1. <button id="qm3rj"><thead id="qm3rj"></thead></button>
      <samp id="qm3rj"></samp>
      <source id="qm3rj"><menu id="qm3rj"><pre id="qm3rj"></pre></menu></source>

      <video id="qm3rj"><code id="qm3rj"></code></video>

        1. <tt id="qm3rj"><track id="qm3rj"></track></tt>
            1. 2.845

              2023影響因子

              (CJCR)

              • 中文核心
              • EI
              • 中國科技核心
              • Scopus
              • CSCD
              • 英國科學(xué)文摘

              留言板

              尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問(wèn)題, 您可以本頁(yè)添加留言。我們將盡快給您答復。謝謝您的支持!

              姓名
              郵箱
              手機號碼
              標題
              留言?xún)热?/th>
              驗證碼

              隱蔽攻擊下信息物理系統的安全輸出反饋控制

              張淇瑞 孟思琪 王蘭豪 劉坤 代偉

              張淇瑞, 孟思琪, 王蘭豪, 劉坤, 代偉. 隱蔽攻擊下信息物理系統的安全輸出反饋控制. 自動(dòng)化學(xué)報, 2024, 50(7): 1363?1372 doi: 10.16383/j.aas.c220893
              引用本文: 張淇瑞, 孟思琪, 王蘭豪, 劉坤, 代偉. 隱蔽攻擊下信息物理系統的安全輸出反饋控制. 自動(dòng)化學(xué)報, 2024, 50(7): 1363?1372 doi: 10.16383/j.aas.c220893
              Zhang Qi-Rui, Meng Si-Qi, Wang Lan-Hao, Liu Kun, Dai Wei. Secure output-feedback control for cyber-physical systems under stealthy attacks. Acta Automatica Sinica, 2024, 50(7): 1363?1372 doi: 10.16383/j.aas.c220893
              Citation: Zhang Qi-Rui, Meng Si-Qi, Wang Lan-Hao, Liu Kun, Dai Wei. Secure output-feedback control for cyber-physical systems under stealthy attacks. Acta Automatica Sinica, 2024, 50(7): 1363?1372 doi: 10.16383/j.aas.c220893

              隱蔽攻擊下信息物理系統的安全輸出反饋控制

              doi: 10.16383/j.aas.c220893
              基金項目: 江蘇省自然科學(xué)基金(BK20231062, BK20200086), 中央高?;究蒲袠I(yè)務(wù)費專(zhuān)項資金(2023QN1074), 國家自然科學(xué)基金(62373361, 61973306, 62273041, 52304309), 流程工業(yè)綜合自動(dòng)化國家重點(diǎn)實(shí)驗室聯(lián)合開(kāi)放基金(2020-KF-21-10, 2021-KF-21-05), 礦冶過(guò)程自動(dòng)控制技術(shù)國家重點(diǎn)實(shí)驗室開(kāi)放基金(BGRIMM-KZSKL-2022-7), 江蘇省研究生科研與實(shí)踐創(chuàng )新計劃(KYCX23_2717), 中國礦業(yè)大學(xué)研究生創(chuàng )新計劃項目(2023WLJCRCZL117)資助
              詳細信息
                作者簡(jiǎn)介:

                張淇瑞:中國礦業(yè)大學(xué)信息與控制工程學(xué)院副教授. 主要研究方向為信息物理系統的脆弱性分析, 安全控制和隱私保護. E-mail: qiruizhang@cumt.edu.cn

                孟思琪:中國礦業(yè)大學(xué)信息與控制工程學(xué)院碩士研究生. 主要研究方向為信息物理系統的安全控制. E-mail: siqimeng@cumt.edu.cn

                王蘭豪:中國礦業(yè)大學(xué)國家煤加工與潔凈化工程技術(shù)研究中心副教授. 主要研究方向為復雜工業(yè)過(guò)程的工藝參數檢測、優(yōu)化決策與智能控制. 本文通信作者. E-mail: wanglanhao888@163.com

                劉坤:北京理工大學(xué)自動(dòng)化學(xué)院研究員. 主要研究方向為網(wǎng)絡(luò )化控制理論與應用, 復雜網(wǎng)絡(luò )系統安全. E-mail: kunliubit@bit.edu.cn

                代偉:中國礦業(yè)大學(xué)信息與控制工程學(xué)院教授. 主要研究方向為復雜工業(yè)過(guò)程建模、運行優(yōu)化與控制. E-mail: weidai@cumt.edu.cn

