Kybernetika 56 no. 2, 323-339, 2020

Dual-terminal event triggered control for cyber-physical systems under false data injection attacks

Zhiwen Wang, Xiangnan Xu, Hongtao Sun and Long LiDOI: 10.14736/kyb-2020-2-0323


This paper deals with the problem of security-based dynamic output feedback control of cyber-physical systems (CPSs) with the dual-terminal event triggered mechanisms (DT-ETM) under false data injection (FDI) attacks. Considering the limited attack energy, FDI attacks taking place in transmission channels are modeled as extra bounded disturbances for the resulting closed-loop system, thus enabling $H_{\infty}$ performance analysis with a suitable $\varrho$ attenuation level. Then two buffers at the controller and actuator sides are skillfully introduced to cope with the different transmission delays in such a way to facilitate the subsequent security analysis. Next, a dynamic output feedback security control (DOFSC) model based on the DT-ETM schemes under FDI attacks is well constructed. Furthermore, novel criteria for stability analysis and robust stabilization are carefully derived by exploiting Lyapunov-Krasovskii theory and LMIs technique. Finally, an illustrative example is provided to show the effectiveness of the proposed method.


cyber-physical system, FDI attacks, Event-triggered mechanisms, dynamic output feedback security control


93C05, 93B36, 93D15


  1. Y. Ashibani and Q. H. Mahmoud: Cyber physical systems security: analysis, challenges and solutions. Computers Security 68 (2017), 81-97.   DOI:10.1016/j.cose.2017.04.005
  2. D. Ding, Q.-L. Han, Z. Wang and X. Ge: A survey on model-based distributed control and filtering for industrial cyber-physical systems. IEEE Trans. Industr. Inform. 15(2019), 5, 2483-2499.   DOI: 10.1109/TII.2019.2905295
  3. D. Ding, Z. Wang, D. Ho and G. Wei: Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks. Automatica 78 (2017), 231-240.   DOI:10.1016/j.automatica.2016.12.026
  4. M. García-Rivera and A. Barreiro: Analysis of networked control systems with drops and variable delays. Automatica 43 (2007), 2054-2059.   DOI:10.1016/j.automatica.2007.03.027
  5. X. Ge, Q.-L. Han and Z. Wang: A threshold-parameter-dependent approach to designing distributed event-triggered $H_{\infty}$ consensus filters over sensor networks. IEEE Trans. Cybernet. 49 (2019), 1148-1159.   DOI:10.1109/TCYB.2017.2789296
  6. X. Ge, Q.-L. Han, X.-M. Zhang, D. Ding and F. Yang: Resilient and secure remote monitoring for a class of cyber-physical systems against attacks. Inform. Sci. (2019).   DOI: 10.1016/j.ins.2019.10.057
  7. X. Ge, Q.-L. Han, X.-M. Zhang, L. Ding and F. Yang: Distributed event-triggered estimation over sensor networks: A survey. IEEE Trans. Cybernet., to be published.   DOI:10.1109/TCYB.2019.2917179
  8. X. Ge, Q.-L. Han, M. Zhong and X.-M. Zhang: Distributed Krein space-based attack detection over sensor networks under deception attacks. Automatica 109 (2019), 108557.   DOI:10.1016/j.automatica.2019.108557
  9. A. Humayed, J. Lin, F. Li and B. Luo: Cyber-physical systems security - a survey. IEEE Internet Things J. 4 (2017), 1802-1831.   DOI:10.1109/JIOT.2017.2703172
  10. G. Liang, S. R. Weller, J. Zhao, F. Luo and Z. Dong: The 2015 ukraine blackout: implications for false data injection attacks. IEEE Trans. Power Systems 32 (2017), 3317-.3318.   DOI:10.1109/TPWRS.2016.2631891
  11. C. Liu, H. Li, Y. Shi and D. Xu: Distributed event-triggered gradient method for constrained convex minimization. IEEE Trans. Automat. Control (2019).   DOI:10.1109/TAC.2019.2916985
  12. C. Liu, H. Li, Y. Shi and D. Xu: Co-design of event trigger and feedback policy in robust model predictive control. IEEE Trans. Automat. Control (2019).   DOI:10.1109/TAC.2019.2914416
