Abstract
This paper studies the switched resilient control of the Cyber-Physical Systems (CPSs) under Denial-of-Service (DoS) attack. We interpret the term ‘resilience’ as the ability to be both robust to the external disturbances in the physical layer, and defending against DoS attacks in the cyber layer. A hybrid-theoretical framework is proposed which is comprised of a physical control subsystem, a cyber security subsystem, and an interface which integrates the control design with the security configuration. Within this framework, the controller will switch in accordance with the competing result of the cyber attacker and defender. Our approach highlights the interaction between the physical control layer and cyber security layer and achieves the goal of coupled design. Some algorithms are provided to obtain the so-called joint defense strategies. Finally, the proposed method is applied to the voltage regulation of the Uninterrupted Power System (UPS).
Similar content being viewed by others
References
V. M. Igure, S. A. Laughter, and R. D. Williams, “Security issues in SCADA networks,” Computers & Security, vol. 25, no. 7, pp. 498–506, October 2006.
S. Amin, G. A. Schwartz, and A. Hussain, “In quest of benchmarking security risks to cyber-physical systems,” IEEE Network Magazine, vol. 27, no. 1, pp. 19–24, February 2013.
Q. Zhu, C. Rieger, and T. Basar, “A hierarchical security architecture for cyber-physical systems,” Proc. of the 4th International Symposium on Resilient Control Systems, Boise, ID, USA, pp. 15–20, August 2011.
J. Matusitza and E. Mineib, “Cyberterrorism: its effects on health-related infrastructures,” Journal of Digital Forensic Practice, vol. 2, no. 4, pp. 161–171, September 2009.
G. Carl, G. Kesidis, R. R. Brooks, and S. Rai, “Denial-of-service attack-detection techniques,” IEEE Internet Computing Magazine, vol. 10, no. 1, pp. 82–89, February 2006.
Y. L. Huang, A. A. Cardenas, S. Amin, Z. S. Lin, H. Y. Tsai, and S. Sastry, “Understanding the physical and economic consequences of attacks on control systems,” International Journal of Critical Infrastructure Protection, vol. 2, no. 3, pp. 73–83, October 2009.
M. Long, C. H. Wu, and J. Y. Hung, “Denial of service attacks on network-based control systems: impact and mitigation,” IEEE Trans. on Industrial Informatics, vol. 1, no. 2, pp. 85–96, May 2005.
D. Geer, “Security of critical control systems sparks concern,” Computer, vol. 39, no. 1, pp. 20–23, January 2006.
C. G. Rieger, D. I. Gertman, and M. A. McQueen, “Resilient control systems: next generation design research,” Proc. of the 2nd Conference on Human System interactions, Catania, Italy, pp. 629–633, May 2009.
L. C. Li, B. Hu, and M. Lemmon, “Resilient event triggered systems with limited communication,” Proc. of the 51st Conferences on Decision and Control, Maui, Hawaii, pp. 6577–6582, December 2012.
T. Juan, X. Luo, Q. Hui, and R. Chang, “Modeling the vulnerability of feedback-control based internet services to low-rate DoS attacks,” IEEE Trans. on Information Forensics and Security, vol. 1, no. 1, pp. 339–353, March 2014.
M. Long, C. Wu, and J. Hung, “Denial of service attacks on network-based control systems: impact and mitigation,” IEEE Trans. on Industrial Informatics, vol. 1, no. 2, pp. 85–96, May 2005.
S. Amin, X. Litrico, S. S. Satry, and A. M. Bayen, “Cyber security of water SCADA systems: (I) analysis and experimentation of stealthy deception attacks,” IEEE Trans. on Control Systems Technology vol. 21, no. 5, pp. 1679–1693, September 2013.
Y. L. Mo and S. Bruno, “Secure control against replay attacks,” Proc. of the 47th Annual Allerton Conference, Champaign, USA, pp. 911–918, October 2009.
M. H. Zhu and M. Sonia, “On the performance analysis of resilient networked control systems under replay attacks,” IEEE Trans. on Automatic Control, vol. 59, no. 3, pp. 804–804, March 2014.
M. H. Zhu and M. Sonia, “Stackelberg-game analysis of correlated attacks in cyber-physical systems,” Proc. of the American Control Conference, San Francisco, USA, pp. 4063–4068, July 2011.
Q. Zhu and T. Basar, “Robust and resilient control design for cyber-physical systems with an application to power systems,” Proc. of the IEEE Conference on Decision and Control, Orlando, USA, pp. 4066–4070, December 2011.
Y. Yuan, Q. Zhu, F. C. Sun, Q. Y. Wang, and T. Basar, “Resilient control of Cyber-Physical Systems against Denial-of-Service attacks,” Proc. of the 6th International Symposium on Resilient Control Systems, San Francisco, USA, pp. 54–59, August 2013.
X. J. Li and G. H. Yang, “Fault detection for T-S fuzzy systems with unknown membership functions,” IEEE Trans. on Fuzzy Systems, vol. 22, no. 1, pp. 139–152, March 2013.
X. J. Li and G. H. Yang, “Robust adaptive faulttolerant control for uncertain linear systems with actuator failures,” IET Control Theory & Applications, vol. 6, no. 10, pp. 1544–1551, July 2012.
H. Yang, Y. Q. Xia, P. Shi and L. Zhao, Analysis and Synthesis of Delta Operator Systems, Springer-Verlag, Berlin, 2012.
I. Srinivasan, M. K. Nakayama, and A. V. Gerbessiotis, “A Markovian dependability model with cascading failures,” IEEE Trans. on Computers, vol. 58, no. 9, pp. 1238–1249, September 2009.
Z. H. Zhang, and P. H. Ho, “Janus: a dual-purpose analytical model for understanding, characterizing and countermining multi-stage collusive attacks in enterprise networks,” Journal of Network and Computer Applications, vol. 32, no. 3, pp. 710–720, May 2009.
Q. Zhu and T. Basar, “Dynamic policy-based IDS configuration,” Proc. of the IEEE Conference on Decision and Control, Shanghai, China, pp. 8600–8605, August 2009.
J. L. Hu and M. P. Wellman, “Nash q-learning for general-sum stochastic games,” The Journal of Machine Learning Research, vol. 4, pp. 1039–1069, December 2003.
T. Alpcan and T. Basar, Network Security: A Decision and Game Theoretic Approach, Cambridge University Press, Philadelphia, 2011.
L. X. Zhang, E. K. Boukas, and P. Shi, “Exponential H8 filtering for uncertain discrete-time switched linear systems with average dwell time: a µ-dependent approach,” International Journal of Robust and Nonlinear Control, vol. 18, no. 11, pp. 1188–1207, July 2008.
F. W. Yang, Z. D. Wang, Y. S. Hung, and M. Gani, “H8 Control for networked systems with random communication delays,” IEEE Trans. on Automatic Control, vol. 51, no. 3, pp. 511–518, March 2006.
J. Löfberg, “YALMIP: a toolbox for modeling and optimization in MATLAB,” Proc. of the IEEE International Symposium on Computer Aided Control Systems Design, Taipei, Taiwan, pp. 284–289, September 2004.
C. Szepesvari and M. L. Littman, “A unified analysis of value-function-based reinforcement-learning algorithms,” Neural Computation, vol. 11, no. 8, pp. 2017–2059, November 1999.
L. S. Shapley, “Stochastic games,” Proc. of the National Academy of Sciences of USA, vol. 39, no. 10, pp. 1095–1100, October 1953.
T. Basar and P. Bernhar, H8 Optimal Control and Related Minmax Design Problems, Birkhauser-Verlag, Berlin, 1995.
T. Raghaven, T. Ferguson, T. Parthasarathy, and O. Vrieze, Stochastic Games and Related Topics: In Honor of Professor L.S. Shapley, Springer-Verlag, Berlin, 1990.
M. Zakai, “On the ultimate boundness of moments associated with solutions of stochastic differential equations,” SIAM Journal on Control, vol. 5, no. 4, pp. 588–593, 1967.
X. J. Li and G. H. Yang, “Switching-type H8 filter design for T-S fuzzy systems with unknown or partially unknown membership functions,” IEEE Trans. on Fuzzy Systems, vol. 21, no. 2, pp. 385–392, April 2013.
D. Liberzon and A. S. Morse, “Basic problems in stability and design of switched systems,” IEEE Control Systems Magazine, vol. 19, no. 4, pp. 59–70, October 1999.
Author information
Authors and Affiliations
Corresponding author
Additional information
Recommended by Associate Editor Izumi Masubuchi under the direction of Editor Ju Hyun Park.
The authors would like to show the deepest gratitude to Professor Tamer Başar, who has provided lab facilities and valuable guidance during the writing of this paper. This work is jointly supported by National Science Foundation of China (Grant No: 61210013 and 61327809) and Beijing Natural Science Foundation (Grant No. 4142028).
Yuan Yuan received his B.S. degree in Electrical Engineering from Beihang University, Beijing, China, in 2009. He received his Ph.D. degree in Computer Science and Technology in Tsinghua University, Beijing, China. His main research interests include robust control/filter theory, security of cyber-physical system and networked control systems.
Fuchun Sun received his B.S. and M.S. degrees from the Naval Aeronautical Engineering Academy, Yantai, China, in 1986 and 1989, respectively, and his Ph.D. degree from Tsinghua University, Beijing, China, in 1998. He is currently a professor with the Department of Computer Science and Technology, Tsinghua University. His research interests include intelligent control and robotics.
Quanyan Zhu is an assistant professor in the Department of Electrical and Computer Engineering at New York University. He received his B.Eng. in honors electrical engineering with distinction from McGill University in 2006, an M.A.Sc. from the University of Toronto in 2008, and a Ph.D. from the University of Illinois at Urbana-Champaign in 2013. From 2013 to 2014, he was a postdoctoral research associate in the Department of Electrical Engineering, Princeton University. He is a recipient of many awards including the NSERC Canada Graduate Scholarship, the Mavis Future Faculty Fellowships, and the NSERC Postdoctoral Fellowship. He spearheaded the INFOCOM workshop on Communications and Control on Smart Energy Systems and the Midwest Workshop on Control and Game Theory. His current research interests include optimal control, game theory, reinforcement learning, network security and privacy, resilient control systems, and cyberphysical systems. He is a Member of the IEEE.
Rights and permissions
About this article
Cite this article
Yuan, Y., Sun, F. & Zhu, Q. Resilient control in the presence of DoS attack: Switched system approach. Int. J. Control Autom. Syst. 13, 1423–1435 (2015). https://doi.org/10.1007/s12555-014-0261-7
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12555-014-0261-7