1
|
Tahoun AH, Arafa M. Secure control design for nonlinear cyber-physical systems under DoS, replay, and deception cyber-attacks with multiple transmission channels. ISA TRANSACTIONS 2022; 128:294-308. [PMID: 34953583 DOI: 10.1016/j.isatra.2021.11.033] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 03/29/2021] [Revised: 11/28/2021] [Accepted: 11/28/2021] [Indexed: 06/14/2023]
Abstract
This paper introduces the state-/output-feedback control for multi-channel nonlinear cyber-physical systems (CPSs). Many cyber-attacks are considered such as Denial-of-Service (DoS), replay and deception attacks. The deception cyber-attacks can be treated as measurement additive and multiplicative uncertainties. Both time-varying state-dependent and state-independent sensor additive attacks are considered. As DoS attack makes the CPS states unavailable, the standard modeling and control methods cannot be applied directly. Alternatively, as attackers in the replay attack re-transmit previous data and prevent the transmission of the more recent data, a delayed model is generated. To deal with these problems, a new observer at the controller side is proposed. It is used to perform two main tasks. The first is to estimate all system states at every time instant. The second is to exclude some unsecured transmitting channels from affecting the system response. Therefore, all attacks in these channels will have no effect on the system response. Using the estimated states, an anti-cyber-attacks state-feedback controller is investigated. Meanwhile, it is verified that the suggested approach certifies the convergence of all the CPSs states under different cyber-attacks. The effectiveness of the proposed secure control approach against different kinds of cyber-attacks is confirmed through two examples with simulation results.
Collapse
Affiliation(s)
- A H Tahoun
- Department of Computer and Control Engineering, Faculty of Engineering, Tanta University, Tanta, Egypt; Department of Computer Science, Faculty of Computer Science and Information Technology, Albaha University, Albaha, Saudi Arabia.
| | - M Arafa
- Department of Computer and Control Engineering, Faculty of Engineering, Tanta University, Tanta, Egypt
| |
Collapse
|
2
|
Wen L, Yu S, Zhao Y, Yan Y. Leader-following consensus for multi-agent systems subject to cyber attacks: Dynamic event-triggered control. ISA TRANSACTIONS 2022; 128:1-9. [PMID: 34565514 DOI: 10.1016/j.isatra.2021.09.002] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/27/2020] [Revised: 08/08/2021] [Accepted: 09/06/2021] [Indexed: 06/13/2023]
Abstract
This paper addresses the event-triggered consensus problem for multi-agent systems (MASs) under cyber attacks in the leader-following framework. Via introducing a recoverable cyber attack and dynamic event-triggered mechanism (DEM), the centralized and distributed event-triggered controllers are co-designed. Meanwhile, some dynamic triggering criteria are given to ensure the MASs can achieve consensus. The DEM contains time-varying dynamic parameters, which can extend the interevent time interval to avoid Zeno phenomenon. The simulation results verify the effectiveness of the proposed scheme.
Collapse
Affiliation(s)
- Lizuo Wen
- College of Marine Electrical Engineering, Dalian Maritime University, Dalian 116026, China
| | - Shuanghe Yu
- College of Marine Electrical Engineering, Dalian Maritime University, Dalian 116026, China.
| | - Ying Zhao
- College of Marine Electrical Engineering, Dalian Maritime University, Dalian 116026, China
| | - Yan Yan
- College of Marine Electrical Engineering, Dalian Maritime University, Dalian 116026, China
| |
Collapse
|
3
|
Event-based security tracking control for networked control systems against stochastic cyber-attacks. Inf Sci (N Y) 2022. [DOI: 10.1016/j.ins.2022.08.085] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
|
4
|
Zhang X, Zhu F, Zhang J, Liu T. Attack isolation and location for a complex network cyber-physical system via zonotope theory. Neurocomputing 2022. [DOI: 10.1016/j.neucom.2021.10.070] [Citation(s) in RCA: 9] [Impact Index Per Article: 4.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/27/2022]
|
5
|
A Survey on Machine-Learning Based Security Design for Cyber-Physical Systems. APPLIED SCIENCES-BASEL 2021. [DOI: 10.3390/app11125458] [Citation(s) in RCA: 6] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
Abstract
A cyber-physical system (CPS) is the integration of a physical system into the real world and control applications in a computing system, interacting through a communications network. Network technology connecting physical systems and computing systems enables the simultaneous control of many physical systems and provides intelligent applications for them. However, enhancing connectivity leads to extended attack vectors in which attackers can trespass on the network and launch cyber-physical attacks, remotely disrupting the CPS. Therefore, extensive studies into cyber-physical security are being conducted in various domains, such as physical, network, and computing systems. Moreover, large-scale and complex CPSs make it difficult to analyze and detect cyber-physical attacks, and thus, machine learning (ML) techniques have recently been adopted for cyber-physical security. In this survey, we provide an extensive review of the threats and ML-based security designs for CPSs. First, we present a CPS structure that classifies the functions of the CPS into three layers: the physical system, the network, and software applications. Then, we discuss the taxonomy of cyber-physical attacks on each layer, and in particular, we analyze attacks based on the dynamics of the physical system. We review existing studies on detecting cyber-physical attacks with various ML techniques from the perspectives of the physical system, the network, and the computing system. Furthermore, we discuss future research directions for ML-based cyber-physical security research in the context of real-time constraints, resiliency, and dataset generation to learn about the possible attacks.
