Resilient and privacy-preserving predictive intrusion-tolerant control under stealthy cyber attacks: a cross-layer detection and defense method

被引:0
|
作者
Han, Kezhen [1 ]
Lu, Shaohang [1 ]
Chen, Changzhi [1 ]
Chen, Mengdi [1 ]
机构
[1] Jinan Univ, Sch Elect Engn, Jinan 250022, Peoples R China
基金
中国国家自然科学基金;
关键词
Attack Detection; Intrusion-Tolerant Control; Predictive Interpolating Control; Secure and Private Control; Stealthy Cyber Attack; SYSTEMS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a cross-layer attack detection and defense method that integrates local controller settings, network management, and cloud side control configuration. The significant advantages of this scheme are two folds: on the one hand, it achieves system-level privacy-preserving control to eliminate eavesdropping attacks; on the other hand, it designs a reliable intrusion-tolerant method to eliminate the disruptive impact of stealthy attacks by integrating attack detection-based network blocking defense and open-loop control defense. Note that, the system-level privacy-preserving is achieved based on the output masking, privacy-preserving optimization, and input encryption; the open-loop control defense is achieved based on one-step-ahead predictive interpolating control method. Sufficient numerical comparisons are given to verify the validity of these results.
引用
收藏
页码:188 / 193
页数:6
相关论文
共 4 条
  • [1] Resilient Predictive Load Frequency Control of Multiarea Interconnected Power Systems With Privacy Preserving and Active Detection Against Stealthy Cyber Attacks
    Han, Kezhen
    Zhang, Kun
    Wang, Zi-Peng
    Su, Rong
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (07): : 9044 - 9057
  • [2] Privacy-Preserving Adaptive Resilient Consensus for Multi-Agent Systems under Cyber Attacks
    Ying, Chenduo
    Zheng, Ning
    Wu, Yiming
    Xu, Ming
    Zhang, Wen-An
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (02) : 1630 - 1640
  • [3] Resilient Control for Wireless Cyber-Physical Systems Subject to Jamming Attacks: A Cross-Layer Dynamic Game Approach
    Zhao, Ling
    Xu, Hao
    Zhang, Jinhui
    Yang, Hongjiu
    IEEE TRANSACTIONS ON CYBERNETICS, 2022, 52 (04) : 2599 - 2608
  • [4] Resilient Control of Wireless Networked Control System Under Denial-of-Service Attacks: A Cross-Layer Design Approach
    Yuan, Yuan
    Yuan, Huanhuan
    Ho, Daniel W. C.
    Guo, Lei
    IEEE TRANSACTIONS ON CYBERNETICS, 2020, 50 (01) : 48 - 60