2,323
Views
9
CrossRef citations to date
0
Altmetric
Articles

A survey on the recent development of securing the networked control systems

&
Pages 54-64 | Received 26 Sep 2018, Accepted 05 Jan 2019, Published online: 14 Jan 2019

References

  • Alpcan, T., & Başar, T. (2010). Network security: A decision and game theoretic approach. Cambridge: Cambridge Univ. Press.
  • Amin, S., Cardenas, A. A., & Sastry, S. S. (2009). Hybrid systems: Computation and control. Berlin: Springer-Verlag.
  • Basar, T., & Olsder, G. J. (1995). Dynamic noncooperative game theory. London: Academic Press.
  • Befekadu, G. K., Gupta, V., & Antsaklis, P. J. (2015). Risk-sensitive control under markov modulated denial-of-service (dos) attack strategies. IEEE Transactions on Automatic Control, 60(12), 3299–3304.
  • Caballero, R., Hermoso, A., & Linares, J. (2015). Optimal state estimation for networked systems with random parameter matrices, correlated noises and delayed measurements. Automatica, 44(2), 142–154.
  • Cárdenas, A., Amin, S., & Sastry, S. (2008). Research challenges for the security of control systems. In Usenix Workshop on Hot Topics in Security (pp. 629–633). San Jose, CA.
  • Carl, G., Kesidis, G., Brooks, R. R., & Rai, S. (2006). Denial-of-service attack-detection techniques. IEEE Internet Computing Magazine, 10(1), 82–89.
  • Chen, H., Gao, J., Shi, T., & Lu, R. (2016). H∞ control for networked control systems with time delay, data packet dropout and disorder. Neurocomputing, 179, 211–218.
  • Chen, P., & Han, Q. (2016). On designing a novel self-triggered sampling scheme for networked control systems with data losses and communication delays. IEEE Transactions on Industrial Electronics, 63(2), 1239–1248.
  • Chen, C., Song, M., Xin, C., & Backens, J. (2013). A game-theoretical anti-jammingi scheme for cognitive radio networks. IEEE Network, 27(3), 22–27.
  • Chorppath, A. K., Alpcan, T., & Boche, H. (2016). Bayesian mechanisms and detection methods for wireless network with malicious users. IEEE Transactions on Mobile Computing, 15(10), 2452–2465.
  • Dan, G., & Sandberg, H. (2010). Stealth attacks and protection schemes for state estimators in power systems. In Proceedings of IEEE international conference on smart grid communications (pp. 214–219), Gaithersburg, MD, USA.
  • Dong, H., Wang, Z., & Gao, H. (2016). Distributed hinfinity filtering for a class of Markoviani jump nonlinear time-delay systems over lossy sensor networks. IEEE Transactions on Industrial Electronics, 60(10), 4665–4672.
  • Du, S., Sun, X., & Wang, W. (2014). Guaranteed cost control for uncertain networked control systems with predictive scheme. IEEE Transactions on Automation and Engineering, 11(3), 740–748.
  • Eyisi, E., Koutsoukos, X., & Kottenstette, N. (2012). Passivity-based trajectory tracking control with adaptive sampling over a wireless network. In Proceedings of the 5th international symposium on resilient control systems (pp. 130–136). Salt Lake, UT.
  • Geer, D. (2006). Security of critical control systems sparks concern. Computer, 39(1), 20–23.
  • Ginoya, D., Shendge, P. D., & Phadke, S. B. (2015). Disturbance observer based sliding mode control of nonlinear mismatched uncertain systems. Communications in Nonlinear Science and Numerical Simulation, 26(1), 98–107.
  • Giorgi, S., Saleheen, F., Ferrese, F., & Won, C. H. (2012). Adaptive neural replication and resilient control despite malicious attacks. In Proceedings of the 5th international symposium on resilient control systems (pp. 112–117). Salt Lake, UT.
  • Guo, G. (2010). Linear system with medium-access constraint and markov actuator assignment. IEEE Transactions on Circuits and Systems-I: Regular Papers, 57(11), 2999–3010.
  • Guo, L., & Cao, S. (2014). Anti-disturbance control theory for systems with multiple disturbances: A survey. ISA Transactions, 53(4), 846–849.
  • Guo, L., & Chen, W. (2005). Disturbance attenuation and rejection for systems with nonlinearity via dobc approach. International Journal of Robust and Nonlinear Control, 15, 109–125.
  • Guo, G., & Jin, H. (2010). A switching system approach to actuator assignment with limited channels. International Journal of Robust and Nonlinear Control, 20(12), 1407–1426.
  • Guo, G., Lu, Z., & Han, Q. (2012). Icontrol with markov sensor/actuator assignment. IEEE Transactions on Automatic Control, 57(7), 1799–1804.
  • Guo, Z., Shi, D., Johansson, K. H., & Shi, L. (2017). Optimal linear cyber-attack on remote state estimation. IEEE Transactions on Control of Network Systems, 4(1), 4–13.
  • Han, S., Xie, M., Chen, H., & Ling, Y. (2014). Intrusion detection in cyber-physical systems: Techniques and challenges. IEEE Systems Journal, 8(4), 1049–1059.
  • He, X., Wang, Z., Wang, X., & Zhou, D. (2014). Networked strong tracking filtering with multiple packet dropouts: Algorithms and applications. IEEE Transactions on Industrial Electronics, 61(3), 1454–1463.
  • Hespanha, J. P., Naghshtabrizi, P., & Xu, Y. (2007). A survey of recent results in networked control systems. Proceedings of theIEEE, 95(1), 138–162.
  • Hirano, H., Mukai, M., Azuma, T., & Fujiata, M. (2005). Optimal control of discrete-time linear systems with network-induced varying delay. In Proceedings of American control conference (pp. 1419–1424). Portland.
  • Huang, H., Ahmed, N., & Karthik, P. (2011). On a new type of denial of service attack in wireless networks: The distributed jammer network. IEEE Transactions on Wireless Communications, 10(7), 2316–2324.
  • Huang, Y. L., Cardenas, A. A, Amin, S., Lin, Z. S., Tsai, H. Y., & Sastry, S. (2009). Denial-of-service attack-detection techniques. IEEE Internet Computing Magazine, 2(3), 73–83.
  • Jia, L., Yao, F., Sun, Y., Niu, Y., & Zhu, Y. (2016). Bayesian Stackelberg game for anti-jamming transmission with incomplete information. IEEE Communication Letters, 20(10), 1991–1994.
  • Kilinc, D., Ozger, M., & Akan, O. B. (2015). On the maximum coverage area of wireless networked control systems with maximum cost-efficiency under convergence constraint. IEEE Transactions on Automatic Control, 60(7), 1910–1914.
  • Kisner, R. A., Manges, W. W., MacIntyre, L. P., Nutaro, J. J., Munro, J. K., Ewing, P. D., & Olama, M. M. (1995). Cybersecurity through real-time distributed control systems. Office of Scientific & Technical Information Technical Reports.
  • Langner, R. (2011). Stuxnet: Dissecting a cyberwarfare weapon. IEEE Security & Privacy, 9(3), 49–51.
  • Law, Y. W., Alpcan, T., & Palaniswami, M. (2015). Security games for risk minimization in automatic generation control. IEEE Transactions on Power Systems, 30(1), 223–232.
  • Lee, P., Clark, A., Bushnell, L., & Poovendran, R. (2014). A passivity framework for modeling and mitigating wormhole attacks on networked control systems. IEEE Transactions on Automatic Control, 59(12), 3224–3237.
  • Li, H., Chow, M. Y., & Sun, Z. (2009). Optimal stabilizing gain selection for networked control systems with time delays and packet losses. IEEE Transactions on Control Systems Technology, 17(5), 1154–1162.
  • Li, L., Hu, B., & Lemmon, M. D. (2012). Resilient event triggered systems with limited communication, Maui, Hawaii, USA.
  • