Advertisement

Introduction

  • Zhong-Hua Pang
  • Guo-Ping Liu
  • Donghua Zhou
  • Dehui Sun
Chapter

Abstract

This chapter presents the background to NCSs and several challenging issues that are not available in conventional control systems. In particular, a brief survey of relevant work on NCSs with communication constraints or cyber attacks is provided.

References

  1. 1.
    Amin, S., Cárdenas, A.A., Sastry, S.: Safe and secure networked control systems under denial-of-service attacks. In: Proceedings of the 12th International Conference on Hybrid Systems: Computation and Control, vol. 5469, pp. 31–45 (2009)CrossRefzbMATHGoogle Scholar
  2. 2.
    Amin, S., Schwartz, G.A., Sastry, S.S.: Security of interdependent and identical networked control systems. Automatica 49(1), 186–192 (2013)MathSciNetzbMATHCrossRefGoogle Scholar
  3. 3.
    Amin, S., Litrico, X., Sastry, S., Bayen, A.M.: Cyber security of water SCADA systems-part i: analysis and experimentation of stealthy deception attacks. IEEE Trans. Control Syst. Technol. 21(5), 1963–1970 (2013)CrossRefGoogle Scholar
  4. 4.
    Baillieul, J., Antsaklis, P.J.: Control and communication challenges in networked real-time systems. Proc. IEEE 95(1), 9–28 (2007)CrossRefGoogle Scholar
  5. 5.
    Beitollahi, H., Deconinck, G.: A dependable architecture to mitigate distributed denial of service attacks on network-based control systems. Int. J. Crit. Infrastruct. Prot. 4(3), 107–123 (2011)CrossRefGoogle Scholar
  6. 6.
    Cetinkaya, A., Ishii, H., Hayakawa, T.: Networked control under random and malicious packet losses. IEEE Trans. Autom. Control 62(5), 2434–2449 (2017)MathSciNetzbMATHCrossRefGoogle Scholar
  7. 7.
    Cloosterman, M.B., Van de Wouw, N., Heemels, W.P.M.H., Nijmeijer, H.: Stability of networked control systems with uncertain time-varying delays. IEEE Trans. Autom. Control 54(7), 1575–1580 (2009)MathSciNetzbMATHCrossRefGoogle Scholar
  8. 8.
    Creery, A.A., Byres, E.J.: Industrial cybersecurity for a power system and SCADA networks - Be secure. IEEE Ind. Appl. Mag. 13(4), 49–55 (2007)CrossRefGoogle Scholar
  9. 9.
    De Persis, C., Tesi, P.: Resilient control under denial-of-service. In: Proceedings of the 19th IFAC World Congress, vol. 19, pp. 134–139 (2014)Google Scholar
  10. 10.
    De Persis, C., Tesi, P.: Networked control of nonlinear systems under denial-of-service. Syst. Control Lett. 96, 124–131 (2016)MathSciNetzbMATHCrossRefGoogle Scholar
  11. 11.
    Dhar, N.K., Verma, N.K., Behera, L., Jamshidi, M.M.: On an integrated approach to networked climate control of a smart home. IEEE Syst. J. (2017).  https://doi.org/10.1109/JSYST.2016.2619366
  12. 12.
    Ding, D., Wang, Z., Wei, G., Alsaadi, F.E.: Event-based security control for discrete-time stochastic systems. IET Control Theory Appl. 10(15), 1808–1815 (2016)MathSciNetCrossRefGoogle Scholar
  13. 13.
    Dinh, T.Q., Marco, J., Greenwood, D., Ahn, K.K., Yoon, J.I.: A data-based hybrid driven control for networked-based remote control applications. In: Proceedings of the 2017 IEEE International Conference on Mechatronics, pp. 382–387 (2017)Google Scholar
  14. 14.
    Dong, H., Wang, Z., Gao, H.: Robust \(H_{\infty }\) filtering for a class of nonlinear networked systems with multiple stochastic communication delays and packet dropouts. IEEE Trans. Signal Process. 58(4), 1957–1966 (2010)MathSciNetCrossRefGoogle Scholar
  15. 15.
    Donkers, M.C.F., Heemels, W.P.M.H., Van de Wouw, N., Hetel, L.: Stability analysis of networked control systems using a switched linear systems approach. IEEE Trans. Autom. Control 56(9), 2101–2115 (2011)MathSciNetzbMATHCrossRefGoogle Scholar
  16. 16.
    Donkers, M.C.F., Heemels, W.P.M.H., Bernardini, D., Bemporad, A., Shneer, V.: Stability analysis of stochastic networked control systems. Automatica 48(5), 917–925 (2012)MathSciNetzbMATHCrossRefGoogle Scholar
  17. 17.
    Dotoli, M., Fay, A., Miśkowicz, M., Seatzu, C.: Advanced control in factory automation: a survey. Int. J. Prod. Res. 55(5), 1243–1259 (2017)CrossRefGoogle Scholar
  18. 18.
    Du, S.L., Wang, R., Shi, P., Shi, Y.: Input-to-state stability for networked control system with predictive scheme. J. Franklin Inst. 352(10), 4565–4578 (2015)MathSciNetCrossRefGoogle Scholar
  19. 19.
