Resilient Tracking Control of Networked Control Systems Under Cyber Attacks

This article is concerned with the resilient tracking control of a networked control system under cyber attacks. The attacker is an active adversary whose aim is to severely degrade the tracking performance of the system by launching deception attacks on the sensor-to-controller communication channels and denial-of-service attacks on the controller-to-plant channels, respectively. First, a concept of resilient set-membership tracking control is presented, through which the system’s true state is guaranteed to reside in a bounding ellipsoidal set of the reference state regardless of the existence of attacks and unknown-but-bounded (UBB) noises. Second, in the case that full information of the system’s state is not implicitly trusted in the presence of attacks, a resilient set-membership estimation strategy is provided to secure the state estimates against the deception attacks. Furthermore, based on a recursive computation of a reference state ellipsoid and confidence state estimation ellipsoids, a convex optimization algorithm in terms of recursive linear matrix inequalities is proposed to obtain the gain parameters for both the desired resilient state estimator and the tracking controller. Finally, the effectiveness of the proposed method is illustrated through an Internet-based three-tank system.

[1]  Qing-Long Han,et al.  A Dynamic Event-Triggered Transmission Scheme for Distributed Set-Membership Estimation Over Wireless Sensor Networks , 2019, IEEE Transactions on Cybernetics.

[2]  Xiangpeng Xie,et al.  Resilient Event-Triggered Controller Synthesis of Networked Control Systems Under Periodic DoS Jamming Attacks , 2019, IEEE Transactions on Cybernetics.

[3]  Qing-Long Han,et al.  Variance-Constrained Distributed Filtering for Time-Varying Systems With Multiplicative Noises and Deception Attacks Over Sensor Networks , 2017, IEEE Sensors Journal.

[4]  Mo-Yuen Chow,et al.  Resilient Distributed Control in the Presence of Misbehaving Agents in Networked Control Systems , 2014, IEEE Transactions on Cybernetics.

[5]  Yuanqing Xia,et al.  Resilient control for wireless networked control systems under DoS attack via a hierarchical game , 2018, International Journal of Robust and Nonlinear Control.

[6]  Qing-Long Han,et al.  Distributed Krein space-based attack detection over sensor networks under deception attacks , 2019, Autom..

[7]  Kevin L. Moore,et al.  Studies on Resilient Control Through Multiagent Consensus Networks Subject to Disturbances , 2014, IEEE Transactions on Cybernetics.

[8]  Xunyuan Yin,et al.  Resilient Estimation for Networked Systems With Variable Communication Capability , 2016, IEEE Transactions on Automatic Control.

[9]  Qing-Long Han,et al.  Networked control systems: a survey of trends and techniques , 2020, IEEE/CAA Journal of Automatica Sinica.

[10]  Lei Guo,et al.  Resilient Control of Networked Control System Under DoS Attacks: A Unified Game Approach , 2016, IEEE Transactions on Industrial Informatics.

[11]  D. Bertsekas,et al.  Recursive state estimation for a set-membership description of uncertainty , 1971 .

[12]  Jianliang Wang,et al.  Reliable robust flight tracking control: an LMI approach , 2002, IEEE Trans. Control. Syst. Technol..

[13]  Fuwen Yang,et al.  A novel islanding fault detection for distributed generation systems , 2014 .

[14]  Yilin Mo,et al.  Attack-Resilient H_2, H_∞, and ℓ_1 State Estimator , 2018, 1803.07053.

[15]  Haibo He,et al.  Near-Optimal Tracking Control of Mobile Robots Via Receding-Horizon Dual Heuristic Programming , 2016, IEEE Transactions on Cybernetics.

[16]  Giorgio Battistelli,et al.  Distributed Joint Attack Detection and Secure State Estimation , 2018, IEEE Transactions on Signal and Information Processing over Networks.

[17]  Sonia Martínez,et al.  On the Performance Analysis of Resilient Networked Control Systems Under Replay Attacks , 2013, IEEE Transactions on Automatic Control.

[18]  Lei Guo,et al.  Resilient Control of Wireless Networked Control System Under Denial-of-Service Attacks: A Cross-Layer Design Approach , 2020, IEEE Transactions on Cybernetics.

[19]  Lihua Xie,et al.  The sector bound approach to quantized feedback control , 2005, IEEE Transactions on Automatic Control.

[20]  Emanuele Garone,et al.  False data injection attacks against state estimation in wireless sensor networks , 2010, 49th IEEE Conference on Decision and Control (CDC).

[21]  Qing-Long Han,et al.  Secure Distributed Finite-Time Filtering for Positive Systems Over Sensor Networks Under Deception Attacks , 2020, IEEE Transactions on Cybernetics.

