SCIENTIA SINICA Informationis, Volume 51 , Issue 1 : 89(2021) https://doi.org/10.1360/SSI-2020-0212

Secure control and proportional-integral-derivative performance of cyber-physical systems with sparse adversarial attacks

More info
  • ReceivedMar 7, 2020
  • AcceptedJun 29, 2020
  • PublishedDec 14, 2020


Funded by





[1] Design and Implementation of Attack-Resilient Cyberphysical Systems: With a Focus on Attack-Resilient State Estimators. IEEE Control Syst, 2017, 37: 66-81 CrossRef Google Scholar

[2] Lee R M, Assante M J, Conway T. German steel mill cyber attack. Ind Control Syst 2014, 30: 62. Google Scholar

[3] Chen T M. Stuxnet, the real start of cyber warfare? [Editor's Note]. IEEE Network, 2010, 24: 2-3 CrossRef Google Scholar

[4] Lee D. Flame: Massive cyber-attack discovered, researchers say. BBC News 2012, 5: 2012. Google Scholar

[5] Peterson S, Faramarzi. Iran hijacked us drone, says iranian engineer. Christian Sci Monitor 2011, 15. Google Scholar

[6] Ding K, Li Y, Quevedo D E. A multi-channel transmission schedule for remote state estimation under DoS attacks. Automatica, 2017, 78: 194-201 CrossRef Google Scholar

[7] Mo Y, Sinopoli B. Secure Estimation in the Presence of Integrity Attacks. IEEE Trans Automat Contr, 2015, 60: 1145-1151 CrossRef Google Scholar

[8] An L, Yang G H. Secure State Estimation Against Sparse Sensor Attacks With Adaptive Switching Mechanism. IEEE Trans Automat Contr, 2018, 63: 2596-2603 CrossRef Google Scholar

[9] Shoukry Y, Nuzzo P, Puggelli A. Secure State Estimation for Cyber-Physical Systems Under Sensor Attacks: A Satisfiability Modulo Theory Approach. IEEE Trans Automat Contr, 2017, 62: 4917-4932 CrossRef Google Scholar

[10] Mo Y, Hespanha J P, Sinopoli B. Resilient Detection in the Presence of Integrity Attacks. IEEE Trans Signal Process, 2014, 62: 31-43 CrossRef ADS Google Scholar

[11] Ye D, Zhang T Y. Summation Detector for False Data-Injection Attack in Cyber-Physical Systems. IEEE Trans Cybern, 2020, 50: 2338-2345 CrossRef Google Scholar

[12] Cardenas A A, Amin S, Sastry S. Secure control: towards survivable cyber-physical systems. In: Proceedings of the 28th International Conference on Distributed Computing Systems Workshops, Beijing, 2008. 495--500. Google Scholar

[13] Xie C H, Yang G H. Observer-based attack-resilient control for linear systems against FDI attacks on communication links from controller to actuators. Int J Robust NOnlinear Control, 2018, 35 CrossRef Google Scholar

[14] Fawzi H, Tabuada P, Diggavi S. Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks. IEEE Trans Automat Contr, 2014, 59: 1454-1467 CrossRef Google Scholar

[15] Amin S, Schwartz G A, Shankar Sastry S. Security of interdependent and identical networked control systems. Automatica, 2013, 49: 186-192 CrossRef Google Scholar

[16] De Persis C, Tesi P. Input-to-State Stabilizing Control Under Denial-of-Service. IEEE Trans Automat Contr, 2015, 60: 2930-2944 CrossRef Google Scholar

[17] Lu A Y, Yang G H. Input-to-State Stabilizing Control for Cyber-Physical Systems With Multiple Transmission Channels Under Denial of Service. IEEE Trans Automat Contr, 2018, 63: 1813-1820 CrossRef Google Scholar

[18] Tang Y, Zhang D, Ho D W C. Event-Based Tracking Control of Mobile Robot With Denial-of-Service Attacks. IEEE Trans Syst Man Cybern Syst, 2020, 50: 3300-3310 CrossRef Google Scholar

[19] Chen X, Wang Y. Event-triggered attack-tolerant tracking control design for networked nonlinear control systems under DoS jamming attacks. Sci China Inf Sci, 2020, 63: 150207 CrossRef Google Scholar

[20] Jin X, Haddad W M, Yucelen T. An Adaptive Control Architecture for Mitigating Sensor and Actuator Attacks in Cyber-Physical Systems. IEEE Trans Automat Contr, 2017, 62: 6058-6064 CrossRef Google Scholar

[21] Liu J, Gu Y, Xie X. Hybrid-Driven-Based ${\mathcal{H}}_\infty$ Control for Networked Cascade Control Systems With Actuator Saturations and Stochastic Cyber Attacks. IEEE Trans Syst Man Cybern Syst, 2019, 49: 2452-2463 CrossRef Google Scholar

[22] Liu J, Wu Z G, Yue D. Stabilization of Networked Control Systems With Hybrid-Driven Mechanism and Probabilistic Cyber Attacks. IEEE Trans Syst Man Cybern Syst, 2019, : 1-11 CrossRef Google Scholar

[23] Hu J, Shen J, Lee D. Resilient Stabilization of Switched Linear Control Systems Against Adversarial Switching. IEEE Trans Automat Contr, 2017, 62: 3820-3834 CrossRef Google Scholar

