Maryam Shahriari-kahkeshi, Sayed Amirhosein Alem, Peng Shi
{"title":"非线性网络物理系统中欺骗攻击的检测、重构和缓解","authors":"Maryam Shahriari-kahkeshi, Sayed Amirhosein Alem, Peng Shi","doi":"10.1002/acs.3854","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>This paper proposes a new detection, reconstruction and mitigation scheme for nonlinear cyber-physical systems experiencing deception attacks in controller-actuator channel. For early detection of attacks, an anomaly detection unit based on the diagnostic observer is designed. After residual generation and evaluation, attack is detected. Upon attack detection, an adaptive fuzzy wavelet network (FWN) as an online nonlinear estimator is activated to reconstruct the detected malicious attack. Then, attack mitigation mechanism based on the command filtered backstepping approach and reconstructed attack is activated to mitigate the adverse effect of the detected attack. Stability analysis of the suggested strategy is presented and simulation results are provided to show the effectiveness of the suggested scheme.</p>\n </div>","PeriodicalId":50347,"journal":{"name":"International Journal of Adaptive Control and Signal Processing","volume":"38 9","pages":"2972-2995"},"PeriodicalIF":3.9000,"publicationDate":"2024-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Detection, reconstruction and mitigation of deception attacks in nonlinear cyber-physical systems\",\"authors\":\"Maryam Shahriari-kahkeshi, Sayed Amirhosein Alem, Peng Shi\",\"doi\":\"10.1002/acs.3854\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div>\\n \\n <p>This paper proposes a new detection, reconstruction and mitigation scheme for nonlinear cyber-physical systems experiencing deception attacks in controller-actuator channel. For early detection of attacks, an anomaly detection unit based on the diagnostic observer is designed. After residual generation and evaluation, attack is detected. Upon attack detection, an adaptive fuzzy wavelet network (FWN) as an online nonlinear estimator is activated to reconstruct the detected malicious attack. Then, attack mitigation mechanism based on the command filtered backstepping approach and reconstructed attack is activated to mitigate the adverse effect of the detected attack. Stability analysis of the suggested strategy is presented and simulation results are provided to show the effectiveness of the suggested scheme.</p>\\n </div>\",\"PeriodicalId\":50347,\"journal\":{\"name\":\"International Journal of Adaptive Control and Signal Processing\",\"volume\":\"38 9\",\"pages\":\"2972-2995\"},\"PeriodicalIF\":3.9000,\"publicationDate\":\"2024-06-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Adaptive Control and Signal Processing\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1002/acs.3854\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Adaptive Control and Signal Processing","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/acs.3854","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
Detection, reconstruction and mitigation of deception attacks in nonlinear cyber-physical systems
This paper proposes a new detection, reconstruction and mitigation scheme for nonlinear cyber-physical systems experiencing deception attacks in controller-actuator channel. For early detection of attacks, an anomaly detection unit based on the diagnostic observer is designed. After residual generation and evaluation, attack is detected. Upon attack detection, an adaptive fuzzy wavelet network (FWN) as an online nonlinear estimator is activated to reconstruct the detected malicious attack. Then, attack mitigation mechanism based on the command filtered backstepping approach and reconstructed attack is activated to mitigate the adverse effect of the detected attack. Stability analysis of the suggested strategy is presented and simulation results are provided to show the effectiveness of the suggested scheme.
期刊介绍:
The International Journal of Adaptive Control and Signal Processing is concerned with the design, synthesis and application of estimators or controllers where adaptive features are needed to cope with uncertainties.Papers on signal processing should also have some relevance to adaptive systems. The journal focus is on model based control design approaches rather than heuristic or rule based control design methods. All papers will be expected to include significant novel material.
Both the theory and application of adaptive systems and system identification are areas of interest. Papers on applications can include problems in the implementation of algorithms for real time signal processing and control. The stability, convergence, robustness and numerical aspects of adaptive algorithms are also suitable topics. The related subjects of controller tuning, filtering, networks and switching theory are also of interest. Principal areas to be addressed include:
Auto-Tuning, Self-Tuning and Model Reference Adaptive Controllers
Nonlinear, Robust and Intelligent Adaptive Controllers
Linear and Nonlinear Multivariable System Identification and Estimation
Identification of Linear Parameter Varying, Distributed and Hybrid Systems
Multiple Model Adaptive Control
Adaptive Signal processing Theory and Algorithms
Adaptation in Multi-Agent Systems
Condition Monitoring Systems
Fault Detection and Isolation Methods
Fault Detection and Isolation Methods
Fault-Tolerant Control (system supervision and diagnosis)
Learning Systems and Adaptive Modelling
Real Time Algorithms for Adaptive Signal Processing and Control
Adaptive Signal Processing and Control Applications
Adaptive Cloud Architectures and Networking
Adaptive Mechanisms for Internet of Things
Adaptive Sliding Mode Control.