Skip to main content
Top
Published in: Advances in Manufacturing 3/2017

08-09-2017

A brief overview on secure control of networked systems

Authors: Hong-Tao Sun, Chen Peng, Peng Zhou, Zhi-Wen Wang

Published in: Advances in Manufacturing | Issue 3/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This paper focuses on the issues of the security of networked control systems by summarizing recent progress in secure control of this research and application area. We mainly discuss existing results, especially in modeling issues, of three aspects: (1) attack mechanisms and their impacts on control systems, (2) the identification and design of attacks, and (3) secure estimation and control strategies. A conclusion is drawn at the end of this paper. In addition, several promising research tendencies of the development for secure control in networked control system are presented.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Konstantinou C, Maniatakos M, Saqib F et al (2015) Cyber-physical systems: a security perspective. IEEE Eur Test Symp 1–8 Konstantinou C, Maniatakos M, Saqib F et al (2015) Cyber-physical systems: a security perspective. IEEE Eur Test Symp 1–8
2.
go back to reference Peng C, Zhang J (2016) Delay-distribution-dependent load frequency control of power systems with probabilistic interval delays. IEEE Trans Power Syst 31(4):3309–3317CrossRefMathSciNet Peng C, Zhang J (2016) Delay-distribution-dependent load frequency control of power systems with probabilistic interval delays. IEEE Trans Power Syst 31(4):3309–3317CrossRefMathSciNet
3.
go back to reference Slay J, Miller M (2007) Lessons learned from the maroochy water breach. In: International conference critical infrastructure protection, Springer, US 73–82 Slay J, Miller M (2007) Lessons learned from the maroochy water breach. In: International conference critical infrastructure protection, Springer, US 73–82
4.
go back to reference Kuvshinkova S (2003) SQL slammer worm lessons learned for consideration by the electricity sector. North Am Electr Reliab Counc 1(2):5 Kuvshinkova S (2003) SQL slammer worm lessons learned for consideration by the electricity sector. North Am Electr Reliab Counc 1(2):5
5.
go back to reference Farwell JP, Rohozinski R (2011) Stuxnet and the future of cyber war. Survival 53(1):23–40CrossRef Farwell JP, Rohozinski R (2011) Stuxnet and the future of cyber war. Survival 53(1):23–40CrossRef
6.
7.
go back to reference Dong P, Han Y, Guo X et al (2015) A systematic review of studies on cyber physical system security. Int J Secur Appl 9(1):155–164 Dong P, Han Y, Guo X et al (2015) A systematic review of studies on cyber physical system security. Int J Secur Appl 9(1):155–164
8.
go back to reference Amin S, Sastry S (2008) Research challenges for the security of control systems. In: USENIX association conference hot topics in security 1–6 Amin S, Sastry S (2008) Research challenges for the security of control systems. In: USENIX association conference hot topics in security 1–6
10.
go back to reference Sandberg H, Amin S, Johansson K (2015) Cyberphysical security in networked control systems: an introduction to the issue. IEEE Trans Control Syst 35(1):20–23CrossRefMathSciNet Sandberg H, Amin S, Johansson K (2015) Cyberphysical security in networked control systems: an introduction to the issue. IEEE Trans Control Syst 35(1):20–23CrossRefMathSciNet
11.
12.
go back to reference Smith RS (2011) A decoupled feedback structure for covertly appropriating networked control systems. IFAC Proc 44(1):91–95 Smith RS (2011) A decoupled feedback structure for covertly appropriating networked control systems. IFAC Proc 44(1):91–95
13.
go back to reference Teixeira A, Dán G, Sandberg H et al (2010) A cyber security study of a scada energy management system: stealthy deception attacks on the state estimator. IFAC Proc 44(1):11271–11277 Teixeira A, Dán G, Sandberg H et al (2010) A cyber security study of a scada energy management system: stealthy deception attacks on the state estimator. IFAC Proc 44(1):11271–11277
14.
go back to reference Cárdenas AA, Amin S, Lin ZS et al (2011) Attacks against process control systems: risk assessment, detection, and response. In: Proceedings of ACM symposium information, computer communication security 355–366 Cárdenas AA, Amin S, Lin ZS et al (2011) Attacks against process control systems: risk assessment, detection, and response. In: Proceedings of ACM symposium information, computer communication security 355–366