[24] Lu A Y, Yang G H. Event-triggered secure observer-based control for cyber-physical systems under adversarial attacks. Inf Sci, 2017, 420: 96-109 CrossRef Google Scholar

[25] Mustafa A, Modares H. Attack Analysis and Resilient Control Design for Discrete-Time Distributed Multi-Agent Systems. IEEE Robot Autom Lett, 2020, 5: 369-376 CrossRef Google Scholar

[26] An L, Yang G H. LQ Secure Control for Cyber-Physical Systems Against Sparse Sensor and Actuator Attacks. IEEE Trans Control Netw Syst, 2019, 6: 833-841 CrossRef Google Scholar

[27] D'Innocenzo A, Smarra F, Di Benedetto M D. Resilient stabilization of Multi-Hop Control Networks subject to malicious attacks. Automatica, 2016, 71: 1-9 CrossRef Google Scholar

[28] Ding D, Wang Z, Han Q L. Security Control for Discrete-Time Stochastic Nonlinear Systems Subject to Deception Attacks. IEEE Trans Syst Man Cybern Syst, 2018, 48: 779-789 CrossRef Google Scholar

[29] Chien-Liang Lai , Pau-Lo Hsu . Design the Remote Control System With the Time-Delay Estimator and the Adaptive Smith Predictor. IEEE Trans Ind Inf, 2010, 6: 73-80 CrossRef Google Scholar

[30] Chang X H, Huang R, Park J H. Robust Guaranteed Cost Control Under Digital Communication Channels. IEEE Trans Ind Inf, 2020, 16: 319-327 CrossRef Google Scholar

[31] Chang X H, Huang R, Wang H. Robust Design Strategy of Quantized Feedback Control. IEEE Trans Circuits Syst II, 2020, 67: 730-734 CrossRef Google Scholar

[32] Sayers C. Remote Control Robotics Berlin: Springer-Verlag, 1998. Google Scholar

[33] Buse D P, Wu Q H. Mobile Agents for Remote Control of Distributed Systems. IEEE Trans Ind Electron, 2004, 51: 1142-1149 CrossRef Google Scholar

[34] Yunseop Kim , Evans R G, Iversen W M. Remote Sensing and Control of an Irrigation System Using a Distributed Wireless Sensor Network. IEEE Trans Instrum Meas, 2008, 57: 1379-1387 CrossRef Google Scholar

[35] Pan Y J, Marquez H J, Chen T. Stabilization of remote control systems with unknown time varying delays by LMI techniques. Int J Control, 2006, 79: 752-763 CrossRef Google Scholar

[36] Potter J J, Adams C J, Singhose W. A Planar Experimental Remote-Controlled Helicopter With a Suspended Load. IEEE/ASME Trans Mechatron, 2015, 20: 2496-2503 CrossRef Google Scholar

[37] Baldi S, Battistelli G, Mosca E. Multi-model unfalsified adaptive switching supervisory control. Automatica, 2010, 46: 249-259 CrossRef Google Scholar

[38] Battistelli G, Mosca E, Safonov M G. Stability of Unfalsified Adaptive Switching Control in Noisy Environments. IEEE Trans Automat Contr, 2010, 55: 2424-2429 CrossRef Google Scholar

[39] Mousavinejad E, Yang F, Han Q L. A Novel Cyber Attack Detection Method in Networked Control Systems. IEEE Trans Cybern, 2018, 48: 3254-3264 CrossRef Google Scholar

[40] Xie C H, Yang H, Wang D. Asymptotic state estimation for linear systems with sensor and actuator faults. Sci China Inf Sci, 2019, 62: 212202 CrossRef Google Scholar

[41] Li Y X, Yang G H. Robust Adaptive Fault-Tolerant Control for a Class of Uncertain Nonlinear Time Delay Systems. IEEE Trans Syst Man Cybern Syst, 2017, 47: 1554-1563 CrossRef Google Scholar

[42] Lu A Y, Yang G H. Secure Switched Observers for Cyber-Physical Systems Under Sparse Sensor Attacks: A Set Cover Approach. IEEE Trans Automat Contr, 2019, 64: 3949-3955 CrossRef Google Scholar

[43] Yin Y, Zhao X, Zheng X. New Stability and Stabilization Conditions of Switched Systems with Mode-Dependent Average Dwell Time. Circuits Syst Signal Process, 2017, 36: 82-98 CrossRef Google Scholar

[44] Zhao X, Yin Y, Zheng X. State-dependent switching control of switched positive fractional-order systems. ISA Trans, 2016, 62: 103-108 CrossRef Google Scholar

  • Figure 1

    (Color online) Secure control architecture under malicious attacks


    Algorithm 1 Secure control with selection mechanism

    Require:Closed-loop system (9) under Assumptions 1 and 2; Given sequence $\mathbb{J}_{1}\mathbb{J}_{2}\mathbb{J}_{3}\cdots\mathbb{J}_{\mathop{\sum}_{j=0}^{a_{\max}}C_m^{j}}$.

    Initialization: $k_0=0$; $k=0$; $\ell(0)=1$.

    while $k\geq0$ do

    Let $\mathbb{J}(k)=\mathbb{J}_{\ell(k)}$.

    Select the feedback gain for the system (9):