Guadarrama Estrada, Angel Rodrigo | Tecnológico Nacional de México/CENIDET |
Osorio-Gordillo, Gloria-Lilia | Tecnológico Nacional de México/CENIDET |
Astorga-Zaragoza, Carlos | Tecnológico Nacional de México/CENIDET |
Reyes-Reyes, Juan | Tecnológico Nacional de México/CENIDET |
https://doi.org/10.58571/CNCA.AMCA.2023.063
Resumen: This article focuses on the design of a Luenberger structure observer with residual generation for the detection of different attack schemes (Denial of Service (DoS) and False Data Injection (FDI)) targeting the sensors and actuators of a discrete cyber-physical system. To simulate a more realistic attack signal, Markovian distribution logic is used to simulate the behavior of the signals. To demonstrate the effectiveness of the proposed scheme, a system of three interconnected tanks is used.
¿Cómo citar?
Guadarrama Estrada, Angel Rodrigo; Osorio-Gordillo, Gloria-Lilia; Astorga-Zaragoza, Carlos; Reyes-Reyes, Juan. Observer Design for Detection of Attack Patterns in Cyber-Physical Systems. Memorias del Congreso Nacional de Control Automático, pp. 473-478, 2023. https://doi.org/10.58571/CNCA.AMCA.2023.063
Palabras clave
Sistemas Discretos; Detección y Aislamiento de Fallas
Referencias
- Baheti, R. and Gill, H. (2011). Cyber-physical systems. null. doi: null.
- Bezzaoucha Reba¨ı, S., Voos, H., and Darouach, M. (2018). Attacktolerant control and observer-based trajectory tracking for cyberphysical systems. European Journal of Control, 47. doi:10.1016/j.ejcon.2018.09.005.
- Bordel S´anchez, B., Alcarria, R., Robles, T., and Mart´ın, D. (2017). Cyber-physical systems: Extending pervasive sensing from control theory to the internet of things. Pervasive and Mobile Computing, 40. doi:10.1016/j.pmcj.2017.06.011.
- Boyd, S., Ghaoui, L., Feron, E., and Balakrishnan, V. (1994). Linear matrix inequalities in systems and control theory. SIAM.
- Januario, F., Cardoso, A., and Gil, P. (2019). A distributed multi-agent framework for resilience enhancement in cyberphysical systems. IEEE Access, 7, 31342– doi:10.1109/ACCESS.2019.2903629.
- Joo, Y., Qu, Z., and Namerikawa, T. (2021). Resilient control of cyber-physical system using nonlinear encoding signal against system integrity attacks. IEEE Transactions on Automatic Control, 66(9), 4334-4341. doi:10.1109/TAC.2020.3034195.
- Li, H., He, X., Zhang, Y., and Guan, W. (2018). Attack detection in cyber-physical systems using particle filter: An illustration on three-tank system. In 2018 IEEE 8th Annual International Conference on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER), 504– doi:10.1109/CYBER.2018.8688281.
- Li, Y., Voos, H., Darouach, M., and Hua, C. (2016). An application of linear algebra theory in networked control systems: stochastic cyber-attacks detection approach. IMA Journal of Mathematical Control and Information, 33(4), 1081– doi:10.1093/imamci/dnv026.
- Orojloo, H. and Azgomi, M.A. (2015). Evaluating the complexity and impacts of attacks on cyber-physical systems. In 2015 CSI Symposium on Real-Time and Embedded Systems and Technologies (RTEST), 1-8. doi:10.1109/RTEST.2015.7369840.
- Rajkumar, R., Lee, I., Sha, L., and Stankovic, J. (2010). Cyberphysical systems: The next computing revolution. 731-736. doi:10.1145/1837274.1837461.
- Shames, I., Teixeira, A., Sandberg, H., and Johansson, K. (2010). Distributed fault detection for interconnected second-order systems with applications to power networks.
- Tahir, Z., Khan, A.Q., and Asad, M. (2019). Attack detection and identification in cyber physical systems: An example on three tank system. In 2019 15th International Conference on Emerging Technologies (ICET), 1-6. doi:10.1109/ICET48972.2019.8994635.
- Yuan, Y., Zhu, Q., Sun, F., Wang, Q., and Ba¸sar, T. (2013). Resilient control of cyber-physical systems against denial-of-service attacks. In 2013 6th International Symposium on Resilient Control Systems (ISRCS), 54-59. doi:10.1109/ISRCS.2013.6623750.