Skip to main content

An Impact of Different Uncertainties and Attacks on the Performance Metrics and Stability of Industrial Control System

  • Conference paper
  • First Online:
Communication and Intelligent Systems

Abstract

The revolutionized growth in the networked control system has made the system more vulnerable to different types of threats such as delays, packet losses, and attacks. Such uncertainties in the control system may be introduced in the forward and/or feedback direction by the intended attackers while transmitting the signal. Herein, the system is estimated by modeling different parameters along with the knowledge about the actual system while considering the delay, packet loss rate, etc., using system identification and True-Time tool. Also, the particle swarm optimization (PSO) algorithm is used for modeling the system and estimation of controller parameters. The efficacy of the estimated model is shown by evaluating the various performance measures along with the introduction of design of a model of attacks based on the estimated system parameters to compromise the actual network control performance. In the absence of attacks, the estimated model used here shows above 94% fit to the estimation data which indicate the efficacy of the estimated model. Later, different rates of packet loss such as 0, 5, 15, and 25% are introduced for estimating the system model. For each case, the attack is simulated to show the impact of service degradation attack on the performance metrics of the networked control system. The overshoots are 15.698% for 0% packet loss, 17.4% for 5% packet loss, 17.9% for 15% packet loss, and 17.5% for 25% packet loss along with modeled attack. The other metrics such as rise time, settling time, and peak time increase substantially, whereas root mean square value decreases, and the cost function increases for estimated system with different packet loss rate and attack, which is an indication of a compromised system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Guo YF, Li SY (2010) Transmission probability condition for stabilisability of networked control systems. IET Control Theory Appl 4(4):672–682

    Article  MathSciNet  Google Scholar 

  2. Pang ZH, Liu GP (2012) Design and implementation of secure networked predictive control systems under deception attacks. IEEE Trans Control Syst Technol 20(5):1334–1342

    Article  Google Scholar 

  3. Xia Y, Chen J, Zhou L (2007) Networked control systems with different control inputs. In: Proceedings of 26th Chinese control conference, CCC 2007, no. 6, pp 539–543

    Google Scholar 

  4. Al-Dabbagh AW, Li Y, Chen T (2018) An intrusion detection system for cyber attacks in wireless networked control systems . IEEE Trans Circuits Syst II Express Briefs 65(8):1049–1053

    Article  Google Scholar 

  5. Seshadhri S, Ayyagari R (2011) Dynamic controller for Network Control Systems with random communication delay. Int J Syst Control Commun 3(2):178–193

    Article  Google Scholar 

  6. Srinivasan S, Vallabhan M, Ramaswamy S, Kotta Ü (2013) Adaptive regulator for networked control systems: MATLAB and true time implementation. In: 2013 25th Chinese control decision conference, CCDC 2013, pp 2551–2555

    Google Scholar 

  7. Bi S, Zawodniok M (2017) PDF-based tuning of stochastic optimal controller design for cyber-physical systems with uncertain delay dynamics. IET Cyber-Phys Syst Theory Appl 2(1):1–9

    Article  Google Scholar 

  8. Sargolzaei A, Yen KK, Abdelghani MN, Sargolzaei S, Carbunar B (2017) Resilient design of networked control systems under time delay switch attacks, application in smart grid. IEEE Access 5:15901–15912

    Article  Google Scholar 

  9. Wang C, He F (2017) Simulation technology for networked motion control system. In: Proceedings of 29th Chinese control decision conference, CCDC 2017, pp 6419–6424

    Google Scholar 

  10. Garcia-Santiago A, Castaneda-Camacho J, Guerrero-Castellanos JF, Mino-Aguilar G, Ponce-Hinestroza VY (2018) Simulation platform for a VANET using the TrueTime toolbox: further result toward cyber-physical vehicle systems. In: IEEE Vehicular Technology Conference, vol 2018, Aug 2018

    Google Scholar 

  11. De Sá AO, Carmo LFRDC, Machado RCS (2017) Covert attacks in cyber-physical control systems. IEEE Trans Ind Inf 13(4):1641–1651

    Article  Google Scholar 

  12. Amin S, Cárdenas AA, Sastry SS (2009) Safe and secure networked control systems under denial-of-service attacks. In: Lecture notes in computer sciences (including Subseries Lecture notes in artificial intelligence. Lecture notes in bioinformatics), vol 5469, no 1, pp 31–45

    Google Scholar 

  13. Han S, Xie M, Chen HH, Ling Y (2014) Intrusion detection in cyber-physical systems: techniques and challenges. IEEE Syst J 8(4):1052–1062

    Article  Google Scholar 

  14. Zhu M, Martinez S (2014) On the performance analysis of resilient networked control systems under replay attacks. IEEE Trans Automat Contr 59(3):804–808

    Article  MathSciNet  Google Scholar 

  15. Miao KL, Zhu JW, Zhang WA (2018) Distributed guaranteed cost control of networked interconnected systems under denial-of-service attacks: a switched system approach. In: Proceedings, 2018 33rd Youth Academic annual conference of Chinese association of automation, YAC 2018, pp 911–915

    Google Scholar 

  16. Liang Z, Guo Y, Yang Y, Chen G (2019) Distribution network control system scheduling strategy. In: Proceedings 2019 IEEE 3rd information technology, networking, electronic and automation control conference. ITNEC 2019, no. Itnec, pp 1424–1428

    Google Scholar 

  17. Li M et al (2019) Suppression of disturbances in networked control systems with time-varying delay based on equivalent-input-disturbance approach. In: IECON Proceedings (Industrial Electronics Conference), vol 2019, Oct 2019, pp 6957–6960