    Dzung, D., Naedele, M., Von Hoff, T.P., Crevatin, M.: Security for industrial communication systems. Proc. IEEE 93(6), 1152–1177 (2005)CrossRefGoogle Scholar
  20. 20.
    El Kalam, A.A., Ferreira, A., Kratz, F.: Bilateral teleoperation system using QoS and secure communication networks for telemedicine applications. IEEE Syst. J. 10(2), 709–720 (2016)CrossRefGoogle Scholar
  21. 21.
    Farnam, A., Esfanjani, R.M.: Improved stabilization method for networked control systems with variable transmission delays and packet dropout. ISA Trans. 53(6), 1746–1753 (2014)CrossRefGoogle Scholar
  22. 22.
    Gao, H., Chen, T.: New results on stability of discrete-time systems with time-varying state delay. IEEE Trans. Autom. Control 52(2), 328–334 (2007)MathSciNetzbMATHCrossRefGoogle Scholar
  23. 23.
    Gao, H., Chen, T.: Network-based \(H_\infty \) output tracking control. IEEE Trans. Autom. control 53(3), 655–667 (2008)MathSciNetzbMATHCrossRefGoogle Scholar
  24. 24.
    Gao, H., Chen, T., Lam, J.: A new delay system approach to network-based control. Automatica 44(1), 39–52 (2008)MathSciNetzbMATHCrossRefGoogle Scholar
  25. 25.
    Garcia, E., Antsaklis, P.J.: Model-based event-triggered control for systems with quantization and time-varying network delays. IEEE Trans. Autom. Control 58(2), 422–434 (2013)MathSciNetzbMATHCrossRefGoogle Scholar
  26. 26.
    Ge, X., Yang, F., Han, Q.L.: Distributed networked control systems: a brief overview. Inf. Sci. 380, 117–131 (2017)CrossRefGoogle Scholar
  27. 27.
    Geng, Y., Ruan, X., Ahn, H.S.: Data-driven networked optimal iterative learning control for discrete linear time-varying systems with one-operation Bernoulli-type communication delays. Discret. Dyn. Nat. Soc. 2017, Article ID 9846846, 12 (2017)Google Scholar
  28. 28.
    Ghosh, A., McGraw, G.: Lost decade or golden era: computer security since 911. IEEE Secur. Privacy 10(1), 6–10 (2012)CrossRefGoogle Scholar
  29. 29.
    Gomma, H.W., Allam, A.: Physical layer privacy scheme for networked control systems. Int. J. Control Autom. Syst. 13(1), 167–174 (2015)CrossRefGoogle Scholar
  30. 30.
    Gupta, R.A., Chow, M.Y., Agarwal, A.K., Wang, W.: Information security with real-time operation: performance assessment for next generation wireless distributed networked-control-systems. In: Proceedings of the 33rd Annual Conference of the IEEE Industrial Electronics Society, pp. 420–425 (2007)Google Scholar
  31. 31.
    Gupta, R.A., Chow, M.Y.: Performance assessment and compensation for secure networked control systems. In: Proceedings of the 34th Annual Conference of the IEEE Industrial Electronics Society, pp. 2929–2934 (2008)Google Scholar
  32. 32.
    Gupta, R.A., Chow, M.Y.: Networked control system: overview and research trends. IEEE Trans. Ind. Electron. 57(7), 2527–2535 (2010)CrossRefGoogle Scholar
  33. 33.
    Han, T., Guan, Z.H., Wu, Y., Zheng, D.F., Zhang, X.H., Xiao, J.W.: Three-dimensional containment control for multiple unmanned aerial vehicles. J. Franklin Inst. 353(13), 2929–2942 (2016)MathSciNetzbMATHCrossRefGoogle Scholar
  34. 34.
    Hespanha, J.P., Naghshtabrizi, P., Xu, Y.: A survey of recent results in networked control systems. Proc. IEEE 95(1), 138–162 (2007)CrossRefGoogle Scholar
  35. 35.
    Hetel, L., Daafouz, J., Iung, C.: Analysis and control of LTI and switched systems in digital loops via an event-based modelling. Int. J. Control 81(7), 1125–1138 (2008)MathSciNetzbMATHCrossRefGoogle Scholar
  36. 36.
    Hou, Z., Bu, X.: Model free adaptive control with data dropouts. Expert Syst. Appl. 38(8), 10709–10717 (2011)CrossRefGoogle Scholar
  37. 37.
    Hu, J., Liu, S., Ji, D., Li, S.: On co-design of filter and fault estimator against randomly occurring nonlinearities and randomly occurring deception attacks. Int. J. Gen. Syst. 45(5), 619–632 (2016)MathSciNetzbMATHCrossRefGoogle Scholar
  38. 38.
    Hu, S., Yue, D.: Event-triggered control design of linear networked systems with quantizations. ISA Trans. 51(1), 153–162 (2012)CrossRefGoogle Scholar
  39. 39.
    Hu, S., Zhu, Q.: Stochastic optimal control and analysis of stability of networked control systems with long delay. Automatica 39(11), 1877–1884 (2003)MathSciNetzbMATHCrossRefGoogle Scholar
  40. 40.
    Hu, W., Lei, Z., Zhou, H., Liu, G.P., Deng, Q., Zhou, D., Liu, Z.W.: Plug-in free web-based 3-D interactive laboratory for control engineering education. IEEE Trans. Ind. Electron. 64(5), 3808–3818 (2017)CrossRefGoogle Scholar
  41. 41.
