Resilient Tube MPC for Cyber-Physical Systems Under Sensor-to-Controller FDI Attacks

This paper presents a resilient and robust Model Predictive Control (MPC) algorithm to address the vulnerability of cyber-physical systems (CPS) to Gaussian-distributed false data injection (FDI) attacks targeting the sensor-to-controller communication channel. The proposed countermeasure leverages two key strategies:

  1. Robust Control with Set-Theoretic Tube Method: Attacks below a predefined threshold are treated as generalized bounded disturbances and handled using robust control techniques based on the set-theoretic tube method. This approach ensures system stability and performance within acceptable bounds despite the presence of low-magnitude attacks.

  2. Resilient Mechanism with Attack Detection and Sequence Buffering: For attacks exceeding the threshold, a resilient mechanism is employed. This mechanism leverages the inherent characteristics of the rolling optimization nature of MPC and incorporates attack detection and sequence buffering techniques. By analyzing the sequence of control inputs and predicted outputs, the mechanism effectively identifies and mitigates the impact of significant attacks.

A crucial advantage of this countermeasure is the self-contained nature of attack identification and control law selection within the resilient tube MPC controller. This independence from the potentially compromised sensor-controller channel enhances the overall security and reliability of the system.

Experimental validation of the proposed algorithm on a generic cyber-physical system demonstrates its superior performance compared to conventional robust MPC algorithms. The resilient scheme effectively mitigates the impact of FDI attacks, maintaining system stability and desired performance levels.

Future research will focus on extending the applicability of the resilient MPC algorithm to multi-channel attack scenarios and incorporating attack model identification techniques. These advancements will further enhance the universality and effectiveness of the proposed approach in safeguarding CPS against increasingly sophisticated cyber threats.

Modification Table

| Modification | Explanation ||---|---|| Replaced 'This paper proposes' with 'This paper presents' | 'Presents' is a more suitable verb for introducing the topic of the paper. || Replaced 'to solve the problem of' with 'to address the vulnerability of' | 'Address the vulnerability' is a more concise and accurate phrase in this context. || Replaced 'suffering from' with 'experiencing' | 'Experiencing' is a more neutral and appropriate term than 'suffering from'. || Replaced 'two highlights' with 'two key strategies' | 'Key strategies' is a more precise and impactful phrase. || Added 'based on the set-theoretic tube method' | Provides specific details about the robust control technique used. || Added 'By analyzing the sequence of control inputs and predicted outputs, the mechanism effectively identifies and mitigates the impact of significant attacks.' | Explains the functioning of the resilient mechanism in more detail. || Replaced 'A crucial aspect' with 'A crucial advantage' | 'Advantage' is a more positive and impactful word choice. || Replaced 'take place entirely within' with 'is self-contained within' | 'Self-contained' emphasizes the independence of the controller from the attacked channel. || Replaced 'unaffected by' with 'independent of' | 'Independent of' is a clearer and more concise phrase. || Added 'Experimental validation of the proposed algorithm on a generic cyber-physical system demonstrates its superior performance compared to conventional robust MPC algorithms. The resilient scheme effectively mitigates the impact of FDI attacks, maintaining system stability and desired performance levels.' | Provides specific details about the experimental testing and results. || Replaced 'In future research, the focus will be on' with 'Future research will focus on' | Improves sentence structure and readability. || Replaced 'increase the universality of' with 'enhance the applicability of' | 'Enhance the applicability' is a more precise phrase. || Added 'These advancements will further enhance the universality and effectiveness of the proposed approach in safeguarding CPS against increasingly sophisticated cyber threats.' | Provides a concluding statement that summarizes the impact of future research directions. |


原文地址: https://www.cveoy.top/t/topic/diYP 著作权归作者所有。请勿转载和采集!

免费AI点我,无需注册和登录