Communications in Nonlinear Science and Numerical Simulation, Год журнала: 2024, Номер unknown, С. 108423 - 108423
Опубликована: Ноя. 1, 2024
Язык: Английский
Communications in Nonlinear Science and Numerical Simulation, Год журнала: 2024, Номер unknown, С. 108423 - 108423
Опубликована: Ноя. 1, 2024
Язык: Английский
IEEE Transactions on Cybernetics, Год журнала: 2023, Номер 53(10), С. 6714 - 6724
Опубликована: Март 27, 2023
Security is a crucial issue for cyber-physical systems, and has become hot topic up to date. From the perspective of malicious attackers, this article aims devise an efficient scheme on false data-injection (FDI) attacks such that performance remote state estimation degraded as much possible. First, event-based stealthy FDI attack mechanism introduced selectively inject data while evading residual-based anomaly detector. Compared with some existing methods, main advantage it decides when launch dynamically according real-time residuals. Second, error covariance compromised system used evaluate degradation under attacks, larger covariance, more degradation. Moreover, stealthiness constraints, optimal strategy presented maximize trace covariance. Finally, simulation experiments are carried out illustrate superiority proposed method compared ones.
Язык: Английский
Процитировано
27Sustainable Energy Grids and Networks, Год журнала: 2024, Номер 38, С. 101347 - 101347
Опубликована: Март 15, 2024
Язык: Английский
Процитировано
14IEEE/CAA Journal of Automatica Sinica, Год журнала: 2023, Номер 10(5), С. 1181 - 1191
Опубликована: Май 1, 2023
This paper investigates the security issue of multi-sensor remote estimation systems. An optimal stealthy false data injection (FDI) attack scheme based on historical and current residuals, which only tampers with measurement residuals partial sensors due to limited resources, is proposed maximally degrade system performance. The stealthiness condition given, then error covariance in compromised state derived quantify performance under attack. strategy obtained by solving several convex optimization problems maximize trace subject condition. Moreover, constraint selection principle attacked sensor provided determine so as hold most impact Finally, simulation results are presented verify theoretical analysis.
Язык: Английский
Процитировано
22Journal of the Franklin Institute, Год журнала: 2023, Номер 360(8), С. 5910 - 5927
Опубликована: Апрель 13, 2023
Язык: Английский
Процитировано
15International Journal of Systems Science, Год журнала: 2023, Номер 54(13), С. 2608 - 2625
Опубликована: Авг. 18, 2023
AbstractThis work considers an innovation-based attack policy in cyber-physical systems with multiple channels. The linear deception only allows the partial channels to be compromised at each step due energy constraint Compared existing results single channel, matrices and positions are time-varying this work. For multi-channel under constraint, is designed determine optimal locations degrade estimation performance of system most extent. Then, it proved that achieving equivalent solving a limited optimisation problem 0–1 programming problem, respectively. Furthermore, simulated examples presented illustrate developed results.Keywords: Cyber-physical (CPSs)strictly stealthy attacksmultiple channelsenergy constraintremote state estimationKalman filters Disclosure statementNo potential conflict interest was reported by author(s).Data availability statementThe authors confirm data supporting findings study available within article its supplementary materials.Additional informationFundingThis supported part Funds National Natural Science Foundation China [grant number 62103089], Liaoning province 2022-BS-178].Notes on contributorsSheng-Sheng DongSheng-Sheng Dong received B.S. degree automation from University Technology Liaoning, Anshan, China, 2021. He currently pursuing M.S. control theory engineering Shenyang Technology, Shenyang, China. current research interests focus security systems.Yi-Gang LiYi-Gang Li born 1992. Northeastern University, 2014, 2017 Ph.D. From September 2021 until now, he joined School Artificial Intelligence, as lecturer. His include CPSs security, attacks design remote estimation.Liwei AnLiwei An degrees Mathematics, Navigation, Guidance Control 2016 2020, Postdoctoral Research Fellow College Information Engineering, adaptive control, distributed optimisation, unmanned privacy systems. honorable mention Guan Zhao-Zhi Best Paper Award 39th Chinese Conference 2020.
