Dual-rate control framework with safe watermarking against deception attacks

Carregando...
Imagem de Miniatura

Data

Título da Revista

ISSN da Revista

Título de Volume

Editor

Universidade Federal de Minas Gerais

Descrição

Tipo

Artigo de periódico

Título alternativo

Primeiro orientador

Membros da banca

Resumo

This article presents a novel secure-control framework against sensor deception attacks. The vulnerability of cyber-physical systems with respect to sensor deceptive attacks makes that all sensor measurements are not reliable until the system security is assured by an attack detection module. Most of the active attack detection strategies require some time to assess the system security, while injecting a watermark signal to ease the detection. However, the injection of watermark signals deteriorates the performance and stability of the plant. The proposed control framework consists of a dual-rate control (DRC) that is able to stabilize the plant using: 1) a model predictive controller that operates at a slower sampling time; 2) a state-feedback predictor-based controller that operates in the nominal sampling time disregarding the use of the untrustworthy measurements until the attack detector is able to certify the security; and 3) a reconfiguration block (RB) for palliating the effect of the watermarking. Simulation results indicate the efficacy of the proposed DRC framework to defend the system from cyber-attacks and the ability of the RB to improve the closed-loop performance during the watermark injection.

Abstract

Assunto

Teoria do controle

Palavras-chave

Watermarking , Reliability , Control systems , Symmetric matrices , Detectors , Cyberattack , Time measurement, Deception attacks , dual-rate control (DRC) , model predictive control , predictor-based control , reconfiguration block (RB) , secure control , watermark signal, Deception Attacks , Sensor Measurements , Model Predictive Control , Cyber-physical Systems , Attack Detection , Reliable Measure , Stability Of System , Optimal Control , Upper Layer , Internet Of Things , Control Signal , Lower Layer , Real Measurements , Types Of Attacks , System Disturbances , Denial Of Service , State Constraints , Security Operations , Replay Attacks , Input Constraints , Cyber Attacks , Reachable Set , Security Control , Nominal System , Upper Tier , Local Control , Prediction Error , Occurrence Of Attacks , Model Predictive Control Problem , Control Strategy

Citação

Curso

Endereço externo

https://ieeexplore.ieee.org/document/9744031

Avaliação

Revisão

Suplementado Por

Referenciado Por