Concurrent Receding Horizon Control and Estimation Against Stealthy Attacks

被引:4
|
作者
Fotiadis, Filippos [1 ]
Vamvoudakis, Kyriakos. G. [1 ]
机构
[1] Georgia Inst Technol, Sch Aerosp Engn, Atlanta, GA 30332 USA
关键词
Costs; Robustness; Uncertainty; Optimization; Games; Trajectory; Security; Actuation attacks; cyber-physical systems (CPS); game-theory; MODEL-PREDICTIVE CONTROL; CYBER-PHYSICAL SYSTEMS; STABILITY;
D O I
10.1109/TAC.2022.3195922
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, we consider a game-theoretic framework for cyber-physical systems, where a defender develops a mitigation strategy against an intelligent attacker who exploits the system's uncertainty to remain undetected. The goal of the defender is to optimize a performance cost constructed specifically to account for robustness against stealthy attacks so that the system is regulated. Conversely, the goal of the attacker is to disrupt the system's performance by leveraging its significant information advantage against the defender. Both players implement their policies in a moving horizon fashion, according to the principles of receding horizon control. However, because the defender has no access to the full state of the system, it concurrently employs receding horizon estimation to overcome this limitation. Rigorous theoretical analysis shows that such a concurrent policy can guarantee closed-loop boundedness, despite the stealthy attacks and the information disadvantage. Simulations verify and clarify these findings.
引用
收藏
页码:3712 / 3719
页数:8
相关论文
共 50 条
  • [41] Event-Driven Receding Horizon Control for Distributed Estimation in Network Systems
    Welikala, Shirantha
    Cassandras, Christos G.
    2021 AMERICAN CONTROL CONFERENCE (ACC), 2021, : 1559 - 1564
  • [42] Stealthy Misreporting Attacks Against Load Balancing
    Yu, Mingli
    Burke, Quinn K.
    La Porta, Thomas F.
    McDaniel, Patrick
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2024, 32 (04) : 3622 - 3635
  • [43] Stealthy switching attacks on sensors against state estimation in cyber-physical systems
    Huo, Jian-Ru
    Li, Xiao-Jian
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2023, 33 (02) : 1169 - 1183
  • [44] Mitigating Stealthy False Data Injection Attacks Against State Estimation in Smart Grid
    Fan, Jingyao
    Khazbak, Youssef
    Tian, Jue
    Liu, Ting
    Cao, Guohong
    2018 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2018,
  • [45] Stealthy Deception Attacks Against SCADA Systems
    Kleinmann, Amit
    Amichay, Ori
    Wool, Avishai
    Tenenbaum, David
    Bar, Ofer
    Lev, Leonid
    COMPUTER SECURITY, 2017, 2018, 10683 : 93 - 109
  • [46] Security design against stealthy attacks on power system state estimation: A formal approach
    Rahman, Mohammad Ashiqur
    Datta, Amarjit
    Al-Shaer, Ehab
    COMPUTERS & SECURITY, 2019, 84 : 301 - 317
  • [47] Optimal completely stealthy attacks against remote estimation in cyber-physical systems
    Li, Yi-Gang
    Yang, Guang-Hong
    INFORMATION SCIENCES, 2022, 590 : 15 - 28
  • [48] Dynamic scheduling of decentralized receding horizon controllers on concurrent processors for the cooperative control of unmanned systems
    Azimi, A.
    Gordon, B. W.
    Rabbath, C. A.
    PROCEEDINGS OF THE 46TH IEEE CONFERENCE ON DECISION AND CONTROL, VOLS 1-14, 2007, : 5408 - +
  • [49] Out of Control: Stealthy Attacks Against Robotic Vehicles Protected by Control-based Techniques
    Dash, Pritam
    Karimibiuki, Mehdi
    Pattabiraman, Karthik
    35TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSA), 2019, : 660 - 672
  • [50] Stability-guaranteed horizon size for receding horizon control
    Quan, Zhonghua
    Han, Soohee
    Kwon, Wook Hyun
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2007, E90A (02) : 523 - 525