2018
DOI: 10.1002/rnc.4236
|View full text |Cite
|
Sign up to set email alerts
|

Observer‐based attack‐resilient control for linear systems against FDI attacks on communication links from controller to actuators

Abstract: For the adversarial attacks on the communication links from the controller to the actuators, most of the existing attack-resilient control results focus on denial-of-service attacks. Unlike the existing results, this paper studies the observer-based attack-resilient control problem for linear systems with false data injection attacks and process disturbances. Due to limited resources, the malicious attacker is assumed to only manipulate a certain number of communication links from the controller to the actuato… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
26
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 40 publications
(26 citation statements)
references
References 43 publications
0
26
0
Order By: Relevance
“…When the sensor and actuator attacks are frequency constrained, the reliable control problem for CPSs was studied in the work of Huang and Dong . Considering the attacks on communication links from controllers to actuators, the observer‐based attack‐resilient control architecture for linear systems was proposed in the work of Xie and Yang . In addition, the state estimation problem against sensor attacks was considered in the works of Yang et al However, these methods are mostly implemented for linear systems.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…When the sensor and actuator attacks are frequency constrained, the reliable control problem for CPSs was studied in the work of Huang and Dong . Considering the attacks on communication links from controllers to actuators, the observer‐based attack‐resilient control architecture for linear systems was proposed in the work of Xie and Yang . In addition, the state estimation problem against sensor attacks was considered in the works of Yang et al However, these methods are mostly implemented for linear systems.…”
Section: Introductionmentioning
confidence: 99%
“…the observer-based attack-resilient control architecture for linear systems was proposed in the work of Xie and Yang. 15 In addition, the state estimation problem against sensor attacks was considered in the works of Yang et al 16,17 However, these methods are mostly implemented for linear systems.…”
mentioning
confidence: 99%
“…3,4 Therefore, how to curb cyber attacks has become an urgent issue. [5][6][7][8][9] As we all know, cyber attacks can be mainly classified into three categories: denial of service (DoS) attacks, 10,11 deception attacks, 12,13 and replay attacks. 14 For instance, a resilient dynamic event-triggered controller was designed to cope with the DoS attacks.…”
Section: Introductionmentioning
confidence: 99%
“…By exploiting the game theory, the resilience of networked control systems and wireless networked control systems subject to DoS attacks was analyzed in the works of Yuan et al Moreover, in the work of Zhao et al, the design, implementation, and impact evaluation of undetectable attacks were discussed via a geometric approach. For linear system under the false data injection attacks, an observer‐based control strategy with an attack‐resilient performance was presented in the work of Xie and Yang . A dynamic output feedback controller was given for discrete‐time stochastic nonlinear systems subject to deception attacks in the work of Ding et al The robustness of the networked cooperative systems against the malicious injections was improved via competitive interaction of the cloud network with the original systems in the work of Gusrialdi et al A data‐driven sliding‐mode compensator was developed in the work of Huang et al such that the effect of the actuator attacks on CPSs was eliminated.…”
Section: Introductionmentioning
confidence: 99%
“…For linear system under the false data injection attacks, an observer-based control strategy with an attack-resilient performance was presented in the work of Xie and Yang. 26 A dynamic output feedback controller was given for discrete-time stochastic nonlinear systems subject to deception attacks in the work of Ding et al 27 The robustness of the networked cooperative systems against the malicious injections was improved via competitive interaction of the cloud network with the original systems in the work of Gusrialdi et al 28 A data-driven sliding-mode compensator was developed in the work of Huang et al 29 such that the effect of the actuator attacks on CPSs was eliminated. The adaptive control policy was developed to mitigate the sensor and actuator attacks in the works of Jin et al 30 and An and Yang,31 and in order to resist the frequency-constrained sensor and actuator attacks, the proposed control equipped with an adaptive attack compensator could guarantee the stability of CPSs in the work of Huang and Dong.…”
Section: Introductionmentioning
confidence: 99%