Secure Control for Cyber-Physical Systems under Malicious Attacks

Chengwei Wu, Weiran Yao, Wei Pan, Guanghui Sun, Jianxing Liu, Ligang Wu

Research output: Contribution to journalArticleScientificpeer-review

2 Downloads (Pure)

Abstract

This paper investigates the secure control problem for cyber-physical systems when the malicious data is injected into the cyber realm which is directly connecting to the actuators. Based on moving target defense and reinforcement learning, we propose a novel proactive and reactive defense control scheme. First, the system <formula><tex>$(A,B)$</tex></formula> is modeled as a switching system consisting of several controllable pairs <formula><tex>$(A,\mathcal{B}_{l})$</tex></formula> to facilitate the construction of the moving target defense control scheme. The controllable pairs <formula><tex>$(A,\mathcal{B}_{l})$</tex></formula> can be altered to update system dynamics under certain unpredictable switching probabilities for each subsystem, which can prevent the adversaries from effective attacks. Second, both attack detection and isolation schemes are designed to accurately locate and exclude the compromised actuators from a switching sequence. Third, a reinforcement learning algorithm based on the zero-sum game theory is proposed to design the defense control scheme when there exist no controllable subsystems to switch. To demonstrate the effectiveness of the defense control scheme, a three-tank system under unknown cyber attacks is illustrated.

Original languageEnglish
Number of pages12
JournalIEEE Transactions on Control of Network Systems
DOIs
Publication statusAccepted/In press - 2021

Keywords

  • Actuator attacks
  • Actuators
  • Control systems
  • Cyber-physical systems
  • Detectors
  • Heuristic algorithms
  • Moving target defense
  • Proactive and reactive control
  • Reinforcement learning
  • Switches
  • Symmetric matrices
  • System dynamics

Fingerprint

Dive into the research topics of 'Secure Control for Cyber-Physical Systems under Malicious Attacks'. Together they form a unique fingerprint.

Cite this