Kybernetika 56 no. 2, 340-362, 2020

Event-triggered control of cyber-physical systems under asynchronous denial of service attacks

Huaye Peng, Chen Peng, Yong Shao and Deliang ZengDOI: 10.14736/kyb-2020-2-0340

Abstract:

This paper addresses event-triggered control cyber-physical systems under asynchronous denial of service attacks. First, a general attack model is given, which allows us to conveniently model the asynchronous denial of service attacks within measurement and control channels in a unified framework. Then, under a delicate event triggered communication mechanism, a refined switching control mechanism is proposed to account for various attack intervals and non-attack intervals. Furthermore, sufficient conditions are derived for guaranteing the input to state stability (ISS) of the resulting closed-loop system. Finally, a simulation example of unmanned ground vehicle (UGV) is given to demonstrate the validity of the proposed main results.

Keywords:

cyber-physical system, DoS attack, event-triggered mechanism

Classification:

93A99

References:

  1. S. Amin, G. A. Schwartz and S. Sastry: Security of interdependent and identical networked control systems. Automatica 49 (2013), 186-192.   DOI:10.1016/j.automatica.2012.09.007
  2. A. A. Cardenas, S. Amin and S. Sastry et al: Secure control: Towards survivable cyber-physical systems. In: Proc. 28th International Conference on Distributed Computing Systems Workshops, Beijing 2008, pp. 495-500.   DOI:10.1109/icdcs.workshops.2008.40
  3. A. Cetinkaya, H. Ishii and T. Hayakawa: Networked control under random and malicious packet losses. IEEE Trans. Automat. Control 62 (2017), 2434-2449.   DOI:10.1109/tac.2016.2612818
  4. Y. H. Chang, Q. Hu, Qie and C. J. Tomlin: Secure estimation based Kalman filter for cyber-physical systems against sensor attacks. Automatica 95 (2018), 399-412.   DOI:10.1016/j.automatica.2018.06.010
  5. D. Ding, Q.-L. Han and Z. Wang et al: A survey on model-based distributed control and filtering for industrial cyber-physical systems. IEEE Trans. Industr. Inform. 15 (2019), 2483-2499.   DOI:10.1109/tii.2019.2905295
  6. J. P. Farwell and R. Rohozinski: Stuxnet and the future of cyber war. Survival 53 (2011), 23-40.   DOI:10.1080/00396338.2011.555586
  7. S. Feng and P. Tesi: Resilient control under denial-of-service: Robust design. Automatica 79 (2017), 42-51.   DOI:10.1016/j.automatica.2017.01.031
  8. X. Ge, Q.-L. Han and Z. Wang: A threshold-parameter-dependent approach to designing distributed event-triggered $H_{\infty}$ consensus filters over sensor networks. IEEE Trans. Cybernet. 49 (2019), 1148-1159.   DOI:10.1109/tcyb.2017.2789296
  9. X. Ge, Q.-L. Han and X.-M. Zhang et al: Distributed event-triggered estimation over sensor networks: A survey. IEEE Trans. Cybernet. 50 (2019), 3, 1306-1320   DOI:10.1109/tcyb.2019.2917179
  10. X. Ge, Q.-L. Han, M. Zhong and X.-M. Zhang: Distributed Krein space-based attack detection over sensor networks under deception attacks. Automatica 109 (2019), 108557.   DOI:10.1016/j.automatica.2019.108557
  11. W. P. M. H. Heemels, M. C. F. Donkers and A. R. Teel: Periodic event-triggered control for linear systems. IEEE Trans. Automat. Control 58 (2013), 847-861.   DOI:10.1109/tac.2012.2220443
  12. S. Hu, D. Yue and Q.-L. Han et al: Observer-based event-triggered control for networked linear systems subject to denial-of-service attacks. IEEE Trans. Cybernet. (2019), 1-13.   DOI:10.1109/tcyb.2019.2903817
  13. S. Hu, D. Yue, X. Xie, X. Chen and X. Yin: Resilient event-triggered controller synthesis of networked control systems under periodic DoS jamming attacks. IEEE Trans. Cybernet. 49 (2019), 4271-4281.   DOI:10.1109/tcyb.2018.2861834
  14. S. Kim, Y. Won, I.-H. Park, Y. Eun and K.-J. Park: Cyber-physical vulnerability analysis of communication-based train control. IEEE Internet Things J. 6 (2019), 6353-6362.   DOI:10.1109/jiot.2019.2919066
  15. Ch. Kwon and I. Hwang: Cyber attack mitigation for cyber-physical systems: hybrid system approach to controller design. IET Control Theory Appl. 10 (2016), 731-741.   DOI:10.1049/iet-cta.2014.1013
  16. G. Liang, S. R. Weller, J. Zhao, F. Luo and Z. Y. Dong: The 2015 Ukraine blackout: Implications for false data injection attacks. IEEE Trans. Power Syst. 32 (2017), 3317-3318.   DOI:10.1109/tpwrs.2016.2631891
