A journal of IEEE and CAA , publishes high-quality papers in English on original theoretical/experimental research and development in all areas of automation
Volume 7 Issue 4
Jun.  2020

IEEE/CAA Journal of Automatica Sinica

  • JCR Impact Factor: 11.8, Top 4% (SCI Q1)
    CiteScore: 17.6, Top 3% (Q1)
    Google Scholar h5-index: 77, TOP 5
Turn off MathJax
Article Contents
Kritika Bansal and Pankaj Mukhija, "Aperiodic Sampled-Data Control of Distributed Networked Control Systems Under Stochastic Cyber-Attacks," IEEE/CAA J. Autom. Sinica, vol. 7, no. 4, pp. 1064-1073, July 2020. doi: 10.1109/JAS.2020.1003249
Citation: Kritika Bansal and Pankaj Mukhija, "Aperiodic Sampled-Data Control of Distributed Networked Control Systems Under Stochastic Cyber-Attacks," IEEE/CAA J. Autom. Sinica, vol. 7, no. 4, pp. 1064-1073, July 2020. doi: 10.1109/JAS.2020.1003249

Aperiodic Sampled-Data Control of Distributed Networked Control Systems Under Stochastic Cyber-Attacks

doi: 10.1109/JAS.2020.1003249
More Information
  • This paper examines the stabilization problem of a distributed networked control system under the effect of cyber-attacks by employing a hybrid aperiodic triggering mechanism. The cyber-attack considered in the paper is a stochastic deception attack at the sensor-controller end. The probability of the occurrence of attack on a subsystem is represented using a random variable. A decentralized hybrid sampled-data strategy is introduced to save energy consumption and reduce the transmission load of the network. In the proposed decentralized strategy, each subsystem can decide independently whether its state should be transmitted to the controller or not. The scheme of the hybrid triggering mechanism for each subsystem composed of two stages: In the first stage, the next sampling instant is computed using a self-triggering strategy. Subsequently, in the second stage, an event-triggering condition is checked at these sampling instants and the control signal is computed only if the event-triggering condition is violated. The self-triggering condition used in the first stage is dependent on the selection of event-triggering condition of the second stage. Finally, a comparison of the proposed approach with other triggering mechanisms existing in the literature is presented in terms of the sampling instants, transmission frequency and performance measures through simulation examples.

     

