Skip to main content
Log in

Resilient control in the presence of DoS attack: Switched system approach

  • Regular Papers
  • Control Applications
  • Published:
International Journal of Control, Automation and Systems Aims and scope Submit manuscript

Abstract

This paper studies the switched resilient control of the Cyber-Physical Systems (CPSs) under Denial-of-Service (DoS) attack. We interpret the term ‘resilience’ as the ability to be both robust to the external disturbances in the physical layer, and defending against DoS attacks in the cyber layer. A hybrid-theoretical framework is proposed which is comprised of a physical control subsystem, a cyber security subsystem, and an interface which integrates the control design with the security configuration. Within this framework, the controller will switch in accordance with the competing result of the cyber attacker and defender. Our approach highlights the interaction between the physical control layer and cyber security layer and achieves the goal of coupled design. Some algorithms are provided to obtain the so-called joint defense strategies. Finally, the proposed method is applied to the voltage regulation of the Uninterrupted Power System (UPS).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. V. M. Igure, S. A. Laughter, and R. D. Williams, “Security issues in SCADA networks,” Computers & Security, vol. 25, no. 7, pp. 498–506, October 2006.

    Article  Google Scholar 

  2. S. Amin, G. A. Schwartz, and A. Hussain, “In quest of benchmarking security risks to cyber-physical systems,” IEEE Network Magazine, vol. 27, no. 1, pp. 19–24, February 2013.

    Article  Google Scholar 

  3. Q. Zhu, C. Rieger, and T. Basar, “A hierarchical security architecture for cyber-physical systems,” Proc. of the 4th International Symposium on Resilient Control Systems, Boise, ID, USA, pp. 15–20, August 2011.

    Google Scholar 

  4. J. Matusitza and E. Mineib, “Cyberterrorism: its effects on health-related infrastructures,” Journal of Digital Forensic Practice, vol. 2, no. 4, pp. 161–171, September 2009.

    Article  Google Scholar 

  5. G. Carl, G. Kesidis, R. R. Brooks, and S. Rai, “Denial-of-service attack-detection techniques,” IEEE Internet Computing Magazine, vol. 10, no. 1, pp. 82–89, February 2006.

    Article  Google Scholar 

  6. Y. L. Huang, A. A. Cardenas, S. Amin, Z. S. Lin, H. Y. Tsai, and S. Sastry, “Understanding the physical and economic consequences of attacks on control systems,” International Journal of Critical Infrastructure Protection, vol. 2, no. 3, pp. 73–83, October 2009.

    Article  Google Scholar 

  7. M. Long, C. H. Wu, and J. Y. Hung, “Denial of service attacks on network-based control systems: impact and mitigation,” IEEE Trans. on Industrial Informatics, vol. 1, no. 2, pp. 85–96, May 2005.

    Article  Google Scholar 

  8. D. Geer, “Security of critical control systems sparks concern,” Computer, vol. 39, no. 1, pp. 20–23, January 2006.

    Article  MathSciNet  Google Scholar 

  9. C. G. Rieger, D. I. Gertman, and M. A. McQueen, “Resilient control systems: next generation design research,” Proc. of the 2nd Conference on Human System interactions, Catania, Italy, pp. 629–633, May 2009.

    Google Scholar 

  10. L. C. Li, B. Hu, and M. Lemmon, “Resilient event triggered systems with limited communication,” Proc. of the 51st Conferences on Decision and Control, Maui, Hawaii, pp. 6577–6582, December 2012.

    Google Scholar 

  11. T. Juan, X. Luo, Q. Hui, and R. Chang, “Modeling the vulnerability of feedback-control based internet services to low-rate DoS attacks,” IEEE Trans. on Information Forensics and Security, vol. 1, no. 1, pp. 339–353, March 2014.

    Google Scholar 

  12. M. Long, C. Wu, and J. Hung, “Denial of service attacks on network-based control systems: impact and mitigation,” IEEE Trans. on Industrial Informatics, vol. 1, no. 2, pp. 85–96, May 2005.

