4.7 Article

Active Security Control Approach Against DoS Attacks in Cyber-Physical Systems

Journal

IEEE TRANSACTIONS ON AUTOMATIC CONTROL
Volume 66, Issue 9, Pages 4303-4310

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TAC.2020.3032598

Keywords

Denial-of-service attack; Actuators; Frequency control; Time measurement; Cyber-physical systems; Process control; Actively defend; cyber-physical systems (CPS); DoS attacks; experiments; security control; security transmission policy

Funding

  1. National Natural Science Foundation of China [61973277, 61673351]
  2. Zhejiang Provincial Natural Science Foundation of China [LR20F030004]

Ask authors/readers for more resources

An active security control approach is proposed for CPSs under DoS attacks, utilizing a strategy and controller to ensure timely control input updates, maintaining asymptotic stability of the system under two-channel DoS attacks. Simulations and experiments demonstrate the effectiveness of the approach.
An active security control approach is developed in this article for cyber-physical systems (CPSs) under denial-of-service (DoS) attacks, where DoS attacks exist in both the sensor-to-controller (S-C) channel and the controller-to-actuator (C-A) channel. Due to the cost constraints of attacks, it is reasonable to consider that the number of maximum continuous DoS attacks in both the S-C and the C-A channels is bounded. Then, to defend the two-channel DoS attacks, an active security control strategy that makes full use of the unattacked intervals is designed to ensure that the control inputs are updated timely in each period. Meanwhile, a security controller that contains both the current and future control inputs is designed. Under the active security control strategy and the security controller, the addressed CPS under two-channel DoS attacks can be asymptotically stable without losing the control performance. Finally, both the simulations and experiments are given to demonstrate the effectiveness of the proposed active security control approach.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available