              Secure Output-feedback Control for Cyber-physical Systems Under Stealthy Attacks

              Funds: Supported by Natural Science Foundation of Jiangsu Province (BK20231062, BK20200086), Fundamental Research Funds for the Central Universities (2023QN1074), National Natural Science Foundation of China (62373361, 61973306, 62273041, 52304309), Joint Open Foundation of State Key Laboratory of Synthetical Automation for Process Industries (2020-KF-21-10, 2021-KF-21-05), Open Foundation of State Key Laboratory of Process Automation in Mining and Metallurgy (BGRIMM-KZSKL-2022-7), Postgraduate Research & Practice Innovation Program of Jiangsu Province (KYCX23_2717), and Graduate Innovation Program of China University of Mining and Technology (2023WLJCRCZL117)
              More Information
                Author Bio:

                ZHANG Qi-Rui Associate professor at the School of Information and Control Engineering, China University of Mining and Technology. His research interest covers vulnerability analysis of cyber-physical systems, secure control, and privacy protection

                MENG Si-Qi Master student at the School of Information and Control Engineering, China University of Mining and Technology. Her main research interest is secure control of cyber-physical systems

                WANG Lan-Hao Associate professor at National Engineering Research Center of Coal Preparation and Purification, China University of Mining and Technology. His research interest covers process parameter detection, optimal decision making, and intelligent control of complex industrial process. Corresponding author of this paper

                LIU Kun Professor at the School of Automation, Beijing Institute of Technology. His research interest covers theory and applications of networked control, and security of complex networked systems

                DAI Wei Professor at the School of Information and Control Engineering, China University of Mining and Technology. His research interest covers modeling, operational optimization and control for complex industrial process

              • 摘要: 研究了受到隱蔽攻擊的信息物理系統(Cyber-physical system, CPS)安全控制問(wèn)題. 采用KL (Kullback-Leibler)散度描述攻擊的隱蔽性, 并設計動(dòng)態(tài)輸出反饋控制器, 使系統可達集始終保持在安全區域內, 其中可達集定義為系統狀態(tài)以一定概率屬于的集合. 首先, 給出隱蔽攻擊下檢測器殘差所在范圍的一個(gè)外橢球近似集; 其次, 根據該近似集和噪聲的范圍給出控制器參數與系統橢球形不變可達集的關(guān)系; 然后, 通過(guò)設計可逆線(xiàn)性變換并構造凸優(yōu)化問(wèn)題, 求解安全控制器參數和相應的不變可達集; 最后, 使用彈簧?質(zhì)量?阻尼系統進(jìn)行仿真, 驗證了所提控制方法的有效性.
              • 圖  1  不同a、b、c值下, 參數$\delta $和橢球形不變可達集體積的關(guān)系

                Fig.  1  Relationship between$\delta $and volume of ellipsoidal invariant reachable set with different a, b and c

                圖  2  不同a、b、c值下, 參數$\alpha $和橢球形不變可達集體積的關(guān)系

                Fig.  2  Relationship between$\alpha $and volume of ellipsoidal invariant reachable set with different a, b and c

                圖  3  不同a、b、c值下, 系統狀態(tài)的橢球形不變可達集

                Fig.  3  Ellipsoidal invariant reachable sets of system's state with different a, b and c

                圖  4  不同a、b、c值下, 參數$\alpha $和$ {\rm{Tr}}(Y)$的關(guān)系

                Fig.  4  Relationship between$\alpha $and$ {\rm{Tr}}(Y)$ with different a, b and c

                圖  5  未使用控制器和使用控制器式(5)、(6)時(shí),系統狀態(tài)的橢球形不變可達集

                Fig.  5  Ellipsoidal invariant reachable set of system's state without controller and with controller (5), (6)

                1. <button id="qm3rj"><thead id="qm3rj"></thead></button>
                  <samp id="qm3rj"></samp>
                  <source id="qm3rj"><menu id="qm3rj"><pre id="qm3rj"></pre></menu></source>

                  <video id="qm3rj"><code id="qm3rj"></code></video>

                    1. <tt id="qm3rj"><track id="qm3rj"></track></tt>
                        亚洲第一网址_国产国产人精品视频69_久久久久精品视频_国产精品第九页
                      1. [1] Derler P, Lee E A, Vincentelli A S. Modeling cyber-physical systems. Proceedings of the IEEE, 2012, 100(1): 13?28 doi: 10.1109/JPROC.2011.2160929
                        [2] 李洪陽(yáng), 魏慕恒, 黃潔, 邱伯華, 趙曄, 駱文城, 等. 信息物理系統技術(shù)綜述. 自動(dòng)化學(xué)報, 2019, 45(1): 37?50 doi: 10.16383/j.aas.2018.c180362