    Google Scholar 

  18. Dias JA, Liberado EV, Serni PJA, Marafao FP, Godoy EP (2016) Simulation of a distributed generator with wireless communication using TrueTime and PLECS. In: 2015 IEEE PES Innovative Smart Grid Technologies Latin America. ISGT LATAM 2015, pp 624–628

    Google Scholar 

  19. Ma J, Liu K, Sun S, Yang G (2018) Design and simulation of large delay wireless network control system. In: Proceedings of 8th International Conference on Instrumentation and Measurement, Computer, Communication and Control. IMCCC 2018, pp 217–220

    Google Scholar 

  20. Gnana Sambandam K, Kamalanaban E (2016) Proceedings of the international conference on soft computing systems. Advances in Intelligent Systems and Computing, 398, pp 319–329

    Google Scholar 

  21. Srinivasan S, Buonopane F, Saravanakumar G, Subathra B, Ramaswamy S (2015) Modelling time-varying delays in networked automation systems with heterogeneous networks using machine learning techniques. IEEE International Conf. Automation Science Engineering, vol 2015, Oct 2015, pp 362–368

    Google Scholar 

  22. Srinivasan S, Buonopane F, Ramaswamy S, Vain J (2014) Verifying response times in networked automation systems using jitter bounds. In: Proceedings of IEEE 25th International Symposium on Software Reliability Engineering Work. ISSREW 2014, pp 47–50

    Google Scholar 

  23. Srinivasan S et al (2018) Adaptive controller for networked control systems subjected to random communication delays. Adv Intell Syst Comput 633(2):78–94

    Google Scholar 

  24. Seshadhri S, Ayyagari R (2009) Hybrid controllers for systems with random communication delays. In: ARTCom 2009—International Conference on advances in recent technologies in communication and computing no. 1, pp 954–958

    Google Scholar 

  25. Li H, Chow MY, Sun Z (2009) State feedback stabilisation of networked control systems. IET Control Theory Appl 3(7):929–940

    Article  MathSciNet  Google Scholar 

  26. Irwin G (2005) Wireless networked control systems. IEE Conference Publication, no. 2005–10868, pp 43–55

    Google Scholar 

  27. Andersson M, Henriksson D, Cervin A, Årzén KE (2005) Simulation of wireless networked control systems. In: Proceedings of 44th IEEE conference on decision and control and European control conference. CDC-ECC ’05, vol 2005, no. January 2006, pp 476–481 (2005)

    Google Scholar 

  28. Balasubramaniyan S, Subathra B, Hemesh RC, Gurusamy S, Srinivasan S (2016) On simulating processor schedules and network protocols within CPS using TrueTime. In: 2015 IEEE International conference on computational intelligence and computing research. ICCIC 2015

    Google Scholar 

  29. Henriksson D, Cervin A, Årzén KE (2002) TRUETIME: simulation of control loops under shared computer resources. IFAC Proc 15(1):417–422

    Article  Google Scholar 

  30. Jithish J, Sankaran S (2018) Securing networked control systems: modeling attacks and defenses. In: 2017 IEEE International Conference on Consumer Electronics. ICCE-Asia 2017, vol 2018, Jan 2018, pp 7–11

    Google Scholar 

  31. Ding P, Wang Y, Yan G, Li W (2017) DoS attacks in electrical cyber-physical systems: a case study using TrueTime simulation tool. In: Proceedings of 2017 Chinese Automation Congress. CAC 2017, vol 2017, Jan 2017, no. 2015, pp 6392–6396

    Google Scholar 

  32. Qu FL, Guan ZH, Li T, Yuan FS (2012) Stabilisation of wireless networked control systems with packet loss. IET Control Theory Appl 6(15):2362–2366

    Article  MathSciNet  Google Scholar 

  33. Goh J, Adepu S, Tan M, Lee ZS (2017) Anomaly detection in cyber physical systems using recurrent neural networks. In: Proceedings of IEEE international symposium on high assurance systems engineering, pp 140–145

    Google Scholar 

  34. Naung Y, Schagin A, Oo HL, Ye KZ, Khaing ZM (2018) Implementation of data driven control system of DC motor by using system identification process. In: Proceedings of 2018 IEEE conference of Russian young researchers in electrical and electronic engineering. ElConRus 2018, vol 2018, Jan 2018, pp 1801–1804

    Google Scholar 

  35. Zhen S, Hou Z, Yin C (2017) A novel data-driven predictive control for networked control systems with random packet dropouts. In: Proceedings of 2017 IEEE 6th data driven control and learning systems conference. DDCLS 2017, pp 335–340

    Google Scholar 

  36. Balasubramaniyan S, Srinivasan S, Buonopane F, Subathra B, Vain J, Ramaswamy S (2016) Design and verification of Cyber-Physical Systems using TrueTime, evolutionary optimization and UPPAAL. Microprocess Microsyst 42:37–48

    Article  Google Scholar 

  37. Vollmer T, Manic M (2014) Cyber-physical system security with deceptive virtual hosts for industrial control networks. IEEE Trans Ind Inf 10(2):1337–1347

    Article  Google Scholar 

  38. Solanki BS, Renu K, Srinivasan S (2019) Stability and security analysis with identification of attack on industrial networked control system: an overview. Internetw Indones J 11(2):3–8

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Brijraj Singh Solanki .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Solanki, B.S., Kumawat, R., Srinivasan, S. (2021). An Impact of Different Uncertainties and Attacks on the Performance Metrics and Stability of Industrial Control System. In: Sharma, H., Gupta, M.K., Tomar, G.S., Lipo, W. (eds) Communication and Intelligent Systems. Lecture Notes in Networks and Systems, vol 204. Springer, Singapore. https://doi.org/10.1007/978-981-16-1089-9_44

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-1089-9_44

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-1088-2

  • Online ISBN: 978-981-16-1089-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics