an observer-based abnormal detector, and it is assumed that control signals and partial sensor outputs transmitted via network layers are vulnerable to cyber attacks. With the use of detection mechanisms of the abnormal monitor, an upper bound of the worst stealthy attacks is obtained, which is composed of the information of the detector's threshold, the attack's structure, and frequency characteristic. By exploiting the bound information, a novel attack compensator, which can stabilize the system with a nearly desired system performance, is proposed for a situation where an attack may occur without triggering an alarm. Finally, the effectiveness of the proposed control policy is verified by a numerical example.

摘要

本文研究了一类频域受限传感器和执行器攻击下的网络物理系统可靠控制问题。考虑了一类带有基于观测器的异常检测机制的连续时间线性物理系统,假设通过网络层传输的控制信号和部分传感器输出易受到网络攻击。利用异常监测器的检测机制,得到了最坏隐蔽攻击的一个上界,它由检测器的阈值、攻击的结构和频率特性的信息组成。利用该界信息,提出了一种新的攻击补偿器,当攻击可能发生而不会触发报警时,该补偿器可以使系统具有几乎期望的系统性能。最后,通过数值例子验证了所提出的控制策略的有效性。

相似文献

1
Reliable Control Policy of Cyber-Physical Systems Against a Class of Frequency-Constrained Sensor and Actuator Attacks.针对一类频域受限传感器和执行器攻击的信息物理系统可靠控制策略。
IEEE Trans Cybern. 2018 Dec;48(12):3432-3439. doi: 10.1109/TCYB.2018.2815758. Epub 2018 Mar 27.
2
Multiplicative Attacks with Essential Stealthiness in Sensor and Actuator Loops against Cyber-Physical Systems.传感器和执行器环中的乘法攻击与对网络物理系统的基本隐身性。
Sensors (Basel). 2023 Feb 9;23(4):1957. doi: 10.3390/s23041957.
3
A Novel Cyber Attack Detection Method in Networked Control Systems.一种网络控制系统中的新型网络攻击检测方法。
IEEE Trans Cybern. 2018 Nov;48(11):3254-3264. doi: 10.1109/TCYB.2018.2843358. Epub 2018 Jun 26.
4
Summation Detector for False Data-Injection Attack in Cyber-Physical Systems.信息物理系统中针对虚假数据注入攻击的求和检测器
IEEE Trans Cybern. 2020 Jun;50(6):2338-2345. doi: 10.1109/TCYB.2019.2915124. Epub 2019 Jun 3.
5
Data-Driven Methods for Stealthy Attacks on TCP/IP-Based Networked Control Systems Equipped With Attack Detectors.针对配备攻击检测器的基于TCP/IP的网络控制系统的隐蔽攻击的数据驱动方法。
IEEE Trans Cybern. 2019 Aug;49(8):3020-3031. doi: 10.1109/TCYB.2018.2837874. Epub 2018 Jun 5.
6
Stealthy false data injection attacks with resource constraints against multi-sensor estimation systems.针对多传感器估计系统的具有资源约束的隐蔽虚假数据注入攻击。
ISA Trans. 2022 Aug;127:32-40. doi: 10.1016/j.isatra.2022.02.045. Epub 2022 Mar 4.
7
A Secure Control Learning Framework for Cyber-Physical Systems Under Sensor and Actuator Attacks.传感器和执行器攻击下的网络物理系统安全控制学习框架
IEEE Trans Cybern. 2021 Sep;51(9):4648-4660. doi: 10.1109/TCYB.2020.3006871. Epub 2021 Sep 15.
8
Reliable cooperative control and plug-and-play operation for networked heterogeneous systems under cyber-physical attacks.网络异构系统在网络物理攻击下的可靠协同控制与即插即用操作。
ISA Trans. 2020 Sep;104:62-72. doi: 10.1016/j.isatra.2019.10.007. Epub 2019 Oct 24.
9
Attack estimation and state reconstruction for cyber-physical systems with state delay via reduced-order observer.基于降阶观测器的含状态延迟的信息物理系统攻击估计与状态重构
ISA Trans. 2024 Jan;144:11-17. doi: 10.1016/j.isatra.2023.10.013. Epub 2023 Oct 16.
10
Cooperative control for cyber-physical multi-agent networked control systems with unknown false data-injection and replay cyber-attacks.具有未知虚假数据注入和重放网络攻击的信息物理多智能体网络控制系统的协同控制
ISA Trans. 2021 Apr;110:1-14. doi: 10.1016/j.isatra.2020.10.002. Epub 2020 Oct 6.