    Hua, C.C., Yu, S.C., Guan, X.P.: A robust \(H_\infty \) control approach for a class of networked control systems with sampling jitter and packet-dropout. Int. J. Control Autom. Syst. 12(4), 759–768 (2014)CrossRefGoogle Scholar
  42. 42.
    Huang, Y.L., Cárdenas, A.A., Amin, S., Lin, Z.S., Tsai, H.Y., Sastry, S.: Understanding the physical and economic consequences of attacks on control systems. Int. J. Crit. Infrastruct. Prot. 2(3), 73–83 (2009)CrossRefGoogle Scholar
  43. 43.
    Huang, Y., Esmalifalak, M., Nguyen, H., Zheng, R., Han, Z., Li, H., Song, L.: Bad data injection in smart grid: attack and defense mechanisms. IEEE Commun. Mag. 51(1), 27–33 (2013)CrossRefGoogle Scholar
  44. 44.
    Humayed, A., Lin, J., Li, F., Luo, B.: Cyber-physical systems security – a survey. IEEE Internet Things J. (2017).  https://doi.org/10.1109/JIOT.2017.2703172
  45. 45.
    Irwin, G.W., Chen, J., McKernan, A.W.G.S., Scanlon, W.G.: Co-design of predictive controllers for wireless network control. IET Control Theory Appl. 4(2), 186–196 (2010)MathSciNetCrossRefGoogle Scholar
  46. 46.
    Ishikawa, K., Nagasawa, K., Kogiso, K., Sawada, K.: Experimental validation of encrypted controller implemented on raspberry Pi. In: Proceedings of the 4th IEEE International Conference on Cyber-Physical Systems, Networks, and Applications, pp. 1–6 (2016)Google Scholar
  47. 47.
    Kantaros, Y., Zavlanos, M.M.: Distributed intermittent connectivity control of mobile robot networks. IEEE Trans. Autom. Control 62(7), 3109–3121 (2017)MathSciNetzbMATHCrossRefGoogle Scholar
  48. 48.
    Khan, S., Pathan, A.S.K., Alrajeh, N.A. (eds.): Wireless sensor networks: current status and future trends. CRC Press, Boca Raton (2016)Google Scholar
  49. 49.
    Kogiso, K., Fujita, T.: Cyber-security enhancement of networked control systems using homomorphic encryption. In: Proceedings of the 54th IEEE Conference on Decision and Control, pp. 6836–6843 (2015)Google Scholar
  50. 50.
    Kruszewski, A., Jiang, W.J., Fridman, E., Richard, J.P., Toguyeni, A.: A switched system approach to exponential stabilization through communication network. IEEE Trans. Control Syst. Technol. 20(4), 887–900 (2012)CrossRefGoogle Scholar
  51. 51.
    Kwon, C., Liu, W., Hwang, I.: Security analysis for cyber-physical systems against stealthy deception attacks. In: Proceedings of the American Control Conference, pp. 3344–3349 (2013)Google Scholar
  52. 52.
    Lee, K., Bhattacharya, R.: Stability analysis of large-scale distributed networked control systems with random communication delays: a switched system approach. Syst. Control Lett. 85, 77–83 (2015)MathSciNetzbMATHCrossRefGoogle Scholar
  53. 53.
    Lee, K.C., Lee, S., Lee, M.H.: Worst case communication delay of real-time industrial switched Ethernet with multiple levels. IEEE Trans. Ind. Electron. 53(5), 1669–1676 (2006)CrossRefGoogle Scholar
  54. 54.
    Lévesque, M., Tipper, D.: A survey of clock synchronization over packet-switched networks. IEEE Commun. Surv. Tutorials 18(4), 2926–2947 (2016)CrossRefGoogle Scholar
  55. 55.
    Li, H., Shi, Y.: Network-based predictive control for constrained nonlinear systems with two-channel packet dropouts. IEEE Trans. Ind. Electron. 61(3), 1574–1582 (2014)CrossRefGoogle Scholar
  56. 56.
    Li, J., Er, M.J., Yu, H.: Sampling and control strategy: networked control systems subject to packet disordering. IET Control Theory Appl. 10(6), 674–683 (2016)MathSciNetCrossRefGoogle Scholar
  57. 57.
    Li, Z., Bai, Y., Huang, C., Cai, Y.: Novel delay-partitioning stabilization approach for networked control system via Wirtinger-based inequalities. ISA Trans. 61, 75–86 (2016)CrossRefGoogle Scholar
  58. 58.
    Li, Z., Bai, Y., Li, T.: Improved stability and stabilization design for networked control systems using new quadruple-integral functionals. ISA Trans. 63, 170–181 (2016)CrossRefGoogle Scholar
  59. 59.
    Liang, K.Y., van de Hoef, S., Terelius, H., Turri, V., Besselink, B., Mårtensson, J., Johansson, K.H.: Networked control challenges in collaborative road freight transport. Eur. J. Control 30, 2–14 (2016)MathSciNetzbMATHCrossRefGoogle Scholar
  60. 60.
    Lin, C., Wang, Z., Yang, F.: Observer-based networked control for continuous-time systems with random sensor delays. Automatica 45(2), 578–584 (2009)MathSciNetzbMATHCrossRefGoogle Scholar
  61. 61.
