收藏本站
收藏 | 投稿 | 手机打开
二维码
手机客户端打开本文

Passivity-Based Robust Control Against Quantified False Data Injection Attacks in Cyber-Physical Systems

Yue Zhao  Ze Chen  Chunjie Zhou  Yu-Chu Tian  Yuanqing Qin  
【摘要】:Secure control against cyber attacks becomes increasingly significant in cyber-physical systems(CPSs). False data injection attacks are a class of cyber attacks that aim to compromise CPS functions by injecting false data such as sensor measurements and control signals. For quantified false data injection attacks, this paper establishes an effective defense framework from the energy conversion perspective. Then, we design an energy controller to dynamically adjust the system energy changes caused by unknown attacks. The designed energy controller stabilizes the attacked CPSs and ensures the dynamic performance of the system by adjusting the amount of damping injection. Moreover, with the L2 disturbance attenuation technique, the burden of control system design is simplified because there is no need to design an attack observer. In addition,this secure control method is simple to implement because it avoids complicated mathematical operations. The effectiveness of our control method is demonstrated through an industrial CPS that controls a permanent magnet synchronous motor.

知网文化
【相似文献】
中国期刊全文数据库 前7条
1 王立海;方茂武;;用编程方法防范SQL Injection攻击[J];电脑知识与技术;2008年30期
2 张启宇;;利用信息摘要防御SQL Injection攻击[J];农业网络信息;2014年02期
3 张睿;胡纯栋;盛鹏;赵远哲;张晓丹;吴德云;;Design of Experimental Data Publishing Software for Neutral Beam Injector on EAST[J];Plasma Science and Technology;2015年02期
4 孙红娜;“诱捕”技术降低误报率[J];中国计算机用户;2003年21期
5 REN Quan;WU Jiangxing;HE Lei;;Performance Modeling Based on GSPN for Cyberspace Mimic DNS[J];Chinese Journal of Electronics;2020年04期
6 Mohammad Hashem Haghighat;Jun Li;;Intrusion Detection System Using Voting-Based Neural Network[J];Tsinghua Science and Technology;2021年04期
7 Huanruo LI;Yunfei GUO;Shumin HUO;Guozhen CHENG;Wenyan LIU;;Survey on quantitative evaluations of moving target defense[J];网络与信息安全学报;2018年09期
中国重要会议论文全文数据库 前4条
1 ;A General System Design and Implementation of SQL Injection Precaution[A];Information Technology and Computer Science—Proceedings of 2012 National Conference on Information Technology and Computer Science[C];2012年
2 Jianlei Gao;Senchun Chai;Min Shuai;Baihai Zhang;Linguo Cui;;Detecting False Data Injection Attack on Cyber-Physical System based on Delta Operator[A];第37届中国控制会议论文集(D)[C];2018年
3 Guangyan Xu;Hui Qiu;Hao Liu;;The optimal false data injection attacks based on zonotopes[A];第三十九届中国控制会议论文集(4)[C];2020年
4 Shao-Yu Lü;Xiao-Zheng Jin;;Robust Adaptive Control for a Class of Disturbed Cyber-Physical Systems with Denial of Service[A];第三十九届中国控制会议论文集(4)[C];2020年
中国硕士学位论文全文数据库 前1条
1 木索尼;基于选择条件树结构的SQL注入攻击检测与防御方法研究[D];中南大学;2012年
 快捷付款方式  订购知网充值卡  订购热线  帮助中心
  • 400-819-9993
  • 010-62982499
  • 010-62783978