×

Resilient observer-based control for cyber-physical systems under denial-of-service attacks. (English) Zbl 1478.93233

Summary: This paper deals with the problem of resilient observer-based control for cyber-physical systems with multiple transmissions under denial-of-service (DoS) attacks. Instead of adopting the existing static output feedback controller, an observer-based controller is adopted. First, based on the property that the dwell-time of DoS is bounded, an interval partition technique is introduced to reduce the conservatism of stability analysis. Second, sufficient conditions for the desired observer-based controller is provided in terms of linear matrix inequalities (LMIs). Based on the obtained conditions, a resilient observer-based controller design strategy is provided to improve the resilience against DoS. Finally, a numerical example is given to show the effectiveness of the proposed interval partition technique and observer-based controller. It is shown that that more intensive DoS attacks can be tolerated.

MSC:

93B53 Observers
93B70 Networked control
93C83 Control/observation systems involving computers (process control, etc.)
93D25 Input-output approaches in control theory
68M25 Computer security
PDFBibTeX XMLCite
Full Text: DOI

References:

[1] Abdallah, F.; Hammad, E.; Kundur, D., A cyber-physical control framework for transient stability in smart grids, IEEE Trans. Smart Grid, 9, 2, 1205-1215 (2018)
[2] Amin, S.; Cørdenas, A.; Sastry, S., Safe and secure networked control systems under denial-of-service attacks, Proc. 12th Int Conf. Hybrid Syst. Comput. Control, 5469, 31-45 (2009) · Zbl 1237.90054
[3] An, L. W.; Yang, G. H., Secure state estimation against sparse sensor attacks with adaptive switching mechanism, IEEE Trans. Autom Control, 63, 8, 2596-2603 (2017) · Zbl 1423.93165
[4] Fawzi, H.; Tabuada, P.; Diggavi, S., Secure state-estimation for dynamical systems under active adversaries, Proc. Allerton Conf. Commun. Control Comput., 337-344 (2011)
[5] Feng, S.; Tesi, P., Resilient control under Denial-of-Service: robust design, Automatica, 79, 42-51 (2017) · Zbl 1371.93124
[6] Guan, X. P.; Yang, B.; Chen, C. L.; Dai, W. B.; Wang, Y. Y., A comprehensive overview of cyber-physical systems: from perspective of feedback system, IEEE/CAA J. Autom. Sinica, 3, 1, 1-14 (2016)
[7] Hu, S. L.; Dong, Y.; Han, Q. L.; Xie, X. P.; Chen, X. L.; Dou, C. X., Observer-based event-triggered control for networked linear systems subject to denial-of-service attacks, IEEE Trans. Cybern., 1-13 (2019)
[8] Jia, X. C.; Chi, X. B.; Han, Q. L.; Zheng, N. N., Event-triggered fuzzy \(H \infty\) control for a class of nonlinear networked control systems using the deviation bounds of asynchronous normalized membership functions, Inf. Sci., 259, 100-117 (2014) · Zbl 1327.93252
[9] Jin, X., Fault tolerant finite-time leader-follower formation control for autonomous surface vessels with LOS range and angle constraints, Automatica, 68, 228-236 (2016) · Zbl 1334.93007
[10] Li, H. S.; Lai, L. F.; Poor, H. V., Multicast routing for decentralized control of cyber physical systems with an application in smart grid, IEEE J. Sel. Areas Commun., 30, 6, 1097-1107 (2012)
[11] Lu, A. Y.; Yang, G. H., Input-to-state stabilizing control for cyber-physical systems with multiple transmission channels under denial-of-service, IEEE Trans Autom. Control, 63, 6, 1813-1820 (2018) · Zbl 1395.93483
[12] Lu, A. Y.; Yang, G. H., Secure state estimation for cyber-physical systems under sparse sensor attacks via a switched Luenberger observer, Inf. Sci., 417, 454-464 (2017) · Zbl 1447.93346
[13] Lu, A. Y.; Yang, G. H., Resilient observer-based control for cyber-physical systems with multiple transmission channels under denial-of-service, IEEE Trans. Cybern., 1-12 (2019)
[14] Mo, Y.; Sinopoli, B., On the performance degradation of cyberphysical systems under stealthy integrity attacks, IEEE Trans Autom. Control, 61, 9, 2618-2624 (2016) · Zbl 1359.93257
[15] Persis, C. D.; Tesi, P., Input-to-state stabilizing control under denialof-service, IEEE Trans Autom. Control, 60, 11, 2930-2944 (2015) · Zbl 1360.93629
[16] Shoukry, Y.; Chong, M.; Wakaiki, M.; Nuzzo, P.; Sangiovannivincentelli, A. L.; Seshia, S. A.; Hespanha, J. P.; Tabuada, P., SMT-based observer design for cyber-physical systems under sensor attacks, Proc. Int. Conf. Cyber Phys. Syst., ICCPS, 1-10 (2016)
[17] Sontag, E., Input to state stability: basic concepts and results, Lecture Notes Math., 1, 12, 163-220 (1970) · Zbl 1175.93001
[18] Sridhar, S.; Hahn, A.; Govindarasu, M., Cyber-physical system security for the electric power grid, Proc. IEEE, 100, 1, 210-224 (2012)
[19] Sun, Y. C.; Yang, G. H., Periodic event-triggered resilient control for cyber-physical systems under denial-of-service attacks, J. Franklin. I, 355, 13, 5613-5631 (2018) · Zbl 1451.93244
[20] Teixeira, A.; Shames, I.; Sandberg, H.; Johansson, K., A secure control framework for resource-limited adversaries, Automatica, 51, 135-148 (2015) · Zbl 1309.93020
[21] Wang, K.; Li, L. W.; Lan, Y.; Dong, P.; Xia, G. T., Application research of chaotic carrier frequency modulation technology in two-stage matrix converter, Math. Probl. Eng., 2019, 1-8 (2019)
[22] Xu, W.; Ma, K.; Trappe, W.; Zhang, Y., Jamming sensor networks: attack and defense strategies, IEEE Network, 20, 3, 41-47 (2006)
[23] Yu, Q.; Wu, B., Robust stability analysis of uncertain switched linear systems with unstable subsystems, Int. J. Syst. Sci., 46, 7, 1278-1287 (2015) · Zbl 1312.93082
[24] Zhai, D.; Lu, A. Y.; Li, J. H.; Zhang, Q. L., State and dynamic output feedback control of switched linear systems via a mixed time and state-dependent switching law, Nonlinear Anal. Hybrid Syst., 22, 228-248 (2016) · Zbl 1344.93084
[25] Zhang, H.; Cheng, P.; Shi, L.; Chen, J., Optimal denial-of-service attack scheduling with energy constraint, IEEE Trans Autom. Control, 60, 11, 3023-3028 (2015) · Zbl 1360.68302
[26] Zheng, B.; Deng, P.; Anguluri, R.; Zhu, Q.; Pasqualetti, F., Cross-layer codesign for secure cyber-physical systems, IEEE Trans. Comput.-Aided Des. Integrated Circuits Syst., 35, 5, 699-711 (2016)
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.