Язык: Английский
Процитировано
12Journal of the Franklin Institute, Год журнала: 2025, Номер unknown, С. 107594 - 107594
Опубликована: Фев. 1, 2025
Язык: Английский
Процитировано
0International Journal of Systems Science, Год журнала: 2023, Номер 54(10), С. 2073 - 2088
Опубликована: Июнь 10, 2023
AbstractThis paper addresses the output tracking control problem for networked systems with plant-model mismatch, where two-channel random network delays are considered. According to different ways of obtaining future commands, two predictive (NPC) methods designed. One is NPC method using one-way time delays, called ONPC, and other round-trip RNPC. Furthermore, they compared in terms way compensation prediction process, communication load, respectively. Then, closed-loop stability conditions RNPC system ONPC mismatch match cases derived, their performance also theoretically analysed. Finally, results theoretical analysis verified through numerical simulation that illustrates effectiveness proposed as well separate advantages.Keywords: Networked systemsnetworked controlnetwork delaysplant-model mismatchtracking Disclosure statementNo potential conflict interest was reported by author(s).Data availability statementThe authors confirm data supporting findings this study available within article.Additional informationFundingThis work supported National Natural Science Foundation China [grant numbers 62173002, 61925303, 62088101, U20B2073, 61720106011], Beijing number 4222045], Key Research Development Program U20B2073], 2018YFC0809700].Notes on contributorsZhong-Hua PangProfessor Zhong-Hua Pang received B.Eng. degree automation M.Eng. theory engineering from Qingdao University Technology, China, 2002 2005, respectively, Ph.D. Institute Automation, Chinese Academy Sciences, 2011. He a Postdoctoral Fellow Tsinghua University, Sept. 2011 Feb. 2014, Visiting Scholar at South Wales, UK, Nov. 2016 Oct. 2017, Swinburne Australia, Jul. 2019 Aug. Jan. 2020 Mar. 2020. Since he has been North first an Associate Professor since 2017 Professor. His research interests include systems, multi-agent security cyber-physical data-driven systems.Tong MuTong Mu electrical City Qingdao, science currently pursuing Beijing, China. current control, control.Fang-Yuan HouFang-Yuan Hou 2013 2016, 2020, she Defence Industry Secrecy Examination Certification Center engineer. Her industrial systems.Yuntao ShiProfessor Yuntao Shi electronic instrument measurement Shenyang Ligong Shenyang, 1998, Electric Power 2003, 2006. visited Department Automation 2009 Sheffield Harlem Britain 2010 visiting scholar. supervisor School Electrical Control Engineering, dean Engineering director Laboratory Fieldbus Technology Automation. fault-tolerant microgrid risk-averse cloud & intelligent decision.Jian SunProfessor Jian Sun Jilin 2001, mechatronical Changchun Optics, Fine Mechanics Physics, Sciences (CAS), 2004, CAS, 2007. From 2008 2009, Glamorgan, UK. 2007 2010, In joined 2013. time-delay systems. Editorial Board Member IEEE Transactions Systems, Man Cybernetics: Journal Systems Complexity.
Язык: Английский
Процитировано
8Energy, Год журнала: 2024, Номер 304, С. 132102 - 132102
Опубликована: Июнь 19, 2024
Язык: Английский
Процитировано
2IEEE Transactions on Circuits & Systems II Express Briefs, Год журнала: 2023, Номер 71(1), С. 206 - 210
Опубликована: Авг. 4, 2023
This paper studies the security issue of remote state estimation cyber-physical systems under replay attacks, where measurement residual is computed in smart sensors and then transmitted to a estimator. Firstly, compromised error covariance derived analyze effect attacks on system performance. Next, estimate based coding detection scheme proposed, which utilizes information encode decode residual. Compared with existing works, developed only uses information, not introduces extra information. Furthermore, design principle matrix deduced for sake being able assist residual-based detector successfully expose such attacks. Finally, simulation results are provided verify performance effectiveness scheme.
Язык: Английский
Процитировано
6World Journal of Advanced Research and Reviews, Год журнала: 2023, Номер 18(3), С. 053 - 078
Опубликована: Июнь 6, 2023
Software development security refers to the practice of integrating measures and considerations throughout software lifecycle ensure confidentiality, integrity, availability systems. It involves identifying, mitigating, eliminating vulnerabilities threats that could be exploited by attackers. The goal this paper is survey various concepts methodologies directed towards security, identification any missing gaps. Based on findings, it noted secure requires a proactive comprehensive approach. begins with establishing design principles incorporating requirements from initial stages development. Here, coding practices, such as input validation, output encoding, authentication authorization mechanisms, are employed prevent common vulnerabilities. In addition, regular testing, including penetration testing vulnerability scanning, helps identify address potential weaknesses in software. Normally, code reviews audits conducted adherence practices flaws. important training awareness programs provided developers other stakeholders foster security-conscious culture. To minimize vulnerabilities, configuration management, which properly configuring servers, networks, dependencies may utilized. On hand, updates patching essential known components. guide their organizations follow established standards frameworks ISO 27001 or NIST Cybersecurity Framework. By prioritizing can protect sensitive data, unauthorized access, mitigate risk breaches incidents. long run, build trust users stakeholders, enhances reputation software, reduces impact incidents organization.
Язык: Английский
Процитировано
5