1
|
Li Z, Zhao Z, Ding SX, Yang Y. Optimal Strictly Stealthy Attack Design on Cyber-Physical Systems: A Data-Driven Approach. IEEE TRANSACTIONS ON CYBERNETICS 2024; 54:6180-6192. [PMID: 38985550 DOI: 10.1109/tcyb.2024.3413969] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 07/12/2024]
Abstract
In this article, an issue of data-driven optimal strictly stealthy attack design for the stochastic linear invariant systems is investigated, with the aim of maximizing the system performance degradation under an energy bounded constraint and bypassing the parity-space-based attack detector. Importantly, the proposed attack policy refrains from the assumption that the system knowledge is known to attackers. A novel strictly stealthy attack sequence (SSAS), coordinating the sensor and actuator signals simultaneously, is proposed with a sufficient and necessary condition for the existence of such an attack presented. Specifically, the SSAS is parameterized as a vector in the null space of a specific matrix which is constructed by a parity matrix and the system Markov parameters. For the purpose of data-driven attack realization, modified subspace identification methods are utilized to achieve an unbiased estimation of the required parameters via the closed-loop data. On this basis, the attack design is formulated as a constrained optimization problem, an explicit solution to which is given to characterize the optimal strictly stealthy attack. Finally, the vulnerability of the cyber-physical systems is analysed from the perspective of the parameter selection for the parity space-based detector. A case study on a three-tank model verifies the efficiency of the proposed approach.
Collapse
|
2
|
Wang J, Wang W, Liang X. Finite-horizon optimal secure tracking control under denial-of-service attacks. ISA TRANSACTIONS 2024; 149:44-53. [PMID: 38692974 DOI: 10.1016/j.isatra.2024.04.025] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/29/2023] [Revised: 04/23/2024] [Accepted: 04/23/2024] [Indexed: 05/03/2024]
Abstract
The finite-horizon optimal secure tracking control (FHOSTC) problem for cyber-physical systems under actuator denial-of-service (DoS) attacks is addressed in this paper. A model-free method based on the Q-function is designed to achieve FHOSTC without the system model information. First, an augmented time-varying Riccati equation (TVRE) is derived by integrating the system with the reference system into a unified augmented system. Then, a lower bound on malicious DoS attacks probability that guarantees the solutions of the TVRE is provided. Third, a Q-function that changes over time (time-varying Q-function, TVQF) is devised. A TVQF-based method is then proposed to solve the TVRE without the need for the knowledge of the augmented system dynamics. The developed method works backward-in-time and uses the least-squares method. To validate the performance and features of the developed method, simulation studies are conducted in the end.
Collapse
Affiliation(s)
- Jian Wang
- Key Laboratory of Marine Intelligent Equipment and System Ministry of Education, Shanghai Jiao Tong University, Shanghai, 200240, PR China
| | - Wei Wang
- School of Information Engineering, Zhongnan University of Economics and Law, Wuhan 430073, PR China; School of Electrical and Information Engineering, Tianjin University, Tianjin, 300072, PR China.
| | - Xiaofeng Liang
- Key Laboratory of Marine Intelligent Equipment and System Ministry of Education, Shanghai Jiao Tong University, Shanghai, 200240, PR China
| |
Collapse
|
3
|
Li J, Wang L, Xi J, Xia K, Gao J, Zheng Y. Induced attack with prescribed consensus trajectory against multiagent systems. ISA TRANSACTIONS 2024; 146:274-284. [PMID: 38242734 DOI: 10.1016/j.isatra.2024.01.015] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/05/2023] [Revised: 12/02/2023] [Accepted: 01/12/2024] [Indexed: 01/21/2024]
Abstract
This paper proposes a new induced attack strategy against multiagent systems from the perspective of the attacker. It is noted that the induced attack can drive multiagent systems as a whole to follow a specific trajectory prescribed by the attacker, which cannot be achieved by denial-of-service attacks or deception attacks. Firstly, the induced attack signal is produced by establishing an attack generation exosystem, whose dynamics can be regulated to generate the prescribed consensus trajectory. Then, by the local state information and the induced attack signal among partial agents, a new induced attack protocol is proposed, which consists of the nominal consensus term and the induced attack term. By constructing the projection of the induced attack signal onto the consensus subspace, an explicit expression of the prescribed consensus trajectory is determined, which describes the movement trajectory of the entire multiagent system under the induced attack. Meanwhile, the induced attack design criterion is proposed to determine the dynamics matrix of the attack generation exosystem via the robust H∞ scheme. Finally, the simulation example is performed to illustrate the effectiveness of theoretical results.
Collapse
Affiliation(s)
- Junlong Li
- Department of Physics, Lüliang University, Lüliang, 033000, PR China; High-Tech Institute of Xi'an, Xi'an, 710025, PR China
| | - Le Wang
- High-Tech Institute of Xi'an, Xi'an, 710025, PR China; School of Aerospace Engineering, Beijing Institute of Technology, Beijing, 100081, PR China
| | - Jianxiang Xi
- High-Tech Institute of Xi'an, Xi'an, 710025, PR China.
| | - Kehan Xia
- High-Tech Institute of Xi'an, Xi'an, 710025, PR China
| | - Jiuan Gao
- High-Tech Institute of Xi'an, Xi'an, 710025, PR China
| | - Yuanshi Zheng
- Shaanxi Key Laboratory of Space Solar Power Station System, School of MechanoElectronic Engineering, Xidian University, Xian 710071, PR China
| |
Collapse
|
4
|
Gao Y, Gong M, Xie Y, Qin AK, Pan K, Ong YS. Multiparty Dual Learning. IEEE TRANSACTIONS ON CYBERNETICS 2023; 53:2955-2968. [PMID: 35044926 DOI: 10.1109/tcyb.2021.3139076] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/14/2023]
Abstract
The performance of machine learning algorithms heavily relies on the availability of a large amount of training data. However, in reality, data usually reside in distributed parties such as different institutions and may not be directly gathered and integrated due to various data policy constraints. As a result, some parties may suffer from insufficient data available for training machine learning models. In this article, we propose a multiparty dual learning (MPDL) framework to alleviate the problem of limited data with poor quality in an isolated party. Since the knowledge-sharing processes for multiple parties always emerge in dual forms, we show that dual learning is naturally suitable to handle the challenge of missing data, and explicitly exploits the probabilistic correlation and structural relationship between dual tasks to regularize the training process. We introduce a feature-oriented differential privacy with mathematical proof, in order to avoid possible privacy leakage of raw features in the dual inference process. The approach requires minimal modifications to the existing multiparty learning structure, and each party can build flexible and powerful models separately, whose accuracy is no less than nondistributed self-learning approaches. The MPDL framework achieves significant improvement compared with state-of-the-art multiparty learning methods, as we demonstrated through simulations on real-world datasets.
Collapse
|
5
|
Zhao Y, Zhou C, Tian YC, Qin Y. Composite Finite-Time Resilient Control for Cyber-Physical Systems Subject to Actuator Attacks. IEEE TRANSACTIONS ON CYBERNETICS 2023; 53:1063-1077. [PMID: 34495861 DOI: 10.1109/tcyb.2021.3107302] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/13/2023]
Abstract
Cyber-physical systems (CPSs) seamlessly integrate communication, computing, and control, thus exhibiting tight coupling of their cyber space with the physical world and human intervention. Forming the basis of future smart services, they play an important role in the era of Industry 4.0. However, CPSs also suffer from increasing cyber attacks due to their connections to the Internet. This article investigates resilient control for a class of CPSs subject to actuator attacks, which intentionally manipulate control commands from controllers to actuators. In our study, the supertwisting sliding-mode algorithm is adopted to construct a finite-time converging extended state observer (ESO) for estimating the state and uncertainty of the system in the presence of actuator attacks. Then, for the attacked system, a finite-time converging resilient controller is designed based on the proposed ESO. It integrates global fast terminal sliding-mode and prescribed performance control. Finally, an industrial CPS, permanent magnet synchronous motor control system, is investigated to demonstrate the effectiveness of the composite resilient control strategy presented in this article.
