Security Control for Discrete-Time Stochastic Nonlinear Systems Subject to Deception Attacks

This paper is concerned with the security control problem with quadratic cost criterion for a class of discrete-time stochastic nonlinear systems subject to deception attacks. A definition of security in probability is adopted to account for the transient dynamics of controlled systems. The purpose of the problem under consideration is to design a dynamic output feedback controller such that the prescribed security in probability is guaranteed while obtaining an upper bound of the quadratic cost criterion. First of all, some sufficient conditions with the form of matrix inequalities are established in the framework of the input-to-state stability in probability. Then, an easy-solution version on above inequalities is proposed by carrying out the well-known matrix inverse lemma to obtain both the controller gain and the upper bound. Furthermore, the main results are shown to be extendable to the case of discrete-time stochastic linear systems. Finally, two simulation examples are utilized to illustrate the usefulness of the proposed controller design scheme.

[1]  James Lam,et al.  Non-Fragile Exponential Stability Assignment of Discrete-Time Linear Systems With Missing Data in Actuators , 2009, IEEE Transactions on Automatic Control.

[2]  Pramod K. Varshney,et al.  Distributed Inference with Byzantine Data: State-of-the-Art Review on Data Falsification Attacks , 2013, IEEE Signal Processing Magazine.

[3]  Yan Song,et al.  Recursive state estimation for discrete time-varying stochastic nonlinear systems with randomly occurring deception attacks , 2016, Int. J. Gen. Syst..

[4]  André Teixeira,et al.  Networked control systems under cyber attacks with applications to power networks , 2010, Proceedings of the 2010 American Control Conference.

[5]  X. Zhou,et al.  Stochastic Controls: Hamiltonian Systems and HJB Equations , 1999 .

[6]  Alberto Bemporad,et al.  Dynamic programming for constrained optimal control of discrete-time linear hybrid systems , 2005, Autom..

[7]  Ing-Ray Chen,et al.  Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications , 2014, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[8]  Jifeng Zhang,et al.  Output‐feedback control of a class of stochastic nonlinear systems with linearly bounded unmeasurable states , 2008 .

[9]  Xuerong Mao,et al.  On Input-to-State Stability of Stochastic Retarded Systems With Markovian Switching , 2009, IEEE Transactions on Automatic Control.

[10]  Rick S. Blum,et al.  Asymptotically Optimum Distributed Estimation in the Presence of Attacks , 2015, IEEE Transactions on Signal Processing.

[11]  Yuguang Fang,et al.  A multipath routing approach for secure data delivery , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).

[12]  S. Shankar Sastry,et al.  Security of interdependent and identical networked control systems , 2013, Autom..

[13]  Gerry Leversha,et al.  Foundations of modern probability (2nd edn), by Olav Kallenberg. Pp. 638. £49 (hbk). 2002. ISBN 0 387 95313 2 (Springer-Verlag). , 2004, The Mathematical Gazette.

[14]  Sonia Martínez,et al.  On event-triggered control of linear systems under periodic denial-of-service jamming attacks , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).

[15]  Fuad E. Alsaadi,et al.  Design of non-fragile state estimators for discrete time-delayed neural networks with parameter uncertainties , 2016, Neurocomputing.

[16]  Shuai Liu,et al.  Event-based distributed set-membership filtering for a class of time-varying non-linear systems over sensor networks with saturation effects , 2016, Int. J. Gen. Syst..

[17]  Shuai Liu,et al.  Error-constrained reliable tracking control for discrete time-varying systems subject to quantization effects , 2016, Neurocomputing.

[18]  Zidong Wang,et al.  RobustH∞ Finite-HorizonFilteringwithRandomly OccurredNonlinearitiesandQuantizationEffects ⋆ , 2010 .

[19]  Guo-Ping Liu,et al.  Design and Implementation of Secure Networked Predictive Control Systems Under Deception Attacks , 2012, IEEE Transactions on Control Systems Technology.

[20]  Kevin A. Kwiat,et al.  Improving System Reliability Against Rational Attacks Under Given Resources , 2014, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[21]  Chen-Khong Tham,et al.  This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS: SYSTEMS 1 Sensing-Driven Energy Purchasing in Smart Grid C , 2022 .

[22]  Derui Ding,et al.  Event-triggered consensus control for discrete-time stochastic multi-agent systems: The input-to-state stability in probability , 2015, Autom..

[23]  Fuwen Yang,et al.  H∞ control for networked systems with random communication delays , 2006, IEEE Trans. Autom. Control..

[24]  Fuad E. Alsaadi,et al.  On scheduling of deception attacks for discrete-time networked systems equipped with attack detectors , 2017, Neurocomputing.

[25]  John Y. Hung,et al.  Denial of service attacks on network-based control systems: impact and mitigation , 2005, IEEE Transactions on Industrial Informatics.

[26]  Grienggrai Rajchakit,et al.  Robust stability and stabilization of nonlinear uncertain stochastic switched discrete-time systems with interval time-varying delays , 2012 .

[27]  H. Karimi Robust H 1 Filter Design for Uncertain Linear Systems Over Network with Network-Induced Delays and Output Quantization , 2009 .

[28]  Kok Lay Teo,et al.  An integrated optimal control algorithm for discrete-time nonlinear stochastic system , 2010, Int. J. Control.

[29]  Qi Li,et al.  Event-triggered synchronization control for complex networks with uncertain inner coupling , 2015, Int. J. Gen. Syst..

[30]  G. Sohie,et al.  Generalization of the matrix inversion lemma , 1986, Proceedings of the IEEE.

[31]  Hongli Dong,et al.  Dynamic output feedback control for discrete-time stochastic nonlinear systems with adversaries , 2014, Proceedings of the 33rd Chinese Control Conference.

[32]  J. Tsinias Stochastic input-to-state stability and applications to global feedback stabilization , 1998 .

[33]  Jun Hu,et al.  A variance-constrained approach to recursive state estimation for time-varying complex networks with missing measurements , 2016, Autom..

[34]  Ian R. Petersen Guaranteed Cost Control of Stochastic Uncertain Systems with Slope Bounded Nonlinearities via the use of Dynamic Multipliers , 2006, Proceedings of the 45th IEEE Conference on Decision and Control.

[35]  S. Shankar Sastry,et al.  Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[36]  Fuad E. Alsaadi,et al.  Distributed fault estimation with randomly occurring uncertainties over sensor networks , 2016, Int. J. Gen. Syst..

[37]  Peter Palensky,et al.  Simulating Cyber-Physical Energy Systems: Challenges, Tools and Methods , 2014, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[38]  Xavier Litrico,et al.  Cyber Security of Water SCADA Systems—Part I: Analysis and Experimentation of Stealthy Deception Attacks , 2013, IEEE Transactions on Control Systems Technology.

[39]  Hao Xu,et al.  Finite-Horizon Near-Optimal Output Feedback Neural Network Control of Quantized Nonlinear Discrete-Time Systems With Input Constraint , 2015, IEEE Transactions on Neural Networks and Learning Systems.

[40]  Panos J. Antsaklis,et al.  Risk-sensitive control under a class of denial-of-service attack models , 2011, Proceedings of the 2011 American Control Conference.