4.5 Article

A game-theoretic approach of cyberattack resilient constraint-following control for cyber-physical systems

期刊

AD HOC NETWORKS
卷 153, 期 -, 页码 -

出版社

ELSEVIER
DOI: 10.1016/j.adhoc.2023.103351

关键词

Cyber-physical system; Cyberattack; Constraint following; Mechanical system; Resilience

向作者/读者索取更多资源

This paper proposes a game-theoretic method based on constraint following theory to enhance the control resilience of cyber-physical systems. It addresses the uncertainties, mechanical constraints, and cyberattacks that these systems may encounter. Experimental results demonstrate the resilience of the controlled system against cyberattack disturbances and other threat attacks, and simulations verify the superiority of the optimal control design parameter.
Cyber-physical systems (CPSs) integrate network and physical components. The relevant network security issues have been receiving consistent attention. This paper considers cyber-physical systems whose control resilience is characterized by uncertainty, mechanical motion constraints, and exposure to cyber-attacks. To address these problems, this paper proposes a game-theoretic method based on constraint following theory where the moving trajectory requirements are considered as constraints. There can be adversary network environment which may launch cyberattacks and even deny providing service. With a creative control design, it is validated that the controlled system is resilient to cyberattack disturbance and other spoofing or mixed threat attacks. Three game rules, one non-cooperative game and two Stackelberg competitions, are adopted in this study to obtain the optimal control design parameter choice. It is proven that the optimal choice is the same from the three rules, thus making this optimal choice generic (i.e., nonspecific) and important. The superiority of the optimal control design parameter is demonstrated in simulations.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据