A brief overview on secure control of networked systems

Hong-Tao Sun , Chen Peng , Peng Zhou , Zhi-Wen Wang

Advances in Manufacturing ›› 2017, Vol. 5 ›› Issue (3) : 243 -250.

PDF
Advances in Manufacturing ›› 2017, Vol. 5 ›› Issue (3) : 243 -250. DOI: 10.1007/s40436-017-0189-2
Article

A brief overview on secure control of networked systems

Author information +
History +
PDF

Abstract

This paper focuses on the issues of the security of networked control systems by summarizing recent progress in secure control of this research and application area. We mainly discuss existing results, especially in modeling issues, of three aspects: (1) attack mechanisms and their impacts on control systems, (2) the identification and design of attacks, and (3) secure estimation and control strategies. A conclusion is drawn at the end of this paper. In addition, several promising research tendencies of the development for secure control in networked control system are presented.

Keywords

Networked control system / Security / Attack / Estimation and control

Cite this article

Download citation ▾
Hong-Tao Sun, Chen Peng, Peng Zhou, Zhi-Wen Wang. A brief overview on secure control of networked systems. Advances in Manufacturing, 2017, 5(3): 243-250 DOI:10.1007/s40436-017-0189-2

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

Konstantinou C, Maniatakos M, Saqib F et al (2015) Cyber-physical systems: a security perspective. IEEE Eur Test Symp 1–8

[2]

Peng C, Zhang J. Delay-distribution-dependent load frequency control of power systems with probabilistic interval delays. IEEE Trans Power Syst, 2016, 31(4): 3309-3317.

[3]

Slay J, Miller M (2007) Lessons learned from the maroochy water breach. In: International conference critical infrastructure protection, Springer, US 73–82

[4]

Kuvshinkova S. SQL slammer worm lessons learned for consideration by the electricity sector. North Am Electr Reliab Counc, 2003, 1(2): 5

[5]

Farwell JP, Rohozinski R. Stuxnet and the future of cyber war. Survival, 2011, 53(1): 23-40.

[6]

Wu G, Sun J, Chen J. A survey on the security of cyber-physical systems. Control Theory Technol, 2016, 14(1): 2-10.

[7]

Dong P, Han Y, Guo X, et al. A systematic review of studies on cyber physical system security. Int J Secur Appl, 2015, 9(1): 155-164.

[8]

Amin S, Sastry S (2008) Research challenges for the security of control systems. In: USENIX association conference hot topics in security 1–6

[9]

O’Connell K (2008) Cia report: cyber extortionists attacked foreign power grid, disrupting delivery. Internet Business Law Services. http://www.ibls.com/internetlawnewsportalview.aspx

[10]

Sandberg H, Amin S, Johansson K. Cyberphysical security in networked control systems: an introduction to the issue. IEEE Trans Control Syst, 2015, 35(1): 20-23.

[11]

Teixeira A, Shames I, Sandberg H, et al. A secure control framework for resource-limited adversaries. Automatica, 2015, 51: 135-148.

[12]

Smith RS. A decoupled feedback structure for covertly appropriating networked control systems. IFAC Proc, 2011, 44(1): 91-95.

[13]

Teixeira A, Dán G, Sandberg H et al (2010) A cyber security study of a scada energy management system: stealthy deception attacks on the state estimator. IFAC Proc 44(1):11271–11277

[14]

Cárdenas AA, Amin S, Lin ZS et al (2011) Attacks against process control systems: risk assessment, detection, and response. In: Proceedings of ACM symposium information, computer communication security 355–366

[15]

Mo Y, Kim TH, Brancik K, et al. Cyber–physical security of a smart grid infrastructure. Proc IEEE, 2012, 100(1): 195-209.

[16]

Teixeira A, Pérez D, Sandberg H et al (2012) Attack models and scenarios for networked control systems. In: Proceedings of High Confidence Networked System 55–64

[17]

Sauter D, Li S, Aubrun C. Robust fault diagnosis of networked control systems. Int J Adapt Control Signal Process, 2009, 23(8): 722-736.

[18]

Ding S. Model-based fault diagnosis techniques: design schemes, algorithms, and tools, 2008, Berlin: Springer 50-56.

[19]

Amin S, Litrico X, Sastry SS et al (2010) Stealthy deception attacks on water SCADA systems. In: Proceedings of ACM conference hybrid system: computation and control, pp 161–170

[20]

Mo Y, Sinopoli B(2009) Secure control against replay attacks. In: Annual allerton conference communication, Control Computing, pp 911–918

[21]

Fawzi H, Tabuada P, Diggavi S. Secure estimation and control for cyber-physical systems under adversarial attacks. IEEE Trans Autom Control, 2014, 59(6): 1454-1467.

[22]

Kosut O, Jia L, Thomas RJ et al (2010) Malicious data attacks on smart grid state estimation: attack strategies and countermeasures. In: IEEE conference smart grid communications, pp 220–225

[23]

Liu Y, Ning P, Reiter MK. False data injection attacks against state estimation in electric power grids. ACM Trans Inf Syst Secur, 2011, 14(1): 1-16.

[24]

Schenato L. To zero or to hold control inputs with lossy links. IEEE Trans Autom Control, 2009, 54(5): 1093-1099.

[25]

Mo Y, Garone E, Casavola A et al (2010) False data injection attacks against state estimation in wireless sensor networks. In: IEEE Conference Decision Control, pp 5967–5972

[26]

Kwon C, Liu W, Hwang I (2013) Security analysis for cyber-physical systems against stealthy deception attacks. In: American Control Conference, pp 3344–3349

[27]

Gertler JJ. Survey of model-based failure detection and isolation in complex plants. Cont Syst Mag, 1988, 8(6): 3-11.