                        Li Hong-Yang, Wei Mu-Heng, Huang Jie, Qiu Bo-Hua, Zhao Ye, Luo Wen-Cheng, et al. Review of information physical systems technology. Acta Automatica Sinica, 2019, 45(1): 37?50 doi: 10.16383/j.aas.2018.c180362
                        [3] Kim S, Park K J, Lu C Y. A survey on network security for cyber-physical systems: From threats to resilient design. IEEE Communications Surveys & Tutorials, 2022, 24(3): 1534?1573
                        [4] 劉烴, 田決, 王稼舟, 吳宏宇, 孫利民, 周亞?wèn)|, 等. 信息物理融合系統綜合安全威脅與防御研究. 自動(dòng)化學(xué)報, 2019, 45(1): 5?24

                        Liu Ting, Tian Jue, Wang Jia-Zhou, Wu Hong-Yu, Sun Li-Min, Zhou Ya-Dong, et al. Research on integrated security threat and defense of information physical fusion system. Acta Automatica Sinica, 2019, 45(1): 5?24
                        [5] Duo W L, Zhou M C, Abusorrah A, Valente J, Faisal M, Ruths J, et al. A survey of cyber attacks on cyber physical systems: Recent advances and challenges. IEEE/CAA Journal of Automatica Sinica, 2022, 9(5): 784?800 doi: 10.1109/JAS.2022.105548
                        [6] Giraldo J, Urbina D, Cardenas A. A survey of physics-based attack detection in cyber-physical systems. ACM Computing Surveys, 2018, 51(4): Article No. 76
                        [7] Tan S, Guerrero J M, Xie P L, Han R K, Vasquez J C. Brief survey on attack detection methods for cyber-physical systems. IEEE Systems Journal, 2020, 14(4): 5329?5339 doi: 10.1109/JSYST.2020.2991258
                        [8] 楊超群, 張恒. 基于CBMeMBer濾波器的多攻擊檢測方法. 控制工程, 2022, 29(6): 1033?1039

                        Yang Chao-Qun, Zhang Heng. Multi-attack detection approach based on CBMeMBer filt. Control Engineering of China, 2022, 29(6): 1033?1039
                        [9] 穆超, 王鑫, 楊明, 張恒, 陳振婭, 吳曉明. 面向物聯(lián)網(wǎng)設備固件的硬編碼漏洞檢測方法. 網(wǎng)絡(luò )與信息安全學(xué)報, 2022, 8(5): 98?110

