Cyber attack mitigation for cyber–physical systems: hybrid system approach to controller design

This study considers robust controller design for cyber–physical systems (CPSs) subject to cyber attacks. While previous studies have investigated secure control by assuming specific attack strategies, in this study the authors propose a robust hybrid control scheme containing multiple sub-controllers, each matched to a different type of cyber attack. A system using this control scheme is able to adapt its behaviour to various cyber attacks (including those which have not been specifically addressed in the sub-controller designs) by switching sub-controllers to achieve the best performance. They propose a method for designing the secure switching logic to counter possible cyber attacks and to mathematically verify the system's performance and stability as well. The performance of the proposed control scheme is demonstrated by the hybrid H 2–H ∞ controller applied to a CPS subject to cyber attacks.

[1]  Inseok Hwang,et al.  Robust estimation and fault detection and isolation algorithms for stochastic linear hybrid systems with unknown fault input , 2011 .

[2]  T. Başar A dynamic games approach to controller design: disturbance rejection in discrete-time , 1991 .

[3]  Inseok Hwang,et al.  A Survey of Fault Detection, Isolation, and Reconfiguration Methods , 2010, IEEE Transactions on Control Systems Technology.

[4]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[5]  João Pedro Hespanha,et al.  Switching between stabilizing controllers , 2002, Autom..

[6]  Xavier Litrico,et al.  Cyber Security of Water SCADA Systems—Part I: Analysis and Experimentation of Stealthy Deception Attacks , 2013, IEEE Transactions on Control Systems Technology.

[7]  Anand R. Tripathi,et al.  Security Policies in Distributed CSCW and Workflow Systems , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[8]  Manfred Morari,et al.  Model predictive control: Theory and practice - A survey , 1989, Autom..

[9]  G. Manimaran,et al.  Cybersecurity for Critical Infrastructures: Attack and Defense Modeling , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[10]  João Pedro Hespanha,et al.  Uniform stability of switched linear systems: extensions of LaSalle's Invariance Principle , 2004, IEEE Transactions on Automatic Control.

[11]  K. Narendra,et al.  Identification and Optimization of Aircraft Dynamics , 1973 .

[12]  Virgil D. Gligor A Note on Denial-of-Service in Operating Systems , 1984, IEEE Transactions on Software Engineering.

[13]  William H. Sanders,et al.  Model-based evaluation: from dependability to security , 2004, IEEE Transactions on Dependable and Secure Computing.

[14]  Jerome H. Saltzer,et al.  The protection of information in computer systems , 1975, Proc. IEEE.

[15]  Carl E. Landwehr,et al.  Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.

[16]  S. Shankar Sastry,et al.  Security of interdependent and identical networked control systems , 2013, Autom..

[17]  Inseok Hwang,et al.  Stochastic Linear Hybrid Systems: Modeling, Estimation, and Application in Air Traffic Control , 2009, IEEE Transactions on Control Systems Technology.

[18]  Mark E. Campbell,et al.  Robust Nonlinear Model Predictive Control With Partial State Information , 2008, IEEE Transactions on Control Systems Technology.