Received date: 2016-11-10
Revised date: 2017-07-26
Online published: 2017-09-25
Supported by
This work was supported in part by the National Natural Science Foundation of China (Grant Nos. 61673255, 61263003 and 61273114); the International Corporation Project of Shanghai Science and Technology Commission (Grant No. 14510722500); the Program for Professor of Special Appointment (Eastern Scholar) at Shanghai Institutions of Higher Learning; the Key Project of Science and Technology Commission of Shanghai Municipality (Grant No. 10JC1405000); A Project of Shandong Province Higher Educational Science and Technology Program (Grant No. J17KA084).
This paper focuses on the issues of the security of networked control systems by summarizing recent progress in secure control of this research and application area. We mainly discuss existing results, especially in modeling issues, of three aspects:(1) attack mechanisms and their impacts on control systems, (2) the identification and design of attacks, and (3) secure estimation and control strategies. A conclusion is drawn at the end of this paper. In addition, several promising research tendencies of the development for secure control in networked control system are presented.
The full text can be downloaded at https://link.springer.com/article/10.1007/s40436-017-0187-4
Key words: Networked control system; Security; Attack; Estimation and control
Hong-Tao Sun , Chen Peng , Peng Zhou , Zhi-Wen Wang . A brief overview on secure control of networked systems[J]. Advances in Manufacturing, 2017 , 5(3) : 243 -250 . DOI: 10.1007/s40436-017-0189-2
1. Konstantinou C, Maniatakos M, Saqib F et al (2015) Cyberphysical systems: a security perspective. IEEE Eur Test Symp 1- 8
2. Peng C, Zhang J (2016) Delay-distribution-dependent load frequency control of power systems with probabilistic interval delays. IEEE Trans Power Syst 31(4):3309-3317
3. Slay J, Miller M (2007) Lessons learned from the maroochy water breach. In: International conference critical infrastructure protection, Springer, US 73-82
4. Kuvshinkova S (2003) SQL slammer worm lessons learned for consideration by the electricity sector. North Am Electr Reliab Counc 1(2):5
5. Farwell JP, Rohozinski R (2011) Stuxnet and the future of cyber war. Survival 53(1):23-40
6. Wu G, Sun J, Chen J (2016) A survey on the security of cyberphysical systems. Control Theory Technol 14(1):2-10
7. Dong P, Han Y, Guo X et al (2015) A systematic review of studies on cyber physical system security. Int J Secur Appl 9 (1):155-164
8. Amin S, Sastry S (2008) Research challenges for the security of control systems. In: USENIX association conference hot topics in security 1-6
9. O’Connell K (2008) Cia report: cyber extortionists attacked foreign power grid, disrupting delivery. Internet Business Law Services. http://www.ibls.com/internetlawnewsportalview.aspx
10. Sandberg H, Amin S, Johansson K (2015) Cyberphysical security in networked control systems: an introduction to the issue. IEEE Trans Control Syst 35(1):20-23
11. Teixeira A, Shames I, Sandberg H et al (2015) A secure control framework for resource-limited adversaries. Automatica 51:135- 148
12. Smith RS (2011) A decoupled feedback structure for covertly appropriating networked control systems. IFAC Proc 44(1):91-95
13. Teixeira A, Dán G, Sandberg H et al (2010) A cyber security study of a scada energy management system: stealthy deception attacks on the state estimator. IFAC Proc 44(1):11271-11277
14. Cárdenas AA, Amin S, Lin ZS et al (2011) Attacks against process control systems: risk assessment, detection, and response. In: Proceedings of ACM symposium information, computer communication security 355-366
15. Mo Y, Kim TH, Brancik K et al (2012) Cyber-physical security of a smart grid infrastructure. Proc IEEE 100(1):195-209
16. Teixeira A, Pérez D, Sandberg H et al (2012) Attack models and scenarios for networked control systems. In: Proceedings of High Confidence Networked System 55-64
17. Sauter D, Li S, Aubrun C (2009) Robust fault diagnosis of networked control systems. Int J Adapt Control Signal Process 23 (8):722-736
18. Ding S (2008) Model-based fault diagnosis techniques: design schemes, algorithms, and tools, vol 49. Springer, Berlin, pp 50- 56
19. Amin S, Litrico X, Sastry SS et al (2010) Stealthy deception attacks on water SCADA systems. In: Proceedings of ACM conference hybrid system: computation and control, pp 161-170
20. Mo Y, Sinopoli B(2009) Secure control against replay attacks. In: Annual allerton conference communication, Control Computing, pp 911-918
21. Fawzi H, Tabuada P, Diggavi S (2014) Secure estimation and control for cyber-physical systems under adversarial attacks. IEEE Trans Autom Control 59(6):1454-1467
22. Kosut O, Jia L, Thomas RJ et al (2010) Malicious data attacks on smart grid state estimation: attack strategies and countermeasures. In: IEEE conference smart grid communications, pp 220-225
23. Liu Y, Ning P, Reiter MK (2011) False data injection attacks against state estimation in electric power grids. ACM Trans Inf Syst Secur 14(1):1-16
24. Schenato L (2009) To zero or to hold control inputs with lossy links. IEEE Trans Autom Control 54(5):1093-1099
25. Mo Y, Garone E, Casavola A et al (2010) False data injection attacks against state estimation in wireless sensor networks. In: IEEE Conference Decision Control, pp 5967-5972
26. Kwon C, Liu W, Hwang I (2013) Security analysis for cyberphysical systems against stealthy deception attacks. In: American Control Conference, pp 3344-3349
27. Gertler JJ (1988) Survey of model-based failure detection and isolation in complex plants. Cont Syst Mag 8(6):3-11
28. Manandhar K, Cao X, Hu F et al (2014) Detection of faults and attacks including false data injection attack in smart grid using kalman filter. IEEE Trans Control Netw Syst 1(4):370-379
29. Kailath T, Poor HV (1998) Detection of stochastic processes. IEEE Trans Inf Theory 44(6):2230-2231
30. Wald A (1973) Sequential analysis. Courier Corporation, North Chelmsford
31. Pang ZH, Hou FY, Zhou YG et al (2015) False data injection attacks for output tracking control systems. In: Chinese Control Conference, pp 6747-6752
32. Xu Z, Ji Y, Zhou D (2009) A new real-time reliability prediction method for dynamic systems based on online fault prediction. IEEE Trans Reliab 58(3):523-538
33. Pasqualetti F, Dorfler F, Bullo F (2012) Cyber-physical security via geometric control: distributed monitoring and malicious attacks. In: Annual conference decision and control, pp 3418- 3425
34. Zhang H, Cheng P, Shi L et al (2016) Optimal dos attack scheduling in wireless networked control system. IEEE Trans Control Syst Technol 24(3):843-852
35. Zhang H, Cheng P, Shi L et al (2015) Optimal denial-of-service attack scheduling with energy constraint. IEEE Trans Autom Control 60(11):3023-3028
36. Zhang H, Cheng P, Shi L et al (2013) Optimal DoS attack policy against remote state estimation. In: IEEE annual conference decision and control, pp 5444-5449
37. Zhang H, Cheng P, Shi L et al (2014) Optimal denial-of-service attack scheduling against linear quadratic gaussian control. In: American control conference, pp 3996-4001
38. Gupta A, Langbort C, Basar T (2010) Optimal control in the presence of an intelligent jammer with limited actions. In: Annual conference decision and control, pp 1096-1101
39. Zhu M, Martinez S (2011) Stackelberg-game analysis of correlated attacks in cyber-physical systems. In: American control conference, pp 4063-4068
40. Wang EK, Ye Y, Xu X et al (2010) Security issues and challenges for cyber physical system. In: Proc IEEE/ACM conference green computing communication & conference cyber, physical society computing, pp 733-738
41. Lee C, Shim H, Eun Y (2015) Secure and robust state estimation under sensor attacks, measurement noises, and process disturbances: observer-based combinatorial approach. In: European control conference, pp 1872-1877
42. Shoukry Y, Tabuada P (2016) Event-triggered state observers for sparse sensor noise/attacks. IEEE Trans Autom Control 61 (8):2079-2091
43. Foroush H S, Martínez S(2012) On single-input controllable linear systems under periodic dos jamming attacks. arXiv preprint arXiv:1209.4101
44. Persis CD, Tesi P (2015) Input-to-state stabilizing control under denial-of-service. IEEE Trans Autom Control 60(11):2930-2944
45. Amin S, Cárdenas AA, Sastry SS (2009) Safe and secure networked control systems under denial-of service attacks. In: Hybrid systems: computation and control, Springer, pp 31-45
46. Feng Z, Hu G, Wen G (2016) Distributed consensus tracking for multi-agent systems under two types of attacks. Int J Robust Nonlinear Control 26(5):896-918
47. Yuan Y, Sun F, Zhu Q (2015) Resilient control in the presence of dos attack: switched system approach. Int J Control Autom Syst 13(6):1423-1435
48. Befekadu GK, Gupta V, Antsaklis PJ (2015) Risksensitive control under markov modulated denial-of service (DoS) attack strategies. IEEE Trans Autom Control 60(12):3299-3304
49. Pang ZH, Liu GP (2012) Design and implementation of secure networked predictive control systems under deception attacks. IEEE Trans Control Syst Technol 20(55):1334-1342
50. Pasqualetti F, Dorfler F, Bullo F (2015) Controltheoretic methods for cyberphysical security: geometric principles for optimal cross-layer resilient control systems. IEEE Trans Control Syst 35(1):110-127
51. Peng C, Ma SD, Xie XP (2017) Observer-based non-PDC control for networked T-S fuzzy systems with an event-triggered communication. IEEE Transactions on Cybernetics (99):1-9
52. Rieger CG, Gertman DI, McQueen MA (2009) Resilient control systems: next generation design research. In: HIS conference human system interaction, pp 632-636
53. Peng C, Li JC, Fei MR (2016) Resilient event-triggered H∞ load frequency control for networked power systems with energylimited DoS attacks. IEEE Trans Power Syst 99:1
/
| 〈 |
|
〉 |