250
Views
1
CrossRef citations to date
0
Altmetric
Articles

Anomaly detection and resilient control of networked control system with multi-hop routing

, &
Pages 1202-1215 | Received 20 Jun 2018, Accepted 17 Mar 2019, Published online: 03 May 2019

References

  • Chen, R., Li, X., Zhong, H., & Fei, M. (2018). A novel online detection method of data injection attack against dynamic state estimation in smart grid. Neurocomputing. DOI:10.1016/j.neucom.2018.09.094
  • Dazhong, Z. (2002). Linear systems theory. Beijin: Tsinghua Press.
  • Di Benedetto, M. D., D'Innocenzo, A., & Smarra, F. (2014). Fault-tolerant control of a wireless HVAC control system. International symposium on communications, control and signal processing (pp. 235–238), Athens, Greece.
  • D'Innocenzo, A., Di Benedetto, M. D., & Serra, E. (2013). Fault tolerant control of multi-hop control networks. IEEE Transactions on Automatic Control, 58(6), 1377–1389. doi: 10.1109/TAC.2012.2235719
  • D'Innocenzo, A., Di Benedetto, M. D., & Smarra, F. (2013). Fault detection and isolation of malicious nodes in MIMO multi-hop control networks. 52nd IEEE conference on decision and control (pp. 5276–5281), Florence, Italy.
  • D'Innocenzo, A., Smarra, F., & Di Benedetto, M. D. (2016). Resilient stabilization of multi-hop control networks subject to malicious attacks. Automatica, 71, 1–9. doi: 10.1016/j.automatica.2016.04.016
  • Du, D., Chen, R., Li, X., Wu, L., Zhou, P., & Fei, M. (2018). Malicious data deception attacks against power systems: A new case and its detection method. Transactions of the Institute of Measurement and Control. DOI:10.1177/0142331217740622
  • Du, D., Li, X., Li, W., Chen, R., Fei, M., & Wu, L. (2019). ADMM-based distributed state estimation of smart grid under data deception and denial of service attacks. IEEE Transactions on Systems, Man, and Cybernetics: Systems. DOI:10.1109/TSMC.2019.2896292
  • Du, D., Qi, B., Fei, M., & Peng, C. (2015). Multiple event-triggered H2/H∞ filtering for hybrid networked systems with random network-induced delays. Information Sciences, 325, 393–408. doi: 10.1016/j.ins.2015.07.026
  • Du, D., Qi, B., Fei, M., & Wang, Z. (2017). Quantized control of distributed event-triggered networked control systems with hybrid wired-wireless networks communication constraints. Information Sciences, 380, 74–91. doi: 10.1016/j.ins.2016.03.033
  • Faragher, R. (2012). Understanding the basis of the Kalman filter via a simple and intuitive derivation. IEEE Signal Processing Magazine, 29(5), 128–132. doi: 10.1109/MSP.2012.2203621
  • Feng, Z., Zhu, J., & Allen, R. (2007). Design of continuous and discrete LQI control systems with stable inner Loops. Journal of Shanghai Jiao Tong University (Science), E-12(6), 787–792.
  • Gong, D. (2004). Theoretical introduction to discrete control system. Beijin: China Railway Press.
  • Gu, G. (2012). Discrete-time linear systems theory and design with applications. New York, NY: Springer.
  • Gupta, V., Dana, A. F., Hespanha, J. P., Murray, R. M., & Hassibi, B. (2009). Data transmission over networks for estimation and control. IEEE Transactions on Automatic Control, 54(8), 1807–1819. doi: 10.1109/TAC.2009.2024567
  • Han, C., Jia, L., & Peng, D. (2018). Model predictive control of batch processes based on two-dimensional integration frame. Nonlinear Analysis: Hybrid Systems, 28, 75–86.
  • Hespanha, J. P. (2009). Linear systems theory. Princeton, NJ: Princeton Press.
  • Hu, L., Wang, Z., Han, Q. L., & Liu, X. (2018). State estimation under false data injection attacks: Security analysis and system protection. Automatica, 87, 176–183. doi: 10.1016/j.automatica.2017.09.028
  • Jie, X., Wang, H., Fei, M., Du, D., Sun, Q., & Yang, T. C. (2018). Anomaly behavior detection and reliability assessment of control systems based on association rules. International Journal of Critical Infrastructure Protection, 22, 90–99. doi: 10.1016/j.ijcip.2018.06.001
  • Manandhar, K., Cao, X., Hu, F., & Liu, Y. (2014). Detection of faults and attacks including false data injection attack in smart grid using Kalman filter. IEEE Transactions on Control of Network Systems, 1(4), 370–379. doi: 10.1109/TCNS.2014.2357531
  • Mao, S., & Zhou, J. (2007). Probability theory and mathematical statistics. Beijin: China Statistics Press.
  • Markam, V., & Dubey, L. S. M. (2012). A general study of associations rule mining in intrusion detection system. International Journal of Emerging Technology and Advanced Engineering, 2(1), 347–356.
  • Mo, Y., Garone, E., Casavola, A., & Sinopoli, B. (2010). False data injection attacks against state estimation in wireless sensor networks. 49th IEEE conference on decision and control (pp. 5967–5972), Atlanta, GA, USA.
