In the cyber-physical system, the uncertainty involves various unpredictable factors that the system encounters during operation. It affects the system performance and reliability, increases security threats faced by the system, and makes the system more vulnerable to attacks. Stealthy attacks can successfully bypass the detection of the anomaly detector, and maliciously destroy the control input signal and the sensor measurement signal transmitted via networks, resulting in the deterioration of the system performance. In order to defend against such cyber attacks, the stealth upper bound of the attacks is quantified by using the detection mechanism and the structural information of the attacks, and then an adaptive attack compensator is proposed, such that the controller equipped with the compensator can effectively re-duce the impact of stealth attacks. Finally, simulation results of the flight control system validate the developed control strategy.
[1]李小杭, 张志虎, 宋春林, 等.虚假数据注入攻击下的自适应补偿控制[J].兵工学报, 2020, 41(11):2260-2265
[2]LI X H, ZHANG Z H, SONG C L, et al.Adaptive compensation control under false data injection attack[J].Acta Armamentarii, 2020, 41(11):2260-2265
[3]黄鑫, 畅晨旭, 李小杭, 苏庆宇.基于协同交互型观测器的虚假数据注入攻击信号重构方法[J].兵工学报, 2023, 44(11):3359-3368
[4]HUANG X, CHANG C X, LI X H, SU Q Y.An Approach for Reconstructing False Data Injection Attack Signal Based on Cooperative Interaction Observer[J].Acta Armamentarii, 2023, 44(11):3359-3368
[5]REN X X, YANG G H.Adaptive control for nonlinear cyber-physical systems under false data injection at-tacks through sensor networks[J].International Journal of Robust and Nonlinear Control, 2020, 30(1):65-79
[6]李笑宇,冯肖雪,潘峰,等.网络攻击下无人机信息物理系统的自适应状态估计[J].航空学报, 2022, 43(3):437-450
[7]LI X Y, FENG X X, PAN F, et al.Adaptive state estimate for unmanned aircraft cyber-physical system with cyber attack[J].Acta Aeronautica et Astronautica Sini-ca, 2022, 43(3):437-450
[8]高煜欣,张绍杰,刘春生.网络攻击下导弹自适应事件触发制导律[J].航空学报, 2024, 45(S1):464-473
[9]GAO Y X, ZHANG S J, LIU C, S.Adaptive event-triggered guidance law of missile under cyber at-tacks[J].Acta Aeronautica et Astronautica Sinica, 2024, 45(S1):464-473
[10]HUANG X, DONG J.Reliable cooperative control and plug-and-play operation for networked heterogeneous systems under cyber-physical attacks[J].ISA Transactions, 2020, 104(0):62-72
[11]LU A Y, YANG G H.Secure Luenberger-like observers for cyber-physical systems under sparse actuator and sensor attacks[J].Automatica, 2018, 98(0):124-129
[12]LIANG L, LIU S.Event-triggered distributed attack detection and fault diagnosis[J].IEEE Transactions on Instrumentation and Measurement, 2022, 72(0):1-11
[13]DUO W, ZHOU C M, ABUSORRAH A.A Survey of cyber attacks on cyber physical systems: Recent Ad-vances and Challenges[J].IEEECAA Journal of Au-tomatica Sinica, 2022, 9(05):784-800
[14]SU Q, FAN Z, LONG Y, et al.Attack detection and secure state estimation for cyber-physical systems with finite-frequency observers[J].Journal of the Franklin Institute, 2020, 357(17):12724-12741
[15]SUI T, MO Y, MARELLI D, et al.The vulnerability of cyber-physical system under stealthy attacks[J].IEEE Transactions on Automatic Control, 2020, 66(2):637-650
[16]李进, 姜顺, 潘丰.隐蔽式攻击下网络化控制系统状态与故障的联合区间估计[J].控制与决策, 2023, 38(12):3418-3426
[17]LI J, JIANG S, PAN F.Joint interval estimation of state and fault for networked control systems under stealthy attacks[J].Control and Decision, 2023, 38(12):3418-3426
[18]张淇瑞, 孟思琪, 王兰豪, 等.隐蔽攻击下信息物理系统的安全输出反馈控制[J].自动化学报, 2024, 50(7):1363-1372
[19]ZHANG Q R, MENG S Q, WANG L H, et al.Secure output feedback control of cyber-physical systems un-der stealthy attacks[J].Acta Automatica Sinica, 2024, 50(7):1363-1372
[20]SUI T, SUN X M.The vulnerability of distributed state estimator under stealthy attacks[J].Automatica, 2021, 133(0):109869-109869
[21]CHENG P, YANG Z, CHEN J, et al.An event-based stealthy attack on remote state estimation[J].IEEE Transactions on Automatic Control, 2019, 65(10):4348-4355
[22]ZHANG Q, LIU K, XIA Y, et al.Optimal stealthy de-ception attack against cyber-physical systems[J].IEEE transactions on cybernetics, 2019, 50(9):3963-3972
[23]JIN X, HADDAD W M, YUCELEN T.An adaptive con-trol architecture for mitigating sensor and actuator at-tacks in cyber-physical systems[J].IEEE Transactions on Automatic Control, 2017, 62(11):6058-6064
[24]LI J, YANG D, SU Q, et al.Reliable control of cyber-physical systems under state attack: An adaptive inte-gral sliding-mode control approach[J].IET Control Theory & Applications, 2024, 18(1):27-39
[25]LU S Y, JIN X Z, WANG H, et al.Robust adaptive estimation and tracking control for perturbed cyber-physical systems against denial of service[J].Applied Mathematics and Computation, 2021, 404(0):126255-126255
[26]LIAN Y, YANG Q, XIE W, et al.Cyber-physical system-based heuristic planning and scheduling method for multiple automatic guided vehicles in logistics sys-tems[J].IEEE Transactions on Industrial Informatics, 2020, 17(11):7882-789
[27]ZHANG J, SHI P, XIA Y.Robust adaptive sliding-mode control for fuzzy systems with mismatched uncertain-ties[J].IEEE Transactions on Fuzzy Systems, 2010, 18(4):700-711
[28]EUGENE L, KEVIN W, HOWE D.Robust and adaptive control with aerospace applications.[J].England: Springer-Verlag London, 2013, 0(0):299-299
[29]CHEN Y, SOUMMYA K.Dynamic attack detection in cyber-physical systems with side initial state infor-mation[J].IEEE Transactions on Automatic Control, 2017, 62(9):4618-4624