    Article  Google Scholar 

  13. S. Amin, X. Litrico, S. S. Satry, and A. M. Bayen, “Cyber security of water SCADA systems: (I) analysis and experimentation of stealthy deception attacks,” IEEE Trans. on Control Systems Technology vol. 21, no. 5, pp. 1679–1693, September 2013.

    Article  Google Scholar 

  14. Y. L. Mo and S. Bruno, “Secure control against replay attacks,” Proc. of the 47th Annual Allerton Conference, Champaign, USA, pp. 911–918, October 2009.

    Google Scholar 

  15. M. H. Zhu and M. Sonia, “On the performance analysis of resilient networked control systems under replay attacks,” IEEE Trans. on Automatic Control, vol. 59, no. 3, pp. 804–804, March 2014.

    Article  Google Scholar 

  16. M. H. Zhu and M. Sonia, “Stackelberg-game analysis of correlated attacks in cyber-physical systems,” Proc. of the American Control Conference, San Francisco, USA, pp. 4063–4068, July 2011.

    Google Scholar 

  17. Q. Zhu and T. Basar, “Robust and resilient control design for cyber-physical systems with an application to power systems,” Proc. of the IEEE Conference on Decision and Control, Orlando, USA, pp. 4066–4070, December 2011.

    Google Scholar 

  18. Y. Yuan, Q. Zhu, F. C. Sun, Q. Y. Wang, and T. Basar, “Resilient control of Cyber-Physical Systems against Denial-of-Service attacks,” Proc. of the 6th International Symposium on Resilient Control Systems, San Francisco, USA, pp. 54–59, August 2013.

    Google Scholar 

  19. X. J. Li and G. H. Yang, “Fault detection for T-S fuzzy systems with unknown membership functions,” IEEE Trans. on Fuzzy Systems, vol. 22, no. 1, pp. 139–152, March 2013.

    Article  Google Scholar 

  20. X. J. Li and G. H. Yang, “Robust adaptive faulttolerant control for uncertain linear systems with actuator failures,” IET Control Theory & Applications, vol. 6, no. 10, pp. 1544–1551, July 2012.

    Article  MathSciNet  Google Scholar 

  21. H. Yang, Y. Q. Xia, P. Shi and L. Zhao, Analysis and Synthesis of Delta Operator Systems, Springer-Verlag, Berlin, 2012.

    Book  Google Scholar 

  22. I. Srinivasan, M. K. Nakayama, and A. V. Gerbessiotis, “A Markovian dependability model with cascading failures,” IEEE Trans. on Computers, vol. 58, no. 9, pp. 1238–1249, September 2009.

    Article  Google Scholar 

  23. Z. H. Zhang, and P. H. Ho, “Janus: a dual-purpose analytical model for understanding, characterizing and countermining multi-stage collusive attacks in enterprise networks,” Journal of Network and Computer Applications, vol. 32, no. 3, pp. 710–720, May 2009.

    Article  Google Scholar 

  24. Q. Zhu and T. Basar, “Dynamic policy-based IDS configuration,” Proc. of the IEEE Conference on Decision and Control, Shanghai, China, pp. 8600–8605, August 2009.

    Google Scholar 

  25. J. L. Hu and M. P. Wellman, “Nash q-learning for general-sum stochastic games,” The Journal of Machine Learning Research, vol. 4, pp. 1039–1069, December 2003.

    MathSciNet  Google Scholar 

  26. T. Alpcan and T. Basar, Network Security: A Decision and Game Theoretic Approach, Cambridge University Press, Philadelphia, 2011.

    Google Scholar 

  27. L. X. Zhang, E. K. Boukas, and P. Shi, “Exponential H8 filtering for uncertain discrete-time switched linear systems with average dwell time: a µ-dependent approach,” International Journal of Robust and Nonlinear Control, vol. 18, no. 11, pp. 1188–1207, July 2008.

    Article  MATH  MathSciNet  Google Scholar 

  28. F. W. Yang, Z. D. Wang, Y. S. Hung, and M. Gani, “H8 Control for networked systems with random communication delays,” IEEE Trans. on Automatic Control, vol. 51, no. 3, pp. 511–518, March 2006.

