Secure Networked Control Systems under Denial of Service Attacks

نویسندگان

  • Z. H. Pang
  • G. P. Liu
چکیده

This paper addresses the security issue of networked control systems (NCSs) under DoS attacks. According to the level of attacks, DoS attacks are classified into two types: weak attacks and strong attacks. A recursive networked predictive control (RNPC) method based on round-trip time delay is proposed to compensate for the adverse effects introduced by the weak DoS attacks as well as the network communication constraints, such as random delay, packet disorder and packet loss. A theoretical result using the switched system theory is also obtained for the closed-loop stability of the RNPC system. For the strong DoS attacks on the controller side, a multi-controller switching scheme is presented, in which each controller is designed based on the RNPC. The performance of the proposed strategies is demonstrated by practical experiments to control a DC motor speed through the Internet under DoS attacks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Safe and Secure Networked Control Systems under Denial-of-Service Attacks

We consider the problem of security constrained optimal control for discrete-time, linear dynamical systems in which control and measurement packets are transmitted over a communication network. The packets may be jammed or compromised by a malicious adversary. For a class of denial-of-service (DoS) attack models, the goal is to find an (optimal) causal feedback controller that minimizes a give...

متن کامل

Networked Systems under Denial-of-Service: Co-located vs. Remote Control Architectures

In this paper, we study networked systems in the presence of Denial-of-Service (DoS) attacks, namely attacks that prevent transmissions over the communication network. Previous studies have shown that co-located architectures (control unit co-located with the actuators and networked sensor channel) can ensure a high level of robustness against DoS. However, co-location requires a wired or dedic...

متن کامل

Dynamic Watermarking: Active Defense of Networked Cyber-Physical Systems

The coming decades may see the large scale deployment of networked cyber-physical systems to address global needs in areas such as energy, water, healthcare, and transportation. However, as recent events have shown, such systems are vulnerable to cyber attacks. Being safety critical, their disruption or misbehavior can cause economic losses or injuries and loss of life. It is therefore importan...

متن کامل

Networked Constrained Cyber-Physical Systems subject to malicious attacks: a resilient set-theoretic control approach

In this paper a novel set-theoretic control framework for Networked Constrained Cyber-Physical Systems is presented. By resorting to set-theoretic ideas and the physical watermarking concept, an anomaly detector module and a control remediation strategy are formally derived with the aim to contrast severe cyber attacks affecting the communication channels. The resulting scheme ensures Uniformly...

متن کامل

Green Lights Forever: Analyzing the Security of Traffic Infrastructure

The safety critical nature of traffic infrastructure requires that it be secure against computer-based attacks, but this is not always the case. We investigate a networked traffic signal system currently deployed in the United States and discover a number of security flaws that exist due to systemic failures by the designers. We leverage these flaws to create attacks which gain control of the s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011