401
Views
8
CrossRef citations to date
0
Altmetric
Original Articles

A game-theoretic method for cross-layer stochastic resilient control design in CPS

ORCID Icon &
Pages 677-691 | Received 30 May 2017, Accepted 12 Nov 2017, Published online: 05 Jan 2018

References

  • Alpcan, T., & Basar, T. (2005). A game theoretic analysis of intrusion detection in access control systems. In Proceedings of the 43rd IEEE Conference on Decision and Control (CDC)l (Vol. 5, pp. 1568–1573). Nassau, Bahamas.
  • Amin, S., Litrico, X., Sastry, S. S., & Bayen, A. M. (2010). Stealthy deception attacks on water SCADA systems. In Proceedings of the 13th ACM International Conference on Hybrid Systems: Computation and Control (HSCC'10) (pp. 161–170). Stockholm, Sweden.
  • Anwar, A., & Mahmood, A. N. (2014). Vulnerabilities of smart grid state estimation against false data injection attack. Renewable energy integration. Singapore: Springer.
  • Basar, T., & Bernhard, P. (2008). H-Infinity optimal control and related minimax design problems: A dynamic game approach. Boston, MA: Birkhäuser.
  • Björk, T. (1980). Finite dimensional optimal filters for a class of ltô-processes with jumping parameters. Stochastics, 4(2), 167–183.
  • Ding, D., Wang, Z., Wei, G., & Alsaadi, F. E. (2016). Event-based security control for discrete-time stochastic systems. IET Control Theory & Applications, 10(15), 1808–1815.
  • Dragan, V., & Ivanov, I. (2011). A numerical procedure to compute the stabilising solution of game theoretic Riccati equations of stochastic control. International Journal of Control, 84(4), 783–800.
  • Forouzandehmehr, N., Esmalifalak, M., Mohsenian-Rad, H., & Han, Z. (2014). Autonomous demand response using stochastic differential games. IEEE Transactions on Smart Grid, 6(1), 291–300.
  • Gupta, R. A., & Chow, M. Y. (2010). Networked control system: Overview and research trends. IEEE Transactions on Industrial Electronics, 57(7), 2527–2535.
  • Huang, Y., Zhang, W., & Feng, G. (2007). Infinite horizon h2/h∞ control for stochastic systems with Markovian jumps. Automatica, 44(3), 2422–2427.
  • Krämer, B. J. (2014). Evolution of cyber-physical systems: A brief review. Applied cyber-physical systems. New York, NY: Springer.
  • Khaitan, S. K., & Mccalley, J. D. (2015). Design techniques and applications of cyberphysical systems: A survey. IEEE Systems Journal, 9(2), 350–365.
  • Langner, R. (2011). Stuxnet: Dissecting a cyberwarfare weapon. Security & Privacy IEEE, 9(3), 49–51.
  • Li, X., Zhou, X. Y., & Rami, M. A. (2003). Indefinite stochastic linear quadratic control with Markovian jumps in infinite time horizon. Journal of Global Optimization, 27(2), 149–175.
  • Mitchell, R., & Chen, I. R. (2015). Behavior rule specification-based intrusion detection for safety critical medical cyber physical systems. IEEE Transactions on Dependable & Secure Computing, 12(1), 16–30.
  • Mo, Y., Garone, E., Casavola, A., & Sinopoli, B. (2010). False data injection attacks against state estimation in wireless sensor networks. In Proceedings of the 49th IEEE Conference on Decision and Control (CDC) (Vol. 58, pp. 5967–5972). Atlanta, GA.
  • Mo, Y., & Sinopoli, B. (2009). Secure control against replay attacks. In 47th Annual Allerton Conference on Communication, Control, and Computing (pp. 911–918). Monticello, IL.
  • Munro, K. (2012). Deconstructing flame: The limitations of traditional defences. Computer Fraud & Security, 10, 8–11.
  • Penrose, R. (1955). A generalized inverse for matrices. Mathematical Proceedings of the Cambridge Philosophical Society, 51(3), 406–413.
  • Rieger, C. G. (2010). Notional examples and benchmark aspects of a resilient control system. In Proceedings of the 3rd International Symposium on Resilient Control Systems (pp. 64–71). Idaho Falls, ID.
  • Rieger, C. G., Gertman, D. I., & McQueen, M. A. (2009). Resilient control systems: Next generation design research. In Proceedings of the 2nd Conference on Human System Interactions (pp. 632–636). Catania, Italy.
  • Rong, X. (2015). Stochastic differential game formulation on the reinsurance and investment problem. International Journal of Control, 88(9), 1–17.
  • Shi, J., Wan, J., Yan, H., & Suo, H. (2011). A survey of cyber-physical systems, In Proceedings of International Conference on Wireless Communications & Signal Processing (WCSP). (Vol. 49, pp. 1–6). Nanjing, China.
  • Smith, J. M. (1976). Evolution and the theory of games. American Scientist, 64(1), 41.
  • Tsoumas, B., & Gritzalis, D. (2012). Inside cyber warfare: Mapping the cyber underworld. Computers & Security, 31(6), 801.
  • Wang, D., Wang, Z., Shen, B., & Alsaadi, F. E. (2017). Security-guaranteed filtering for discrete-time stochastic delayed systems with randomly occurring sensor saturations and deception attacks. International Journal of Robust & Nonlinear Control, 27(7), 1194–1208.
  • Wang, D., Wang, Z., Shen, B., Alsaadi, F. E., & Hayat, T. (2016). Recent advances on filtering and control for cyber-physical systems under security and resource constraints. Journal of the Franklin Institute, 353(11), 2451–2466.
  • Yang, T. C. (2006). Networked control system: A brief survey. IEE Proceedings on Control Theory and Applications, 153(4), 403–412.
  • Yuan, Y., Sun, F., & Liu, H. (2015). Resilient control of cyber-physical systems against intelligent attacker: A hierarchal Stackelberg game approach. International Journal of Systems Science, 47(9), 1–11.
  • Yuan, Y., Wang, Z., & Guo, L. (2017). Event-triggered strategy design for discrete-time nonlinear quadratic games with disturbance compensations: The noncooperative case. IEEE Transactions on Systems Man & Cybernetics Systems, 9(9), 1–12.
  • Yuan, Y., Yuan, H., Guo, L., Yang, H., & Sun, S. (2016). Resilient control of networked control system under dos attacks: A unified game approach. IEEE Transactions on Industrial Informatics, 12(5), 1786–1794.
  • Yuan, Y., Zhu, Q., Sun, F., Wang, Q., & Basar, T. (2013). Resilient control of cyber-physical systems against denial-of-service attacks. In Proceedings of the 6th International Symposium on Resilient Control Systems (ISRCS) (pp. 54–59). San Francisco, CA.
  • Zhu, Q., & Basar, T. (2011). Robust and resilient control design for cyber-physical systems with an application to power systems. In Proceedings of the 50th IEEE Conference on Decision and Control and European Control Conference (pp. 4066–4071). Orlando, FL.
  • Zhu, Q., & Basar, T. (2012a). A dynamic game-theoretic approach to resilient control system design for cascading failures. In Proceedings of the 1st International Conference on High Confidence Networked Systems - HiCoNS '12 (pp. 41–46). Beijing, China.
  • & Zhu, Q., Basar, T., Cambridge, London (2012b). A hierarchical security architecture for the smart grid. In E. Hossain, Z. Han, & H. V. Poor (Eds.), Smart grid communications and networking. Cambridge University Press. Cambridge, London.
  • Zhu, Q., & Basar, T. (2015). Game-theoretic methods for robustness, security, and resilience of cyberphysical control systems: Games-in-games principle for optimal cross-layer resilient control systems. IEEE Control Systems, 35(1), 46–65.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.