{"title":"基于信号发生器的隐蔽攻击检测和安全控制","authors":"Xianghua Wang , Ali Zolghadri , Changqing Wang","doi":"10.1016/j.jfranklin.2024.107323","DOIUrl":null,"url":null,"abstract":"<div><div>The problem addressed in this paper is the monitoring and secure control in cyber–physical-systems subject to covert attacks. To reveal the covert attacks, an attack detection scheme by constructing signal generators in both cyber-layer and physical-layer is proposed. Different from the watermarking scheme, the dynamics of proposed signal generators are linear time invariant; also different from the moving target-based method, the proposed scheme does not need to rapidly alter the system dynamics. Moreover, the design parameter of signal generators can be chosen appropriately to guarantee the output tracking performance after the occurrence of attacks and before their detection. After the attack has been detected, the nominal output feedback controller is switched into a secure controller based on adaptive observer to ensure an output tracking performance level. Finally, numerical simulations are provided to show the effectiveness of the proposed scheme.</div></div>","PeriodicalId":17283,"journal":{"name":"Journal of The Franklin Institute-engineering and Applied Mathematics","volume":"361 18","pages":"Article 107323"},"PeriodicalIF":3.7000,"publicationDate":"2024-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Covert attack detection and secure control based on signal generator\",\"authors\":\"Xianghua Wang , Ali Zolghadri , Changqing Wang\",\"doi\":\"10.1016/j.jfranklin.2024.107323\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>The problem addressed in this paper is the monitoring and secure control in cyber–physical-systems subject to covert attacks. To reveal the covert attacks, an attack detection scheme by constructing signal generators in both cyber-layer and physical-layer is proposed. Different from the watermarking scheme, the dynamics of proposed signal generators are linear time invariant; also different from the moving target-based method, the proposed scheme does not need to rapidly alter the system dynamics. Moreover, the design parameter of signal generators can be chosen appropriately to guarantee the output tracking performance after the occurrence of attacks and before their detection. After the attack has been detected, the nominal output feedback controller is switched into a secure controller based on adaptive observer to ensure an output tracking performance level. Finally, numerical simulations are provided to show the effectiveness of the proposed scheme.</div></div>\",\"PeriodicalId\":17283,\"journal\":{\"name\":\"Journal of The Franklin Institute-engineering and Applied Mathematics\",\"volume\":\"361 18\",\"pages\":\"Article 107323\"},\"PeriodicalIF\":3.7000,\"publicationDate\":\"2024-10-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of The Franklin Institute-engineering and Applied Mathematics\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0016003224007440\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of The Franklin Institute-engineering and Applied Mathematics","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0016003224007440","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
Covert attack detection and secure control based on signal generator
The problem addressed in this paper is the monitoring and secure control in cyber–physical-systems subject to covert attacks. To reveal the covert attacks, an attack detection scheme by constructing signal generators in both cyber-layer and physical-layer is proposed. Different from the watermarking scheme, the dynamics of proposed signal generators are linear time invariant; also different from the moving target-based method, the proposed scheme does not need to rapidly alter the system dynamics. Moreover, the design parameter of signal generators can be chosen appropriately to guarantee the output tracking performance after the occurrence of attacks and before their detection. After the attack has been detected, the nominal output feedback controller is switched into a secure controller based on adaptive observer to ensure an output tracking performance level. Finally, numerical simulations are provided to show the effectiveness of the proposed scheme.
期刊介绍:
The Journal of The Franklin Institute has an established reputation for publishing high-quality papers in the field of engineering and applied mathematics. Its current focus is on control systems, complex networks and dynamic systems, signal processing and communications and their applications. All submitted papers are peer-reviewed. The Journal will publish original research papers and research review papers of substance. Papers and special focus issues are judged upon possible lasting value, which has been and continues to be the strength of the Journal of The Franklin Institute.