Adaptive Event-Triggered Stability Control for Intermittent DoS Attacks in Industrial Cyber Physical Systems

被引:0
|
作者
Sun Z. [1 ,2 ]
Liu J. [1 ]
机构
[1] School of Internet of Things Engineering, Jiangnan University, Jiangsu, Wuxi
[2] Engineering Research Center of Internet of Things Technology Applications Ministry of Education, Jiangsu, Wuxi
基金
中国国家自然科学基金;
关键词
adaptive event-triggered; DoS attack; industrial cyber physical system; observer; reconstructed states; stability control;
D O I
10.12141/j.issn.1000-565X.220084
中图分类号
学科分类号
摘要
For industrial information physical systems (ICPS) with gap denial of service (DoS) attacks, an observer-based adaptive event-triggered stability control scheme was proposed. Firstly, an observer was constructed to estimate the unmeasured state of the system, and a new adaptive event-triggered communication scheme was adopted to save network resources. Secondly, an attack model was established based on the influence of intermittent DoS attacks on ICPS limited by frequency and duration. ICPS subjected to DoS attacks was divided into active DoS attack system and dormant DoS attack system, and the current attacked states were reconstructed by some successful trigger states. An attack compensation mechanism based on dynamic estimator was proposed to ensure the asymptotic stability of the system during active DoS attacks. Finally, the piecewise Lyapunov functional method, Jensen’s inequality and Schur’s complement lemma were used to obtain the stability conditions of the system. On this basis, a cooperative design scheme of adaptive event triggering parameters, observer gain and controller gain was proposed. The intermittent reactor system was used to simulate the stability of ICPS based on adaptive event triggering under intermittent DoS attack. The simulation results show that the adaptive event triggering strategy and the compensation mechanism based on the dynamic estimator can not only improve the stability of the system, but also effectively reduce the number of data transmission. The times of the system triggered by the static event triggering policy is about 4. 5 times that of the system triggered by the adaptive event triggering policy. © 2023 South China University of Technology. All rights reserved.
引用
收藏
页码:146 / 156
页数:10
相关论文
共 24 条
  • [1] WANG Zhongjie, XIE Lulu, Cyber-physical systems:A survey [J]., Acta Automatica Sinica, 37, 10, pp. 1157-1166, (2011)
  • [2] WALSH G C, YE H., Scheduling of networked control systems [J], IEEE Control Systems, 21, 1, pp. 57-65, (2001)
  • [3] MAHMOUD M S,, HAMDAN M M,, BARUDI U A., Modeling and control of cyber-physical systems subject to cyber attacks:A survey of recent advances and challenges [J], Neurocomputing, 338, 21, pp. 101-115, (2019)
  • [4] LANGNER R., Stuxnet: dissecting a cyberwarfare weapon [J], IEEE Security and Privacy Magazine, 15, 1, pp. 49-51, (2011)
  • [5] TANG Yi, CHEN Qian, LI Mengya, Review of network attack research in power information physical fusion system environment [J], Automation of Electric Power Systems, 40, 17, pp. 59-69, (2016)
  • [6] Secure estimation and control for cyber-physical systems under adversarial attacks [J], IEEE Transactions on Automatic Control, 59, 6, pp. 1454-1467, (2014)
  • [7] KONG L S,, LIU Z, Machine learning and deep learning methods for cyber security [J].IEEE Access, 6, pp. 35365-35381, (2018)
  • [8] CHAUDHARI R S,, TALMALE G R., A review on detection approaches for distributed denial of service attacks, Proceedings of the 2019 International Conference on Intelligent Sustainable Systems(ICISS), pp. 323-327, (2019)
  • [9] MURUGAN K,, SURESH P., Efficient anomaly intrusion detection using hybrid probabilistic techniques in wireless ad hoc network [J], International Journal of Network Security, 20, 4, pp. 730-737, (2018)
  • [10] BUCZAK A L,, GUVEN E., A survey of data mining and machine learning methods for cyber security intrusion detection [J], IEEE Communications Surveys and Tutorials, 18, 2, pp. 1153-1176, (2017)