A brief overview on secure control of networked systems
Hong-Tao Sun , Chen Peng , Peng Zhou , Zhi-Wen Wang
Advances in Manufacturing ›› 2017, Vol. 5 ›› Issue (3) : 243 -250.
A brief overview on secure control of networked systems
This paper focuses on the issues of the security of networked control systems by summarizing recent progress in secure control of this research and application area. We mainly discuss existing results, especially in modeling issues, of three aspects: (1) attack mechanisms and their impacts on control systems, (2) the identification and design of attacks, and (3) secure estimation and control strategies. A conclusion is drawn at the end of this paper. In addition, several promising research tendencies of the development for secure control in networked control system are presented.
Networked control system / Security / Attack / Estimation and control
| [1] |
Konstantinou C, Maniatakos M, Saqib F et al (2015) Cyber-physical systems: a security perspective. IEEE Eur Test Symp 1–8 |
| [2] |
|
| [3] |
Slay J, Miller M (2007) Lessons learned from the maroochy water breach. In: International conference critical infrastructure protection, Springer, US 73–82 |
| [4] |
|
| [5] |
|
| [6] |
|
| [7] |
|
| [8] |
Amin S, Sastry S (2008) Research challenges for the security of control systems. In: USENIX association conference hot topics in security 1–6 |
| [9] |
O’Connell K (2008) Cia report: cyber extortionists attacked foreign power grid, disrupting delivery. Internet Business Law Services. http://www.ibls.com/internetlawnewsportalview.aspx |
| [10] |
|
| [11] |
|
| [12] |
|
| [13] |
Teixeira A, Dán G, Sandberg H et al (2010) A cyber security study of a scada energy management system: stealthy deception attacks on the state estimator. IFAC Proc 44(1):11271–11277 |
| [14] |
Cárdenas AA, Amin S, Lin ZS et al (2011) Attacks against process control systems: risk assessment, detection, and response. In: Proceedings of ACM symposium information, computer communication security 355–366 |
| [15] |
|
| [16] |
Teixeira A, Pérez D, Sandberg H et al (2012) Attack models and scenarios for networked control systems. In: Proceedings of High Confidence Networked System 55–64 |
| [17] |
|
| [18] |
|
| [19] |
Amin S, Litrico X, Sastry SS et al (2010) Stealthy deception attacks on water SCADA systems. In: Proceedings of ACM conference hybrid system: computation and control, pp 161–170 |
| [20] |
Mo Y, Sinopoli B(2009) Secure control against replay attacks. In: Annual allerton conference communication, Control Computing, pp 911–918 |
| [21] |
|
| [22] |
Kosut O, Jia L, Thomas RJ et al (2010) Malicious data attacks on smart grid state estimation: attack strategies and countermeasures. In: IEEE conference smart grid communications, pp 220–225 |
| [23] |
|
| [24] |
|
| [25] |
Mo Y, Garone E, Casavola A et al (2010) False data injection attacks against state estimation in wireless sensor networks. In: IEEE Conference Decision Control, pp 5967–5972 |
| [26] |
Kwon C, Liu W, Hwang I (2013) Security analysis for cyber-physical systems against stealthy deception attacks. In: American Control Conference, pp 3344–3349 |
| [27] |
|
| [28] |
|
| [29] |
|
| [30] |
|
| [31] |
Pang ZH, Hou FY, Zhou YG et al (2015) False data injection attacks for output tracking control systems. In: Chinese Control Conference, pp 6747–6752 |
| [32] |
|
| [33] |
Pasqualetti F, Dorfler F, Bullo F (2012) Cyber-physical security via geometric control: distributed monitoring and malicious attacks. In: Annual conference decision and control, pp 3418–3425 |
| [34] |
|
| [35] |
|
| [36] |
Zhang H, Cheng P, Shi L et al (2013) Optimal DoS attack policy against remote state estimation. In: IEEE annual conference decision and control, pp 5444–5449 |
| [37] |
Zhang H, Cheng P, Shi L et al (2014) Optimal denial-of-service attack scheduling against linear quadratic gaussian control. In: American control conference, pp 3996–4001 |
| [38] |
Gupta A, Langbort C, Basar T (2010) Optimal control in the presence of an intelligent jammer with limited actions. In: Annual conference decision and control, pp 1096–1101 |
| [39] |
Zhu M, Martinez S (2011) Stackelberg-game analysis of correlated attacks in cyber-physical systems. In: American control conference, pp 4063–4068 |
| [40] |
Wang EK, Ye Y, Xu X et al (2010) Security issues and challenges for cyber physical system. In: Proc IEEE/ACM conference green computing communication & conference cyber, physical society computing, pp 733–738 |
| [41] |
Lee C, Shim H, Eun Y (2015) Secure and robust state estimation under sensor attacks, measurement noises, and process disturbances: observer-based combinatorial approach. In: European control conference, pp 1872–1877 |
| [42] |
|
| [43] |
Foroush H S, Martínez S(2012) On single-input controllable linear systems under periodic dos jamming attacks. arXiv preprint arXiv:1209.4101 |
| [44] |
|
| [45] |
Amin S, Cárdenas AA, Sastry SS (2009) Safe and secure networked control systems under denial-of service attacks. In: Hybrid systems: computation and control, Springer, pp 31–45 |
| [46] |
|
| [47] |
|
| [48] |
|
| [49] |
|
| [50] |
|
| [51] |
Peng C, Ma SD, Xie XP (2017) Observer-based non-PDC control for networked T-S fuzzy systems with an event-triggered communication. IEEE Transactions on Cybernetics (99):1–9 |
| [52] |
Rieger CG, Gertman DI, McQueen MA (2009) Resilient control systems: next generation design research. In: HIS conference human system interaction, pp 632–636 |
| [53] |
|
/
| 〈 |
|
〉 |