Du, D and Zhang, C and Wang, H and Li, X and Hu, H and Yang, T (2018) Stability Analysis of Token-based Wireless Networked Control Systems under Deception Attacks. Information Sciences, 459. pp. 168-182. DOI https://doi.org/10.1016/j.ins.2018.04.085
Du, D and Zhang, C and Wang, H and Li, X and Hu, H and Yang, T (2018) Stability Analysis of Token-based Wireless Networked Control Systems under Deception Attacks. Information Sciences, 459. pp. 168-182. DOI https://doi.org/10.1016/j.ins.2018.04.085
Du, D and Zhang, C and Wang, H and Li, X and Hu, H and Yang, T (2018) Stability Analysis of Token-based Wireless Networked Control Systems under Deception Attacks. Information Sciences, 459. pp. 168-182. DOI https://doi.org/10.1016/j.ins.2018.04.085
Abstract
Currently cyber-security has attracted a lot of attention, in particular in wireless industrial control networks (WICNs). In this paper, the stability of wireless networked control systems (WNCSs) under deception attacks is studied with a token-based protocol applied to the data link layer (DLL) of WICNS. Since deception attacks cause the stability problem of WNCSs by changing the data transmitted over wireless network, it is important to detect deception attacks, discard the injected false data and compensate for the missing data (i.e., the discarded original data with the injected false data). The main contributions of this paper are: 1) With respect to the character of the token-based protocol, a switched system model is developed. Different from the traditional switched system where the number of subsystems is fixed, in our new model this number will be changed under deception attacks. 2) For this model, a new Kalman filter (KF) is developed for the purpose of attack detection and the missing data reconstruction. 3) For the given linear feedback WNCSs, when the noise level is below a threshold derived in this paper, the maximum allowable duration of deception attacks is obtained to maintain the exponential stability of the system. Finally, a numerical example based on a linearized model of an inverted pendulum is provided to demonstrate the proposed design.
Item Type: | Article |
---|---|
Uncontrolled Keywords: | Deception attacks; Token-based protocol; Kalman filter; Wireless networked control systems; Switched systems |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science |
Divisions: | Faculty of Science and Health Faculty of Science and Health > Computer Science and Electronic Engineering, School of |
SWORD Depositor: | Unnamed user with email elements@essex.ac.uk |
Depositing User: | Unnamed user with email elements@essex.ac.uk |
Date Deposited: | 04 May 2018 15:50 |
Last Modified: | 30 Oct 2024 16:59 |
URI: | http://repository.essex.ac.uk/id/eprint/21955 |
Available files
Filename: 1-s2.0-S0020025518303554-main.pdf
Licence: Creative Commons: Attribution-Noncommercial-No Derivative Works 3.0