15.
go back to reference Mo Y, Kim TH, Brancik K et al (2012) Cyber-physical security of a smart grid infrastructure. Proc IEEE 100(1):195–209CrossRef Mo Y, Kim TH, Brancik K et al (2012) Cyber-physical security of a smart grid infrastructure. Proc IEEE 100(1):195–209CrossRef
16.
go back to reference Teixeira A, Pérez D, Sandberg H et al (2012) Attack models and scenarios for networked control systems. In: Proceedings of High Confidence Networked System 55–64 Teixeira A, Pérez D, Sandberg H et al (2012) Attack models and scenarios for networked control systems. In: Proceedings of High Confidence Networked System 55–64
17.
go back to reference Sauter D, Li S, Aubrun C (2009) Robust fault diagnosis of networked control systems. Int J Adapt Control Signal Process 23(8):722–736CrossRefMATHMathSciNet Sauter D, Li S, Aubrun C (2009) Robust fault diagnosis of networked control systems. Int J Adapt Control Signal Process 23(8):722–736CrossRefMATHMathSciNet
18.
go back to reference Ding S (2008) Model-based fault diagnosis techniques: design schemes, algorithms, and tools, vol 49. Springer, Berlin, pp 50–56 Ding S (2008) Model-based fault diagnosis techniques: design schemes, algorithms, and tools, vol 49. Springer, Berlin, pp 50–56
19.
go back to reference Amin S, Litrico X, Sastry SS et al (2010) Stealthy deception attacks on water SCADA systems. In: Proceedings of ACM conference hybrid system: computation and control, pp 161–170 Amin S, Litrico X, Sastry SS et al (2010) Stealthy deception attacks on water SCADA systems. In: Proceedings of ACM conference hybrid system: computation and control, pp 161–170
20.
go back to reference Mo Y, Sinopoli B(2009) Secure control against replay attacks. In: Annual allerton conference communication, Control Computing, pp 911–918 Mo Y, Sinopoli B(2009) Secure control against replay attacks. In: Annual allerton conference communication, Control Computing, pp 911–918
21.
go back to reference Fawzi H, Tabuada P, Diggavi S (2014) Secure estimation and control for cyber-physical systems under adversarial attacks. IEEE Trans Autom Control 59(6):1454–1467CrossRefMATHMathSciNet Fawzi H, Tabuada P, Diggavi S (2014) Secure estimation and control for cyber-physical systems under adversarial attacks. IEEE Trans Autom Control 59(6):1454–1467CrossRefMATHMathSciNet
22.
go back to reference Kosut O, Jia L, Thomas RJ et al (2010) Malicious data attacks on smart grid state estimation: attack strategies and countermeasures. In: IEEE conference smart grid communications, pp 220–225 Kosut O, Jia L, Thomas RJ et al (2010) Malicious data attacks on smart grid state estimation: attack strategies and countermeasures. In: IEEE conference smart grid communications, pp 220–225
23.
go back to reference Liu Y, Ning P, Reiter MK (2011) False data injection attacks against state estimation in electric power grids. ACM Trans Inf Syst Secur 14(1):1–16CrossRef Liu Y, Ning P, Reiter MK (2011) False data injection attacks against state estimation in electric power grids. ACM Trans Inf Syst Secur 14(1):1–16CrossRef
25.
go back to reference Mo Y, Garone E, Casavola A et al (2010) False data injection attacks against state estimation in wireless sensor networks. In: IEEE Conference Decision Control, pp 5967–5972 Mo Y, Garone E, Casavola A et al (2010) False data injection attacks against state estimation in wireless sensor networks. In: IEEE Conference Decision Control, pp 5967–5972
26.
go back to reference Kwon C, Liu W, Hwang I (2013) Security analysis for cyber-physical systems against stealthy deception attacks. In: American Control Conference, pp 3344–3349 Kwon C, Liu W, Hwang I (2013) Security analysis for cyber-physical systems against stealthy deception attacks. In: American Control Conference, pp 3344–3349
27.
go back to reference Gertler JJ (1988) Survey of model-based failure detection and isolation in complex plants. Cont Syst Mag 8(6):3–11CrossRef Gertler JJ (1988) Survey of model-based failure detection and isolation in complex plants. Cont Syst Mag 8(6):3–11CrossRef
28.
go back to reference Manandhar K, Cao X, Hu F et al (2014) Detection of faults and attacks including false data injection attack in smart grid using kalman filter. IEEE Trans Control Netw Syst 1(4):370–379CrossRefMathSciNet Manandhar K, Cao X, Hu F et al (2014) Detection of faults and attacks including false data injection attack in smart grid using kalman filter. IEEE Trans Control Netw Syst 1(4):370–379CrossRefMathSciNet
