4.8 Article

A Zoning-Based Secure Control Approach Against Actuator Attacks in Industrial Cyber-Physical Systems

期刊

IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS
卷 68, 期 3, 页码 2637-2647

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TIE.2020.2972466

关键词

Actuators; Security; Linear systems; Sensor systems; Controllability; Process control; Actuator attack; attack mitigation; controllability; control reconfiguration; zoning

资金

  1. National Science Foundation of China [61873103, 61433006]
  2. Australian Research Council through the Discovery Project Scheme, Australia [DP170103305]

向作者/读者索取更多资源

The integration of cyber and physical domains can enhance the flexibility and efficiency of industrial systems, but also introduces security threats. A zoning-based approach is introduced to identify and mitigate actuator attacks in industrial cyber-physical systems, ensuring system controllability. Case studies demonstrate the effectiveness of the proposed approach.
The integration of cyber and physical domains improves the flexibility and efficiency of industrial systems. However, it also introduces security threats into the physical processes of the systems. More seriously, most of field devices, such as sensors and actuators, in industrial systems are vulnerable to security threats because they are usually not deployed with security countermeasures. Therefore, how to secure the physical processes of these industrial cyber-physical systems becomes an emerging problem. To address this problem, a zoning-based approach is presented in this article for identification and mitigation of actuator attacks in multiple-input multiple-output processes governed by linear time-invariant systems. It partitions the set of actuators into multiple zones that ensures the controllability of the surviving zones when a zone is compromised. When a zone is intruded, the system states of the compromised zone and other zones cooperate to confirm that the detected attack is against actuators. Then, to mitigate the impact of the actuator attack on the system functions, the attacked actuators are isolated. After that, the residual actuators in the surviving zones are used to reconfigure the control loops of the systems. Case studies are conducted to illustrate the effectiveness of the presented approach.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据