Electronics and Electrical Engineering and Control

An adaptive control strategy for defending against cyber stealthy attacks

  • Xin HUANG ,
  • Jiahe ZOU ,
  • Shuyi XIAO ,
  • Xiaohang LI
Expand
  • 1.School of Automation Engineering,Northeast Electric Power University,Jilin 132012,China
    2.College of Electrical and Power Engineering,Taiyuan University of Technology,Taiyuan 030024,China
    3.National Key Laboratory of Helicopter Dynamics/Helicopter Research Institute,Nanjing University of Aeronautics and Astronautics,Nanjing 210016,China

Received date: 2025-05-24

  Revised date: 2025-08-11

  Accepted date: 2025-09-17

  Online published: 2025-09-24

Supported by

National Natural Science Foundation of China(62573109);Natinal Natural Science Foundation of Jilin Province(YDZJ202201ZYTS379);Northeast Electric Power University Doctoral Research Initiation Fund(BSJXM-2021107);Shanxi Provincial Basic Research Program(202203021222101)

Abstract

In the cyber-physical system, the uncertainty involves various unpredictable factors that the system encounters during operation. It affects the system performance and reliability, increases security threats faced by the system, and makes the system more vulnerable to attacks. Stealthy attacks can successfully bypass the detection of the anomaly detector, and maliciously destroy the control input signal and the sensor measurement signal transmitted via networks, resulting in the deterioration of the system performance. In order to defend against such cyber attacks, the stealth upper bound of the attacks is quantified by using the detection mechanism and the structural information of the attacks, and then an adaptive attack compensator is proposed, such that the controller equipped with the compensator can effectively reduce the impact of stealth attacks. Simulation results of the flight control system validate the developed control strategy.

Cite this article

Xin HUANG , Jiahe ZOU , Shuyi XIAO , Xiaohang LI . An adaptive control strategy for defending against cyber stealthy attacks[J]. ACTA AERONAUTICAET ASTRONAUTICA SINICA, 2026 , 47(4) : 332290 -332290 . DOI: 10.7527/S1000-6893.2025.32290