Collapse
|
6
|
Liu J, Yin T, Yue D, Karimi HR, Cao J. Event-Based Secure Leader-Following Consensus Control for Multiagent Systems With Multiple Cyber Attacks. IEEE TRANSACTIONS ON CYBERNETICS 2021; 51:162-173. [PMID: 32086233 DOI: 10.1109/tcyb.2020.2970556] [Citation(s) in RCA: 9] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/10/2023]
Abstract
This article concentrates on event-based secure leader-following consensus control for multiagent systems (MASs) with multiple cyber attacks, which contain replay attacks and denial-of-service (DoS) attacks. A new multiple cyber-attacks model is first built by considering replay attacks and DoS attacks simultaneously. Different from the existing researches on MASs with a fixed topological graph, the changes of communication topologies caused by DoS attacks are considered for MASs. Besides, an event-triggered mechanism is adopted for mitigating a load of network bandwidth by scheduling the transmission of sampled data. Then, an event-based consensus control protocol is first developed for MASs subjected to multiple cyber attacks. In view of this, by using the Lyapunov stability theory, sufficient conditions are obtained to ensure the mean-square exponential consensus of MASs. Furthermore, the event-based controller gain is derived by solving a set of linear matrix inequalities. Finally, an example is simulated for confirming the effectiveness of the theoretical results.
Collapse
|
7
|
Yoo SJ. Neural-Network-Based Adaptive Resilient Dynamic Surface Control Against Unknown Deception Attacks of Uncertain Nonlinear Time-Delay Cyberphysical Systems. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS 2020; 31:4341-4353. [PMID: 31869805 DOI: 10.1109/tnnls.2019.2955132] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/10/2023]
Abstract
A neural-network-based dynamic surface design strategy against sensor and actuator deception attacks is presented to design a delay-independent adaptive resilient control scheme of uncertain nonlinear time-delay cyberphysical systems in the lower triangular form. It is assumed that all nonlinearities, time-varying delays, and sensor and actuator attacks are unknown. In the concerned problem, since the state information measured by sensors is compromised by additional attack signals, the exact state variables are not available for feedback. Thus, a memoryless adaptive resilient control design using compromised state variables is developed by employing the neural-network-based function approximation technique and designing the attack compensator. The resulting control scheme ensures the robust stabilization in the presence of unknown deception attacks and time-varying delays. It is shown from the Lyapunov stability analysis that all closed-loop signals are uniformly ultimately bounded and the stabilization errors converge to an adjustable neighborhood of the origin.
Collapse
|
8
|
Zhao X, Liu C, Tian E. Finite-horizon tracking control for a class of stochastic systems subject to input constraints and hybrid cyber attacks. ISA TRANSACTIONS 2020; 104:93-100. [PMID: 30902497 DOI: 10.1016/j.isatra.2019.02.025] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/26/2018] [Revised: 01/25/2019] [Accepted: 02/20/2019] [Indexed: 06/09/2023]
Abstract
This paper is concerned with the probabilistic-constrained finite-horizon tracking control problem for a class of stochastic systems subject to randomly occurring hybrid cyber attacks and input constraints. Both the randomly occurring denial-of-service (DOS) attacks and randomly occurring deception attacks are considered in an unified framework. The purpose of the current study is to design an observer-based tracking controller such that: over a finite horizon, (1) the variance of the estimation error is less than certain bound at each time step, (2) the probability of the tracking error falling in certain region should larger than a specified value and the region is minimized at each time step. To achieve those purposes, an improved multi-dimensional Chebyshev inequality method is first utilized to convert the probabilistic constraint to a deterministic one. Then an observer-based tracking control method is designed to estimate the state and design the tracking controller, which are realized through solving a set of recursive linear matrix inequalities. By using the proposed algorithm, the observer and tracking controller gains can be solved out in terms of the solution to a convex optimization problem. A simulation example is finally given to demonstrate the effectiveness and applicability of the proposed method.
