Article
Automation & Control Systems
Youngjun Joo, Zhihua Qu, Toru Namerikawa
Summary: This article presents an attack-resilient control structure for enhancing the security of a cyber-physical system against stealthy system integrity attacks. The proposed structure can detect stealthy attacks and maintain nominal performance, while using chaotic oscillators for secure communication to prevent eavesdropping of transmitted signals. Resilience against malicious attacks and robustness under time delay and nonlinear components of the CPS structure are investigated, and simulations for validation are performed on a quadruple-tank process.
IEEE TRANSACTIONS ON AUTOMATIC CONTROL
(2021)
Article
Computer Science, Information Systems
Chun-Lei Zhang, Guang-Hong Yang, An-Yang Lu
Summary: This paper presents a solution to the problem of resilient observer-based control for cyber-physical systems under Denial-of-Service attacks, by introducing interval partition technique and linear matrix inequalities to reduce the conservatism in stability analysis, and providing a design strategy to improve the resilience against DoS. Numerical example demonstrates the effectiveness of the proposed method in tolerating more intensive DoS attacks.
INFORMATION SCIENCES
(2021)
Article
Automation & Control Systems
Xiao Wang, Ping Zhao
Summary: This article addresses the problem of adaptive control against deception attacks for switched nonlinear cyber-physical systems (CPSs) with more general and unknown nonlinearities. An adaptive controller is designed to mitigate the impact of state-dependent sensor attacks and input-dependent actuator attacks. Nussbaum-type functions are introduced to handle the unknown time-varying gains caused by these attacks. The effectiveness of the proposed approach is demonstrated through a simulation example.
INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL
(2023)
Article
Engineering, Multidisciplinary
Dan Zhao, Yuezu Lv, Jialing Zhou, Guanghui Wen, Tingwen Huang
Summary: This paper investigates the resilient stability problem of large-scale systems under covert attacks. Two-stage fixed-time observer and attack isolation algorithms are proposed to detect covert attacks and ensure system resilience. Two notions of isolability are introduced to evaluate the effectiveness of the algorithms. A control law is developed based on the proposed attack isolation techniques for resilient stability of the system.
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING
(2022)
Article
Automation & Control Systems
Dina Mikhaylenko, Ping Zhang
Summary: This article introduces a new attack strategy called local covert attack, which can be made completely stealthy by applying decoupling technique or by combining basic idea of covert attack and zero-dynamics attack.
IEEE TRANSACTIONS ON AUTOMATIC CONTROL
(2022)
Article
Automation & Control Systems
Yishi Liu, Xiwang Dong, Zhang Ren, Jianwei Liu
Summary: This paper considers a distributed cyber-security and fault tolerance formation problem using a multi-agent system. The agents focus on a formation reference function and achieve a desired time-varying formation even in the presence of malicious attacks and multiple faults. A distributed control protocol, utilizing an event-triggered technique and active reconfigurable strategy, is proposed to achieve resilient control in the face of adverse effects. The attack parameters are bounded by analyzing the Lyapunov stability theorem and the property of the Laplacian matrix. An observer-based fault estimator is used to improve fault-tolerance capabilities. Simulation results validate the effectiveness of the proposed scheme in addressing distributed formation issues with faults and attack intervals.
INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL
(2023)
Article
Engineering, Mechanical
Yuehui Ji, Qiang Gao, Junjie Liu
Summary: This paper presents an adaptive resilient control method for cyber-physical systems (CPSs) subject to stealthy false data injection attacks and strict-feedback nonlinear dynamics. Due to attacks from ill-disposed hackers, accurate state information is not available for state feedback control. By transforming the false data injection attack problem into nonlinear uncertainty dynamics and unknown control directions, the proposed control method utilizes extended state observers and Nussbaum functions to approximate system uncertainties and achieve stability. Numerical simulations demonstrate the effectiveness of the proposed control method in stabilizing the system and countering false data injection attacks.
NONLINEAR DYNAMICS
(2023)
Article
Mathematics, Applied
Qingyu Su, Handong Wang, Chaowei Sun, Bo Li, Jian Li
Summary: This paper addresses the issue of cyber-attacks corrupting states of cyber-physical power systems, proposing a method for secure state estimation and attack reconstruction, and designing an effective attack defense strategy.
APPLIED MATHEMATICS AND COMPUTATION
(2022)
Article
Automation & Control Systems
Guoxi Chen, Ya Zhang, Shiyi Gu, Wenjun Hu
Summary: This article investigates the secure state estimation and control problem in cyber-physical systems. It proposes a specific filter gain to ensure that the actuator attack does not affect the estimation error. A new method for constructing chi(2) detection variables is proposed, and actuator and sensor attack detection schemes are developed. The article also presents a multiple information fusion algorithm and a compensator-based estimator controller.
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS
(2022)
Article
Automation & Control Systems
Tongxiang Li, Bo Chen, Li Yu, Wen-An Zhang
Summary: An active security control approach is proposed for CPSs under DoS attacks, utilizing a strategy and controller to ensure timely control input updates, maintaining asymptotic stability of the system under two-channel DoS attacks. Simulations and experiments demonstrate the effectiveness of the approach.
IEEE TRANSACTIONS ON AUTOMATIC CONTROL
(2021)
Article
Automation & Control Systems
Yue Zhao, Chunjie Zhou, Yu-Chu Tian, Jianhui Yang, Xiaoya Hu
Summary: Cyber attacks pose serious threats to the security of cyber-physical systems. This article proposes a resilient control scheme based on cloud computing environments to address the destructive changes in system structure caused by actuator attacks. The scheme consists of a local resilient controller and a cloud-based resilient controller. Simulation experiments on a permanent synchronous motor control system demonstrate the effectiveness of the proposed scheme.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2023)
Article
Computer Science, Information Systems
Yue Zhao, Xin Du, Chunjie Zhou, Yu -Chu Tian
Summary: This paper presents a resilient control strategy for cyber-physical systems (CPSs) under actuator saturation caused by cyberattacks. The strategy includes an extended state observer and an anti-saturation resilient controller to estimate and resist attacks while maintaining system stability and resilience.
INFORMATION SCIENCES
(2022)
Article
Computer Science, Information Systems
Yi-Gang Li, Guang-Hong Yang
Summary: This paper investigates the problem of designing optimal completely stealthy attacks in cyber-physical systems. A completely stealthy attack model is proposed to bypass the detector successfully without being detected. The optimal attack policy is derived by analyzing the remote estimation error and solving a constrained optimization problem, ensuring maximum remote estimation error and complete stealthiness to the detector.
INFORMATION SCIENCES
(2022)
Article
Automation & Control Systems
Yun Liu, Yuanzheng Li, Yu Wang, Xian Zhang, Hoay Beng Gooi, Huanhai Xin
Summary: This article proposes a robust and resilient distributed optimal frequency control scheme to address the threat of cyber attacks on autonomous microgrids (MGs). The scheme introduces an auxiliary networked system to maintain functionalities and mitigates the impact of attacks through attenuation or isolation.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2022)
Article
Mathematics, Interdisciplinary Applications
Haibin Guo, Zhonghua Pang, Jian Sun, Jun Li
Summary: This paper addresses the security problem of cyber-physical systems subject to stealthy false data injection attacks. A stochastic coding scheme is proposed to detect such attacks, and a decoder is used to ensure system performance. An estimation-optimization iteration algorithm is presented to obtain a numerical solution, and the effectiveness is verified through a numerical example.
JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY
(2022)