Please wait a minute...
 首页  期刊介绍 期刊订阅 联系我们
 
最新录用  |  预出版  |  当期目录  |  过刊浏览  |  阅读排行  |  下载排行  |  引用排行  |  百年期刊
Journal of Tsinghua University(Science and Technology)    2018, Vol. 58 Issue (1) : 14-19     DOI: 10.16511/j.cnki.qhdxxb.2018.22.003
COMPUTER SCIENCE AND TECHNOLOGY |
Synchronization control of cyber physical systems during malicious stochastic attacks
GAO Yang1, MA Yangyang1, ZHANG Liang1, WANG Meilin1, WANG Weiping2
1. China Information Technology Security Evaluation Center, Beijing 100085, China;
2. School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing 100083, China
Download: PDF(973 KB)  
Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks    
Abstract  Cyber physical systems (CPSs) exist in many modern infrastructure systems, such as the future smart grid, smart transportation networks, and public health systems. CPS security is critical for normal operation of our society. The physical layer networks and the cyber layer networks are all complex networks that are interdependent. A mathematical model is given for the interdependent systems during stochastic malicious attacks, which exist in both the physical layer networks and the cyber layer networks. In addition, an adaptive nonlinear controller is given to synchronize interdependent CPSs during malicious stochastic attacks. The controller uses the properties of a Weiner process for the physical layer networks to synchronize the interdependent CPSs. Numerical simulations show the effectiveness of the theoretical results.
Keywords cyber physical system      stochastic attack      synchronization control      adaptive nonlinear controller     
ZTFLH:  TP393.0  
Issue Date: 15 January 2018
Service
E-mail this article
E-mail Alert
RSS
Articles by authors
GAO Yang
MA Yangyang
ZHANG Liang
WANG Meilin
WANG Weiping
Cite this article:   
GAO Yang,MA Yangyang,ZHANG Liang, et al. Synchronization control of cyber physical systems during malicious stochastic attacks[J]. Journal of Tsinghua University(Science and Technology), 2018, 58(1): 14-19.
URL:  
http://jst.tsinghuajournals.com/EN/10.16511/j.cnki.qhdxxb.2018.22.003     OR     http://jst.tsinghuajournals.com/EN/Y2018/V58/I1/14
  
  
[1] 黎作鹏, 张天驰, 张菁. 信息物理融合系统(CPS)研究综述[J]. 计算机科学, 2011, 38(9):25-31. LI Z P, ZHANG T C, ZHANG J. Survey on the research of cyber-physical systems (CPS)[J]. Computer Science, 2011, 38(9):25-31. (in Chinese)
[2] 许少伦, 严正, 张良, 等. 信息物理融合系统的特性、架构及研究挑战[J]. 计算机应用, 2013, 33(S2):1-5. XU S L, YAN Z, ZHANG L, et al. Cyber physical systems:Features, architecture, and research challenges[J]. Journal of Computer Applications, 2013, 33(S2):1-5. (in Chinese)
[3] 施陈博, 苗权, 陈启鑫. 基于CPS的能源互联网关键技术与应用[J]. 清华大学学报(自然科学版), 2016, 56(9):930-936. SHI C B, MIAO Q, CHEN Q X. Key technology and application of the energy Internet based on cyber physical systems[J]. Journal of Tsinghua University (Science and Technology), 2016, 56(9):930-936. (in Chinese)
[4] DERLER P, LEE E A, VINCENTELLI A S. Modeling cyber-physical systems[J]. Proceedings of the IEEE, 2012, 100:13-28.
url: http://dx.doi.org/10.1109/JPROC.2011.2160929
[5] WAN K Y, MAN K L, HUGHES D, et al. Analyzing challenges and approaches for cyber-physical systems (CPS)[J]. Engineering Letters, 2010, 18(3):EL_18_3_14.
[6] 蒋国平, 樊春霞, 宋玉蓉, 等. 复杂动态网络同步控制及其在信息物理系统中的应用[J]. 南京邮电大学学报(自然科学版), 2010, 30(4):41-51.JIANG G P, FAN C X, SONG Y R, et al. Synchronization and control of complex dynamical networks with application in cyber-physical systems[J]. Journal of Nanjing University of Posts and Telecommunications (Natural Science), 2010, 30(4):41-51. (in Chinese)
[7] MILLS E. Hackers broke into FAA air traffic control system[N]. The Wall Street Journal, 2009-05-07(A6).
[8] LEAVITT N. Researchers fight to keep implanted medical devices safe from hackers[J]. Computer, 2010, 43(8):11-14.
[9] KOSCHER K, CZESKIS A, ROESNER F, et al. Experimental security analysis of a modern automobile[J]. IEEE Journal of Selected Topics in Quantum Electronics, 2010, 41(3):447-462.
[10] 彭昆仑, 彭伟, 王东霞, 等. 信息物理融合系统安全问题研究综述[J]. 信息网络安全, 2016(7):20-28.PENG K L, PENG W, WANG D X, et al. Research survey on security issues of cyber-physical systems[J]. Netinfo Security, 2016(7):20-28. (in Chinese)
[11] 张恒. 信息物理系统安全理论研究[D]. 杭州:浙江大学, 2015. ZHANG H. Research on security theory for cyber-physical systems[D]. Hangzhou:Zhejiang University, 2015. (in Chinese)
[12] 李钊, 彭勇, 谢丰, 等. 信息物理系统安全威胁与措施[J]. 清华大学学报(自然科学版), 2012, 52(10):1482-1487.LI Z, PENG Y, XIE F, et al. Security threats and measures for cyber physical systems[J]. Journal of Tsinghua University (Science and Technology), 2012, 52(10):1482-1487. (in Chinese)
[1] SHI Chenbo, MIAO Quan, CHEN Qixin. Key technology and application of the energy internet based on cyber physical systems[J]. Journal of Tsinghua University(Science and Technology), 2016, 56(9): 930-936,941.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
Copyright © Journal of Tsinghua University(Science and Technology), All Rights Reserved.
Powered by Beijing Magtech Co. Ltd