  • Nisbina, H., Umakoshi, K., & Hashimoto, Y. (1997). Control of air temperature in nursery plants production system by LQI control with Kalman filter. IFAC Proceedings Volumes, 30(26), 13–18. doi: 10.1016/S1474-6670(17)41238-9
  • Pajic, M., Sundaram, S., Pappas, G. J., & Mangharam, R. (2011). The wireless control network: A new approach for control over networks. IEEE Transactions on Automatic Control, 56(10), 2305–2318. doi: 10.1109/TAC.2011.2163864
  • Parwekar, P, Rodda, S, & Kaur, P. (2018). Mobile sink as checkpoints for fault detection towards fault tolerance in wireless sensor networks. Journal of Global Information Management, 26(3), 78–89. doi: 10.4018/JGIM.2018070106
  • Prakash, J., Patwardhan, S. C., & Narasimhan, S. (2002). A supervisory approach to fault-tolerant control of linear multivariable systems. Industrial & Engineering Chemistry Research, 41(9), 2270–2281. doi: 10.1021/ie010030q
  • Rajeev, Alur., Alessandro, D'Innocenzo., Karl H., H.Johansson., George J., Pappas., & Gera, Weiss. (2009). Modeling and analysis of multi-hop control networks. 15th IEEE real-time and embedded technology and applications symposium (pp. 223–232), San Francisco, CA, USA.
  • Ramachandran, K. M., & Tsokos, C. P. (2015). Mathematical statistics with applications in R (2nd ed.). Salt Lake City, UT: Academic Press.
  • Rezha, F. P., & Shin, S. Y. (2014). Performance analysis of ISA100.11a under interference from an IEEE 802.11b wireless network. IEEE Transactions on Industrial Informatics, 10(2), 919–927. doi: 10.1109/TII.2014.2307016
  • Smarra, F., D'Innocenzo, A., & Di Benedetto, M. D. (2012). Fault tolerant stabilizability of MIMO multi-hop control networks. Proceedings of the 3rd IFAC workshop on distributed estimation and control in networked systems (pp. 79–84), Santa Barbara, CA, USA.
  • Song, J., Han, S., Mok, A., Chen, D., Lucas, M., Nixon, M., & Pratt, W. (2008b). WirelessHART: Applying wireless technology in real-time industrial process control. IEEE real-time and embedded technology and applications symposium (pp. 377–386), St. Louis, MO, USA.
  • Song, J., Han, S., Zhu, X., Mok, A., Chen, D., & Nixon, M. (2008a). Demo abstract: A complete wirelessHART network. Proceedings of the 6th ACM conference on embedded network sensor systems (pp. 381–382), Raleigh, NC, USA.
  • Sun, Q., Lim, C., Shi, P., & Liu, F. (2018). Design and stability of moving horizon estimator for Markov jump linear systems. IEEE Transactions on Automatic Control. DOI:10.1109/TAC.2018.2816102
  • Tajbakhsh, A., Rahmati, M., & Mirzaei, A. (2009). Intrusion detection using fuzzy association rules. Applied Soft Computing, 9, 462–469. doi: 10.1016/j.asoc.2008.06.001
  • Tanenbaum, A. S., & Wetherall, D. J. (2011). Computer networks. Upper Saddle River, NJ: Prentice Hall.
  • Tarokh, M. (1986). Frequency-domain criteria for controllability and observability of multivariable systems. Proceedings of the American control conference (pp. 18–20), Seattle, WA, USA.
  • Wang, M., Qiu, J., & Feng, G. (2018a). Finite frequency memory output feedback controller design for T–S fuzzy dynamical systems. IEEE Transactions on Fuzzy Systems, 26(6), 3301–3313. doi: 10.1109/TFUZZ.2018.2821654
  • Wang, M., Qiu, J., & Feng, G. (2018b). A novel piecewise affine filtering design for T–S fuzzy affine systems using past output measurements. IEEE Transactions on Cybernetics. doi:10.1109/TCYB.2018.2883476
  • Wang, M., Qiu, J., & Feng, G. (2018c). Finite frequency filtering design for uncertain discrete-time systems using past output measurements. IEEE Transactions on Circuits and Systems I: Regular Papers, 65(9), 3005–3013. doi: 10.1109/TCSI.2018.2824315
  • Wang, T., Qiu, J., Fu, S., & Ji, W. (2017). Distributed fuzzy H∞ filtering for nonlinear multirate networked double-layer industrial processes. IEEE Transactions on Industrial Electronics, 64(6), 5203–5211. doi: 10.1109/TIE.2016.2622234
  • Wang, T., Qiu, J., Gao, H., & Wang, C. (2017). Network-based fuzzy control for nonlinear industrial processes with predictive compensation strategy. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 47(8), 2137–2147. doi: 10.1109/TSMC.2016.2616904
  • Wang, T., Qiu, J., Yin, S., Gao, H., Fan, J., & Chai, T. (2016). Performance-based adaptive fuzzy tracking control for networked industrial processes. IEEE Transactions on Cybernetics, 46(8), 1760–1770. doi: 10.1109/TCYB.2016.2551039
  • Welch, G., & Bishop, G. (2001). An introduction to the Kalman filter. New York, NY: ACM, Inc.
  • Zhonghua, P., Fangyuan, H., Yuguo, Z., & Dehui, S. (2015). False data injection attacks for output tracking control systems. Proceedings of the 34th Chinese control conference (pp. 6747–6752), Hangzhou, China.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.