Secure Networked Control Systems

Author(s):  
Henrik Sandberg ◽  
Vijay Gupta ◽  
Karl H. Johansson

Cyber-vulnerabilities are being exploited in a growing number of control systems. As many of these systems form the backbone of critical infrastructure and are becoming more automated and interconnected, it is of the utmost importance to develop methods that allow system designers and operators to do risk analysis and develop mitigation strategies. Over the last decade, great advances have been made in the control systems community to better understand cyber-threats and their potential impact. This article provides an overview of recent literature on secure networked control systems. Motivated by recent cyberattacks on the power grid, connected road vehicles, and process industries, a system model is introduced that covers many of the existing research studies on control system vulnerabilities. An attack space is introduced that illustrates how adversarial resources are allocated in some common attacks. The main part of the article describes three types of attacks: false data injection, replay, and denial-of-service attacks. Representative models and mathematical formulations of these attacks are given along with some proposed mitigation strategies. The focus is on linear discrete-time plant models, but various extensions are presented in the final section, which also mentions some interesting research problems for future work. Expected final online publication date for the Annual Review of Control, Robotics, and Autonomous Systems, Volume 5 is May 2022. Please see http://www.annualreviews.org/page/journal/pubdates for revised estimates.

Author(s):  
Liruo Zhang ◽  
Sing Kiong Nguang ◽  
Shen Yan

This paper investigates the event-triggered H∞ control for networked control systems under the denial-of-service (DoS) attacks. First, a novel system model is established considering random, time-constraint DoS attacks. Second, an event-triggered scheme including an off-time is proposed to reduce the unnecessary occupation of network resources, with which a prescribed minimum inter-triggering time is guaranteed and Zeno problem is avoided. Third, sufficient conditions for the existence of an event-triggered controller which ensures the exponential stability of the closed-loop system with desired H∞ performance are formulated in linear matrix inequalities (LMIs). Finally, the effectiveness of the proposed method is examined by two illustrative examples, where a real communication network based on the ZigBee protocol is utilized.


2019 ◽  
Vol 356 (5) ◽  
pp. 2723-2741 ◽  
Author(s):  
Yanfei Zhu ◽  
Fuwen Yang ◽  
Chuanjiang Li ◽  
Yilian Zhang ◽  
Qing-Long Han

Sign in / Sign up

Export Citation Format

Share Document