期刊文献+

A brief overview on secure control of networked systems 被引量:4

A brief overview on secure control of networked systems
原文传递
导出
摘要 This paper focuses on the issues of the security of networked control systems by summarizing recent progress in secure control of this research and application area. We mainly discuss existing results, especially in modeling issues, of three aspects: (1) attack mechanisms and their impacts on control systems, (2) the identification and design of attacks, and (3) secure estimation and control strategies. A conclusion is drawn at the end of this paper. In addition, several promising research tendencies of the development for secure control in networked control system are presented. This paper focuses on the issues of the security of networked control systems by summarizing recent progress in secure control of this research and application area. We mainly discuss existing results, especially in modeling issues, of three aspects: (1) attack mechanisms and their impacts on control systems, (2) the identification and design of attacks, and (3) secure estimation and control strategies. A conclusion is drawn at the end of this paper. In addition, several promising research tendencies of the development for secure control in networked control system are presented.
出处 《Advances in Manufacturing》 SCIE CAS CSCD 2017年第3期243-250,共8页 先进制造进展(英文版)
基金 This work was supported in part by the National Natural Science Foundation of China (Grant Nos. 61673255, 61263003 and 61273114) the International Corporation Project of Shanghai Science and Technology Commission (Grant No. 14510722500) the Program for Professor of Special Appointment (Eastern Scholar) at Shanghai Institutions of Higher Learning the Key Project of Science and Technology Commission of Shanghai Municipality (Grant No. 10JC1405000) A Project of Shandong Province Higher Educational Science and Technology Program (Grant No. J17KA084).
关键词 Networked control system SECURITY Attack·Estimation and control Networked control system · Security · Attack·Estimation and control
  • 相关文献

参考文献1

二级参考文献42

  • 1A. Teixeira, H. Sandberg, K. H. Johansson. Networked control systems under cyber attacks with applications to power networks. Proceedings of the American Control Conference, Maryland: IEEE, 2010:3690 - 3696.
  • 2S. Sundaram, M. Pajic, C. N. Hadjicostis, et al. The wireless control network: Monitoring for malicious behavior. IEEE Conference on Decision and Control, Atlanta: IEEE, 2010:5979 - 5984.
  • 3R. Chabukswar, Y. Mo, B. Sinopoli. Detecting integrity attacks on SCADA systems. Proceedings of the 18th IFAC World Congress, Milano: IEEE, 2014:11239 - 11244.
  • 4T. T. Kim, H. V. Poor. Strategic protection against data injection attacks on power grids. IEEE Transactions on Smart Grid, 2011, 2(2): 326 - 333.
  • 5B. Tang, L. D. Alvergue, G. Gu. Secure networked control systems against replay attacks without injecting authentication noise. Proceedings of the American Control Conference, Montreal: IEEE, 2012:60280 - 6036.
  • 6Y. Mo, R. Chabukswar, B. Sinopoli. Detecting integrity attacks on SCADA systems. IEEE Transactions on Control Systems Technology, 2013, 22 (4): 1396 - 1407.
  • 7F. Pasqualetti, F. Dorfler, F. Bullo. Attack detection and identification in cyber-physical systems. IEEE Transactions on Automatic Control, 2013, 22 (4): 1396 - 1407.
  • 8A. N. Bishop, A. V. Savkin. Set-valued state estimation and attack detection for uncertain descriptor systems. IEEE Signal Processing Letters, 2015, 20(11): 1102 - 1105.
  • 9M. Esmalifalak, G. Shi, Z. Han, et al. Bad data injection attack and defense in electricity market using game theory study. IEEE Transactions on Smart Grid, 2013, 4(1 ): 160 - 169.
  • 10F. Miao, M. Pajic, G. J. Pappas. Stochastic game approach for replay attack detection. I EEE Conference on Decision and Control, Firenze: IEEE, 2013:185,4 - 1859.

共引文献7

同被引文献45

引证文献4

二级引证文献36

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部