About the Authors |
|
xv | |
Acknowledgments |
|
xvii | |
Preface |
|
xix | |
1 An Overview |
|
1 | (36) |
|
|
1 | (1) |
|
1.2 Networked Control Systems: Challenges |
|
|
1 | (7) |
|
1.2.1 Basic Classification |
|
|
4 | (1) |
|
|
5 | (3) |
|
1.3 Current Key Ingredients |
|
|
8 | (12) |
|
1.3.1 Control of Networks |
|
|
10 | (1) |
|
1.3.2 Control Over Networks |
|
|
11 | (1) |
|
1.3.3 Delay Characteristics |
|
|
11 | (2) |
|
|
13 | (3) |
|
1.3.5 Quantization and Coding |
|
|
16 | (1) |
|
|
16 | (1) |
|
|
17 | (1) |
|
1.3.8 Internet-Based Control |
|
|
17 | (3) |
|
|
20 | (3) |
|
|
21 | (1) |
|
1.4.2 Knowledge and Big Data |
|
|
21 | (1) |
|
|
22 | (1) |
|
|
22 | (1) |
|
1.5 Cyberphysical Systems |
|
|
23 | (9) |
|
|
24 | (1) |
|
|
25 | (1) |
|
1.5.3 Cyberphysical Attacks |
|
|
26 | (1) |
|
|
27 | (1) |
|
1.5.5 Robustness, Resilience and Security |
|
|
28 | (1) |
|
|
29 | (3) |
|
|
32 | (1) |
|
|
33 | (4) |
2 Networked Control Systems' Fundamentals |
|
37 | (54) |
|
|
38 | (15) |
|
2.1.1 Quantization Errors |
|
|
39 | (3) |
|
|
42 | (6) |
|
2.1.3 Variable Sampling/Transmission Intervals |
|
|
48 | (1) |
|
2.1.4 Variable Transmission Delays |
|
|
49 | (3) |
|
2.1.5 Communication Constraints |
|
|
52 | (1) |
|
2.2 Control Approaches Over Networks |
|
|
53 | (19) |
|
2.2.1 Input Delay System Approach |
|
|
53 | (5) |
|
2.2.2 Markovian System Approach |
|
|
58 | (2) |
|
2.2.3 Switched System Approach |
|
|
60 | (5) |
|
2.2.4 Stochastic System Approach |
|
|
65 | (2) |
|
2.2.5 Impulsive System Approach |
|
|
67 | (2) |
|
2.2.6 Predictive Control Approach |
|
|
69 | (3) |
|
2.3 Advanced Issues in NCS |
|
|
72 | (6) |
|
2.3.1 Decentralized and Distributed NCS |
|
|
72 | (1) |
|
2.3.2 Event-Triggered Schemes |
|
|
73 | (1) |
|
2.3.3 Cloud Control System |
|
|
74 | (3) |
|
|
77 | (1) |
|
|
78 | (1) |
|
|
78 | (13) |
3 Cloud Computing |
|
91 | (36) |
|
|
91 | (1) |
|
3.2 Overview of Cloud Computing |
|
|
92 | (2) |
|
|
92 | (1) |
|
3.2.2 Related Technologies |
|
|
93 | (1) |
|
3.3 Cloud Computing Architecture |
|
|
94 | (4) |
|
3.3.1 A Layered Model of Cloud Computing |
|
|
94 | (1) |
|
|
95 | (1) |
|
|
96 | (2) |
|
3.4 Integrating CPS With the Cloud |
|
|
98 | (1) |
|
3.5 Cloud Computing Characteristics |
|
|
98 | (9) |
|
|
100 | (1) |
|
3.5.2 Cloud Computing Technologies |
|
|
100 | (1) |
|
3.5.3 Architectural Design of Data Centers |
|
|
100 | (2) |
|
3.5.4 Distributed File System Over Clouds |
|
|
102 | (1) |
|
3.5.5 Distributed Application Framework Over Clouds |
|
|
103 | (1) |
|
3.5.6 Commercial Products |
|
|
103 | (1) |
|
3.5.7 Microsoft Windows Azure Platform |
|
|
104 | (3) |
|
|
107 | (5) |
|
3.6.1 Automated Service Provisioning |
|
|
107 | (1) |
|
3.6.2 Virtual Machine Migration |
|
|
108 | (1) |
|
3.6.3 Server Consolidation |
|
|
108 | (1) |
|
|
109 | (1) |
|
3.6.5 Traffic Management and Analysis |
|
|
109 | (1) |
|
|
110 | (1) |
|
3.6.7 Software Frameworks |
|
|
110 | (1) |
|
3.6.8 Storage Technologies and Data Management |
|
|
111 | (1) |
|
3.6.9 Novel Cloud Architectures |
|
|
111 | (1) |
|
3.7 Progress of Cloud Computing |
|
|
112 | (5) |
|