  • loading
  • [1]
    X. Ge, F. Yang, and Q.-L. Han, “Distributed networked control systems: A brief overview,” Information Sciences, vol. 380, pp. 117–131, 2017. doi: 10.1016/j.ins.2015.07.047
    [2]
    X. Zhang, Q. Han, and X. Yu, “Survey on recent advances in networked control systems,” IEEE Trans. Industrial Informatics, vol. 12, no. 5, pp. 1740–1752, Oct. 2016. doi: 10.1109/TII.2015.2506545
    [3]
    F. Pasqualetti, F. Dorfler, and F. Bullo, “Control-theoretic methods for cyberphysical security: Geometric principles for optimal cross-layer resilient control systems,” IEEE Control Systems Magazine, vol. 35, no. 1, pp. 110–127, Feb. 2015. doi: 10.1109/MCS.2014.2364725
    [4]
    C. De Persis and P. Tesi, “Input-to-state stabilizing control under denialof-service,” IEEE Trans. Automatic Control, vol. 60, no. 11, pp. 2930–2944, Nov. 2015. doi: 10.1109/TAC.2015.2416924
    [5]
    G. Wu, J. Sun, and J. Chen, “Optimal data injection attacks in cyberphysical systems,” IEEE Trans. Cybernetics, vol. 48, no. 12, pp. 3302–3312, Dec. 2018. doi: 10.1109/TCYB.2018.2846365
    [6]
    Y. Chen, S. Kar, and J. M. F. Moura, “Cyber-physical systems: Dynamic sensor attacks and strong observability, ” in Proc. IEEE Int. Conf. Acoustics, Speech and Signal Processing, 2015, pp. 1752–1756.
    [7]
    L. Wei and J. Liu, “Stabilization for networked control systems under stochastic cyber-attacks, ” in Proc. 36th Chinese Control Conf., 2017, pp. 8020–8025.
    [8]
    M. Fattahi and A. Afshar, “Resilient sampled-data control of networked control systems against cyber attacks, ” Int. J. Dynamics and Control, 2018.
    [9]
    X. Ge, Q.-L. Han, M. Zhong, and X.-M. Zhang, “Distributed krein space-based attack detection over sensor networks under deception attacks,” Automatica, vol. 109, pp. 108557, 2019. doi: 10.1016/j.automatica.2019.108557
    [10]
    A. Teixeira, H. Sandberg, and K. H. Johansson, “Networked control systems under cyber attacks with applications to power networks, ” in Proc. 2010 American Control Conf., Jun. 2010, pp. 3690–3696.
    [11]
    H. Zhang, P. Cheng, L. Shi, and J. Chen, “Optimal DoS attack scheduling in wireless networked control system,” IEEE Trans. Control Systems Technology, vol. 24, no. 3, pp. 843–852, May 2016. doi: 10.1109/TCST.2015.2462741
    [12]
    Z. Feng, G. Hu, and G. Wen, “Distributed consensus tracking for multi-agent systems under two types of attacks,” Int. J. Robust and Nonlinear Control, vol. 26, no. 5, pp. 896–918, 2016. doi: 10.1002/rnc.3342
    [13]
    M. Mazo and P. Tabuada, “On event-triggered and self-triggered control over sensor/actuator networks, ” in Proc. 47th IEEE Conf. Decision and Control, Dec. 2008, pp. 435–440.
    [14]
    K.-E. Åarzén, “A simple event-based PID controller, ” in Proc. 14th IFAC World Congr., vol. 32, no. 2, pp. 8687–8692, Beijing, China, 1999.
    [15]
    M. S. Mahmoud and M. Sabih, “Networked event-triggered control: an introduction and research trends,” Int. J. General Systems, vol. 43, no. 8, pp. 810–827, 2014. doi: 10.1080/03081079.2014.908190
    [16]
    C. Peng and F. Li, “A survey on recent advances in event-triggered communication and control,” Information Sciences, vol. 457–458, pp. 113–125, 2018. doi: 10.1016/j.ins.2018.04.055
    [17]
    X. Wang and M. D. Lemmon, “Event-triggering in distributed networked control systems,” IEEE Trans. Automatic Control, vol. 56, no. 3, pp. 586–601, Mar. 2011. doi: 10.1109/TAC.2010.2057951
    [18]
    Z. Zhong, Y. Zhu, and H. Lam, “Asynchronous piecewise outputfeedback control for large-scale fuzzy systems via distributed eventtriggering schemes,” IEEE Trans. Fuzzy Systems, vol. 26, no. 3, pp. 1688–1703, Jun. 2018. doi: 10.1109/TFUZZ.2017.2744599
    [19]
    J. Liu, E. Tian, X. Xie, and H. Lin, “Distributed event-triggered control for networked control systems with stochastic cyber-attacks,” J. Franklin Institute-Engineering and Applied Mathematics, vol. 356, no. 17, pp. 10260–10276, 2019. doi: 10.1016/j.jfranklin.2018.01.048
    [20]
    J. Liu, L. Wei, X. Xie, E. Tian, and S. Fei, “Quantized stabilization for T-S fuzzy systems with hybrid-triggered mechanism and stochastic cyber-attacks,” IEEE Trans. Fuzzy Systems, vol. 26, no. 6, pp. 3820–3834, Dec. 2018. doi: 10.1109/TFUZZ.2018.2849702
    [21]
    A.-Y. Lu and G.-H. Yang, “Event-triggered secure observer-based control for cyber-physical systems under adversarial attacks,” Information Sciences, vol. 420, pp. 96–109, 2017. doi: 10.1016/j.ins.2017.08.057
    [22]
    X. Ge, Q. Han, X. Zhang, L. Ding, and F. Yang, “Distributed event-triggered estimation over sensor networks: A survey,” IEEE Trans. Cybernetics, vol. 50, no. 3, pp. 1306–1320, Mar. 2020. doi: 10.1109/TCYB.2019.2917179
