2021
DOI: 10.3390/electronics10030322
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Control Design for Networked Control Systems with Linear Dynamics under a Time-Delay Switch Attack

Abstract: Networked control systems (NCSs) are designed to control and monitor large-scale and complex systems remotely. The communication connectivity in an NCS allows agents to quickly communicate with each other to respond to abrupt changes in the system quickly, thus reducing complexity and increasing efficiency. Despite all these advantages, NCSs are vulnerable to cyberattacks. Injecting cyberattacks, such as a time-delay switch (TDS) attack, into communication channels has the potential to make NCSs inefficient or… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
12
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 17 publications
(12 citation statements)
references
References 26 publications
0
12
0
Order By: Relevance
“…To minimize the steady-state error, an integrator can be embedded in (1), and an auxiliary variable is introduced as…”
Section: A Description Of the System Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…To minimize the steady-state error, an integrator can be embedded in (1), and an auxiliary variable is introduced as…”
Section: A Description Of the System Modelmentioning
confidence: 99%
“…A Modern power grid, taking advantages of advanced control strategies, cost-competitive technologies and information and communication technology (ICT), is a cyberphysical systems (CPSs), which are vulnerable to cyber attacks. Some of the well-known cyber-attacks are denial of service, which disables access to the system information or a service, false data injection, which intentionally manipulates the exchange of data, replay attack, which maliciously repeats valid data transmission [1]. A recently found attack, the time-delay switch attack (TDSA) [2], is made by inserting time delays into communication channels of CPSs.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Since the secondary control heavily relies on communications and cyber infrastructures in a closed control loop, it can be labeled as a networked control system [3]. Similar to all networked control systems, the secondary control of microgrids is vulnerable to cyber threats.…”
Section: Introductionmentioning
confidence: 99%
“…The DoS targets the availability of machines or networks to temporarily or indefinitely distort the service to its intended users. The FDI manipulates the data exchanges throughout the network, which misleads the control center and disturbs the system operation [3,4].…”
Section: Introductionmentioning
confidence: 99%