                        Mu Chao, Wang Xin, Yang Ming, Zhang Heng, Chen Zhen-Ya, Wu Xiao-Ming. Hard-coded vulnerability detection approach for IoT device firmware. Chinese Journal of Network and Information, 2022, 8(5): 98?110
                        [10] Zhang Q R, Liu K, Teixeira A, Li Y Z, Chai S C, Xia Y Q. An online Kullback-Leibler divergence-based stealthy attack against cyber-physical systems. IEEE Transactions on Automatic Control, 2022, 68(6): 3672?3679 doi: 10.1109/TAC.2022.3192201
                        [11] Zhang Q R, Liu K, Xia Y Q, Ma A Y. Optimal stealthy deception attack against cyber-physical systems. IEEE Transactions on Cybernetics, 2020, 50(9): 3963?3972 doi: 10.1109/TCYB.2019.2912622
                        [12] Zhang Q R, Liu K, Han D Y, Su G Z, Xia Y Q. Design of stealthy deception attacks with partial system knowledge. IEEE Transactions on Automatic Control, 2023, 68(2): 1069?1076 doi: 10.1109/TAC.2022.3146079
                        [13] Guo Z Y, Shi D W, Johansson K H, Shi L. Worst-case stealthy innovation-based linear attack on remote state estimation. Automatica, 2018, 89: 117?124 doi: 10.1016/j.automatica.2017.11.018
                        [14] Mo Y L, Sinopoli B. False data injection attacks in control systems. In: Proceedings of the 1st Workshop on Secure Control Systems. Stockholm, Sweden: IEEE, 2010. 1?6
                        [15] Kwon C, Liu W Y, Hwang I. Analysis and design of stealthy cyber attacks on unmanned aerial systems. Journal of Aerospace Information Systems, 2014, 11(8): 525?539 doi: 10.2514/1.I010201
                        [16] Sui T J, Mo Y L, Marelli D, Sun X M, Fu M Y. The vulnerability of cyber-physical system under stealthy attacks. IEEE Transactions on Automatic Control, 2020, 66(2): 637?650
                        [17] Sui T J, Sun X M. The vulnerability of distributed state estimator under stealthy attacks. Automatica, 2021, 133: Article No. 109869 doi: 10.1016/j.automatica.2021.109869
                        [18] Hu L, Wang Z D, Han Q L, Liu X H. State estimation under false data injection attacks: Security analysis and system protection. Automatica, 2018, 87: 176?183 doi: 10.1016/j.automatica.2017.09.028
                        [19] Xu W Y, Wang Z D, Hu L, Kurths J. State estimation under joint false data injection attacks: Dealing with constraints and insecurity. IEEE Transactions on Automatic Control, 2022, 62 (2): 6745?6753
                        [20] Jovanov I, Pajic M. Relaxing integrity requirements for attack-resilient cyber-physical systems. IEEE Transactions on Automa-tic Control, 2019, 64(12): 4843?4858 doi: 10.1109/TAC.2019.2898510
                        [21] Zhang T Y, Ye D. False data injection attacks with complete stealthiness in cyber-physical systems: A self-generated approach. Automatica, 2020, 120: Article No. 109117 doi: 10.1016/j.automatica.2020.109117
                        [22] Mo Y L, Sinopoli B. On the performance degradation of cyber-physical systems under stealthy integrity attacks. IEEE Transactions on Automatic Control, 2015, 61(9): 2618?2624
                        [23] Murguia C, Shames I, Ruths J. Security metrics and synthesis of secure control systems. Automatica, 2020, 115: Article No. 108757 doi: 10.1016/j.automatica.2019.108757
                        [24] Kwon C, Hwang I. Reachability analysis for safety assurance of cyber-physical systems against cyber attacks. IEEE Transactions on Automatic Control, 2018, 63(7): 2272?2279 doi: 10.1109/TAC.2017.2761762
                        [25] Liu H, Niu B, Qin J H. Reachability analysis for linear discrete-time systems under stealthy cyber attacks. IEEE Transactions on Automatic Control, 2021, 66(9): 4444?4451 doi: 10.1109/TAC.2021.3050549
                        [26] Zhang Q R, Liu K, Pang Z H, Xia Y Q, Liu T. Reachability analysis of cyber-physical systems under stealthy attacks. IEEE Transactions on Cybernetics, 2022, 52(6): 4926?4934 doi: 10.1109/TCYB.2020.3025307
                        [27] Hashemi N, Ruths J. Co-design for resilience and performance. IEEE Transactions on Control of Network Systems, 2022, 10(3): 1387?1399 doi: 10.1109/TCNS.2022.3229774
                        [28] Bai C Z, Pasqualetti F, Gupta V. Data-injection attacks in stochastic control systems: Detectability and performance trade-offs. Automatica, 2017, 82: 251?260 doi: 10.1016/j.automatica.2017.04.047
                        [29] Fang C R, Qi Y F, Chen J M, Tan R, Zheng W X. Stealthy actuator signal attacks in stochastic control systems: Performance and limitations. IEEE Transactions on Automatic Control, 2020, 65(9): 3927?3934 doi: 10.1109/TAC.2019.2950072
                        [30] Kullback S. Information Theory and Statistics. Chelmsford: Courier Corporation, 1997.
                        [31] Boyd S, El Ghaoui L, Feron E, Balakrishnan V. Linear Matrix Inequalities in System and Control Theory. Philadelphia: Society for Industry and Applied Mathematics, 1994.
                        [32] Diananda P H. A simple proof of the arithmetic mean geometric mean inequality. The American Mathematical Monthly, 1960, 67(10): Article No. 1007 doi: 10.2307/2309236
                        [33] 夏元清. 云控制系統及其面臨的挑戰. 自動(dòng)化學(xué)報, 2016, 42(1): 1?12

                        Xia Yuan-Qing. Cloud control systems and their challenges. Acta Automatica Sinica, 2016, 42(1): 1?12
                      2. 加載中
                      3. 圖(5)
                        計量
                        • 文章訪(fǎng)問(wèn)數:  1058
                        • HTML全文瀏覽量:  401
                        • PDF下載量:  146
                        • 被引次數: 0
                        出版歷程
                        • 收稿日期:  2022-11-16
                        • 錄用日期:  2023-03-21
                        • 網(wǎng)絡(luò )出版日期:  2023-04-11
                        • 刊出日期:  2024-07-23

                        目錄

                          /

                          返回文章
                          返回