3.7.1 The Major Providers |
|
|
114 | (1) |
|
3.7.2 Control in the Cloud |
|
|
114 | (1) |
|
|
115 | (1) |
|
3.7.4 Historian as a Service |
|
|
116 | (1) |
|
|
116 | (1) |
|
3.7.6 Control as a Service |
|
|
117 | (1) |
|
3.8 Cloud-Based Manufacturing |
|
|
117 | (3) |
|
3.8.1 Cloud-Based Services |
|
|
118 | (1) |
|
3.8.2 Conceptual Framework |
|
|
119 | (1) |
|
|
120 | (2) |
|
|
122 | (5) |
4 Control From the Cloud |
|
127 | (40) |
|
|
127 | (1) |
|
4.2 Towards Controlling From the Cloud |
|
|
128 | (15) |
|
|
128 | (3) |
|
4.2.2 Wireless Control Systems |
|
|
131 | (1) |
|
4.2.3 ,Basic Classification |
|
|
132 | (1) |
|
4.2.4 Remote Control Systems |
|
|
133 | (2) |
|
4.2.5 Some Prevailing Challenges |
|
|
135 | (1) |
|
4.2.6 Reflections on Industrial Automation |
|
|
136 | (3) |
|
4.2.7 Quality-of-Service (QoS) |
|
|
139 | (1) |
|
4.2.8 Preliminary Control Models |
|
|
140 | (3) |
|
4.3 Cloud Control Systems |
|
|
143 | (19) |
|
|
144 | (1) |
|
4.3.2 Model Based Networked Control Systems |
|
|
145 | (3) |
|
4.3.3 Data Driven Networked Control Systems Design |
|
|
148 | (1) |
|
4.3.4 Networked Multiagent Systems |
|
|
149 | (2) |
|
4.3.5 Control of Complex Systems |
|
|
151 | (2) |
|
4.3.6 Cloud Control System Concepts |
|
|
153 | (2) |
|
4.3.7 A Rudiment of Cloud Control Systems |
|
|
155 | (4) |
|
4.3.8 Cooperative Cloud Control |
|
|
159 | (3) |
|
|
162 | (1) |
|
|
162 | (5) |
5 Secure Control Design Techniques |
|
167 | (92) |
|
|
167 | (8) |
|
|
168 | (1) |
|
5.1.2 Workflow Within CPS |
|
|
169 | (1) |
|
|
170 | (2) |
|
5.1.4 Robust Networked Control Systems |
|
|
172 | (1) |
|
5.1.5 Resilient Networked Systems Under Attacks |
|
|
173 | (2) |
|
5.2 Time-Delay Switch Attack |
|
|
175 | (17) |
|
|
176 | (1) |
|
|
176 | (4) |
|
5.2.3 Control Methodology |
|
|
180 | (5) |
|
5.2.4 Procedure for Controller Design |
|
|
185 | (1) |
|
5.2.5 Simulation Example 5.1 |
|
|
186 | (1) |
|
5.2.6 Simulation Example 5.2 |
|
|
187 | (1) |
|
5.2.7 Simulation Example 5.3 |
|
|
188 | (2) |
|
5.2.8 Simulation Example 5.4 |
|
|
190 | (2) |
|
5.3 Security Control Under Constraints |
|
|
192 | (19) |
|
5.3.1 Problem Formulation |
|
|
193 | (2) |
|
|
195 | (7) |
|
|
202 | (2) |
|
5.3.4 Terminal State With a Continuous Distribution |
|
|
204 | (4) |
|
5.3.5 Simulation Example 5.5 |
|
|
208 | (3) |
|
5.4 Lyapunov-Based Methods Under Denial-of-Service |
|
|
211 | (15) |
|
5.4.1 Networked Distributed System |
|
|
211 | (1) |
|
5.4.2 DoS Attacks' Frequency and Duration |
|
|
212 | (1) |
|
5.4.3 A Small-Gain Approach for Networked Systems |
|
|
213 | (4) |
|
5.4.4 Stabilization of Distributed Systems Under DoS |
|
|
217 | (3) |
|
5.4.5 A Hybrid Transmission Strategy |
|
|
220 | (1) |
|
5.4.6 Zeno-Free Event-Triggered Control in the Absence of DoS |
|
|
220 | (2) |
|
5.4.7 Hybrid Transmission Strategy Under DoS |
|
|
222 | (2) |
|
5.4.8 Simulation Example 5.6 |
|
|
224 | (1) |
|
5.4.9 Simulation Example 5.7 |
|
|
225 | (1) |
|
5.5 Stabilizing Secure Control |
|
|
226 | (25) |
|
5.5.1 Process Dynamics and Ideal Control Action |
|
|
228 | (1) |
|
5.5.2 DoS and Actual Control Action |
