期刊文献+

欺骗攻击下网络化系统事件触发安全控制 被引量:5

Event-Triggered Secure Control for Networked Systems Under Deception Attacks
下载PDF
导出
摘要 针对网络控制系统受欺骗攻击问题,提出了事件触发器与安全控制器协同设计策略。提出了离散事件触发机制,克服了连续事件触发机制需要新增专用硬件且需要复杂计算避免芝诺现象局限。建立了有机融合欺骗攻击、事件触发机制、网络诱导延时及外部扰动多约束参数的闭环系统时滞模型,推导出了欺骗攻击下事件触发控制系统渐近稳定的充分条件,得到了事件触发器与安全控制器的协同设计条件。仿真验证了方法的有效性。 As for networked control systems under deception attacks,a co-design strategy of event-triggered mechanism and secure controller is proposed.Firstly,a discrete-time event-triggered mechanism is introduced,which overcomes limits of continuous-time event-triggered mechanism requiring dedicated hardware and complex Zeno-avoidance computation.Secondly,a time-delay closed-loop system model is built,which integrates parameters of deception attacks,event-triggered mechanism,network-induced delays and external disturbances in a unified framework.Then,sufficient conditions for asymptotic stability of the attacked event-triggered systems are derived,and the co-design scheme of event-triggered mechanism and secure controller is presented.Finally,simulation confirms the proposed methods.
作者 李富强 郜丽赛 郑宝周 谷小青 LI Fuqiang;GAO Lisai;ZHENG Baozhou;GU Xiaoqing(College of Science,Henan Agricultural University,Zhengzhou 450002,China;School of Mechatronics Engineering and Automation,Shanghai Key Laboratory of Power Station Automation Technology,Shanghai University,Shanghai 200444,China)
出处 《计算机工程与应用》 CSCD 北大核心 2021年第5期264-270,共7页 Computer Engineering and Applications
基金 国家自然科学基金(61703146) 河南省科技攻关项目(202102110126) 河南省高等学校青年骨干教师项目(2020GGJS048) 河南省教育厅重点科研项目(19A413009) 河南农业大学科技创新项目(KJCX2016A09,KJCX2015A17)。
关键词 网络控制系统 欺骗攻击 事件触发机制 渐近稳定 协同设计 networked control system deception attack event-triggered mechanism asymptotic stability co-design
  • 相关文献

参考文献5

二级参考文献108

  • 1陈星,贾卓生.工业控制网络的信息安全威胁与脆弱性分析与研究[J].计算机科学,2012,39(S2):188-190. 被引量:29
  • 2高永生,赵杰,蔡鹤皋.基于多智能体的多机器人网络控制体系[J].计算机工程,2006,32(22):14-16. 被引量:4
  • 3Wilhiot K.Who’s really attacking your ICS equipmeent[R].Silicon Valley:Trend Micro Incorporated,2013.
  • 4Stouffer K,Pillitteri V,Lightman S,et al.SP800-82 Guideto indudstrial control systems security[S].Gaithersburg:NIST,2015-05.
  • 5戴汝为.工业控制系统信息安全联盟致辞[R].北京:工业控制信息安全联盟,2014.
  • 6卢慧康.工业控制系统脆弱性测试与风险评估研究[D].上海:华东理工大学,2013:12-13.
  • 7Hadziosmanovic D,Bolzoni D,Etalley S,et al.Challengesand opportunities in securing industrial control system[C]//Proceedings of 2012 IEEE Workshop on Complexity inEngineering,2012:1-2.
  • 8Bezukladnikov I I,Kon E L.Method to counter the threat of covert channels in LonWorks-based industrial controlsystems[C]//Proceedings of the 9th International Conferenceon Application of Information and CommunicationTechnologies(AICT),14-16 Oct,2015:173-177.
  • 9Ashford W.Industrial control system:What are the securitychallenges?[R].London:Tech Target,2014.
  • 10Colella A.Industrial control system cyber threats indicatorsin smart grid technology[C]//Proceedings of the InternationalConference on Network-Based Information Systems,2014:374-380.

共引文献64

同被引文献60

引证文献5

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部