LQ Secure Control for Cyber-Physical Systems Against Sparse Sensor and Actuator Attacks

This paper investigates the problem of secure control for cyber-physical systems (CPSs) under sensor and actuator attacks. The attacks are assumed to be sparse but arbitrary. The strong detectability under the sparse attacks is characterized by computing the rank of the so-called structural matrix pencil. An adaptive hybrid control strategy is proposed by automatically excluding the tampered measurement and input data. First, a hybrid system consisting of all possible combinations of models is implemented. Then, combining classical linear quadratic control theory, an adaptive switching logic is designed to online locate the proper system mode by observing the optimal performance index. As a result, the closed-loop system is ensured to be asymptotically stable in the presence of the attacks, while the performance loss can be mitigated. Also, the performance degradation under attacks is also analyzed quantificationally based on the quadratic cost function. Simulation results on an aircraft system are given to substantiate the proposed method.

[1]  L. Silverman Discrete Riccati Equations: Alternative Algorithms, Asymptotic Properties, and System Theory Interpretations , 1976 .

[2]  Paulo Tabuada,et al.  Event-Triggered State Observers for Sparse Sensor Noise/Attacks , 2013, IEEE Transactions on Automatic Control.

[3]  João Pedro Hespanha,et al.  Observability of linear systems under adversarial attacks , 2015, 2015 American Control Conference (ACC).

[4]  John O'Reilly,et al.  Observers for Linear Systems , 1983 .

[5]  Panos J. Antsaklis,et al.  Goals and Challenges in Cyber-Physical Systems Research Editorial of the Editor in Chief , 2014, IEEE Trans. Autom. Control..

[6]  Guang-Hong Yang,et al.  Secure Luenberger-like observers for cyber-physical systems under sparse actuator and sensor attacks , 2018, Autom..

[7]  M. Luk,et al.  MiniSec: A Secure Sensor Network Communication Architecture , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.

[8]  Pietro Tesi,et al.  Input-to-State Stabilizing Control Under Denial-of-Service , 2015, IEEE Transactions on Automatic Control.

[9]  Frank L. Lewis,et al.  Reinforcement Learning for Partially Observable Dynamic Processes: Adaptive Dynamic Programming Using Measured Output Data , 2011, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[10]  Bruno Sinopoli,et al.  Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[11]  Ralph Langner,et al.  Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.

[12]  Quanyan Zhu,et al.  Robust and resilient control design for cyber-physical systems with an application to power systems , 2011, IEEE Conference on Decision and Control and European Control Conference.

[13]  Karl Henrik Johansson,et al.  A secure control framework for resource-limited adversaries , 2012, Autom..

[14]  Guang-Hong Yang,et al.  Secure State Estimation Against Sparse Sensor Attacks With Adaptive Switching Mechanism , 2018, IEEE Transactions on Automatic Control.

[15]  Kun Ji,et al.  Resilient industrial control system (RICS): Concepts, formulation, metrics, and insights , 2010, 2010 3rd International Symposium on Resilient Control Systems.

[16]  Dan Ye,et al.  Adaptive Reliable $H_\infty $ Static Output Feedback Control Against Markovian Jumping Sensor Failures , 2018, IEEE Transactions on Neural Networks and Learning Systems.

[17]  Paulo Tabuada,et al.  Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.

[18]  Sonia Martínez,et al.  On the Performance Analysis of Resilient Networked Control Systems Under Replay Attacks , 2013, IEEE Transactions on Automatic Control.

[19]  Bruno Sinopoli,et al.  On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks , 2016, IEEE Transactions on Automatic Control.

[20]  Chengnian Long,et al.  Dynamic State Recovery for Cyber-Physical Systems Under Switching Location Attacks , 2017, IEEE Transactions on Control of Network Systems.

[21]  Guang-Hong Yang,et al.  Data-Driven Coordinated Attack Policy Design Based on Adaptive $\mathcal {L}_2$-Gain Optimal Theory , 2018, IEEE Transactions on Automatic Control.

[22]  Shuzhi Sam Ge,et al.  Adaptive actuator fault tolerant control for uncertain nonlinear systems with multiple actuators , 2015, Autom..

[23]  Zhong-Ping Jiang,et al.  Output-feedback adaptive optimal control of interconnected systems based on robust adaptive dynamic programming , 2016, Autom..

[24]  Cheolhyeon Kwon,et al.  Cyber attack mitigation for cyber–physical systems: hybrid system approach to controller design , 2016 .

[25]  Paulo Tabuada,et al.  Secure State Estimation for Cyber-Physical Systems Under Sensor Attacks: A Satisfiability Modulo Theory Approach , 2014, IEEE Transactions on Automatic Control.

[26]  Anand R. Tripathi,et al.  Security Policies in Distributed CSCW and Workflow Systems , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[27]  Tamer Basar,et al.  Optimal control in the presence of an intelligent jammer with limited actions , 2010, 49th IEEE Conference on Decision and Control (CDC).

[28]  Hyungbo Shim,et al.  On Redundant Observability: From Security Index to Attack Detection and Resilient State Estimation , 2018, IEEE Transactions on Automatic Control.

[29]  A. Laub,et al.  Feedback properties of multivariable systems: The role and use of the return difference matrix , 1981 .

[30]  Lei Guo,et al.  Resilient Control of Networked Control System Under DoS Attacks: A Unified Game Approach , 2016, IEEE Transactions on Industrial Informatics.