4.8 Article

A Zoning-Based Secure Control Approach Against Actuator Attacks in Industrial Cyber-Physical Systems

Journal

IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS
Volume 68, Issue 3, Pages 2637-2647

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TIE.2020.2972466

Keywords

Actuators; Security; Linear systems; Sensor systems; Controllability; Process control; Actuator attack; attack mitigation; controllability; control reconfiguration; zoning

Funding

  1. National Science Foundation of China [61873103, 61433006]
  2. Australian Research Council through the Discovery Project Scheme, Australia [DP170103305]

Ask authors/readers for more resources

The integration of cyber and physical domains can enhance the flexibility and efficiency of industrial systems, but also introduces security threats. A zoning-based approach is introduced to identify and mitigate actuator attacks in industrial cyber-physical systems, ensuring system controllability. Case studies demonstrate the effectiveness of the proposed approach.
The integration of cyber and physical domains improves the flexibility and efficiency of industrial systems. However, it also introduces security threats into the physical processes of the systems. More seriously, most of field devices, such as sensors and actuators, in industrial systems are vulnerable to security threats because they are usually not deployed with security countermeasures. Therefore, how to secure the physical processes of these industrial cyber-physical systems becomes an emerging problem. To address this problem, a zoning-based approach is presented in this article for identification and mitigation of actuator attacks in multiple-input multiple-output processes governed by linear time-invariant systems. It partitions the set of actuators into multiple zones that ensures the controllability of the surviving zones when a zone is compromised. When a zone is intruded, the system states of the compromised zone and other zones cooperate to confirm that the detected attack is against actuators. Then, to mitigate the impact of the actuator attack on the system functions, the attacked actuators are isolated. After that, the residual actuators in the surviving zones are used to reconfigure the control loops of the systems. Case studies are conducted to illustrate the effectiveness of the presented approach.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available