References

[1] 李小杭, 张志虎, 宋春林, 等. 虚假数据注入攻击下的自适应补偿控制[J]. 兵工学报202041(11): 2260-2265.
  LI X H, ZHANG Z H, SONG C L, et al. Adaptive compensation control under false data injection attack[J]. Acta Armamentarii202041(11): 2260-2265 (in Chinese).
[2] 黄鑫, 畅晨旭, 李小杭, 等. 基于协同交互型观测器的虚假数据注入攻击信号重构方法[J]. 兵工学报202344(11): 3359-3368.
  HUANG X, CHANG C X, LI X H, et al. An approach for reconstructing false data injection attack signal based on cooperative interaction observer[J]. Acta Armamentarii202344(11): 3359-3368 (in Chinese).
[3] REN X X, YANG G H. Adaptive control for nonlinear cyber-physical systems under false data injection attacks through sensor networks[J]. International Journal of Robust and Nonlinear Control202030(1): 65-79.
[4] 李笑宇, 冯肖雪, 潘峰, 等. 网络攻击下无人机信息物理系统的自适应状态估计[J]. 航空学报202243(3): 325193.
  LI X Y, FENG X X, PAN F, et al. Adaptive state estimate for unmanned aircraft cyber-physical system with cyber attack[J]. Acta Aeronautica et Astronautica Sinica202243(3): 325193 (in Chinese).
[5] 高煜欣, 张绍杰, 刘春生. 网络攻击下导弹自适应事件触发制导律[J]. 航空学报202445(S1): 730892.
  GAO Y X, ZHANG S J, LIU C S. Adaptive event-triggered guidance law of missile under cyber attacks[J]. Acta Aeronautica et Astronautica Sinica202445(S1): 730892 (in Chinese).
[6] HUANG X, DONG J X. Reliable cooperative control and plug-and-play operation for networked heterogeneous systems under cyber-physical attacks[J]. ISA Transactions2020104: 62-72.
[7] LU A Y, YANG G H. Secure Luenberger-like observers for cyber-physical systems under sparse actuator and sensor attacks[J]. Automatica201898: 124-129.
[8] LIANG L M, LIU S. Event-triggered distributed attack detection and fault diagnosis[J]. IEEE Transactions on Instrumentation and Measurement202272: 3520111.
[9] DUO W, ZHOU C M, ABUSORRAH A. A survey of cyber attacks on cyber physical systems: Recent advances and challenges[J]. IEEE/CAA Journal of Automatica Sinica20229(05): 784-800.
[10] SU Q Y, FAN Z X, LONG Y, et al. Attack detection and secure state estimation for cyber-physical systems with finite-frequency observers[J]. Journal of the Franklin Institute2020357(17): 12724-12741.
[11] SUI T J, MO Y L, MARELLI D, et al. The vulnerability of cyber-physical system under stealthy attacks[J]. IEEE Transactions on Automatic Control202166(2): 637-650.
[12] 李进, 姜顺, 潘丰. 隐蔽式攻击下网络化控制系统状态与故障的联合区间估计[J]. 控制与决策202338(12): 3418-3426.
  LI J, JIANG S, PAN F. Joint interval estimation of state and fault for networked control systems under stealthy attacks[J]. Control and Decision202338(12): 3418-3426 (in Chinese).
[13] 张淇瑞, 孟思琪, 王兰豪, 等. 隐蔽攻击下信息物理系统的安全输出反馈控制[J]. 自动化学报202450(7): 1363-1372.
  ZHANG Q R, MENG S Q, WANG L H, et al. Secure output-feedback control for cyber-physical systems under stealthy attacks[J]. Acta Automatica Sinica202450(7): 1363-1372 (in Chinese).
[14] SUI T J, SUN X M. The vulnerability of distributed state estimator under stealthy attacks[J]. Automatica2021133: 109869.
[15] CHENG P, YANG Z Y, CHEN J M, et al. An event-based stealthy attack on remote state estimation[J]. IEEE Transactions on Automatic Control202065(10): 4348-4355.
[16] ZHANG Q R, LIU K, XIA Y Q, et al. Optimal stealthy deception attack against cyber-physical systems[J]. IEEE Transactions on Cybernetics202050(9): 3963-3972.
[17] JIN X, HADDAD W M, YUCELEN T. An adaptive control architecture for mitigating sensor and actuator attacks in cyber-physical systems[J]. IEEE Transactions on Automatic Control201762(11): 6058-6064.
[18] LI J, YANG D F, SU Q Y, et al. Reliable control of cyber-physical systems under state attack: An adaptive integral sliding-mode control approach[J]. IET Control Theory & Applications202418(1): 27-39.
[19] Lü S Y, JIN X Z, WANG H, et al. Robust adaptive estimation and tracking control for perturbed cyber-physical systems against denial of service[J]. Applied Mathematics and Computation2021404: 126255.
[20] LIAN Y D, YANG Q F, XIE W, et al. Cyber-physical system-based heuristic planning and scheduling method for multiple automatic guided vehicles in logistics systems[J]. IEEE Transactions on Industrial Informatics202117(11): 7882-7893.
[21] ZHANG J H, SHI P, XIA Y Q. Robust adaptive sliding-mode control for fuzzy systems with mismatched uncertainties[J]. IEEE Transactions on Fuzzy Systems201018(4): 700-711.
[22] PETERSEN I R, TEMPO R. Robust control of uncertain systems: Classical results and recent developments[J]. Automatica201450(5): 1315-1335.
[23] WANG B, ZHU D H, HAN L Y, et al. Adaptive fault-tolerant control of a hybrid canard rotor/wing UAV under transition flight subject to actuator faults and model uncertainties[J]. IEEE Transactions on Aerospace and Electronic Systems202359(4): 4559-4574.
[24] HUANG X, LI J, SU Q Y. An observer with cooperative interaction structure for biasing attack detection and secure control[J]. IEEE Transactions on Systems, Man, and Cybernetics: Systems202253(4): 2543-2553.
[25] LIU M, CAO X B, SHI P. Fuzzy-model-based fault-tolerant design for nonlinear stochastic systems against simultaneous sensor and actuator faults[J]. IEEE Transactions on Fuzzy Systems201221(5): 789-799.
[26] LANGNER R. Stuxnet: Dissecting a cyberwarfare weapon[J]. IEEE Security & Privacy20119(3): 49-51.
[27] LU A Y, YANG G H. Secure state estimation against sparse sensor attacks with adaptive switching mechanism[J]. IEEE Transactions on Automatic Control201863(8): 2596-2603.
[28] YUE D, HAN Q L, LAM J. Network-based robust H ∞ control of systems with uncertainty[J]. Automatica200541(6): 999-1007.
[29] EUGENE L, KEVIN W, HOWE D. Robust and adaptive control with aerospace applications[M]. London: Springer-Verlag London, 2013: 299
[30] CHEN Y, KAR S, MOURA J M F. Dynamic attack detection in cyber-physical systems with side initial state information[J]. IEEE Transactions on Automatic Control201762(9): 4618-4624.
Outlines

/