30.
go back to reference Wald A (1973) Sequential analysis. Courier Corporation, North ChelmsfordMATH Wald A (1973) Sequential analysis. Courier Corporation, North ChelmsfordMATH
31.
go back to reference Pang ZH, Hou FY, Zhou YG et al (2015) False data injection attacks for output tracking control systems. In: Chinese Control Conference, pp 6747–6752 Pang ZH, Hou FY, Zhou YG et al (2015) False data injection attacks for output tracking control systems. In: Chinese Control Conference, pp 6747–6752
32.
go back to reference Xu Z, Ji Y, Zhou D (2009) A new real-time reliability prediction method for dynamic systems based on online fault prediction. IEEE Trans Reliab 58(3):523–538CrossRef Xu Z, Ji Y, Zhou D (2009) A new real-time reliability prediction method for dynamic systems based on online fault prediction. IEEE Trans Reliab 58(3):523–538CrossRef
33.
go back to reference Pasqualetti F, Dorfler F, Bullo F (2012) Cyber-physical security via geometric control: distributed monitoring and malicious attacks. In: Annual conference decision and control, pp 3418–3425 Pasqualetti F, Dorfler F, Bullo F (2012) Cyber-physical security via geometric control: distributed monitoring and malicious attacks. In: Annual conference decision and control, pp 3418–3425
34.
go back to reference Zhang H, Cheng P, Shi L et al (2016) Optimal dos attack scheduling in wireless networked control system. IEEE Trans Control Syst Technol 24(3):843–852CrossRef Zhang H, Cheng P, Shi L et al (2016) Optimal dos attack scheduling in wireless networked control system. IEEE Trans Control Syst Technol 24(3):843–852CrossRef
35.
go back to reference Zhang H, Cheng P, Shi L et al (2015) Optimal denial-of-service attack scheduling with energy constraint. IEEE Trans Autom Control 60(11):3023–3028CrossRefMATHMathSciNet Zhang H, Cheng P, Shi L et al (2015) Optimal denial-of-service attack scheduling with energy constraint. IEEE Trans Autom Control 60(11):3023–3028CrossRefMATHMathSciNet
36.
go back to reference Zhang H, Cheng P, Shi L et al (2013) Optimal DoS attack policy against remote state estimation. In: IEEE annual conference decision and control, pp 5444–5449 Zhang H, Cheng P, Shi L et al (2013) Optimal DoS attack policy against remote state estimation. In: IEEE annual conference decision and control, pp 5444–5449
37.
go back to reference Zhang H, Cheng P, Shi L et al (2014) Optimal denial-of-service attack scheduling against linear quadratic gaussian control. In: American control conference, pp 3996–4001 Zhang H, Cheng P, Shi L et al (2014) Optimal denial-of-service attack scheduling against linear quadratic gaussian control. In: American control conference, pp 3996–4001
38.
go back to reference Gupta A, Langbort C, Basar T (2010) Optimal control in the presence of an intelligent jammer with limited actions. In: Annual conference decision and control, pp 1096–1101 Gupta A, Langbort C, Basar T (2010) Optimal control in the presence of an intelligent jammer with limited actions. In: Annual conference decision and control, pp 1096–1101
39.
go back to reference Zhu M, Martinez S (2011) Stackelberg-game analysis of correlated attacks in cyber-physical systems. In: American control conference, pp 4063–4068 Zhu M, Martinez S (2011) Stackelberg-game analysis of correlated attacks in cyber-physical systems. In: American control conference, pp 4063–4068
40.
go back to reference Wang EK, Ye Y, Xu X et al (2010) Security issues and challenges for cyber physical system. In: Proc IEEE/ACM conference green computing communication & conference cyber, physical society computing, pp 733–738 Wang EK, Ye Y, Xu X et al (2010) Security issues and challenges for cyber physical system. In: Proc IEEE/ACM conference green computing communication & conference cyber, physical society computing, pp 733–738
41.
go back to reference Lee C, Shim H, Eun Y (2015) Secure and robust state estimation under sensor attacks, measurement noises, and process disturbances: observer-based combinatorial approach. In: European control conference, pp 1872–1877 Lee C, Shim H, Eun Y (2015) Secure and robust state estimation under sensor attacks, measurement noises, and process disturbances: observer-based combinatorial approach. In: European control conference, pp 1872–1877
42.
