Passivity-Based Robust Control Against Quantified False Data Injection Attacks in Cyber-Physical Systems

Secure control against cyber attacks becomes increasingly significant in cyber-physical systems (CPSs). False data injection attacks are a class of cyber attacks that aim to compromise CPS functions by injecting false data such as sensor measurements and control signals. For quantified false data injection attacks, this paper establishes an effective defense framework from the energy conversion perspective. Then, we design an energy controller to dynamically adjust the system energy changes caused by unknown attacks. The designed energy controller stabilizes the attacked CPSs and ensures the dynamic performance of the system by adjusting the amount of damping injection. Moreover, with the $L_{2}$ disturbance attenuation technique, the burden of control system design is simplified because there is no need to design an attack observer. In addition, this secure control method is simple to implement because it avoids complicated mathematical operations. The effectiveness of our control method is demonstrated through an industrial CPS that controls a permanent magnet synchronous motor.

[1]  Guo-Ping Liu,et al.  Design and Implementation of Secure Networked Predictive Control Systems Under Deception Attacks , 2012, IEEE Transactions on Control Systems Technology.

[2]  Guoping Liu,et al.  Design and detection of false data injection attacks against output tracking control systems , 2017, 2017 36th Chinese Control Conference (CCC).

[3]  Dehui Sun,et al.  False data injection attacks for a class of output tracking control systems , 2015, The 27th Chinese Control and Decision Conference (2015 CCDC).

[4]  Bing Chu,et al.  Energy-Based $L_2$ Disturbance Attenuation Excitation Control of Differential Algebraic Power Systems , 2008, IEEE Transactions on Circuits and Systems II: Express Briefs.

[5]  Alessandro Astolfi,et al.  Practical L2 disturbance attenuation for nonlinear systems , 2002, Autom..

[6]  Qing-Long Han,et al.  State estimation under false data injection attacks: Security analysis and system protection , 2018, Autom..

[7]  Sonia Martínez,et al.  On the Performance Analysis of Resilient Networked Control Systems Under Replay Attacks , 2013, IEEE Transactions on Automatic Control.

[8]  M. Granieri,et al.  Down Converter Characterization in a Synthetic Instrument Context , 2006, 2006 IEEE Autotestcon.

[9]  Guang-Hong Yang,et al.  Decentralized Adaptive Fuzzy Secure Control for Nonlinear Uncertain Interconnected Systems Against Intermittent DoS Attacks , 2019, IEEE Transactions on Cybernetics.

[10]  Emanuele Garone,et al.  Feasibility and Detection of Replay Attack in Networked Constrained Cyber-Physical Systems , 2019, 2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[11]  Qi Tang,et al.  A New Cuk Converter with High Step-Down Ratio and its Control , 2014 .

[12]  Hyungbo Shim,et al.  When adversary encounters uncertain cyber-physical systems: Robust zero-dynamics attack with disclosure resources , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).

[13]  Yuri B. Shtessel,et al.  Sliding Mode Disturbance Observer-Based Control for a Reusable Launch Vehicle , 2005 .

[14]  Ali Akbar Safavi,et al.  A Secure Hybrid Dynamic-State Estimation Approach for Power Systems Under False Data Injection Attacks , 2020, IEEE Transactions on Industrial Informatics.

[15]  Renquan Lu,et al.  Event-Triggered Consensus Control for Multi-Agent Systems Against False Data-Injection Attacks , 2019, IEEE Transactions on Cybernetics.

[16]  Jian Sun,et al.  Covert attacks against output tracking control of cyber-physical systems , 2017, IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society.

[17]  Mark W. Spong,et al.  Passivity-Based Control of Multi-Agent Systems , 2006 .

[18]  Dan Ye,et al.  False data injection attacks with complete stealthiness in cyber-physical systems: A self-generated approach , 2020, Autom..

[19]  Guang-Hong Yang,et al.  Stability Analysis for Cyber-Physical Systems Under Denial-of-Service Attacks , 2020, IEEE Transactions on Cybernetics.

[20]  Xin Huang,et al.  Adaptive integral sliding‐mode control strategy of data‐driven cyber‐physical systems against a class of actuator attacks , 2018, IET Control Theory & Applications.

[21]  Daizhan Cheng,et al.  Dissipative Hamiltonian realization and energy-based L2-disturbance attenuation control of multimachine power systems , 2003, IEEE Trans. Autom. Control..

[22]  Gerardo Espinosa-Pérez,et al.  On the passivity-based power control of a doubly-fed induction machine , 2013 .

[23]  Alessandro Macchelli,et al.  Control by Interconnection and Energy Shaping of the Timoshenko Beam , 2004 .

[24]  Euntai Kim,et al.  A fuzzy disturbance observer and its application to control , 2002, IEEE Trans. Fuzzy Syst..

[25]  Guang-Hong Yang,et al.  Adaptive sliding mode fault tolerant control for nonlinearly chaotic systems against DoS attack and network faults , 2017, J. Frankl. Inst..

[26]  Jie Li,et al.  Research on PMSM Speed Control System Based on Improved Reaching Law , 2019, 2019 3rd International Conference on Circuits, System and Simulation (ICCSS).

[27]  Ling Shi,et al.  Optimal Denial-of-Service Attack Scheduling With Energy Constraint Over Packet-Dropping Networks , 2018, IEEE Transactions on Automatic Control.

[28]  Christian Diedrich,et al.  Identifying false data injection attacks in industrial control systems using artificial neural networks , 2017, 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA).

[29]  Yan Song,et al.  RMPC-based security problem for polytopic uncertain system subject to deception attacks and persistent disturbances , 2017 .

[30]  Arman Sargolzaei,et al.  Resilient Control Design for Load Frequency Control System Under False Data Injection Attacks , 2020, IEEE Transactions on Industrial Electronics.

[31]  Guang-Hong Yang,et al.  Event-triggered secure observer-based control for cyber-physical systems under adversarial attacks , 2017, Inf. Sci..

[32]  Yijing Wang,et al.  Security control of multi-agent systems under false data injection attacks , 2020, Neurocomputing.

[33]  Mohamed Darouach,et al.  A model predictive approach for cyber-attack detection and mitigation in control systems , 2013, 52nd IEEE Conference on Decision and Control.

[34]  Andong Liu,et al.  Distributed model predictive control for wide area measurement power systems under malicious attacks , 2017, IET Cyper-Phys. Syst.: Theory & Appl..

[35]  Olav Bjarte Fosso,et al.  Passivity-Based Control of Power Systems Considering Hydro-Turbine With Surge Tank , 2020, IEEE Transactions on Power Systems.

[36]  T. Shen,et al.  Design method for an adaptive robust controller with L/sub 2/-gain disturbance attenuation for nonlinear systems with uncertainty , 2004 .

[37]  Dorothée Normand-Cyrot,et al.  A passivity-based controller under low sampling for speed control of PMSM , 2014 .

[38]  A. Levant Sliding order and sliding accuracy in sliding mode control , 1993 .

[39]  Bruno Sinopoli,et al.  Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[40]  Shuai Liu,et al.  Event-triggered dynamic output feedback RMPC for polytopic systems with redundant channels: Input-to-state stability , 2017, J. Frankl. Inst..

[41]  Thomas Parisini,et al.  Detection of Covert Cyber-Attacks in Interconnected Systems: A Distributed Model-Based Approach , 2020, IEEE Transactions on Automatic Control.

[42]  Narayan C. Kar,et al.  Direct Calculation of Maximum-Torque-Per-Ampere Angle for Interior PMSM Control Using Measured Speed Harmonic , 2018, IEEE Transactions on Power Electronics.

[43]  Xin Huang,et al.  Reliable Control Policy of Cyber-Physical Systems Against a Class of Frequency-Constrained Sensor and Actuator Attacks , 2018, IEEE Transactions on Cybernetics.

[44]  Liang Liu,et al.  Identifying LDoS attack traffic based on wavelet energy spectrum and combined neural network , 2018, Int. J. Commun. Syst..

[45]  Guang-Hong Yang,et al.  Improved adaptive resilient control against sensor and actuator attacks , 2018, Inf. Sci..

[46]  Gerd Hirzinger,et al.  Passivity-based Object-Level Impedance Control for a Multifingered Hand , 2006, 2006 IEEE/RSJ International Conference on Intelligent Robots and Systems.

[47]  Jiabin Wang,et al.  Maximum Torque Per Ampere (MTPA) Control for Interior Permanent Magnet Synchronous Machine Drives Based on Virtual Signal Injection , 2015, IEEE Transactions on Power Electronics.