网络攻击下一类非线性CPS安全控制与通信协同设计研究

Li Zhao, Wei Li, Yajie Li, Yahong Shi
{"title":"网络攻击下一类非线性CPS安全控制与通信协同设计研究","authors":"Li Zhao, Wei Li, Yajie Li, Yahong Shi","doi":"10.1109/SAFEPROCESS45799.2019.9213332","DOIUrl":null,"url":null,"abstract":"The co-design problem is studied for a class of nonlinear CPS under cyber attack, physical component failure and limited communication resources by introducing DETCS. Firstly, in the circumstances of cyber attack and physical component failure, the defense idea of active fault-tolerant combine with passive attack-tolerant is developed, and on the basis, a nonlinear CPS security control model is established that integrates trigger condition, actuator fault and cyber attack. Secondly, based on time delay system theory, the design of robust attack-tolerant observer which can estimate the being attack state and fault in real time, as well as a method of co-compute between fault-tolerant, attack-tolerant controller, the event trigger matrix are obtained respectively. Thus, the goals of active fault-tolerant, passive attack-tolerant control and the method of saving cyber communication resource are given. Finally, a simulation example is given to verify the effectiveness and feasibility of the theoretical research.","PeriodicalId":353946,"journal":{"name":"2019 CAA Symposium on Fault Detection, Supervision and Safety for Technical Processes (SAFEPROCESS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Research on Co-Design between Security Control and Communication for a Class of Nonlinear CPS under Cyber Attack\",\"authors\":\"Li Zhao, Wei Li, Yajie Li, Yahong Shi\",\"doi\":\"10.1109/SAFEPROCESS45799.2019.9213332\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The co-design problem is studied for a class of nonlinear CPS under cyber attack, physical component failure and limited communication resources by introducing DETCS. Firstly, in the circumstances of cyber attack and physical component failure, the defense idea of active fault-tolerant combine with passive attack-tolerant is developed, and on the basis, a nonlinear CPS security control model is established that integrates trigger condition, actuator fault and cyber attack. Secondly, based on time delay system theory, the design of robust attack-tolerant observer which can estimate the being attack state and fault in real time, as well as a method of co-compute between fault-tolerant, attack-tolerant controller, the event trigger matrix are obtained respectively. Thus, the goals of active fault-tolerant, passive attack-tolerant control and the method of saving cyber communication resource are given. Finally, a simulation example is given to verify the effectiveness and feasibility of the theoretical research.\",\"PeriodicalId\":353946,\"journal\":{\"name\":\"2019 CAA Symposium on Fault Detection, Supervision and Safety for Technical Processes (SAFEPROCESS)\",\"volume\":\"48 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 CAA Symposium on Fault Detection, Supervision and Safety for Technical Processes (SAFEPROCESS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SAFEPROCESS45799.2019.9213332\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 CAA Symposium on Fault Detection, Supervision and Safety for Technical Processes (SAFEPROCESS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SAFEPROCESS45799.2019.9213332","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

通过引入DETCS,研究了网络攻击、物理部件失效和通信资源有限情况下一类非线性CPS的协同设计问题。首先,在网络攻击和物理部件失效的情况下,提出了主动容错与被动容错相结合的防御思想,并在此基础上建立了集成触发条件、执行器故障和网络攻击的非线性CPS安全控制模型。其次,基于时滞系统理论,设计了能够实时估计被攻击状态和故障的鲁棒容错观测器,给出了容错控制器、容错控制器、事件触发矩阵的协同计算方法;在此基础上,提出了主动容错控制、被动容错控制的目标和节约网络通信资源的方法。最后通过仿真算例验证了理论研究的有效性和可行性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Research on Co-Design between Security Control and Communication for a Class of Nonlinear CPS under Cyber Attack
The co-design problem is studied for a class of nonlinear CPS under cyber attack, physical component failure and limited communication resources by introducing DETCS. Firstly, in the circumstances of cyber attack and physical component failure, the defense idea of active fault-tolerant combine with passive attack-tolerant is developed, and on the basis, a nonlinear CPS security control model is established that integrates trigger condition, actuator fault and cyber attack. Secondly, based on time delay system theory, the design of robust attack-tolerant observer which can estimate the being attack state and fault in real time, as well as a method of co-compute between fault-tolerant, attack-tolerant controller, the event trigger matrix are obtained respectively. Thus, the goals of active fault-tolerant, passive attack-tolerant control and the method of saving cyber communication resource are given. Finally, a simulation example is given to verify the effectiveness and feasibility of the theoretical research.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Research on Fault Estimation and Fault-tolerant Control of Hypersonic Aircraft Based on Adaptive Observer A Real-Time Anomaly Detection Approach Based on Sparse Distributed Representation Multimode Process Monitoring with Mode Transition Constraints Active Fault-Tolerant Tracking Control of an Unmanned Quadrotor Helicopter under Sensor Faults Cryptanalysis on a (k, n)-Threshold Multiplicative Secret Sharing Scheme
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1