    Liu, A., Zhang, W.A., Yu, L., Liu, S., Chen, M.Z.: New results on stabilization of networked control systems with packet disordering. Automatica 52, 255–259 (2015)MathSciNetzbMATHCrossRefGoogle Scholar
  62. 62.
    Liu, G.P., Mu, J.X., Rees, D.: Networked predictive control of systems with random communication delay. In: Proceedings of the 2004 UKACC International Conference on Control, ID-015 (2004)Google Scholar
  63. 63.
    Liu, G.P., Mu, J.X., Rees, D., Chai, S.C.: Design and stability analysis of networked control systems with random communication time delay using the modified MPC. Int. J. Control 79(4), 288–297 (2006)MathSciNetzbMATHCrossRefGoogle Scholar
  64. 64.
    Liu, G.P., Xia, Y., Chen, J., Rees, D., Hu, W.: Networked predictive control of systems with random network delays in both forward and feedback channels. IEEE Trans. Ind. Electron. 54(3), 1282–1297 (2007)CrossRefGoogle Scholar
  65. 65.
    Liu, G.P., Sun, J., Zhao, Y.B.: Design, analysis and real-time implementation of networked predictive control systems. Acta Autom. Sin. 39(11), 1769–1777 (2013)CrossRefGoogle Scholar
  66. 66.
    Liu, K., Fridman, E., Johansson, K.H.: Dynamic quantization of uncertain linear networked control systems. Automatica 59, 248–255 (2015)MathSciNetzbMATHCrossRefGoogle Scholar
  67. 67.
    Liu, K., Fridman, E., Johansson, K.H.: Networked control with stochastic scheduling. IEEE Trans. Autom. Control 60(11), 3071–3076 (2015)MathSciNetzbMATHCrossRefGoogle Scholar
  68. 68.
    Liu, Y.M., Fong, I.K.: Robust predictive tracking control of networked control systems with time-varying delays and data dropouts. IET Control Theory Appl. 7(5), 738–748 (2013)MathSciNetCrossRefGoogle Scholar
  69. 69.
    Long, M., Wu, C.H., Hung, J.Y.: Denial of service attacks on network-based control systems: Impact and mitigation. IEEE Trans. Ind. Inform. 1(2), 85–96 (2005)CrossRefGoogle Scholar
  70. 70.
    Mahmood, A., Exel, R., Trsek, H., Sauter, T.: Clock synchronization over IEEE 802.11 - a survey of methodologies and protocols. IEEE Trans. Ind. Inform. 13(2), 907–922 (2017)CrossRefGoogle Scholar
  71. 71.
    Mahmoud, M.S., Saif, A.W.A.: Robust quantized approach to fuzzy networked control systems. IEEE J. Emerging Sel. Top. Circuits Syst. 2(1), 71–81 (2012)CrossRefGoogle Scholar
  72. 72.
    Manandhar, K., Cao, X., Hu, F., Liu, Y.: Detection of faults and attacks including false data injection attack in smart grid using Kalman filter. IEEE Trans. Control Netw. Syst. 1(4), 370–379 (2014)MathSciNetzbMATHCrossRefGoogle Scholar
  73. 73.
    Meng, D., Du, W., Jia, Y.: Data-driven consensus control for networked agents: an iterative learning control-motivated approach. IET Control Theory Appl. 9(14), 2084–2096 (2015)MathSciNetCrossRefGoogle Scholar
  74. 74.
    Miao, F., Pajic, M., Pappas, G.J.: Stochastic game approach for replay attack detection. In: Proceedings of the 52nd IEEE Conference on Decision and Control, pp. 1854–1859 (2013)Google Scholar
  75. 75.
    Miao, F., Zhu, Q., Pajic, M., Pappas, G.J.: Coding schemes for securing cyber-physical systems against stealthy data injection attacks. IEEE Trans. Control Netw. Syst. 4(1), 106–117 (2017)MathSciNetzbMATHCrossRefGoogle Scholar
  76. 76.
    Mo, Y., Sinopoli, B.: Secure control against replay attacks. In: Proceedings of the 47th Annual Allerton Conference on Communication, Control, and Computing, pp. 911–918 (2009)Google Scholar
  77. 77.
    Mo, Y., Chabukswar, R., Sinopoli, B.: Detecting integrity attacks on SCADA systems. IEEE Trans. Control Syst. Technol. 22(4), 1396–1407 (2014)CrossRefGoogle Scholar
  78. 78.
    Mo, Y., Weerakkody, S., Sinopoli, B.: Physical authentication of control systems: Designing watermarked control inputs to detect counterfeit sensor outputs. IEEE Control Syst. 35(1), 93–109 (2015)MathSciNetCrossRefGoogle Scholar
  79. 79.
    Mo, Y., Sinopoli, B.: Secure estimation in the presence of integrity attacks. IEEE Trans. Autom. Control 60(4), 1145–1151 (2015)MathSciNetzbMATHCrossRefGoogle Scholar
  80. 80.
    Mo, Y., Sinopoli, B.: On the performance degradation of cyber-physical systems under stealthy integrity attacks. IEEE Trans. Autom. Control 61(9), 2618–2624 (2016)MathSciNetzbMATHCrossRefGoogle Scholar
  81. 81.
