1,228
Views
70
CrossRef citations to date
0
Altmetric
Original Articles

Resilient control of cyber-physical systems against intelligent attacker: a hierarchal stackelberg game approach

, &
Pages 2067-2077 | Received 12 Mar 2014, Accepted 02 Oct 2014, Published online: 07 Jan 2015

References

  • Alpcan, T., & Basar, T. (2004). A game theoretic analysis of intrusion detection in access control systems. In Proceedings of the 43rd IEEE Conference on Decision and Control (pp. 1568–1573). Atlantis.
  • Alpcan, T., & Başar, T. (2010). Network security: A decision and game-theoretic approach. Cambridge: Cambridge University Press.
  • Amin, S., Cardenas, A.A., & Sastry, S.S. (2009). Safe and secure networked control systems under denial-of-service attacks. In Hybrid Systems: Computation and Control (pp. 31–45). Heidelberg: Springer.
  • Baillieul, J., & Antsaklis, P.J. (2007). Control and communication challenges in networked real-time systems. Proceedings of the IEEE, 95, 9–28.
  • Başar, T., & Bernhard, P. (2008). H optimal control and related minimax design problems: A dynamic game approach. Boston, MA: Birkhauser.
  • Carl, G., Kesidis, G., Brooks, R.R., & Rai, S. (2006). Denial-of-service attack-detection techniques. Internet Computing, 10, 82–89.
  • Chen, T.M., & Abu-Nimeh. S,. (2011). Lessons from stuxnet. Computer, 44, 91–93.
  • Creery, A., & Byres, E.J. (2005). Industrial cyber security for power system and SCADA networks. In Proceedings of the Petroleum and Chemical Industry Conference (pp. 303–309). Denver, CO.
  • Dan, G., & Sandberg, H. (2010). Stealth attacks and protection schemes for state estimators in power systems. In Proceedings of the 1st International Conference on Smart Grid Communications (pp. 214–219). Maryland.
  • Elbsat, M.N., & Yaz, E.E. (2013). Robust and resilient finite-time bounded control of discrete-time uncertain nonlinear systems. Automatica, 49, 2292–2296.
  • Geer, D. (2006). Security of critical control systems sparks concern. Computer, 39, 20–23.
  • Greengard, S. (2010). The new face of war. Communications of the ACM, 53, 20–22.
  • Huang, Y.L., Cárdenas, A.A., Amin, S., Lin, Z.S., Tsai, H.Y., & Sastry, S.S. (2009). Understanding the physical and economic consequences of attacks on control systems. International Journal of Critical Infrastructure Protection, 2, 73–83.
  • Isidori, A., & Astolfi, A. (1992). Disturbance attenuation and H∞ control via measurement feedback in nonlinear systems. IEEE Transactions on Automatic Control, 37, 1283–1293.
  • Jiang, L., Yao, W., Wu, Q.H., Wen, J.Y., & Cheng, S.J. (2012). Delay-dependent stability for load frequency control with constant and time-varying delays. IEEE Transactions on Power Systems, 27, 932–941.
  • Korzhyk, D., Conitzer, V., & Parr, R. (2010). Complexity of computing optimal stackelberg strategies in security resource allocation games. In Proceedings of the 24th AAAI Conference on Artificial Intelligence (pp. 805–810). Georgia.
  • Long, M., Wu, C.H.J., & Hung, J.Y. (2005). Denial of service attacks on network-based control systems: Impact and mitigation. IEEE Transactions on Industrial Informatics, 1, 85–96.
  • Mahmoud, M.S. (2004). Resilient linear filtering of uncertain systems. Automatica, 40, 1797–1802.
  • Matusitz, J., & Minei, E. (2009). Cyberterrorism: Its effects on health-related infrastructures. Journal of Digital Forensic Practice, 2, 161–171.
  • Mo, Y., & Sinopoli, B. (2009). Secure control against replay attacks. In Proceedings of the 47th Annual Allert on Conference on Communication, Control, and Computing (pp. 911–918). Champaign, IL.
  • Moon, J., & Basar, T. (2013). Control over TCP-like lossy networks: A dynamic game approach. In Proceedings of the American Control Conference (pp. 1578–1583). Washington, DC.
  • Rieger, C.G., Gertman, D.I., & McQueen, M.A. (2009). Resilient control systems: Next generation design research. In Proceedings of the 2nd International Conference on Human System Interactions (pp. 632–636). Catania.
  • Tang, Y., Luo, X., Hui, Q., & Chang, R. (2014). Modeling the vulnerability of feedback-control based internet services to low-rate DoS attacks. IEEE Transactions on Information Forensics and Security, 9, 339–353.
  • Xu, W., Trappe, W., Zhang, Y., & Wood, T. (2005). The feasibility of launching and detecting jamming attacks in wireless networks. In Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing (pp. 46–57). Champaign.
  • Yuan, Y., Zhu, Q., Sun, F., Wang, Q., & Başar, T. (2013). Resilient control of cyber-physical systems against Denial-of-Service attacks. In Proceedings of the 6th International Symposium on Resilient Control Systems (pp. 54–59), San Francisco, CA.
  • Zeng, W., & Chow, M.Y. (2011). A trade-off model for performance and security in secured networked control systems. In Proceedings of the 20th IEEE International Symposium on Industrial Electronics (pp. 1997–2002). Gdansk.
  • Zhu, Q., & Başar, T. (2009). Dynamic policy-based IDS configuration. In Proceedings of the 48th IEEE Conference on Decision and Control (pp. 8600–8605). Shanghai.
  • Zhu, Q., & Başar, T. (2011). Robust and resilient control design for cyber-physical systems with an application to power systems. In Proceedings of the 50th Decision and Control and European Control Conference (pp. 4066–4071). Florida.
  • Zhu, Q., Rieger, C., & Basar, T. (2011). A hierarchical security architecture for cyber-physical systems. In Proceedings of 4th International Symposium on Resilient Control Systems (pp. 15–20). Boise, ID.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.