A zonotopic set-invariance analysis of replay attacks affecting the supervisory layer

Systems and Control Letters - Tập 157 - Trang 105056 - 2021
Carlos Trapiello1,2, Vicenç Puig1,2, Damiano Rotondo3
1Advanced Control Systems Group, Automatic Control Department, Universitat Politècnica de Catalunya (UPC), Rambla Sant Nebridi 10, Terrassa 08222, Spain
2Institut de Robòtica i Informàtica Industrial, CSIC-UPC, Llorens i Artigas 4-6, Barcelona 08028, Spain
3Department of Electrical and Computer Engineering (IDE), University of Stavanger (UiS), Kristine Bonnevies vei 22, 4021 Stavanger, Norway

Tài liệu tham khảo

Sánchez, 2019, Bibliographical review on cyber attacks from a control oriented perspective, Annu. Rev. Control, 48, 103, 10.1016/j.arcontrol.2019.08.002 Teixeira, 2015, A secure control framework for resource-limited adversaries, Automatica, 51, 135, 10.1016/j.automatica.2014.10.067 Pasqualetti, 2013, Attack detection and identification in cyber-physical systems, IEEE Trans. Automat. Control, 58, 2715, 10.1109/TAC.2013.2266831 Cárdenas, 2008, Research challenges for the security of control systems. Hashemi, 2018, A comparison of stealthy sensor attacks on control systems, 973 Liu, 2011, False data injection attacks against state estimation in electric power grids, ACM Trans. Inf. Syst. Secur., 14, 13, 10.1145/1952982.1952995 Teixeira, 2012, Revealing stealthy attacks in control systems, 1806 Smith, 2011, A decoupled feedback structure for covertly appropriating networked control systems, IFAC Proc. Vol., 44, 90, 10.3182/20110828-6-IT-1002.01721 Mo, 2009, Secure control against replay attacks, 911 Miao, 2013, Stochastic game approach for replay attack detection, 1854 Ferrari, 2017, Detection and isolation of replay attacks through sensor watermarking, IFAC-PapersOnLine, 50, 7363, 10.1016/j.ifacol.2017.08.1502 Fang, 2020, Optimal periodic watermarking schedule for replay attack detection in cyber–physical systems, Automatica, 112, 10.1016/j.automatica.2019.108698 Zhu, 2013, On the performance analysis of resilient networked control systems under replay attacks, IEEE Trans. Automat. Control, 59, 804, 10.1109/TAC.2013.2279896 Zhu, 2013, On distributed constrained formation control in operator–vehicle adversarial networks, Automatica, 49, 3571, 10.1016/j.automatica.2013.09.031 Mohan, 2020, A comprehensive review of the cyber-attacks and cyber-security on load frequency control of power systems, Energies, 13, 3860, 10.3390/en13153860 Stoican, 2011 Murguia, 2020, Security metrics and synthesis of secure control systems, Automatica, 115, 10.1016/j.automatica.2019.108757 Kontouras, 2018, Set-theoretic detection of data corruption attacks on cyber physical power systems, J. Mod. Power Syst. Clean Energy, 6, 872, 10.1007/s40565-018-0452-y Lucia, 2016, A set-theoretic approach for secure and resilient control of cyber-physical systems subject to false data injection attacks, 1 Franzè, 2019, Resilient control for cyber-physical systems subject to replay attacks, IEEE Control Syst. Lett., 3, 984, 10.1109/LCSYS.2019.2920507 Blanchini, 2008 Le, 2013 Kühn, 1998, Rigorously computed orbits of dynamical systems without the wrapping effect, Computing, 61, 47, 10.1007/BF02684450 Kolmanovsky, 1998, Theory and computation of disturbance invariant sets for discrete-time linear systems, Math. Probl. Eng., 4, 10.1155/S1024123X98000866 Blanchini, 1999, Set invariance in control, Automatica, 35, 1747, 10.1016/S0005-1098(99)00113-2 Franklin, 2002 Combastel, 2015, Zonotopes and Kalman observers: Gain optimality under distinct uncertainty paradigms and robust convergence, Automatica, 55, 265, 10.1016/j.automatica.2015.03.008 Alamo, 2005, Guaranteed state estimation by zonotopes, Automatica, 41, 1035, 10.1016/j.automatica.2004.12.008 Wang, 2018, Interval observer design for uncertain discrete-time linear systems, Systems Control Lett., 116, 41, 10.1016/j.sysconle.2018.04.003 Scott, 2014, Input design for guaranteed fault diagnosis using zonotopes, Automatica, 50, 1580, 10.1016/j.automatica.2014.03.016 Dobkin, 1993, Computing the intersection-depth of polyhedra, Algorithmica, 9, 518, 10.1007/BF01190153 Johansson, 2000, The quadruple-tank process: A multivariable laboratory process with an adjustable zero, IEEE Trans. Control Syst. Technol., 8, 456, 10.1109/87.845876 Olaru, 2010, Positive invariant sets for fault tolerant multisensor control schemes, Internat. J. Control, 83, 2622, 10.1080/00207179.2010.535215 Rakovic, 2005, Invariant approximations of the minimal robust positively invariant set, IEEE Trans. Automat. Control, 50, 406, 10.1109/TAC.2005.843854 Caro, 2004 Althoff, 2010, Computing reachable sets of hybrid systems using a combination of zonotopes and polytopes, Nonlinear Anal. Hybrid Syst., 4, 233, 10.1016/j.nahs.2009.03.009