    Nagahara, M., Quevedo, D.E., Ostergaard, J.: Sparse packetized predictive control for networked control over erasure channels. IEEE Trans. Autom. Control 59(7), 1899–1905 (2014)MathSciNetzbMATHCrossRefGoogle Scholar
  82. 82.
    Nilsson, J., Bernhardsson, B., Wittenmark, B.: Stochastic analysis and control of real-time systems with random time delays. Automatica 34(1), 57–64 (1998)MathSciNetzbMATHCrossRefGoogle Scholar
  83. 83.
    Onat, A., Naskali, T., Parlakay, E., Mutluer, O.: Control over imperfect networks: model-based predictive networked control systems. IEEE Trans. Ind. Electron. 58(3), 905–913 (2011)CrossRefGoogle Scholar
  84. 84.
    Pan, Y.J., Marquez, H.J., Chen, T.: Stabilization of remote control systems with unknown time varying delays by LMI techniques. Int. J. Control 79(07), 752–763 (2006)MathSciNetzbMATHCrossRefGoogle Scholar
  85. 85.
    Pang, Z.H., Zheng, G., Liu, G.P., Luo, C.X.: Secure transmission mechanism for networked control systems under deception attacks. In: Proceedings of the IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems, pp. 27–32 (2011)Google Scholar
  86. 86.
    Pang, Z.H., Liu, G.P., Dong, Z.: Secure networked control systems under denial of service attacks. In: Proceedings of the 18th IFAC World Congress, pp. 8908–8913 (2011)CrossRefGoogle Scholar
  87. 87.
    Pang, Z.H., Liu, G.P., Zhou, D.: Detection of deception attacks on the backward channel of networked control systems. In: Proceedings of the 31st Chinese Control Conference, pp. 5972–5977 (2012)Google Scholar
  88. 88.
    Pang, Z.H., Liu, G.P.: Design and implementation of secure networked predictive control systems under deception attacks. IEEE Trans. Control Syst. Technol. 20(5), 1334–1342 (2012)CrossRefGoogle Scholar
  89. 89.
    Pang, Z.H., Liu, G.P., Zhou, D., Chen, M.: Output tracking control for networked systems: a model-based prediction approach. IEEE Trans. Ind. Electron. 61(9), 4867–4877 (2014)CrossRefGoogle Scholar
  90. 90.
    Pang, Z.H., Liu, G.P., Zhou, D., Sun, D.: Data-based predictive control for networked non-linear systems with two-channel packet dropouts. IET Control Theory Appl. 9(7), 1154–1161 (2015)MathSciNetCrossRefGoogle Scholar
  91. 91.
    Pang, Z.H., Hou, F., Zhou, Y., Sun, D.: False data injection attacks for output tracking control systems. In: Proceedings of the 34th Chinese Control Conference, pp. 6747–6752 (2015)Google Scholar
  92. 92.
    Pang, Z.H., Liu, G.P., Zhou, D., Sun, D.: Data-based predictive control for networked nonlinear systems with network-induced delay and packet dropout. IEEE Trans. Ind. Electron. 63(2), 1249–1257 (2016)CrossRefGoogle Scholar
  93. 93.
    Pang, Z.H., Liu, G.P., Zhou, D., Hou, F., Sun, D.: Two-channel false data injection attacks against output tracking control of networked systems. IEEE Trans. Ind. Electron. 63(5), 3242–3251 (2016)CrossRefGoogle Scholar
  94. 94.
    Pang, Z.H., Liu, G.P., Zhou, D.: Design and performance analysis of incremental networked predictive control systems. IEEE Trans. Cybern. 46(6), 1400–1410 (2016)CrossRefGoogle Scholar
  95. 95.
    Pang, Z.H., Liu, G.P., Zhou, D., Sun, D.: Design and performance analysis of networked predictive control systems based on input-output difference equation model. Int. J. Control Autom. Syst. 15(1), 416–426 (2017)CrossRefGoogle Scholar
  96. 96.
    Pang, Z.H., Liu, G.P., Zhou, D., Sun, D.: Data-driven control with input design-based data dropout compensation for networked nonlinear systems. IEEE Trans. Control Syst. Technol. 25(2), 628–636 (2017)CrossRefGoogle Scholar
  97. 97.
    Pang, Z.H., Liu, G.P., Zhou, D., Sun, D.: Input design-based compensation control for networked nonlinear systems with random delays and packet dropouts. IEEE Trans. Circuits Syst. II Express Briefs 64(3), 299–303 (2017)CrossRefGoogle Scholar
  98. 98.
    Pasqualetti, F., Dörfler, F., Bullo, F.: Attack detection and identification in cyber-physical systems. IEEE Trans. Autom. Control 58(11), 2715–2729 (2013)MathSciNetzbMATHCrossRefGoogle Scholar
  99. 99.
    Peng, C., Zhang, J.: Event-triggered output-feedback \(H_\infty \) control for networked control systems with time-varying sampling. IET Control Theory Appl. 9(9), 1384–1391 (2015)MathSciNetCrossRefGoogle Scholar
  100. 100.
    Peterson, L.L., Davie, B.S.: Computer Networks: A Systems Approach, 5th edn. Elsevier, San Francisco (2012)zbMATHGoogle Scholar
  101. 101.