go back to reference Shoukry Y, Tabuada P (2016) Event-triggered state observers for sparse sensor noise/attacks. IEEE Trans Autom Control 61(8):2079–2091CrossRefMATHMathSciNet Shoukry Y, Tabuada P (2016) Event-triggered state observers for sparse sensor noise/attacks. IEEE Trans Autom Control 61(8):2079–2091CrossRefMATHMathSciNet
43.
go back to reference Foroush H S, Martínez S(2012) On single-input controllable linear systems under periodic dos jamming attacks. arXiv preprint arXiv:1209.4101 Foroush H S, Martínez S(2012) On single-input controllable linear systems under periodic dos jamming attacks. arXiv preprint arXiv:​1209.​4101
44.
45.
go back to reference Amin S, Cárdenas AA, Sastry SS (2009) Safe and secure networked control systems under denial-of service attacks. In: Hybrid systems: computation and control, Springer, pp 31–45 Amin S, Cárdenas AA, Sastry SS (2009) Safe and secure networked control systems under denial-of service attacks. In: Hybrid systems: computation and control, Springer, pp 31–45
46.
go back to reference Feng Z, Hu G, Wen G (2016) Distributed consensus tracking for multi-agent systems under two types of attacks. Int J Robust Nonlinear Control 26(5):896–918CrossRefMATHMathSciNet Feng Z, Hu G, Wen G (2016) Distributed consensus tracking for multi-agent systems under two types of attacks. Int J Robust Nonlinear Control 26(5):896–918CrossRefMATHMathSciNet
47.
go back to reference Yuan Y, Sun F, Zhu Q (2015) Resilient control in the presence of dos attack: switched system approach. Int J Control Autom Syst 13(6):1423–1435CrossRef Yuan Y, Sun F, Zhu Q (2015) Resilient control in the presence of dos attack: switched system approach. Int J Control Autom Syst 13(6):1423–1435CrossRef
48.
go back to reference Befekadu GK, Gupta V, Antsaklis PJ (2015) Risksensitive control under markov modulated denial-of service (DoS) attack strategies. IEEE Trans Autom Control 60(12):3299–3304CrossRefMATH Befekadu GK, Gupta V, Antsaklis PJ (2015) Risksensitive control under markov modulated denial-of service (DoS) attack strategies. IEEE Trans Autom Control 60(12):3299–3304CrossRefMATH
49.
go back to reference Pang ZH, Liu GP (2012) Design and implementation of secure networked predictive control systems under deception attacks. IEEE Trans Control Syst Technol 20(55):1334–1342CrossRef Pang ZH, Liu GP (2012) Design and implementation of secure networked predictive control systems under deception attacks. IEEE Trans Control Syst Technol 20(55):1334–1342CrossRef
50.
go back to reference Pasqualetti F, Dorfler F, Bullo F (2015) Controltheoretic methods for cyberphysical security: geometric principles for optimal cross-layer resilient control systems. IEEE Trans Control Syst 35(1):110–127CrossRef Pasqualetti F, Dorfler F, Bullo F (2015) Controltheoretic methods for cyberphysical security: geometric principles for optimal cross-layer resilient control systems. IEEE Trans Control Syst 35(1):110–127CrossRef
51.
go back to reference Peng C, Ma SD, Xie XP (2017) Observer-based non-PDC control for networked T-S fuzzy systems with an event-triggered communication. IEEE Transactions on Cybernetics (99):1–9 Peng C, Ma SD, Xie XP (2017) Observer-based non-PDC control for networked T-S fuzzy systems with an event-triggered communication. IEEE Transactions on Cybernetics (99):1–9
52.
go back to reference Rieger CG, Gertman DI, McQueen MA (2009) Resilient control systems: next generation design research. In: HIS conference human system interaction, pp 632–636 Rieger CG, Gertman DI, McQueen MA (2009) Resilient control systems: next generation design research. In: HIS conference human system interaction, pp 632–636
53.
go back to reference Peng C, Li JC, Fei MR (2016) Resilient event-triggered H ∞ load frequency control for networked power systems with energy-limited DoS attacks. IEEE Trans Power Syst 99:1 Peng C, Li JC, Fei MR (2016) Resilient event-triggered H load frequency control for networked power systems with energy-limited DoS attacks. IEEE Trans Power Syst 99:1
Metadata
Title
A brief overview on secure control of networked systems
Authors
Hong-Tao Sun
Chen Peng
Peng Zhou
Zhi-Wen Wang
Publication date
08-09-2017
Publisher
Shanghai University
Published in
Advances in Manufacturing / Issue 3/2017
Print ISSN: 2095-3127
Electronic ISSN: 2195-3597
DOI
https://doi.org/10.1007/s40436-017-0189-2

Other articles of this Issue 3/2017

Advances in Manufacturing 3/2017 Go to the issue

Premium Partners