Abstract

Currently cyber-security has attracted a lot of attention, in particular in wireless industrial control networks (WICNs). In this paper, the stability of wireless networked control systems (WNCSs) under deception attacks is studied with a token-based protocol applied to the data link layer (DLL) of WICNS. Since deception attacks cause the stability problem of WNCSs by changing the data transmitted over wireless network, it is important to detect deception attacks, discard the injected false data and compensate for the missing data (i.e., the discarded original data with the injected false data). The main contributions of this paper are: (1) With respect to the character of the token-based protocol, a switched system model is developed. Different from the traditional switched system where the number of subsystems is fixed, in our new model this number will be changed under deception attacks. (2) For this model, a new Kalman filter (KF) is developed for the purpose of attack detection and the missing data reconstruction. (3) For the given linear feedback WNCSs, when the noise level is below a threshold derived in this paper, the maximum allowable duration of deception attacks is obtained to maintain the exponential stability of the system. Finally, a numerical example based on a linearized model of an inverted pendulum is provided to demonstrate the proposed design.

Highlights

  • Industrial wireless network has been increasingly employed in many automation fields to form wireless networked control systems (WNCSs), such as cooperative automated vehicles and unmanned aerial vehicles [6, 28, 29, 33, 41], due to their low cost, flexibility, scalability and easy deployment [11, 12, 36, 39]

  • This paper investigates the stability of token-based WNCSs under deception attacks

  • The paper has investigated the stability of token-based WNCSs under deception attacks

Read more

Summary

Introduction

Industrial wireless network has been increasingly employed in many automation fields to form wireless networked control systems (WNCSs), such as cooperative automated vehicles and unmanned aerial vehicles [6, 28, 29, 33, 41], due to their low cost, flexibility, scalability and easy deployment [11, 12, 36, 39]. Before detection: the memory is updated by the data received from the master station, becoming y(k), and the KF produces the a priori state estimation (i.e., x(k|k − 1)) based on the control signals (i.e., u(k − 1)) at the previous sampling instant Both will be sent to the deception attacks detector (DAD). If deception attacks happen, master station receives yi∗k−1(k − 1) injected with the false data so that the corresponding element in y(k) in (7) is discarded according to the detection result of the DAD in (14). This missing data is reconstructed to compensate the corresponding element in y(k) by using (15). It is more difficult to analyze the stability of WNCSs compared with that of NCSs [38, 43,44,45]

Control objectives
Stability analysis
Simulation
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call