Collapse
|
6
|
Zha L, Liao R, Liu J, Xie X, Tian E, Cao J. Dynamic Event-Triggered Output Feedback Control for Networked Systems Subject to Multiple Cyber Attacks. IEEE TRANSACTIONS ON CYBERNETICS 2022; 52:13800-13808. [PMID: 34797773 DOI: 10.1109/tcyb.2021.3125851] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/13/2023]
Abstract
This article is concerned with the problem of the H∞ output feedback control for a class of event-triggered networked systems subject to multiple cyber attacks. Two dynamic event-triggered generators are equipped at sensor and observer sides, respectively, to lower the frequency of unnecessary data transmission. The sensor-to-observer (STO) channel and observer-to-controller (OTC) channel are subject to deception attacks and Denial-of-Service (DoS) attacks, respectively. The aim of the addressed problem is to design an output feedback controller, with the consideration of the effects of dynamic event-triggered schemes (DETSs) and multiple cyber attacks. Sufficient condition is derived, which can guarantee that the resulted closed-loop system is asymptotically mean-square stable (AMSS) with a prescribed H∞ performance. Moreover, we provide the desired output feedback controller design method. Finally, the effectiveness of the proposed method is demonstrated by an example.
Collapse
|
7
|
Aslam MM, Ahmed Z, Du L, Hassan MZ, Ali S, Nasir M. An Overview of Recent Advances of Resilient Consensus for Multiagent Systems under Attacks. COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE 2022; 2022:6732343. [PMID: 39411550 PMCID: PMC11479781 DOI: 10.1155/2022/6732343] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 04/18/2022] [Revised: 05/26/2022] [Accepted: 05/31/2022] [Indexed: 10/19/2024]
Abstract
Consensus control of multiagent systems (MASs) has been one of the most extensive research topics in the field of robotics and automation. The information sharing among the agents in the MASs depends upon the communication network because the interaction of agents may affect the consensus performance of the agents in a communication network. An unexpected fault and attack may occur on one agent and can propagate through the communication network into other agents. Thus, this may cause severe degradation of the whole MASs. In this paper, we first discussed MAS technologies. After that available technologies for the modeling of attacks and fundamental issues due to attacks on MAS attacks were discussed. We also introduced cooperative attack methodologies and model-based attack methodology. Objective of this article is to provide comprehensive study on recent advances in consensus control of MASs under attacks covering the published results until 2021. This survey presents different kinds of attacks, their estimation and detection, and resilient control against attacks. At the end, the survey accomplishes some potential recommendations for future direction to solve the key issues and challenges reported for secure consensus control of MASs.
Collapse
Affiliation(s)
- Muhammad Muzamil Aslam
- School of Computer and Communication Engineering, University of Science and Technology, Beijing 100083, China
- Department of Electronics and Communication Engineering, University of Science and Technology China (USTC), Hefei, China
- Department of Information Sciences, University of Education Multan Campus, Lahore, Pakistan
| | - Zahoor Ahmed
- Department of Automation, Shanghai Jiaotong University, Shanghai 200240, China
| | - Liping Du
- School of Computer and Communication Engineering, University of Science and Technology, Beijing 100083, China
| | | | - Sajid Ali
- Department of Information Sciences, University of Education Multan Campus, Lahore, Pakistan
| | - Muhammad Nasir
- Department of Computer Engineering, The University of Lahore, Lahore, Pakistan
| |
Collapse
|
8
|
Yu Y, Liu GP, Hu W. Security tracking control for discrete-time stochastic systems subject to cyber attacks. ISA TRANSACTIONS 2022; 127:133-145. [PMID: 35216807 DOI: 10.1016/j.isatra.2022.02.001] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/19/2021] [Revised: 01/29/2022] [Accepted: 02/02/2022] [Indexed: 06/14/2023]
Abstract
This paper is concerned with the security tracking problem under the quadratic cost criterion for a class of discrete-time stochastic linear networked control systems (NCSs) exposed to cyber attacks, covering false data injection attacks as well as a class of DoS attacks. Taking into account factors such as network congestion and the defensive role of intrusion detection systems, successful attack events are modeled as a Bernoulli random sequence. To describe the transient trajectory of an NCS under the impact of a random attack, a probabilistic definition of secure trackability is taken. Therefore, an observer-based dynamic output feedback controller is designed in order to achieve the specified probabilistic secure trackability. Specifically, the probabilistic safety output tracking problem is transformed into an input-to-state stability problem in the probabilistic sense for closed-loop systems with some new sufficient conditions, provided that an augmented incremental model is utilized Then, the controller parameters and the upper bound of the quadratic cost function are determined by solving matrix inequalities, while easy-solution forms of the matrix inequalities to be solved are presented by the Schur complementary lemma. Both simulation studies and practical experiments demonstrate the effectiveness of the proposed control scheme.
