2014
DOI: 10.1109/tac.2013.2279896
|View full text |Cite
|
Sign up to set email alerts
|

On the Performance Analysis of Resilient Networked Control Systems Under Replay Attacks

Abstract: This paper studies a resilient control problem for discrete-time, linear time-invariant systems subject to state and input constraints. State measurements and control commands are transmitted over a communication network and could be corrupted by adversaries. In particular, we consider the replay attackers who maliciously repeat the messages sent from the operator to the actuator. We propose a variation of the receding-horizon control law to deal with the replay attacks and analyze the resulting system perform… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
165
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 436 publications
(165 citation statements)
references
References 31 publications
(44 reference statements)
0
165
0
Order By: Relevance
“…Deception attacks are intended to tamper transmitted data packages causing false feedback information. Deception attacks include sparse attacks, replay attacks, zero‐dynamic attacks, etc. One of the basic problems arising in CPSs is how to design a decoder/estimator that recovers the system state in the presence of cyber attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Deception attacks are intended to tamper transmitted data packages causing false feedback information. Deception attacks include sparse attacks, replay attacks, zero‐dynamic attacks, etc. One of the basic problems arising in CPSs is how to design a decoder/estimator that recovers the system state in the presence of cyber attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Design the attack strategy (12) for the system (1). The systems (14) and (15) satisfy the performances (A.1), (16) and (A.2), (17), if there exist block diagonal matrixP t , matricesP t ,Q 1 ,Q 2 , … ,Q N−1 ,Q 1 ,Q 2 , … ,Q N−1 , t = 1, 2, … , N, X > 0,X > 0 and 1 > 0, 2 > 0 such that the inequalities (48) to (57)…”
Section: Resultsmentioning
confidence: 99%
“…The existing research on how to defend against attacks mainly focuses on security estimation and control, attack detection, and recognition of anticipated attack patterns. For instance, denial‐of‐service (DoS) attack, false data injection attack, and replay attack . In addition, the resilient filtering problem under DoS attack was investigated by Chen et al for the power system.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Security economics aims to incentivize heterogeneous stock holders to contribute to the security of CPS. Some papers along this line include [16] and [35] This chapter employs a distributed receding horizon control methodology for the resilient control of a class of multi-agent systems. Previously, distributed receding horizon control has been applied to solve the problem of stabilizing an a priori known common set point for decoupled subsystems [36,37], coupled subsystems [38], and the problem of reaching consensus in [2,39].…”
Section: Notesmentioning
confidence: 99%