    Phat, V.N., Jiang, J., Savkin, A.V., Petersen, I.R.: Robust stabilization of linear uncertain discrete-time systems via a limited capacity communication channel. Syst. Control Lett. 53(5), 347–360 (2004)MathSciNetzbMATHCrossRefGoogle Scholar
  102. 102.
    Pin, G., Parisini, T.: Networked predictive control of uncertain constrained nonlinear systems: Recursive feasibility and input-to-state stability analysis. IEEE Trans. Autom. Control 56(1), 72–87 (2011)MathSciNetzbMATHCrossRefGoogle Scholar
  103. 103.
    Qiu, J., Gao, H., Ding, S.X.: Recent advances on fuzzy-model-based nonlinear networked control systems: a survey. IEEE Trans. Ind. Electron. 63(2), 1207–1217 (2016)CrossRefGoogle Scholar
  104. 104.
    Qiu, J., Wang, T., Yin, S., Gao, H.: Data-based optimal control for networked double-layer industrial processes. IEEE Trans. Ind. Electron. 64(5), 4179–4186 (2017)CrossRefGoogle Scholar
  105. 105.
    Quevedo, D.E., Jurado, I.: Stability of sequence-based control with random delays and dropouts. IEEE Trans. Autom. Control 59(5), 1296–1302 (2014)MathSciNetzbMATHCrossRefGoogle Scholar
  106. 106.
    Rahmani, B., Markazi, A.H.D., Nezhad, P.M.: Plant input-mapping-based predictive control of systems through band-limited networks. IET Control Theory Appl. 5(2), 341–350 (2011)MathSciNetCrossRefGoogle Scholar
  107. 107.
    Sahoo, A., Jagannathan, S.: Stochastic optimal regulation of nonlinear networked control systems by using event-driven adaptive dynamic programming. IEEE Trans. Cybern. 47(2), 425–438 (2017)Google Scholar
  108. 108.
    Schilling, K.: Perspectives for miniaturized, distributed, networked cooperating systems for space exploration. Rob. Autom. Syst. 90, 118–124 (2017)CrossRefGoogle Scholar
  109. 109.
    Shi, Y., Yu, B.: Robust mixed \(H_2/H_\infty \) control of networked control systems with random time delays in both forward and backward communication links. Automatica 47(4), 754–760 (2011)MathSciNetzbMATHCrossRefGoogle Scholar
  110. 110.
    Shuai, Z., Zhang, H., Wang, J., Li, J., Ouyang, M.: Combined AFS and DYC control of four-wheel-independent-drive electric vehicles over CAN network with time-varying delays. IEEE Trans. Veh. Technol. 63(2), 591–602 (2014)CrossRefGoogle Scholar
  111. 111.
    Smit, J., Hancke, G.P.: The design and implementation of a general-purpose, secure, measurement and control network incorporating Internet-based access. In: Proceedings of the 20th IEEE International Instrumentation and Measurement Technology, vol. 2, pp. 1643–1647 (2003)Google Scholar
  112. 112.
    Song, H., Lu, J., Lockwood, J., Moscola, J.: Secure remote control of field-programmable network devices. In: Proceedings of the 12th Annual IEEE Symposium on Field-Programmable Custom Computing Machines, pp. 334–335 (2004)Google Scholar
  113. 113.
    Sun, J., Chen, J.: Networked predictive control for systems with unknown or partially known delay. IET Control Theory Appl. 8(18), 2282–2288MathSciNetCrossRefGoogle Scholar
  114. 114.
    Sun, X.M., Liu, G.P., Wang, W., Rees, D.: Stability analysis for networked control systems based on event-time-driven mode. Int. J. Control 82(12), 2260–2266 (2009)MathSciNetzbMATHCrossRefGoogle Scholar
  115. 115.
    Sun, X.M., Wu, D., Liu, G.P., Wang, W.: Input-to-state stability for networked predictive control with random delays in both feedback and forward channels. IEEE Trans. Ind. Electron. 61(7), 3519–3526 (2014)CrossRefGoogle Scholar
  116. 116.
    Suri, N., Hugue, M.M., Walter, C.J.: Synchronization issues in real-time systems. Proc. IEEE 82(1), 41–54 (1994)CrossRefGoogle Scholar
  117. 117.
    Tabbara, M., Nesic, D.: Input-output stability of networked control systems with stochastic protocols and channels. IEEE Trans. Autom. Control 53(5), 1160–1175 (2008)MathSciNetzbMATHCrossRefGoogle Scholar
  118. 118.
    Tahoun, A.H.: Output-feedback MRAC of networked control systems with packet dropout. Int. J. Syst. Sci. 44(9), 1701–1710 (2013)MathSciNetzbMATHCrossRefGoogle Scholar
  119. 119.
    Tang, B., Alvergue, L.D., Gu, G.: Secure networked control systems against replay attacks without injecting authentication noise. In: Proceedings of the American Control Conference, pp. 6028–6033 (2015)Google Scholar
  120. 120.
    Tang, P.L., de Silva, C.W.: Compensation for transmission delays in an Ethernet-based control network using variable-horizon predictive control. IEEE Trans. Control Syst. Technol. 14(4), 707–718 (2006)CrossRefGoogle Scholar
  121. 121.
    Tang, Y., Qian, F., Gao, H., Kurths, J.: Synchronization in complex networks and its application - a survey of recent advances and challenges. Annu. Rev. Control 38(2), 184–198 (2014)CrossRefGoogle Scholar
  122. 122.
    Teixeira, A., Amin, S., Sandberg, H., Johansson, K.H., Sastry, S.S.: Cyber security analysis of state estimators in electric power systems. In: Proceedings of the 49th IEEE Conference on Decision and Control, pp. 5991–5998 (2010)Google Scholar
  123. 123.
    Teixeira, A., Shames, I., Sandberg, H., Johansson, K.H.: A secure control framework for resource-limited adversaries. Automatica 51, 135–148 (2015)MathSciNetzbMATHCrossRefGoogle Scholar
  124. 124.
    Ulusoy, A., Gurbuz, O., Onat, A.: Wireless model-based predictive networked control system over cooperative wireless network. IEEE Trans. Ind. Inform. 7(1), 41–51 (2011)CrossRefGoogle Scholar
  125. 125.
    Walsh, G.C., Ye, H.: Scheduling of networked control systems. IEEE Control Syst. 21(1), 57–65 (2001)CrossRefGoogle Scholar
  126. 126.
    Wang, Z., Chen, B., Wang, J., Chen, C.: Networked microgrids for self-healing power systems. IEEE Trans. Smart Grid 7(1), 310–319 (2016)CrossRefGoogle Scholar
  127. 127.
    Wang, Z., Wang, X., Liu, L.: Stochastic optimal linear control of wireless networked control systems with delays and packet losses. IET Control Theory Appl. 10(7), 742–751 (2016)MathSciNetCrossRefGoogle Scholar
  128. 128.
    Wu, G., Sun, J., Chen, J.: A survey on the security of cyber-physical systems. Control Theory Technol. 14(1), 2–10 (2016)MathSciNetCrossRefGoogle Scholar
  129. 129.
    Wu, Y., Liu, T., Wu, Y., Zhang, Y.: \(H_{\infty }\) output tracking control for uncertain networked control systems via a switched system approach. Int. J. Robust Nonlinear Control 26(5), 995–1009 (2016)MathSciNetzbMATHCrossRefGoogle Scholar
  130. 130.
    Xia, Y., Liu, G.P., Shi, P., Rees, D., Thomas, E.J.C.: New stability and stabilization conditions for systems with time-delay. Int. J. Syst. Sci. 38(1), 17–24 (2007)MathSciNetzbMATHCrossRefGoogle Scholar
  131. 131.
    Xia, Y., Xie, W., Liu, B., Wang, X.: Data-driven predictive control for networked control systems. Inf. Sci. 235, 45–54 (2013)MathSciNetzbMATHCrossRefGoogle Scholar
  132. 132.
    Xia, Y., Gao, Y., Yan, L.: Recent progress in networked control systems - a survey. Int. J. Autom. Comput. 12(4), 343–367 (2015)CrossRefGoogle Scholar
  133. 133.
    Xie, L., Mo, Y., Sinopoli, B.: Integrity data attacks in power market operations. IEEE Trans. Smart Grid 2(4), 659–666 (2011)CrossRefGoogle Scholar
  134. 134.
    Xu, H., Jagannathan, S., Lewis, F.L.: Stochastic optimal control of unknown linear networked control system in the presence of random delays and packet losses. Automatica 48(6), 1017–1030 (2012)MathSciNetzbMATHCrossRefGoogle Scholar
  135. 135.
    Xu, H., Jagannathan, S.: Stochastic optimal controller design for uncertain nonlinear networked control system via neuro dynamic programming. IEEE Trans. Neural Netw. Learn. Syst. 24(3), 471–484 (2013)CrossRefGoogle Scholar
  136. 136.
    Xu, H., Jagannathan, S.: Neural network-based finite horizon stochastic optimal control design for nonlinear networked control systems. IEEE Trans. Neural Netw. Learn. Syst. 26(3), 472–485 (2015)MathSciNetCrossRefGoogle Scholar
  137. 137.
    Xu, Y., Song, R., Korba, L., Wang, L., Shen, W., Lang, S.: Distributed device networks with security constraints. IEEE Trans. Ind. Inform. 1(4), 217–225 (2005)CrossRefGoogle Scholar
  138. 138.
    Yang, H., Ricciato, F., Lu, S., Zhang, L.: Securing a wireless world. Proc. IEEE 94(2), 442–454 (2006)CrossRefGoogle Scholar
  139. 139.
    Yang, Q., Yang, J., Yu, W., An, D., Zhang, N., Zhao, W.: On false data-injection attacks against power system state estimation: modeling and countermeasures. IEEE Trans. Parallel Distrib. Syst. 25(3), 717–729 (2014)CrossRefGoogle Scholar
  140. 140.
    Yang, R., Shi, P., Liu, G.P., Gao, H.: Network-based feedback control for systems with mixed delays based on quantization and dropout compensation. Automatica 47(12), 2805–2809 (2011)MathSciNetzbMATHCrossRefGoogle Scholar
  141. 141.
    Yang, T.C.: Networked control system: a brief survey. IEE Proc. Control Theory Appl. 153(4), 403–412 (2006)CrossRefGoogle Scholar
  142. 142.