|
|
229 | (1) |
|
|
230 | (1) |
|
5.5.4 Stabilizing Control Update Policies |
|
|
231 | (4) |
|
5.5.5 Time-Constrained DoS |
|
|
235 | (1) |
|
5.5.6 ISS Under Denial-of-Service |
|
|
236 | (11) |
|
5.5.7 Simulation Example 5.8 |
|
|
247 | (1) |
|
5.5.8 Simulation Example 5.9 |
|
|
247 | (1) |
|
5.5.9 Simulation Example 5.10 |
|
|
248 | (1) |
|
5.5.10 Simulation Example 5.11 |
|
|
249 | (2) |
|
|
251 | (2) |
|
|
253 | (6) |
6 Case Studies |
|
259 | (56) |
|
6.1 Hybrid Cloud-Based SCADA Approach |
|
|
259 | (8) |
|
6.1.1 Cloud-Based SCADA Concept |
|
|
260 | (3) |
|
6.1.2 Architecture Adaptation |
|
|
263 | (3) |
|
|
266 | (1) |
|
6.2 Smart Grid Under Time Delay Switch Attacks |
|
|
267 | (21) |
|
|
267 | (3) |
|
|
270 | (2) |
|
6.2.3 TDS Attack as Denial-of-Service (DoS) Attack |
|
|
272 | (2) |
|
6.2.4 A Crypto-Free TDS Recovery Protocol |
|
|
274 | (1) |
|
6.2.5 Decision Making Unit (DMU) |
|
|
275 | (1) |
|
6.2.6 Delay Estimator Unit (DEU) |
|
|
276 | (2) |
|
6.2.7 Stability of the LFC Under TDS Attack |
|
|
278 | (1) |
|
6.2.8 Simulation Example 6.1 |
|
|
279 | (9) |
|
6.3 Multisensor Track Fusion-Based Model Prediction |
|
|
288 | (21) |
|
6.3.1 State Representation of Observation Model |
|
|
291 | (1) |
|
6.3.2 Electromechanical Oscillation Model Formulation |
|
|
292 | (1) |
|
6.3.3 Initial Correlation Information |
|
|
293 | (3) |
|
6.3.4 Computation of Crosscovariance |
|
|
296 | (3) |
|
6.3.5 Moving Horizon Estimate |
|
|
299 | (1) |
|
6.3.6 Track Fusion Center |
|
|
300 | (1) |
|
6.3.7 Evaluation of Residuals |
|
|
301 | (1) |
|
6.3.8 N$imulation Studies |
|
|
302 | (7) |
|
|
309 | (2) |
|
|
311 | (4) |
7 Smart Grid Infrastructures |
|
315 | (36) |
|
7.1 Cyberphysical Security |
|
|
315 | (14) |
|
|
315 | (1) |
|
7.1.2 Pricing and Generation |
|
|
316 | (1) |
|
7.1.3 Cyberphysical Approach to Smart Grid Security |
|
|
317 | (2) |
|
|
319 | (1) |
|
7.1.5 Cybersecurity Requirements |
|
|
320 | (1) |
|
|
321 | (4) |
|
|
325 | (4) |
|
7.2 System Theoretic Approaches |
|
|
329 | (11) |
|
|
329 | (1) |
|
7.2.2 Security Requirements |
|
|
330 | (1) |
|
|
331 | (1) |
|
|
331 | (1) |
|
7.2.5 Needs for Cyberphysical Security |
|
|
332 | (2) |
|
|
334 | (1) |
|
7.2.7 Defense Against Replay Attacks |
|
|
334 | (3) |
|
7.2.8 Cybersecurity Investment |
|
|
337 | (3) |
|
7.3 Wide-Area Monitoring, Protection and Control |
|
|
340 | (5) |
|
|
341 | (1) |
|
7.3.2 Wide-Area Monitoring, Protection and Control |
|
|
341 | (2) |
|
7.3.3 Cyberattack Taxonomy |
|
|
343 | (1) |
|
7.3.4 Cyberattack Classification |
|
|
344 | (1) |
|
7.3.5 Coordinated Attacks on WAMPAC |
|
|
345 | (1) |
|
|
345 | (2) |
|
|
347 | (4) |
8 Secure Resilient Control Strategies |
|
351 | (38) |
|
8.1 Basis for Resilient Cyberphysical System |
|
|
351 | (2) |
|
8.1.1 Networked Control System Models |
|
|
352 | (1) |
|
8.2 Resilient Design Approach |
|
|
353 | (14) |
|
|
354 | (1) |
|
|
355 | (1) |
|
|
356 | (1) |
|
|
357 | (1) |
|
|
357 | (3) |
|
8.2.6 Switching the Controller |
|
|
360 | (4) |
|
8.2.7 Simulation Example 8.1 |
|
|
364 | (3) |
|
8.3 Remote State Estimation Under DoS Attacks |
|
|
367 | (17) |
|
|
368 | (2) |
|
|
370 | (1) |
|
8.3.3 Process and Sensor Model |
|
|
370 | (1) |
|
8.3.4 Multichannel Communication and Attack Model |
|
|
371 | (1) |
|
8.3.5 Remote State Estimation |
|
|
372 | (1) |
|
8.3.6 Problem of Interest |
|
|
372 | (1) |
|
8.3.7 Stochastic Game Framework |
|
|
373 | (3) |
|
|
376 | (1) |
|
8.3.9 Extension to Power-Level Selection |
|
|
377 | (1) |
|
8.3.10 Equilibrium Analysis |
|
|
377 | (1) |
|
8.3.11 Learning Methodology |
|
|
378 | (3) |
|
8.3.12 Simulations Example 8.2 |
|
|
381 | (3) |
|
|
384 | (1) |
|
|
385 | (4) |
9 Cyberphysical Security Methods |
|
389 | (68) |
|
9.1 A Generalized Game Theoretic Approach |
|
|
389 | (25) |
|
9.1.1 Physical Layer Control Problem |
|
|
391 | (1) |
|
|
392 | (1) |
|
9.1.3 Perfect-State Feedback Control |
|
|
393 | (3) |
|
9.1.4 Cyberlayer Defense System |
|
|
396 | (2) |
|
9.1.5 Linear Quadratic Problem |
|
|
398 | (2) |
|
|
400 | (2) |
|
9.1.7 Games-in-Games Structure |
|
|
402 | (1) |
|
9.1.8 Simulation Example 9.1 |
|
|
403 | (3) |
|
9.1.9 Defense Against Denial-of-Service Attack |
|
|
406 | (1) |
|
9.1.10 Control System Model |
|
|
406 | (1) |
|
9.1.11 Intrusion Detection Systems |
|
|
407 | (3) |
|
9.1.12 Crosslayer Control Design |
|
|
410 | (2) |
|
9.1.13 Simulation Example 11.2 |
|
|
412 | (1) |
|
9.1.14 Linear Programming for Computing Saddle-Point Equilibrium |
|
|
413 | (1) |
|
9.2 Game-Theoretic Approach |
|
|
414 | (18) |
|
|
414 | (2) |
|
9.2.2 Model of NCS Subject to DoS Attack |
|
|
416 | (1) |
|
9.2.3 Optimal Tasking Design |
|
|
417 | (1) |
|
9.2.4 Defense and Attack Strategy Design |
|
|
418 | (1) |
|
9.2.5 Tasking Control Strategies |
|
|
419 | (3) |
|
9.2.6 Defense and Attack Strategies |
|
|
422 | (1) |
|
9.2.7 Development of Defense Strategies |
|
|
423 | (1) |
|
9.2.8 Development of Attack Strategies |
|
|
424 | (2) |
|
|
426 | (1) |
|
|
427 | (1) |
|
|
428 | (1) |
|
|
429 | (1) |
|
|
430 | (2) |
|
9.3 Convex Optimization Problems |
|
|
432 | (17) |
|
|
433 | (2) |
|
9.3.2 Cybermission Damage Model |
|
|
435 | (1) |
|
9.3.3 Known Mission Damage Data |
|
|
436 | (4) |
|
9.3.4 Unknown Mission Damage Data |
|
|
440 | (2) |
|
|
442 | (1) |
|
|
442 | (2) |
|
9.3.7 Actions Available to Every Team |
|
|
444 | (1) |
|
9.3.8 Optimization Schemes and iCTF |
|
|
445 | (1) |
|
|
446 | (3) |
|
|
449 | (4) |
|
|
453 | (4) |
A Appendix |
|
457 | (18) |
|
A.1 Preliminaries and Notations |
|
|
457 | (2) |
|
A.2 A Brief of Game Theory |
|
|
459 | (6) |
|
|
459 | (1) |
|
A.2.2 General Game Model and Equilibrium Concept |
|
|
460 | (1) |
|
A.2.3 A Stochastic Game Formulation |
|
|
461 | (2) |
|
|
463 | (2) |
|
|
465 | (1) |
|
A.4 Linear Matrix Inequalities |
|
|
466 | (4) |
|
|
466 | (1) |
|
A.4.2 Some Standard Problems |
|
|
467 | (2) |
|
|
469 | (1) |
|
A.5 Some Lyapunov-Krasovskii Functionals |
|
|
470 | (1) |
|
A.6 Some Formulae for Matrix Inverses |
|
|
470 | (2) |
|
A.6.1 Inverses of Block Matrices |
|
|
471 | (1) |
|
A.6.2 Matrix Inversion Lemma |
|
|
472 | (1) |
|
A.7 Partial Differentiation |
|
|
472 | (1) |
|
|
473 | (2) |
Index |
|
475 | |