  17. J. Liu, M. Yang and X. Xie et al: Finite-time ${H}_\infty$ filtering for state-dependent uncertain systems with event-triggered mechanism and multiple attacks. IEEE Trans. Circuits Systems I: Regular Papers /2019), 1-14..   CrossRef
  18. A.-Y. Lu and G.-H. Yang: Input-to-state stabilizing control for cyber-physical systems with multiple transmission channels under denial of service. IEEE Trans. Automat. Control 63 (2018), 1813-1820.   DOI:10.1109/tac.2017.2751999
  19. P. Millan, L. Orihuela and I. Jurado et al: Distributed estimation in networked systems under periodic and event-based communication policies. Int. J. Systems Sci. 46 (2015), 139-151.   DOI:10.1080/00207721.2013.775387
  20. C. Peng and H. T. Sun: Switching-like event-triggered control for networked control systems under malicious denial of service attacks. IEEE Trans. Automat. Control (2020)   DOI:10.1109/tac.2020.2989773
  21. Y. Mo, S. Weerakkody and B. Sinopoli: Physical authentication of control systems: Designing watermarked control inputs to detect counterfeit sensor outputs. IEEE Control Systems Mag. 35 (2015), 93-109.   DOI:10.1109/mcs.2014.2364724
  22. M. Muehlebach and S. Trimpe: Distributed event-based state estimation for networked systems: An LMI approach. IEEE Trans. Automat. Control 63 (2018), 269-276.   DOI:10.1109/tac.2017.2726002
  23. F. Pasqualetti, F. Dorfler and F. Bullo: Attack detection and identification in cyber-physical systems. IEEE Trans. Automat. Control 58 (2013), 2715-2729.   DOI:10.1109/tac.2013.2266831
  24. C. Peng, J. Li and M. Fei: Resilient event-triggering $H_\infty$ load frequency control for multi-area power systems with energy-limited DoS attacks. IEEE Trans. Power Syst. 32 (2017), 4110-4118.   DOI:10.1109/tpwrs.2016.2634122
  25. C. Peng, S. Ma and X. Xie: Observer-based non-PDC control for networked T-S fuzzy systems with an event-triggered Communication. IEEE Trans. Cybernet. 47 (2017), 2279-2287.   DOI:10.1109/tcyb.2017.2659698
  26. C. Peng, H. Sun, M. Yang and Y. Wang: A survey on security communication and control for smart grids under malicious cyber attacks. IEEE Trans. Systems Man Cybernet.: Systems 49 (2019), 1554-1569.   DOI:10.1109/tsmc.2018.2884952
  27. C. de Persis and P. Tesi: Input-to-state stabilizing control under denial-of-service. IEEE Trans. Automat. Control 60 (2015), 2930-2944.   DOI:10.1109/tac.2015.2416924
  28. A. Seuret and F. Gouaisbaut: Wirtinger-based integral inequality: Application to time-delay systems. Automatica 49 (2013), 2860-2866.   DOI:10.1016/j.automatica.2013.05.030
  29. Y.-Ch. Sun and G.-H. Yang: Event-triggered resilient control for cyber-physical systems under asynchronous DoS attacks. Inform. Sci. 465 (2018), 340-352.   DOI:10.1016/j.ins.2018.07.030
  30. P. Tabuada: Event-triggered real-time scheduling of stabilizing control tasks. IEEE Trans. Automat. Control 52 (2007), 1680-1685.   DOI:10.1109/tac.2007.904277
  31. L. Van Do, L. Fillatre and I. Nikiforov et al: Security of SCADA systems against cyber-physical attacks. IEEE Aerospace Electron. Systems Mag. 32 (2017), 28-45.   DOI:10.1109/maes.2017.160047
  32. S. Xiaon, Q.-L. Han, X. Ge and Y. Zhang: Secure distributed finite-time filtering for positive systems over sensor networks under deception attacks. IEEE Trans. Cybernet. 50 (2019), 3, 1220-1229.   DOI:10.1109/tcyb.2019.2900478
  33. X. Xie, D. Yue and Ch. Peng: Relaxed real-time scheduling stabilization of discrete-time takagi-sugeno fuzzy systems via a alterable-weights-based ranking switching mechanism. IEEE Trans. Cybernet. 26 (2018), 3808-3819.   DOI:10.1109/tfuzz.2018.2849701
  34. X.-M. Zhang, Q.-L. Han and X. Ge et al: Networked control systems: A survey of trends and techniques. IEEE/CAA J. Automat. Sinica (2019), 1-17.   CrossRef
  35. X.-M. Zhang, Q.-L. Han and X. Ge et al: Resilient control design based on a sampled-data model for a class of networked control systems under denial-of-service attacks. IEEE Trans. Cybernet. (2019), 1-11.   CrossRef
  36. X.-M. Zhang, Q.-L. Han, A. Seuret and F. Gouaisbaut: An improved reciprocally convex inequality and an augmented Lyapunov-Krasovskii functional for stability of linear systems with time-varying delay. Automatica 84 (2017), 221-226.   DOI:10.1016/j.automatica.2017.04.048