导航

Acta Aeronautica et Astronautica Sinica ›› 2026, Vol. 47 ›› Issue (4): 332290.doi: 10.7527/S1000-6893.2025.32290

• Electronics and Electrical Engineering and Control • Previous Articles    

An adaptive control strategy for defending against cyber stealthy attacks

Xin HUANG1(), Jiahe ZOU1, Shuyi XIAO2, Xiaohang LI3   

  1. 1.School of Automation Engineering,Northeast Electric Power University,Jilin 132012,China
    2.College of Electrical and Power Engineering,Taiyuan University of Technology,Taiyuan 030024,China
    3.National Key Laboratory of Helicopter Dynamics/Helicopter Research Institute,Nanjing University of Aeronautics and Astronautics,Nanjing 210016,China
  • Received:2025-05-24 Revised:2025-08-11 Accepted:2025-09-17 Online:2025-09-25 Published:2025-09-24
  • Contact: Xin HUANG E-mail:huangxin@neepu.edu.cn
  • Supported by:
    National Natural Science Foundation of China(62573109);Natinal Natural Science Foundation of Jilin Province(YDZJ202201ZYTS379);Northeast Electric Power University Doctoral Research Initiation Fund(BSJXM-2021107);Shanxi Provincial Basic Research Program(202203021222101)

Abstract:

In the cyber-physical system, the uncertainty involves various unpredictable factors that the system encounters during operation. It affects the system performance and reliability, increases security threats faced by the system, and makes the system more vulnerable to attacks. Stealthy attacks can successfully bypass the detection of the anomaly detector, and maliciously destroy the control input signal and the sensor measurement signal transmitted via networks, resulting in the deterioration of the system performance. In order to defend against such cyber attacks, the stealth upper bound of the attacks is quantified by using the detection mechanism and the structural information of the attacks, and then an adaptive attack compensator is proposed, such that the controller equipped with the compensator can effectively reduce the impact of stealth attacks. Simulation results of the flight control system validate the developed control strategy.

Key words: cyber-physical system, uncertainty, stealthy attacks, adaptive control, flight control system

CLC Number: