Muutke küpsiste eelistusi

Analysis and Design of Networked Control Systems under Attacks [Kõva köide]

(Boston University, USA), , ,
  • Formaat: Hardback, 294 pages, kõrgus x laius: 234x156 mm, kaal: 367 g, 11 Tables, black and white; 83 Line drawings, black and white; 2 Halftones, black and white; 85 Illustrations, black and white
  • Ilmumisaeg: 10-Oct-2018
  • Kirjastus: CRC Press
  • ISBN-10: 1138612758
  • ISBN-13: 9781138612754
Teised raamatud teemal:
  • Formaat: Hardback, 294 pages, kõrgus x laius: 234x156 mm, kaal: 367 g, 11 Tables, black and white; 83 Line drawings, black and white; 2 Halftones, black and white; 85 Illustrations, black and white
  • Ilmumisaeg: 10-Oct-2018
  • Kirjastus: CRC Press
  • ISBN-10: 1138612758
  • ISBN-13: 9781138612754
Teised raamatud teemal:

This book adopts a systematic view of the control systems in cyber-physical systems including the security control of the optimal control system, security control of the non-cooperative game system, quantify the impact of the Denial-of-Service attacks on the optimal control system, and the adaptive security control of the networked control systems. Because the cyber-physical system is a hybrid system, it adopts cross layer approach to handle the security control of the CPS. It presents a number of attack models according to the attack scenario and defense facilities, and a number of cross-layer co-design methodologies to secure the control of CPS.

Preface xiii
Symbols and Acronyms xv
1 Introduction
1(16)
1.1 Background
1(3)
1.2 Form of Attacks in NCSs
4(2)
1.3 Problem Studied in This Book
6(11)
1.3.1 Attacks in Networked Control Systems
6(3)
1.3.2 Resilient Control of WNCSs
9(1)
1.3.3 Application of Resilient Control to Power System
10(2)
1.3.4 Coupled Design of CPS under Attacks
12(5)
Part I The Attacks in Networked Control Systems
2 A Unified Game Approach for NCSs under DoS Attacks
17(28)
2.1 Introduction
17(1)
2.2 Problem Formulation
18(6)
2.2.1 The Model of NCS Subject to DoS Attack
18(2)
2.2.2 MTOC and CTOC Design
20(2)
2.2.3 Impact Metrics
22(1)
2.2.4 Defense and Attack Strategy Design
23(1)
2.3 MTOC and CTOC Control Strategies
24(8)
2.3.1 Finite Time Horizon Case
24(5)
2.3.2 Infinite Time Horizon Case
29(3)
2.4 Defense and Attack Strategies
32(3)
2.4.1 Development of Defense Strategies
33(1)
2.4.2 Development of Attack Strategies
34(1)
2.5 Numerical Simulation
35(8)
2.5.1 Building Model Description
35(2)
2.5.2 Strategy Design
37(1)
2.5.3 Robust Study
38(1)
2.5.4 Comparative Study
39(1)
2.5.5 Experiment Verification
40(3)
2.6 Conclusion
43(2)
3 Optimal Control for NCSs with Disturbances
45(18)
3.1 Introduction
45(1)
3.2 Problem Formulations
46(2)
3.3 Optimal Controller Design in the Delta Domain
48(3)
3.3.1 Finite-Time Horizon Case
48(1)
3.3.2 Infinite-Time Horizon Case
49(2)
3.4 Robustness Analysis of e-Optimum
51(6)
3.4.1 Finite-Time Horizon Case
51(4)
3.4.2 Infinite-Time Horizon Case
55(2)
3.5 Illustrate Examples
57(4)
3.5.1 Numerical Simulation
57(2)
3.5.2 Experimental Verification
59(2)
3.6 Conclusion
61(2)
4 Resilient NPC for NCSs against DoS Attack
63(22)
4.1 Introduction
63(1)
4.2 Problem Formulation and Preliminaries
64(5)
4.2.1 Optimal DoS Attack Scheme
64(2)
4.2.2 The Domain of Attraction
66(3)
4.3 Main Results
69(9)
4.3.1 Least Attack Steps
69(2)
4.3.2 Design of Kalman Filter
71(2)
4.3.3 Defense Strategy
73(4)
4.3.4 Algorithms of Attacks and Defenses
77(1)
4.4 Numerical Example
78(4)
4.5 Conclusion
82(3)
Part II Resilient Control of WNCSs
5 A Hierarchical Game Approach to Secure WNCSs
85(22)
5.1 Introduction
85(1)
5.2 Problem Setup
86(4)
5.2.1 Transmit Model with SINR
86(2)
5.2.2 Control Model under Disturbance
88(2)
5.3 Main Results
90(9)
5.3.1 Strategy Design for G 1
91(2)
5.3.2 Strategy Design for G 2
93(6)
5.3.3 Coupled Design for the WNCS
99(1)
5.4 Simulation Example
99(7)
5.5 Conclusion
106(1)
6 A Bayesian Game Approach to Secure WNCSs
107(20)
6.1 Introduction
107(1)
6.2 Problem Formulation
108(5)
6.2.1 WNCS Framework
108(1)
6.2.2 Wireless Communication Channel
109(2)
6.2.3 Beyasian Stackelberg Game Equilibrium
111(2)
6.3 Main Results
113(8)
6.3.1 Best Responses for Cyber-Layer Game
113(2)
6.3.2 Optimal Controller Design
115(4)
6.3.3 Coupled Design
119(2)
6.4 Numerical Example
121(3)
6.5 Conclusion
124(3)
Part III Application of Resilient Control to Power System
7 Quantifying the Impact of Attacks on NCSs
127(20)
7.1 Introduction
127(1)
7.2 Problem Formulation
128(3)
7.3 Main Results
131(12)
7.3.1 Multitasking Optimal Control Strategy
131(3)
7.3.2 Robustness Analysis of E-NE
134(9)
7.4 Numerical Examples
143(2)
7.5 Conclusion
145(2)
8 Resilient Control of CPS against Intelligent Attacker
147(16)
8.1 Introduction
147(1)
8.2 Problem Setting
148(3)
8.2.1 Hierarchical Model for RCS
148(2)
8.2.2 Design Objective
150(1)
8.3 Main Contents
151(5)
8.3.1 Stackelberg Configuration Strategy for G 1
151(2)
8.3.2 Stackelberg Control Strategy for G 2
153(3)
8.3.3 Coupled Design of RCS
156(1)
8.4 Numerical Case
156(3)
8.4.1 Dynamic Model
156(2)
8.4.2 Simulation Results
158(1)
8.4.3 Discussions
158(1)
8.5 Conclusion
159(4)
9 Multitasking Optimal Control of NCSs
163(26)
9.1 Introduction
163(1)
9.2 Problem Formulation
164(5)
9.2.1 Delta-Domain Model of NCS
164(3)
9.2.2 Design Objective for Multitasking NCS
167(2)
9.3 Main Results
169(11)
9.3.1 Design of the Control Strategy
169(4)
9.3.2 Robustness of E-NE
173(7)
9.4 Numerical Simulation
180(5)
9.5 Conclusion
185(4)
Part IV Coupled Design of CPS under Attacks
10 Coupled Design of IDS and CPS under DoS Attacks
189(18)
10.1 Introduction
189(1)
10.2 Problem Formulation
190(3)
10.2.1 Structure of RCS
190(1)
10.2.2 The Game
190(2)
10.2.3 Design Objective
192(1)
10.3 Main Content
193(9)
10.3.1 NE Configuration Strategy for G 1
193(2)
10.3.2 NE Control Strategy for G 2
195(5)
10.3.3 Coupled Design Problem
200(2)
10.4 Numerical Simulation
202(3)
10.4.1 Dynamic Model
202(1)
10.4.2 Simulation Results
203(2)
10.5 Conclusion and Future Work
205(2)
11 Attack-Tolerant Control for Nonlinear NCSs
207(16)
11.1 Introduction
207(1)
11.2 Problem Statement and Preliminaries
208(5)
11.2.1 Control Model
209(1)
11.2.2 Attack Model
210(3)
11.3 Iterative ADP Algorithm
213(3)
11.3.1 Formula Derived for Iterative ADP Algorithm
213(1)
11.3.2 Properties of Iterative ADP Algorithm
214(2)
11.4 Realization of Iterative ADP Algorithm by Neural Networks
216(3)
11.5 Numerical Example
219(2)
11.6 Conclusion
221(2)
12 Coupled Design of CPS under DoS Attacks
223(16)
12.1 Introduction
223(1)
12.2 Resilient and H∞ Optimal Control
224(9)
12.2.1 Attacks on ICS
224(1)
12.2.2 System Framework
225(1)
12.2.3 Optimal Defense Mechanism
226(3)
12.2.4 H∞ Optimal Control
229(3)
12.2.5 Coupled Design
232(1)
12.3 Numerical Simulation
233(4)
12.4 Conclusion
237(2)
13 Attack-Tolerant Control under DoS Attacks
239(28)
13.1 Introduction
239(1)
13.2 Preliminaries
240(1)
13.3 Problem Statement
241(5)
13.4 Optimal Strategy Design
246(14)
13.4.1 Optimal Defense Policy
246(3)
13.4.2 Hoo Optimal Control
249(8)
13.4.3 Joint Optimal Policy Design
257(3)
13.5 Numerical Simulation
260(5)
13.6 Conclusion
265(2)
References 267(10)
Index 277
Yuan Yuan was born in Xian, China, in 1986. He received the B.Sc. degree in electrical engineering from the School of Instrumental Science and Opto-electronics Engineering, Beihang University, Beijing, China, in 2009, and the Ph.D. degree in computer science and technology from the Department of Computer Science and Technology, Tsinghua University, Beijing, in 2015. He is currently a Research Fellow with the Department of Information Systems and Computing, Brunel University London, Uxbridge, U.K. His research interests include cyber-physical system, networked control systems, game theory and security of the control systems. He currently serves as the Associate Editor of Neurocomputing.