Please wait a minute...
 首页  期刊介绍 期刊订阅 联系我们
 
最新录用  |  预出版  |  当期目录  |  过刊浏览  |  阅读排行  |  下载排行  |  引用排行  |  百年期刊
Journal of Tsinghua University(Science and Technology)    2021, Vol. 61 Issue (11) : 1234-1239     DOI: 10.16511/j.cnki.qhdxxb.2021.21.008
VULNERABILITY ANALUSIS AND RISK ASSESSMENT |
Attack detection and security state estimation of cyber-physical systems
GAO Yang1, REN Wang1,3, WU Renpu1, WANG Weiping2, YI Shengwei1, HAN Baijing2
1. China Information Technology Security Evaluation Center, Beijing 100085, China;
2. School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing 100083, China;
3. College of Electronics and Information Engineering, Sichuan University, Chengdu 610065, China
Download: PDF(1777 KB)   HTML
Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks    
Abstract  In the Industry 4.0 context, cyber-physical systems (CPS) need effective security and control capabilities. This study analyzes attack detection and security state estimation based on a cyber-physical system model attacked by an actuator. The attack detection uses a finite time attack detector that ensures that existing attacks can be accurately detected within a preset time limit. An observer is then designed to estimate the system state. A theoretical analysis shows that the observer ensures that the system can immediately adjust when attacked and that the system will reach a safe, stable state. Simulations verify the effectiveness of this method.
Keywords cyber-physical systems      abnormal state detection      safe state estimation      detector      observer     
Issue Date: 19 October 2021
Service
E-mail this article
E-mail Alert
RSS
Articles by authors
GAO Yang
REN Wang
WU Renpu
WANG Weiping
YI Shengwei
HAN Baijing
Cite this article:   
GAO Yang,REN Wang,WU Renpu, et al. Attack detection and security state estimation of cyber-physical systems[J]. Journal of Tsinghua University(Science and Technology), 2021, 61(11): 1234-1239.
URL:  
http://jst.tsinghuajournals.com/EN/10.16511/j.cnki.qhdxxb.2021.21.008     OR     http://jst.tsinghuajournals.com/EN/Y2021/V61/I11/1234
  
  
  
[1] CONTI M, DAS S K, BISDIKIAN C, et al. Looking ahead in pervasive computing:Challenges and opportunities in the era of cyber-physical convergence[J]. Pervasive and Mobile Computing, 2012, 8:2-21.
[2] CHIEN D. Systems and methods for suppressing denial of service attacks:U.S. Patent 10,277,626[P]. 2019-04-30.
[3] LI B, XIAO G, LU R, et al. On feasibility and limitations of detecting false data injection attacks on power grid state estimation using D-FACTS devices[J]. IEEE Transactions on Industrial Informatics, 202016(2):854-864.
[4] TEIXEIRA A, AMIN S, SANDBERG H, et al. Cyber security analysis of state estimators in electric power systems[C]//49th IEEE Conference on Decision and Control. Atlanta GA, USA:IEEE Press, 2010:5991-5998.
[5] MO Y, SINOPOLI B. Secure control against replay attacks[C]//47th Annual Allerton Conference on Communication, Control, and Computing. Monticello IL USA:IEEE Press, 2010:911-918.
[6] 王萃清. 虚假数据注入攻击下信息物理系统的弹性控制[D]. 兰州:兰州理工大学, 2018.WANG C Q. Elastic control of information physical system under false data injection attack[D]. Lanzhou:Lanzhou University of Technology, 2018. (in Chinese)
[7] QIN J, LI M, SHI L, et al. Optimal denial-of-service attack scheduling with energy constraint over packet-dropping networks[J]. IEEE Transactions on Automatic Control, 2018, 63(6):1648-1663.
[8] 庄康熙, 孙子文. 针对工业信息物理系统中的拒绝服务攻击建立检测模型[J]. 控制理论与应用, 2020, 37(3):629-638.ZHUANG K X, SUN Z W. A detection model for denial of service attacks in industrial information physics systems[J]. Control Theory and Application, 2020, 37(3):629-638. (in Chinese)
[9] AO W, SONG Y, WEN C, et al. Finite time attack detection and supervised secure state estimation for CPSs with malicious adversaries[J]. Information Sciences, 2018, 451-452:67-82.
[10] CHONG M S, WAKAIKI M, HESPANHA J P. Observability of linear systems under adversarial attacks[C]//American Control Conference. Chicago IL, USA:IEEE Press, 2015:2439-2444.
[11] LU A, YANG G. Secure Luenberger-like observers for cyber-physical systems undersparse actuator and sensor attacks[J]. Automatica, 2018, 98:124-129.
[12] YASSER S, PIERLUIGI N, ALBERTO P, et al. Secure state estimation for cyber-physical systems under sensor attacks:A satisfiability modulo theory approach[J]. IEEE Transactions on Automatic Control, 2017, 62(10):4917-4932.
[13] WU C W, HU Z R, LIU J X, et al. Secure estimation for cyber-physical systems via sliding mode[J]. IEEE Transactions on Cybernetics, 2018, 48(12):3420-3431.
[14] LI Y, SHI L, CHEN T. Detection against linear deception attacks on multi-sensor remote state estimation[J]. IEEE Transactions on Control of Network Systems, 2017, 5(3):846-856.
[15] 敖伟. 信息物理系统中攻击检测与安全状态估计问题研究[D].重庆:重庆大学,2017.AO W. Research on attack detection and security state estimation in information physics system[D]. Chongqing:Chongqing University, 2017. (in Chinese)
[16] 汤奕, 李梦雅, 王琦, 等. 电力信息物理系统网络攻击与防御研究综述(二)检测与保护[J]. 电力系统自动化, 2019, 43(10):1-9.TANG Y, LI M Y, WANG Q, et al. Research review on network attack and defense of power information physical system (ii) detection and protection[J]. Power System Automation, 2019, 43(10):1-9. (in Chinese)
[17] YANG F, WILDE R W. Observers for linear systems with unknown inputs[J]. IEEE Transactions on Automatic Control, 1988, 33(7):677-681.
[18] FAIRMAN F W, MAHIL S S, LUK L. Disturbance decoupled observer design via singular value decomposition[J]. IEEE Transactions on Automatic Control, 1984, 29(1):84-86.
[19] SHOUKRY Y, TABUADA P. Event-triggered state observers for sparse sensor noise/attacks[J]. IEEE Transactions on Automatic Control, 2015, 61(8):2079-2091.
[1] ZHANG Qiuli, ZHANG Peng, JING Mingkun, ZENG Zhi, MA Hao. Cosmogenic radionuclides produced in high-purity germanium detectors during fabrication and transport[J]. Journal of Tsinghua University(Science and Technology), 2024, 64(1): 146-154.
[2] DONG Tailang, FENG Yulong, HUANG Wei, REN Depeng, WANG Zhihao, WANG Jianshan, CUI Yuhong. Abnormal phenomena of lunar dust transport near a light/dark junction region on the lunar surface[J]. Journal of Tsinghua University(Science and Technology), 2023, 63(3): 433-448.
[3] WANG Xiaoguang, WU Jun, LIN Qi. Kinematics analysis and control of under-constrained cable-driven parallel suspension systems[J]. Journal of Tsinghua University(Science and Technology), 2021, 61(3): 193-201.
[4] BAI Zhaole, ZHOU Qi, YANG Nan, LIU Feng, YANG Zhongjian, CHEN Baowei, WANG Jianlong. Scintillation neutron detectors based on a wavelength-shifting optical fiber using 232Th+ZnS(Ag)[J]. Journal of Tsinghua University(Science and Technology), 2018, 58(6): 558-562.
[5] ZHENG Jun, LI Wenqing. Calibration of 3-D measurement system based on a double position sensitive detectors[J]. Journal of Tsinghua University(Science and Technology), 2018, 58(4): 411-416.
[6] WANG Li, DU Qiang, KANG Kejun, YUE Qian. Stability test and efficiency calibration of a gadolinium-loaded liquid scintillation detector[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(7): 768-773.
[7] XU Limin, ZHANG Tao. Dual channel spacecraft attitude control method based on an external disturbance observer[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(6): 631-636.
[8] LI Fang, YE Peiqing, YAN Leyang, ZHANG Hui. Repetitive sliding mode observer for disturbance estimation of a linear motor system[J]. Journal of Tsinghua University(Science and Technology), 2016, 56(6): 626-632.
[9] FENG Chuqing, SHEN Qi, KANG Kejun, XING Yuxiang. Energy calibration of photon counting detectors using a single monochromatic source[J]. Journal of Tsinghua University(Science and Technology), 2016, 56(6): 672-676.
[10] SHI Han, PENG Qiyu, XU Jianfeng, DU Dong. GATE simulation based light sharing detector optimization[J]. Journal of Tsinghua University(Science and Technology), 2016, 56(2): 200-205.
[11] WANG Zhirui, ZHANG Xudong, XU Jia. Radial velocity estimation based on Radon transforms for SAR images of moving ground targets[J]. Journal of Tsinghua University(Science and Technology), 2015, 55(8): 860-865.
[12] YU Hao, GONG Hui, WANG Yongqiang, WANG Xuewu, LI Jianmin, LI Yuanjing, KANG Kejun. Readout electronics for position sensitive boron coated straw detector[J]. Journal of Tsinghua University(Science and Technology), 2015, 55(6): 691-694.
[13] JIANG Wenxue, ZHOU Kai. Precise feedback linearization in EMS systems based on a disturbance observer[J]. Journal of Tsinghua University(Science and Technology), 2015, 55(10): 1067-1071.
[14] Yi DU,Xiangang WANG,Xincheng XIANG. An exponential-type weighting function for CT reconstruction with a displaced detector array[J]. Journal of Tsinghua University(Science and Technology), 2015, 55(1): 115-121.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
Copyright © Journal of Tsinghua University(Science and Technology), All Rights Reserved.
Powered by Beijing Magtech Co. Ltd