A Resilient Control Approach to Secure Cyber Physical Systems (CPS) with an Application on Connected Vehicles

[1]  Ravishankar K. Iyer,et al.  An Approach for Detecting and Distinguishing Errors versus Attacks in Sensor Networks , 2006, International Conference on Dependable Systems and Networks (DSN'06).

[2]  Angelo Alessandri,et al.  Design of Luenberger Observers for a Class of Hybrid Linear Systems , 2001, HSCC.

[3]  Bruno Sinopoli,et al.  False Data Injection Attacks in Electricity Markets , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[4]  Antonio Bicchi,et al.  Identifying cyber attacks via local model information , 2010, 49th IEEE Conference on Decision and Control (CDC).

[5]  Fan Bai,et al.  Reliability Analysis of DSRC Wireless Communication for Vehicle Safety Applications , 2006, 2006 IEEE Intelligent Transportation Systems Conference.

[6]  L. Spitzner,et al.  Honeypots: Tracking Hackers , 2002 .

[7]  Wenyuan Xu,et al.  Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study , 2010, USENIX Security Symposium.

[8]  Yunchuan Guo,et al.  Cyber Attacks Prediction Model Based on Bayesian Network , 2012, 2012 IEEE 18th International Conference on Parallel and Distributed Systems.

[9]  P. Barooah,et al.  Control of Large Vehicular Platoons: Improving Closed Loop Stability by Mistuning , 2007, 2007 American Control Conference.

[10]  G Naus,et al.  Cooperative adaptive cruise control, design and experiments , 2010, Proceedings of the 2010 American Control Conference.

[11]  Jiang Lu,et al.  Robust Cyber-Physical Systems: Concept, models, and implementation , 2016, Future Gener. Comput. Syst..

[12]  Richard M. Murray,et al.  Optimal LQG control across packet-dropping links , 2007, Syst. Control. Lett..

[13]  Ulf E. Larson,et al.  Securing vehicles against cyber attacks , 2008, CSIIRW '08.

[14]  Ellen van Nunen,et al.  Safety in the Face of Uncertainty , 2014, International Journal of Intelligent Transportation Systems Research.

[15]  Rolf Isermann,et al.  Process fault detection based on modeling and estimation methods - A survey , 1984, Autom..

[16]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[17]  Daniel W. C. Ho,et al.  Robust observer design for Itô stochastic time-delay systems via sliding mode control , 2006, Syst. Control. Lett..

[18]  S. Shankar Sastry,et al.  Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[19]  P. Barooah,et al.  Error Amplification and Disturbance Propagation in Vehicle Strings with Decentralized Linear Control , 2005, Proceedings of the 44th IEEE Conference on Decision and Control.

[20]  Delphine Bresch-Pietri,et al.  Adaptive trajectory tracking despite unknown input delay and plant parameters , 2009, Autom..

[21]  D. Helbing Traffic and related self-driven many-particle systems , 2000, cond-mat/0012229.

[22]  Maarten Steinbuch,et al.  String-Stable CACC Design and Experimental Validation: A Frequency-Domain Approach , 2010, IEEE Transactions on Vehicular Technology.

[23]  Ulf E. Larson,et al.  Simulated attacks on CAN buses: vehicle virus , 2008 .

[24]  M. Krstić Boundary Control of PDEs: A Course on Backstepping Designs , 2008 .

[25]  Richard M. Murray,et al.  State estimation over packet dropping networks using multiple description coding , 2006, Autom..

[26]  Xavier Litrico,et al.  Cyber Security of Water SCADA Systems—Part II: Attack Detection Using Enhanced Hydrodynamic Models , 2013, IEEE Transactions on Control Systems Technology.

[27]  Han-Shue Tan,et al.  Design and field testing of a Cooperative Adaptive Cruise Control system , 2010, Proceedings of the 2010 American Control Conference.

[28]  Mike McDonald,et al.  Car-following: a historical review , 1999 .

[29]  Yilin Mo,et al.  False Data Injection Attacks in Control Systems , 2010 .

[30]  Nitin H. Vaidya,et al.  A vehicle-to-vehicle communication protocol for cooperative collision warning , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..

[31]  Matti Valovirta,et al.  Experimental Security Analysis of a Modern Automobile , 2011 .

[32]  Ricardo G. Sanfelice,et al.  A hybrid observer with a continuous intersample injection in the presence of sporadic measurements , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[33]  G Rizzoni,et al.  Nonlinear parity equation based residual generation for diagnosis of automotive engine faults , 1995 .

[34]  Huajing Fang,et al.  Takagi-sugeno fuzzy-model-based fault detection for networked control systems with Markov delays , 2006, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[35]  Bruno Sinopoli,et al.  Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[36]  Xiongxi Zhang,et al.  Observer-based fault detection for stochastic delayed systems in network environment , 2014, Proceeding of the 11th World Congress on Intelligent Control and Automation.

[37]  Alvin S. Lim,et al.  An Empirical Study on Ad Hoc Performance of DSRC and Wi-Fi Vehicular Communications , 2013, Int. J. Distributed Sens. Networks.

[38]  Pietro Tesi,et al.  On resilient control of nonlinear systems under Denial-of-Service , 2014, 53rd IEEE Conference on Decision and Control.

[39]  Tamer Basar,et al.  Optimal control of dynamical systems over unreliable communication links , 2004 .

[40]  Christopher Edwards,et al.  On the Design of Sliding-Mode Static-Output-Feedback Controllers for Systems With State Delay , 2009, IEEE Transactions on Industrial Electronics.

[41]  Thomas M. Chen,et al.  Petri Net Modeling of Cyber-Physical Attacks on Smart Grid , 2011, IEEE Transactions on Smart Grid.

[42]  Prabir Barooah,et al.  Approximation error in PDE-based modelling of vehicular platoons , 2012, Int. J. Control.

[43]  Mashrur Chowdhury,et al.  A Review of Communication, Driver Characteristics, and Controls Aspects of Cooperative Adaptive Cruise Control (CACC) , 2016, IEEE Transactions on Intelligent Transportation Systems.

[44]  Nathan van de Wouw,et al.  Lp String Stability of Cascaded Systems: Application to Vehicle Platooning , 2014, IEEE Transactions on Control Systems Technology.

[45]  S. Shankar Sastry,et al.  Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.

[46]  João Pedro Hespanha,et al.  Mistuning-Based Control Design to Improve Closed-Loop Stability Margin of Vehicular Platoons , 2008, IEEE Transactions on Automatic Control.

[47]  Martijn C. Schut,et al.  Approximating safe spacing policies for adaptive cruise control strategies , 2011, 2011 IEEE Vehicular Networking Conference (VNC).

[48]  Subhrakanti Dey,et al.  Stability of Kalman filtering with Markovian packet losses , 2007, Autom..

[49]  A. Willsky,et al.  Observability of discrete event dynamic systems , 1990 .

[50]  Theodore L. Willke,et al.  A survey of inter-vehicle communication protocols and their applications , 2009, IEEE Communications Surveys & Tutorials.

[51]  Gábor Orosz,et al.  Digital Effects and Delays in Connected Vehicles: Linear Stability and Simulations , 2013 .

[52]  Hamed Mohsenian Rad,et al.  False data injection attacks with incomplete information against smart power grids , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[53]  Camille Alain Rabbath,et al.  Modeling of packet dropout for UAV wireless communications , 2012, 2012 International Conference on Computing, Networking and Communications (ICNC).

[54]  M. Shalini,et al.  Security Issues And Challenges For Cyber Physical System , 2018 .

[55]  Nader Meskin,et al.  Fault Diagnosis in a Network of Unmanned Aerial Vehicles with Imperfect Communication Channels , 2009 .

[56]  J. Gertler Fault detection and isolation using parity relations , 1997 .

[57]  Karl Henrik Johansson,et al.  Cyber security analysis of state estimators in electric power systems , 2010, 49th IEEE Conference on Decision and Control (CDC).

[58]  Hovav Shacham,et al.  Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.

[59]  Krishna R. Pattipati,et al.  An Integrated Diagnostic Development Process for Automotive Engine Control Systems , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[60]  J. Christian Gerdes,et al.  Integrating Inertial Sensors With Global Positioning System (GPS) for Vehicle Dynamics Control , 2004 .

[61]  E. Byres,et al.  The Myths and Facts behind Cyber Security Risks for Industrial Control Systems , 2004 .

[62]  Bruno Sinopoli,et al.  Kalman filtering with intermittent observations , 2004, IEEE Transactions on Automatic Control.

[63]  Delphine Bresch-Pietri,et al.  Delay-Adaptive Predictor Feedback for Systems With Unknown Long Actuator Delay $ $ , 2010, IEEE Transactions on Automatic Control.

[64]  João Pedro Hespanha,et al.  A Survey of Recent Results in Networked Control Systems , 2007, Proceedings of the IEEE.

[65]  André Teixeira,et al.  Networked control systems under cyber attacks with applications to power networks , 2010, Proceedings of the 2010 American Control Conference.

[66]  Karen A. Scarfone,et al.  Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .

[67]  Hao Ye,et al.  Fault diagnosis of networked control systems , 2007, Annu. Rev. Control..

[68]  Hyeongcheol Lee,et al.  A Study of Adaptive Cruise Control System to Improve Fuel Efficiency , 2017 .

[69]  Anuradha M. Annaswamy,et al.  Stable Adaptive Systems , 1989 .

[70]  D.K. Nilsson,et al.  An approach to specification-based attack detection for in-vehicle networks , 2008, 2008 IEEE Intelligent Vehicles Symposium.

[71]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2011, TSEC.

[72]  John Y. Hung,et al.  Denial of service attacks on network-based control systems: impact and mitigation , 2005, IEEE Transactions on Industrial Informatics.

[73]  Zhong-Hua Pang,et al.  Secure Networked Control Systems under Denial of Service Attacks , 2011 .

[74]  Quanyan Zhu,et al.  Resilient control of cyber-physical systems against Denial-of-Service attacks , 2013, 2013 6th International Symposium on Resilient Control Systems (ISRCS).

[75]  Pierluigi Pisu,et al.  A fuel economic model predictive control strategy for a group of connected vehicles in urban roads , 2015, 2015 American Control Conference (ACC).

[76]  Paul M. Frank,et al.  Fault diagnosis in dynamic systems using analytical and knowledge-based redundancy: A survey and some new results , 1990, Autom..

[77]  Bruno Sinopoli,et al.  Foundations of Control and Estimation Over Lossy Networks , 2007, Proceedings of the IEEE.

[78]  Nasser E. Nahi,et al.  Optimal recursive estimation with uncertain observation , 1969, IEEE Trans. Inf. Theory.

[79]  Nathan van de Wouw,et al.  Graceful degradation of CACC performance subject to unreliable wireless communication , 2013, 16th International IEEE Conference on Intelligent Transportation Systems (ITSC 2013).

[80]  G. Maciá-Fernández,et al.  Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..

[81]  E. Fridman,et al.  Control under Quantization, Saturation and Delay: An LMI Approach , 2008 .

[82]  Vadim I. Utkin,et al.  Sliding mode control in electromechanical systems , 1999 .

[83]  Xavier Litrico,et al.  Cyber Security of Water SCADA Systems—Part I: Analysis and Experimentation of Stealthy Deception Attacks , 2013, IEEE Transactions on Control Systems Technology.

[84]  Qing Wang,et al.  Robust fault detection and optimization for a network of unmanned vehicles with imperfect communication channels , 2014 .

[85]  Hamid Sharif,et al.  A Survey on Cyber Security for Smart Grid Communications , 2012, IEEE Communications Surveys & Tutorials.

[86]  Nathan van de Wouw,et al.  Cooperative Adaptive Cruise Control: Network-Aware Analysis of String Stability , 2014, IEEE Transactions on Intelligent Transportation Systems.

[87]  Xavier Litrico,et al.  Stealthy deception attacks on water SCADA systems , 2010, HSCC '10.

[88]  Ming Jiang,et al.  Modeling and estimation of networked control systems with time delays based on CTHMM , 2009, 2009 International Conference on Mechatronics and Automation.

[89]  Inseok Hwang,et al.  A Survey of Fault Detection, Isolation, and Reconfiguration Methods , 2010, IEEE Transactions on Control Systems Technology.

[90]  Steven E Shladover Effects of Cooperative Adaptive Cruise Control on Traffic Flow: Testing Drivers' Choices of Following Distances , 2009 .

[91]  Kenneth A. Loparo,et al.  Identification of time delays in linear stochastic systems , 1993 .

[92]  Emilia Fridman,et al.  Sliding mode control in the presence of input delay: A singular perturbation approach , 2012, Autom..

[93]  Jie Chen,et al.  Design of unknown input observers and robust fault detection filters , 1996 .

[94]  Hai Le Vu,et al.  Performance Analysis of the IEEE 802.11 MAC Protocol for DSRC Safety Applications , 2011, IEEE Transactions on Vehicular Technology.

[95]  R. K. Mehra,et al.  Correspondence item: An innovations approach to fault detection and diagnosis in dynamic systems , 1971 .