Collapse
Affiliation(s)
- Yi Yu
- Department of Artificial Intelligence and Automation, School of Electrical Engineering and Automation, Wuhan University, Wuhan, 430072, China.
| | - Guo-Ping Liu
- Department of Electronic and Electrical Engineering, Southern University of Science and Technology, Shenzhen, 518055, China.
| | - Wenshan Hu
- Department of Artificial Intelligence and Automation, School of Electrical Engineering and Automation, Wuhan University, Wuhan, 430072, China.
| |
Collapse
|
9
|
Event-based security tracking control for networked control systems against stochastic cyber-attacks. Inf Sci (N Y) 2022. [DOI: 10.1016/j.ins.2022.08.085] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
|
10
|
Gao S, Liu L, Wang H, Wang A. Data-driven model-free resilient speed control of an autonomous surface vehicle in the presence of actuator anomalies. ISA TRANSACTIONS 2022; 127:251-258. [PMID: 35701238 DOI: 10.1016/j.isatra.2022.04.050] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/05/2021] [Revised: 04/30/2022] [Accepted: 04/30/2022] [Indexed: 06/15/2023]
Abstract
This paper is concerned with the resilient speed control of an autonomous surface vehicle (ASV) in the presence of actuator anomalies. A data-driven model-free resilient speed control method is presented based on available input and output data only with pulse-width-modulation inputs. Specifically, a data-driven neural predictor is designed to learn the unknown system dynamics of the speed control system of the ASV. Then, a resilient speed control law is designed based on the learned dynamics obtained from the neural network predictor, where a cost function is designed for selecting the optimal duty cycle for the motor. The stability of the data-driven neural predictor is analyzed by using input-state stability (ISS) theory. The advantage of the developed data-driven model-free resilient control method is that the optimal speed control performance can be achieved in the presence of actuator anomalies without any modeling process. Simulation results show the learning ability of the data-driven neural predictor and the effectiveness of the proposed data-driven model-free resilient speed control method for the ASV subject to actuator anomalies.
Collapse
Affiliation(s)
- Shengnan Gao
- School of Marine Electrical Engineering, Dalian Maritime University, Dalian 116026, China
| | - Lu Liu
- School of Marine Electrical Engineering, Dalian Maritime University, Dalian 116026, China.
| | - Haoliang Wang
- School of Marine Engineering, Dalian Maritime University, Dalian 116026, China
| | - Anqing Wang
- School of Marine Electrical Engineering, Dalian Maritime University, Dalian 116026, China
| |
Collapse
|
11
|
Deng Y, Lu H, Zhou W. Security Event-Triggered Filtering for Delayed Neural Networks Under Denial-of-Service Attack and Randomly Occurring Deception Attacks. Neural Process Lett 2022. [DOI: 10.1007/s11063-022-10860-3] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 09/29/2022]
|
12
|
Secure Tracking Control Against Sensor and Actuator Attacks: A Robust Model-Reference Adaptive Control Method. Inf Sci (N Y) 2022. [DOI: 10.1016/j.ins.2022.05.014] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
|
13
|
Distributed set-membership filtering for discrete-time systems subject to denial-of-service attacks and fading measurements: A zonotopic approach. Inf Sci (N Y) 2021. [DOI: 10.1016/j.ins.2020.07.041] [Citation(s) in RCA: 12] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/22/2022]
|
14
|
Abstract
In this paper, we propose a novel 77 GHz automotive radar sensor, and demonstrate its cyberattack resilience using real measurements. The proposed system is built upon a standard Frequency Modulated Continuous Wave (FMCW) radar RF-front end, and the novelty is in the DSP algorithm used at the firmware level. All attack scenarios are based on real radar signals generated by Texas Instruments AWR series 77 GHz radars, and all measurements are done using the same radar family. For sensor networks, including interconnected autonomous vehicles sharing radar measurements, cyberattacks at the network/communication layer is a known critical problem, and has been addressed by several different researchers. What is addressed in this paper is cyberattacks at the physical layer, that is, adversarial agents generating 77 GHz electromagnetic waves which may cause a false target detection, false distance/velocity estimation, or not detecting an existing target. The main algorithm proposed in this paper is not a predictive filtering based cyberattack detection scheme where an “unusual” difference between measured and predicted values triggers an alarm. The core idea is based on a kind of physical challenge-response authentication, and its integration into the radar DSP firmware.
Collapse
|