[28]

Manandhar K, Cao X, Hu F, et al. Detection of faults and attacks including false data injection attack in smart grid using kalman filter. IEEE Trans Control Netw Syst, 2014, 1(4): 370-379.

[29]

Kailath T, Poor HV. Detection of stochastic processes. IEEE Trans Inf Theory, 1998, 44(6): 2230-2231.

[30]

Wald A. Sequential analysis, 1973, North Chelmsford: Courier Corporation.

[31]

Pang ZH, Hou FY, Zhou YG et al (2015) False data injection attacks for output tracking control systems. In: Chinese Control Conference, pp 6747–6752

[32]

Xu Z, Ji Y, Zhou D. A new real-time reliability prediction method for dynamic systems based on online fault prediction. IEEE Trans Reliab, 2009, 58(3): 523-538.

[33]

Pasqualetti F, Dorfler F, Bullo F (2012) Cyber-physical security via geometric control: distributed monitoring and malicious attacks. In: Annual conference decision and control, pp 3418–3425

[34]

Zhang H, Cheng P, Shi L, et al. Optimal dos attack scheduling in wireless networked control system. IEEE Trans Control Syst Technol, 2016, 24(3): 843-852.

[35]

Zhang H, Cheng P, Shi L, et al. Optimal denial-of-service attack scheduling with energy constraint. IEEE Trans Autom Control, 2015, 60(11): 3023-3028.

[36]

Zhang H, Cheng P, Shi L et al (2013) Optimal DoS attack policy against remote state estimation. In: IEEE annual conference decision and control, pp 5444–5449

[37]

Zhang H, Cheng P, Shi L et al (2014) Optimal denial-of-service attack scheduling against linear quadratic gaussian control. In: American control conference, pp 3996–4001

[38]

Gupta A, Langbort C, Basar T (2010) Optimal control in the presence of an intelligent jammer with limited actions. In: Annual conference decision and control, pp 1096–1101

[39]

Zhu M, Martinez S (2011) Stackelberg-game analysis of correlated attacks in cyber-physical systems. In: American control conference, pp 4063–4068

[40]

Wang EK, Ye Y, Xu X et al (2010) Security issues and challenges for cyber physical system. In: Proc IEEE/ACM conference green computing communication & conference cyber, physical society computing, pp 733–738

[41]

Lee C, Shim H, Eun Y (2015) Secure and robust state estimation under sensor attacks, measurement noises, and process disturbances: observer-based combinatorial approach. In: European control conference, pp 1872–1877

[42]

Shoukry Y, Tabuada P. Event-triggered state observers for sparse sensor noise/attacks. IEEE Trans Autom Control, 2016, 61(8): 2079-2091.

[43]

Foroush H S, Martínez S(2012) On single-input controllable linear systems under periodic dos jamming attacks. arXiv preprint arXiv:1209.4101

[44]

Persis CD, Tesi P. Input-to-state stabilizing control under denial-of-service. IEEE Trans Autom Control, 2015, 60(11): 2930-2944.

[45]

Amin S, Cárdenas AA, Sastry SS (2009) Safe and secure networked control systems under denial-of service attacks. In: Hybrid systems: computation and control, Springer, pp 31–45

[46]

Feng Z, Hu G, Wen G. Distributed consensus tracking for multi-agent systems under two types of attacks. Int J Robust Nonlinear Control, 2016, 26(5): 896-918.

[47]

Yuan Y, Sun F, Zhu Q. Resilient control in the presence of dos attack: switched system approach. Int J Control Autom Syst, 2015, 13(6): 1423-1435.

[48]

Befekadu GK, Gupta V, Antsaklis PJ. Risksensitive control under markov modulated denial-of service (DoS) attack strategies. IEEE Trans Autom Control, 2015, 60(12): 3299-3304.

[49]

Pang ZH, Liu GP. Design and implementation of secure networked predictive control systems under deception attacks. IEEE Trans Control Syst Technol, 2012, 20(55): 1334-1342.

[50]

Pasqualetti F, Dorfler F, Bullo F. Controltheoretic methods for cyberphysical security: geometric principles for optimal cross-layer resilient control systems. IEEE Trans Control Syst, 2015, 35(1): 110-127.

[51]

Peng C, Ma SD, Xie XP (2017) Observer-based non-PDC control for networked T-S fuzzy systems with an event-triggered communication. IEEE Transactions on Cybernetics (99):1–9

[52]

Rieger CG, Gertman DI, McQueen MA (2009) Resilient control systems: next generation design research. In: HIS conference human system interaction, pp 632–636

[53]

Peng C, Li JC, Fei MR. Resilient event-triggered H load frequency control for networked power systems with energy-limited DoS attacks. IEEE Trans Power Syst, 2016, 99: 1

Funding

National Natural Science Foundation of China http://dx.doi.org/10.13039/501100001809(61273114)

the National Natural Science Foundation of China http://dx.doi.org/10.13039/501100001809(61263003)

International Corporation Project of Shanghai Science and Technology Commission(14510722500)

Program for Professor of Special Appointment (Eastern Scholar) at Shanghai Institutions of Higher Learning

Key Project of Science and Technology Commission of Shanghai Municipality(10JC1405000)

AI Summary AI Mindmap
PDF

186

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/