    Ye, W., Heidemann, J., Estrin, D.: An energy-efficient MAC protocol for wireless sensor networks. In: Proceedings of the 21st Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings, vol. 3, pp. 1567–157 (2002)Google Scholar
  143. 143.
    Yuan, Y., Yuan, H., Guo, L., Yang, H., Sun, S.: Resilient control of networked control system under DoS attacks: a unified game approach. IEEE Trans. Ind. Inform. 12(5), 1786–1794 (2016)CrossRefGoogle Scholar
  144. 144.
    Yue, D., Han, Q.L.: Delayed feedback control of uncertain systems with time-varying input delay. Automatica 41(2), 233–240 (2005)MathSciNetzbMATHCrossRefGoogle Scholar
  145. 145.
    Zhang, D., Shi, P., Wang, Q.G., Yu, L.: Analysis and synthesis of networked control systems: a survey of recent advances and challenges. ISA Trans. 66, 376–392 (2017)CrossRefGoogle Scholar
  146. 146.
    Zhang, H., Cheng, P., Shi, L., Chen, J.: Optimal DoS attack scheduling in wireless networked control system. IEEE Trans. Control Syst. Technol. 24(3), 843–852 (2016)CrossRefGoogle Scholar
  147. 147.
    Zhang, H., Zhang, Z., Wang, Z., Shan, Q.: New results on stability and stabilization of networked control systems with short time-varying delay. IEEE Trans. Cybern. 46(12), 2772–2781 (2016)CrossRefGoogle Scholar
  148. 148.
    Zhang, J., Xia, Y., Shi, P.: Design and stability analysis of networked predictive control systems. IEEE Trans. Control Syst. Technol. 21(4), 1495–1501 (2013)CrossRefGoogle Scholar
  149. 149.
    Zhang, L., Shi, Y., Chen, T., Huang, B.: A new method for stabilization of networked control systems with random delays. IEEE Trans. Autom. Control 50(8), 1177–1181 (2005)MathSciNetzbMATHCrossRefGoogle Scholar
  150. 150.
    Zhang, L., Gao, H., Kaynak, O.: Network-induced constraints in networked control systems - a survey. IEEE Trans. Ind. Inform. 9(1), 403–416 (2013)CrossRefGoogle Scholar
  151. 151.
    Zhang, L., Xie, L., Li, W., Wang, Z.: Security solutions for networked control systems based on DES algorithm and improved grey prediction model. Int. J. Comput. Netw. Inf. Secur. 6(1), 78–85 (2014)Google Scholar
  152. 152.
    Zhang, R., Venkitasubramaniam, P.: Stealthy control signal attacks in linear quadratic gaussian control systems: detectability reward tradeoff. IEEE Trans. Inf. Forensics Secur. 12(7), 1555–1570 (2017)CrossRefGoogle Scholar
  153. 153.
    Zhang, W.A., Yu, L.: Modelling and control of networked control systems with both network-induced delay and packet-dropout. Automatica 44(12), 3206–3210 (2008)MathSciNetzbMATHCrossRefGoogle Scholar
  154. 154.
    Zhang, W.A., Yu, L.: A robust control approach to stabilization of networked control systems with time-varying delays. Automatica 45(10), 2440–2445 (2009)MathSciNetzbMATHCrossRefGoogle Scholar
  155. 155.
    Zhang, W.A., Yu, L.: A robust control approach to stabilization of networked control systems with short time-varying delays. Acta Autom. Sin. 36(1), 87–91 (2010)MathSciNetzbMATHCrossRefGoogle Scholar
  156. 156.
    Zhang, W.A., Yu, L.: BIBO stability and stabilization of networked control systems with short time-varying delays. Int. J. Robust Nonlinear Control 21(3), 295–308 (2011)MathSciNetzbMATHCrossRefGoogle Scholar
  157. 157.
    Zhang, X.M., Han, Q.L., Yu, X.: Survey on recent advances in networked control systems. IEEE Trans. Ind. Inform. 12(5), 1740–1752 (2016)CrossRefGoogle Scholar
  158. 158.
    Zhao, Y.B., Liu, G.P., Rees, D.: Integrated predictive control and scheduling co-design for networked control systems. IET Control Theory Appl. 2(1), 7–15 (2008)MathSciNetCrossRefGoogle Scholar
  159. 159.
    Zhao, Y.B., Liu, G.P., Rees, D.: Actively compensating for data packet disorder in networked control systems. IEEE Trans. Circuits Syst. II Express Briefs 57(11), 913–917 (2010)CrossRefGoogle Scholar
  160. 160.
    Zhu, M., Martłnez, S.: On the performance analysis of resilient networked control systems under replay attacks. IEEE Trans. Autom. Control 59(3), 804–808 (2014)MathSciNetzbMATHCrossRefGoogle Scholar
  161. 161.
    Zou, L., Wang, Z., Dong, H., Liu, Y., Gao, H.: Time-and event-driven communication process for networked control systems: a survey. Abstr. Appl. Anal. 2014, Article ID 261738, 10 (2014)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • Zhong-Hua Pang
    • 1
  • Guo-Ping Liu
    • 2
  • Donghua Zhou
    • 3
  • Dehui Sun
    • 1
  1. 1.North China University of TechnologyBeijingChina
  2. 2.University of South WalesPontypriddUK
  3. 3.Shandong University of Science and TechnologyQingdaoChina

Personalised recommendations