    [23]
    Y. Fan, L. Liu, G. Feng, and Y. Wang, “Self-triggered consensus for multi-agent systems with zeno-free triggers,” IEEE Trans. Automatic Control, vol. 60, no. 10, pp. 2779–2784, Oct. 2015. doi: 10.1109/TAC.2015.2405294
    [24]
    X. Wang and M. D. Lemmon, “Self-triggered feedback control systems with finite-gain L 2 stability,” IEEE Trans. Automatic Control, vol. 54, no. 3, pp. 452–467, Mar. 2009. doi: 10.1109/TAC.2009.2012973
    [25]
    U. Tiberi and K. Johansson, “A simple self-triggered sampler for nonlinear systems,” in Proc. 4th IFAC Conf. Analysis and Design of Hybrid Systems, vol. 45, no. 9, pp. 76–81, 2012,
    [26]
    M. Xing, F. Deng, and X. Zhao, “Synchronization of stochastic complex dynamical networks under self-triggered control,” Int. J. Robust and Nonlinear Control, vol. 27, no. 16, pp. 2861–2878, 2017. doi: 10.1002/rnc.3716
    [27]
    Y. Yan, M. Xia, A. Rahnama, and P. Antsaklis, “A passivity-based self-triggered strategy for cyber physical systems under denial-of-service attack, ” in Proc. 56th Annual Conf. Decision and Control, Dec. 2017, pp. 6082–6087.
    [28]
    D. Senejohnny, P. Tesi, and C. De Persis, “A jamming-resilient algorithm for self-triggered network coordination,” IEEE Trans. Control of Network Systems, vol. 5, no. 3, pp. 981–990, Sep. 2018. doi: 10.1109/TCNS.2017.2668901
    [29]
    M. Kishida, M. Kögel, and R. Findeisen, “Combined event- and self-triggered control approach with guaranteed finite-gain L2 stability for uncertain linear systems,” IET Control Theory Applications, vol. 11, no. 11, pp. 1674–1683, 2017. doi: 10.1049/iet-cta.2016.1263
    [30]
    K. Bansal and P. Mukhija, “A hybrid aperiodic sampled-data strategy for distributed networked control system, ” in Proc. 2019 12th Asian Control Conf., Jun. 2019, pp. 1577–1582.
    [31]
    Z. Zhan, M. Xu, and S. Xu, “Characterizing honeypot-captured cyber attacks: Statistical framework and case study,” IEEE Trans. Information Forensics and Security, vol. 8, no. 11, pp. 1775–1789, 2013. doi: 10.1109/TIFS.2013.2279800
    [32]
    T. Li, X. Tang, H. Zhang, and S. Fei, “Improved event-triggered control for networked control systems under stochastic cyber-attacks,” Neurocomputing, vol. 350, pp. 33–43, 2019. doi: 10.1016/j.neucom.2019.03.058
    [33]
    J. Liu, J. Xia, E. Tian, and S. Fei, “Hybrid-driven-based H1 filter design for neural networks subject to deception attacks,” Applied Mathematics and Computation, vol. 320, pp. 158–174, 2018. doi: 10.1016/j.amc.2017.09.007
    [34]
    L. Wei and J. Liu, “Stabilization for networked control systems under stochastic cyber-attacks, ” in Proc. IEEE 2017 36th Chinese Control Conf., 2017, pp. 8020–8025.
    [35]
    S. Boyd, L. El Ghaoui, E. Feron, and V. Balakrishnan, Linear Matrix Inequalities in System and Control Theory. Society for Industrial and Applied Mathematics, 1994.
    [36]
    H. K. Khalil, Nonlinear Systems, 3rd ed. Upper Saddle River, NJ: Prentice-Hall, 2000.
    [37]
    K. Tanaka and M. Sano, “A robust stabilization problem of fuzzy control systems and its application to backing up control of a truck-trailer,” IEEE Trans. Fuzzy Systems, vol. 2, no. 2, pp. 119–134, May 1994. doi: 10.1109/91.277961
    [38]
    M. Guinaldo, D. V. Dimarogonas, K. H. Johansson, J. Sánchez, and S. Dormido, “Distributed event-based control for interconnected linear systems, ” in Proc. 50th IEEE Conf. Decision and Control and European Control Conf., Dec. 2011, pp. 2553–2558.

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(10)  / Tables(6)

    Article Metrics

    Article views (890) PDF downloads(55) Cited by()

    Highlights

    • A hybrid aperiodic sampled-data mechanism for distributed networked control systems under stochastic deception attacks is introduced to alleviate the problem of computational load, energy consumption and communication load. The proposed strategy combines self-triggering and event-triggering strategies.
    • A more general attack scenario on distributed networked control systems is considered whereby stochastic deception attacks of different intensity on different subsystems may occur.
    • The implementation of self-triggering strategy alone for distributed networked control systems under attack is also presented.
    • The analysis of the proposed strategy for an isolated system is presented as a special case. Also, minimum inter-event time is obtained for an isolated system under deception attack.

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return