2022
DOI: 10.1049/cth2.12289
|View full text |Cite
|
Sign up to set email alerts
|

Resilient predictive control strategy of cyber–physical systems against FDI attack

Abstract: Self-triggered control strategy has been widely applied in cyber-physical systems, which are unavoidable to suffer various malicious cyber-attacks. This paper is aimed at solving the cyber security problem of self-triggered model predictive control in cyber-physical systems under false data injection attack, and a resilient control strategy is proposed based on control signal reconstruction. Firstly, the continuous control signal is discretely sampled at the controller side, and the key data samples are determ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 14 publications
(8 citation statements)
references
References 38 publications
(74 reference statements)
0
8
0
Order By: Relevance
“…then the following secure adaptive control law u r (𝜉(t)) = − k𝜒(𝜉(t)), (16) will ensure the input to state stability of lateral dynamics (11) of AVs under event-triggered communication scheme (10). Here, ̇k = 2𝛾||𝜉 T (t)P ⋆ ||𝜒(𝜉(t)),…”
Section: Theorem 1 (Adaptive Law Design and Stability Analysis)mentioning
confidence: 99%
“…then the following secure adaptive control law u r (𝜉(t)) = − k𝜒(𝜉(t)), (16) will ensure the input to state stability of lateral dynamics (11) of AVs under event-triggered communication scheme (10). Here, ̇k = 2𝛾||𝜉 T (t)P ⋆ ||𝜒(𝜉(t)),…”
Section: Theorem 1 (Adaptive Law Design and Stability Analysis)mentioning
confidence: 99%
“…Figure 3 depicts the performance of this system with these attacks. Further, Figure 4 shows the proposed correction signals ( 4), ( 5), (6), and ( 7) in terms of the the performance of the designed controller. The parameters 𝛾, L and R are taken as 𝛾 = 5, L = 2.5I 2 and R = I 2 .…”
Section: Time-invariant State-independent Sensor Attack and Input-ind...mentioning
confidence: 99%
“…Security issues of CPSs under attack have attracted extensive attention. Many control mechanisms have been developed to mitigate the impact of different kinds of attacks, for example, mechanisms for time-delay switch attacks [1][2][3], deception attacks [4][5][6][7][8][9][10][11][12][13],…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Physical attacks are mainly to destroy the facilities and equipments, for example, cutting the transmission lines. Cyber attacks typically target data transmission and processing process, for example, deception attacks [23], DoS attacks [24], or false data injection (FDI) attacks [25]. Particularly, the problem of distributed maximum correntropy filtering is investigated for general stochastic non-linear systems under deception attacks in [23].…”
Section: Introductionmentioning
confidence: 99%