    Article  MathSciNet  Google Scholar 

  29. J. Löfberg, “YALMIP: a toolbox for modeling and optimization in MATLAB,” Proc. of the IEEE International Symposium on Computer Aided Control Systems Design, Taipei, Taiwan, pp. 284–289, September 2004.

    Google Scholar 

  30. C. Szepesvari and M. L. Littman, “A unified analysis of value-function-based reinforcement-learning algorithms,” Neural Computation, vol. 11, no. 8, pp. 2017–2059, November 1999.

    Article  Google Scholar 

  31. L. S. Shapley, “Stochastic games,” Proc. of the National Academy of Sciences of USA, vol. 39, no. 10, pp. 1095–1100, October 1953.

    Article  MATH  MathSciNet  Google Scholar 

  32. T. Basar and P. Bernhar, H8 Optimal Control and Related Minmax Design Problems, Birkhauser-Verlag, Berlin, 1995.

    Google Scholar 

  33. T. Raghaven, T. Ferguson, T. Parthasarathy, and O. Vrieze, Stochastic Games and Related Topics: In Honor of Professor L.S. Shapley, Springer-Verlag, Berlin, 1990.

    Google Scholar 

  34. M. Zakai, “On the ultimate boundness of moments associated with solutions of stochastic differential equations,” SIAM Journal on Control, vol. 5, no. 4, pp. 588–593, 1967.

    Article  MATH  MathSciNet  Google Scholar 

  35. X. J. Li and G. H. Yang, “Switching-type H8 filter design for T-S fuzzy systems with unknown or partially unknown membership functions,” IEEE Trans. on Fuzzy Systems, vol. 21, no. 2, pp. 385–392, April 2013.

    Article  Google Scholar 

  36. D. Liberzon and A. S. Morse, “Basic problems in stability and design of switched systems,” IEEE Control Systems Magazine, vol. 19, no. 4, pp. 59–70, October 1999.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuan Yuan.

Additional information

Recommended by Associate Editor Izumi Masubuchi under the direction of Editor Ju Hyun Park.

The authors would like to show the deepest gratitude to Professor Tamer Başar, who has provided lab facilities and valuable guidance during the writing of this paper. This work is jointly supported by National Science Foundation of China (Grant No: 61210013 and 61327809) and Beijing Natural Science Foundation (Grant No. 4142028).

Yuan Yuan received his B.S. degree in Electrical Engineering from Beihang University, Beijing, China, in 2009. He received his Ph.D. degree in Computer Science and Technology in Tsinghua University, Beijing, China. His main research interests include robust control/filter theory, security of cyber-physical system and networked control systems.

Fuchun Sun received his B.S. and M.S. degrees from the Naval Aeronautical Engineering Academy, Yantai, China, in 1986 and 1989, respectively, and his Ph.D. degree from Tsinghua University, Beijing, China, in 1998. He is currently a professor with the Department of Computer Science and Technology, Tsinghua University. His research interests include intelligent control and robotics.

Quanyan Zhu is an assistant professor in the Department of Electrical and Computer Engineering at New York University. He received his B.Eng. in honors electrical engineering with distinction from McGill University in 2006, an M.A.Sc. from the University of Toronto in 2008, and a Ph.D. from the University of Illinois at Urbana-Champaign in 2013. From 2013 to 2014, he was a postdoctoral research associate in the Department of Electrical Engineering, Princeton University. He is a recipient of many awards including the NSERC Canada Graduate Scholarship, the Mavis Future Faculty Fellowships, and the NSERC Postdoctoral Fellowship. He spearheaded the INFOCOM workshop on Communications and Control on Smart Energy Systems and the Midwest Workshop on Control and Game Theory. His current research interests include optimal control, game theory, reinforcement learning, network security and privacy, resilient control systems, and cyberphysical systems. He is a Member of the IEEE.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yuan, Y., Sun, F. & Zhu, Q. Resilient control in the presence of DoS attack: Switched system approach. Int. J. Control Autom. Syst. 13, 1423–1435 (2015). https://doi.org/10.1007/s12555-014-0261-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12555-014-0261-7

Keywords

Navigation