[22]  Ji Huang,et al.  Robust Tracking Control of Networked Control Systems: Application to a Networked DC Motor , 2013, IEEE Transactions on Industrial Electronics.

[23]  Dai Shi Robust Reliable Tracking Control for a Class of Uncertain Systems and Its Application to Flight Control , 2006 .

[24]  Qusay H. Mahmoud,et al.  Cyber physical systems security: Analysis, challenges and solutions , 2017, Comput. Secur..

[25]  P. Olver Nonlinear Systems , 2013 .

[26]  Qing Wang,et al.  H∞ output tracking control for flight control systems with time-varying delay , 2013 .

[27]  Nicola Elia,et al.  Stabilization of linear systems with limited information , 2001, IEEE Trans. Autom. Control..

[28]  Giuseppe Carlo Calafiore,et al.  Robust filtering for discrete-time systems with bounded noise and parametric uncertainty , 2001, IEEE Trans. Autom. Control..

[29]  F. Schweppe Recursive state estimation: Unknown but bounded errors and system inputs , 1967 .

[30]  Quanyan Zhu,et al.  Resilient control of cyber-physical systems against Denial-of-Service attacks , 2013, 2013 6th International Symposium on Resilient Control Systems (ISRCS).

[31]  Ling Shi,et al.  Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach , 2015, IEEE Transactions on Automatic Control.

[32]  Anton van den Hengel,et al.  Semidefinite Programming , 2014, Computer Vision, A Reference Guide.

[33]  Yong Chen,et al.  Robust Tracking Control of Networked Control Systems With Communication Constraints and External Disturbance , 2017, IEEE Transactions on Industrial Electronics.

[34]  Donghua Zhou,et al.  Two-Channel False Data Injection Attacks Against Output Tracking Control of Networked Systems , 2016, IEEE Transactions on Industrial Electronics.

[35]  Paulo Tabuada,et al.  Secure State Estimation Against Sensor Attacks in the Presence of Noise , 2015, IEEE Transactions on Control of Network Systems.

[36]  Renquan Lu,et al.  Vision-Based Human Tracking Control of a Wheeled Inverted Pendulum Robot , 2016, IEEE Transactions on Cybernetics.

[37]  Jinde Cao,et al.  Observer-based tracking control for heterogeneous dynamical systems under asynchronous attacks , 2017, 2017 International Workshop on Complex Systems and Networks (IWCSN).

[38]  Hamidreza Modares,et al.  Resilient Autonomous Control of Distributed Multiagent Systems in Contested Environments , 2017, IEEE Transactions on Cybernetics.

[39]  Fuwen Yang,et al.  Set-Membership Filtering with State Constraints , 2009, IEEE Transactions on Aerospace and Electronic Systems.

[40]  Guoqiang Hu,et al.  Distributed Secure Coordinated Control for Multiagent Systems Under Strategic Attacks , 2017, IEEE Transactions on Cybernetics.

[41]  Fuwen Yang,et al.  Set-membership filtering for systems with sensor saturation , 2009, Autom..

[42]  Yang Liu,et al.  Fault-Tolerant Control for an Internet-Based Three-Tank System: Accommodation to Sensor Bias Faults , 2017, IEEE Transactions on Industrial Electronics.

[43]  Lihua Xie,et al.  Finite-Level Quantized Feedback Control for Linear Systems , 2009, Proceedings of the 45th IEEE Conference on Decision and Control.

[44]  Daniel W. C. Ho,et al.  Event-Based Tracking Control of Mobile Robot With Denial-of-Service Attacks , 2020, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[45]  Qing-Long Han,et al.  A Survey on Model-Based Distributed Control and Filtering for Industrial Cyber-Physical Systems , 2019, IEEE Transactions on Industrial Informatics.

[46]  Angelika Bayer,et al.  Ellipsoidal Calculus For Estimation And Control , 2016 .

[47]  R.K. Martin,et al.  Simulator for Velocity Gate Pull-Off electronic countermeasure techniques , 2008, 2008 IEEE Radar Conference.

[48]  Guo-Ping Liu,et al.  Design and Implementation of Secure Networked Predictive Control Systems Under Deception Attacks , 2012, IEEE Transactions on Control Systems Technology.

[49]  Qing-Long Han,et al.  Event-Based Set-Membership Leader-Following Consensus of Networked Multi-Agent Systems Subject to Limited Communication Resources and Unknown-But-Bounded Noise , 2017, IEEE Transactions on Industrial Electronics.

[50]  Jian Chen,et al.  Trifocal Tensor-Based Adaptive Visual Trajectory Tracking Control of Mobile Robots , 2017, IEEE Transactions on Cybernetics.