  13. Y. Liu, P. Ning and M. Reiter: False data injection attacks against state estimation in electric power grids. ACM Trans. Inform. System Security 14 (2011), 1-33.   DOI:10.1145/1952982.1952995
  14. A.-Y. Lu and G.-H. Yang: False data injection attacks against state estimation in the presence of sensor failures. Inform. Sci. 508 (2020), 92-104.   DOI:10.1016/j.ins.2019.08.052
  15. A.-Y. Lu and G.-H. Yang: Malicious attacks on state estimation against distributed control systems. IEEE Trans. Automat. Control (2019).   DOI: 10.1109/TAC.2019.2949877
  16. Z. Pang, G. Liu, D. Zhou, F. Hou and D. Sun: Two-channel false data injection attacks against output tracking control of networked systems. IEEE Trans. Industr. Electron. 63 (2016), 3242-3251.   DOI:10.1109/TIE.2016.2535119
  17. P. Park, J. W. Ko and C. Jeong: Reciprocally convex approach to stability of systems with time-varying delays. Automatica 47 (2011), 235-238.   DOI:10.1016/j.automatica.2010.10.014
  18. C. Peng, H. Sun, M. Yang and Y. Wang: A survey on security communication and control for smart grids under malicious cyber attacks. IEEE Trans. Systems Man Cybernet.: Systems. 49 (2019), 1554-1569.   DOI: 10.1109/TSMC.2018.2884952
  19. D. Peng, J. Dong, Z. Cai, C. Zhang and Q. Peng: A study on stability of cyber-physical systems under false data injection attacks. J. Automat. 45 (2019), 196-205.   DOI:10.16383/j.aas.2018.c180331
  20. L. Shi, Q. Dai and Y. Ni: Review of network attacks in power information physical fusion system environment. Electr. Power Syst. Res. 163 (2018), 396-412.   DOI:10.1016/j.epsr.2018.07.015
  21. L. Song, J. Wu, C. Long and S. Li: Asynchronous event-triggered output feedback control for cps under data injection attacks. In: 37th Chinese Automation Congress (2018), Xi'an, pp. 2530-2535.   DOI:10.1109/CAC.2018.8623668
  22. Z. Song, J. Zhai and H. Ye: Global adaptive output-feedback control for switched uncertain nonlinear systems. Kybernetika 53 (2017), 263-281.   DOI:10.14736/kyb-2017-2-0263
  23. A. Teixeira, I. Shames, H. Sandberg and K. H.Johansson: A secure control framework for resource-limited adversaries. Automatica 51 (2015), 135-148.   DOI:10.1016/j.automatica.2014.10.067
  24. Q. Wang, W. Tai, Y. Tang and M. Ni: A review of the false data injection attack against the cyber physical power system. J. Automat. 45 (2019), 72-83.   DOI:10.16383/j.aas.2018.c180369
  25. D. Wang, S. Wu, W. Zhang, G. Wang, F. Wu and S. Okubo: Model following control system with time delays. Kybernetika 52 (2016), 478-495.   DOI:10.14736/kyb-2016-3-0478
  26. S. Xiao, Q.-L. Han, X. Ge and Y. Zhang: Secure distributed finite-time filtering for positive systems over sensor networks under deception attacks. IEEE Trans. Cybernet., to be published.   DOI:10.1109/TCYB.2019.2900478
  27. S. Yan, S. K. Nguang and L. Zhang: Nonfragile integral-based event-triggered control of uncertain cyber-physical systems under cyber-attacks. Complexity ID 8194606 (2019), 14 pages.   DOI:10.1155/2019/8194606
  28. W. Yu, Z. Deng, H. Zhou and X. Zeng: Distributed event-triggered algorithm for optimal resource allocation of multi-agent systems. Kybernetika 53 (2017), 747-764.   DOI: 10.14736/kyb-2017-5-0747
  29. W. Zeng and M.-Y. Chow: Optimal tradeoff between performance and security networked control systems based on coevolutionary algorithms. IEEE Trans. Industr. Electr. 59 (2012), 3016-3025.   DOI:10.1109/TIE.2011.2178216
  30. X.-M. Zhang and Q.-L. Han: Event-triggered dynamic output feedback control for networked control systems. IET Control Theory Appl. 8 (2014), 226-234.   DOI:10.1016/j.ins.2018.05.007
  31. X.-M. Zhang, Q.-L. Han, X. Ge, D. Ding, L. Ding, D. Yue and C. Peng: Networked control systems: a survey of trends and techniques. IEEE/CAA J. Automat. Sinica, to be published.   DOI:10.1109/JAS.2019.1911651