Collapse
Affiliation(s)
- Xia Zhao
- School of Automation Engineering, Nanjing University of Aeronautics and Astronautics, Nanjing 2111106, China
| | - Chunsheng Liu
- School of Automation Engineering, Nanjing University of Aeronautics and Astronautics, Nanjing 2111106, China.
| | - Engang Tian
- School of Electrical and Automation Engineering, Nanjing Normal University, Nanjing 210042, China
| |
Collapse
|
9
|
Li XM, Zhou Q, Li P, Li H, Lu R. Event-Triggered Consensus Control for Multi-Agent Systems Against False Data-Injection Attacks. IEEE TRANSACTIONS ON CYBERNETICS 2020; 50:1856-1866. [PMID: 31722502 DOI: 10.1109/tcyb.2019.2937951] [Citation(s) in RCA: 10] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/10/2023]
Abstract
In this article, the event-triggered security consensus problem is studied for time-varying multiagent systems (MASs) against false data-injection attacks (FDIAs) and parameter uncertainties over a given finite horizon. In the process of information transmission, the malicious attacker tries to inject false signals to destroy consensus by compromising the integrity of measurements and control signals. The randomly occurring stealthy FDIAs on sensors and actuators are modeled by the Bernoulli processes. In order to reduce the unnecessary utilization of communication resources, an event-triggered control mechanism with state-dependent threshold is adopted to update the control input signal. The main objective of this article is to design a controller such that, under randomly occurring FDIAs and admissible parameter uncertainties, the MASs achieve consensus. By utilizing stochastic analysis method, two sufficient criteria are derived to ensure that the prescribed H∞ consensus performance can be achieved. Then, the desired controller gains are derived by solving recursive linear matrix inequalities. Simulation results are presented to illustrate the effectiveness and applicability of the proposed control method.
Collapse
|
10
|
Amirkhani A, Shirzadeh M, Shojaeefard MH, Abraham A. Controlling wheeled mobile robot considering the effects of uncertainty with neuro-fuzzy cognitive map. ISA TRANSACTIONS 2020; 100:454-468. [PMID: 31916988 DOI: 10.1016/j.isatra.2019.12.011] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/23/2019] [Revised: 12/19/2019] [Accepted: 12/20/2019] [Indexed: 06/10/2023]
Abstract
In this paper, we present neuro-fuzzy cognitive map (NFCM) to control a non-holonomic wheeled mobile robot, for both the kinematic control and the dynamic control. For this purpose, the rules for updating the parameters of NFCM used in online training have been extracted. Also, the convergence of the presented approach has been confirmed by means of Lyapunov method. To evaluate the strength and robustness of the proposed model, it has been tested in tracking different circular and square paths. Experimental results indicate that despite the presence of disturbances, the changes of system parameters, and the existence of non-holonomic constraints, our robot has been able to follow challenging paths (e.g. square-shape trajectories) successfully.
Collapse
Affiliation(s)
- Abdollah Amirkhani
- School of Automotive Engineering, Iran University of Science and Technology, Tehran 16846-13114, Iran.
| | - Masoud Shirzadeh
- Department of Electrical Engineering, Amirkabir University of Technology (Tehran Polytechnic), Tehran 15875-4413, Iran
| | - Mohammad H Shojaeefard
- Department of Mechanical Engineering, Iran University of Science and Technology, Tehran 16846-13114, Iran
| | - Ajith Abraham
- Machine Intelligence Research Laboratories, Washington, DC 98071-2259, USA
| |
Collapse
|
11
|
Li Y, Zhang H. Positive observer design for switched positive T-S fuzzy delayed systems with dwell time constraints. ISA TRANSACTIONS 2020; 96:37-50. [PMID: 31208883 DOI: 10.1016/j.isatra.2019.06.006] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/20/2018] [Revised: 06/04/2019] [Accepted: 06/04/2019] [Indexed: 06/09/2023]
Abstract
In this paper, the positive observer design problem is investigated for switched positive Takagi-Sugeno (T-S) fuzzy delayed systems (SPFDSs) with dwell time constraints. First, by using a clock-dependent co-positive Lyapunov-Krasovskii function (CDCLKF), sufficient conditions are derived for stability of SPFDSs with dwell time. Then, the observer design problem of SPFDSs is separately considered for the measurable and unmeasurable premise variable cases. On the basis of the obtained stability results, sufficient conditions are presented to check the existence of observers for SPFDSs with measurable and unmeasurable premise variables. Through minimizing the system matrix norm of the error dynamics, the optimized observer gains for SPFDSs with unmeasurable premise variables are achieved, and the errors between the system states and their estimations are reduced. All the clock-dependent conditions are relaxed into sum of squares (SOS) program via the SOS approximation approach. At last, two examples are given to show the validity of our results.
Collapse
Affiliation(s)
- Yang Li
- School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan, 611731, PR China.
| | - Hongbin Zhang
- School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan, 611731, PR China.
| |
Collapse
|
12
|
Rotondo D, Sánchez HS, Puig V, Escobet T, Quevedo J. A virtual actuator approach for the secure control of networked LPV systems under pulse-width modulated DoS attacks. Neurocomputing 2019. [DOI: 10.1016/j.neucom.2019.06.050] [Citation(s) in RCA: 17] [Impact Index Per Article: 3.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
|
13
|
Zhang H, Zhang W, Miao Q, Cui Y. Synchronization of Switched Coupled Neural Networks with Distributed Impulsive Effects: An Impulsive Strength Dependent Approach. Neural Process Lett 2019. [DOI: 10.1007/s11063-019-10020-0] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
|