Secure Control for Cyber-Physical Systems under Malicious Attacks

Journal Article (2021)
Author(s)

Chengwei Wu (Harbin Institute of Technology)

Weiran Yao (Harbin Institute of Technology)

W. Pan (TU Delft - Robot Dynamics)

Guanghui Sun (Harbin Institute of Technology)

Jianxing Liu (Harbin Institute of Technology)

Ligang Wu (Harbin Institute of Technology)

Research Group
Robot Dynamics
Copyright
© 2021 Chengwei Wu, Weiran Yao, W. Pan, Guanghui Sun, Jianxing Liu, Ligang Wu
DOI related publication
https://doi.org/10.1109/TCNS.2021.3094782
More Info
expand_more
Publication Year
2021
Language
English
Copyright
© 2021 Chengwei Wu, Weiran Yao, W. Pan, Guanghui Sun, Jianxing Liu, Ligang Wu
Research Group
Robot Dynamics
Issue number
2
Volume number
9 (2022)
Pages (from-to)
775-788
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

This article investigates the secure control problem for cyber-physical systems when the malicious data are injected into the cyber realm, which directly connects to the actuators. Based on moving target defense (MTD) and reinforcement learning, we propose a novel proactive and reactive defense control scheme. First, the system (A,B) is modeled as a switching system consisting of several controllable pairs (A,Bl) to facilitate the construction of the MTD control scheme. The controllable pairs (A,Bl) can be altered to update system dynamics under certain unpredictable switching probabilities for each subsystem, which can prevent the adversaries from effective attacks. Second, both attack detection and isolation schemes are designed to accurately locate and exclude the compromised actuators from a switching sequence. Third, a reinforcement learning algorithm based on the zero-sum game theory is proposed to design the defense control scheme when there exist no controllable subsystems to switch. To demonstrate the effectiveness of the defense control scheme, a three-tank system under unknown cyber attacks is illustrated.

Files

License info not available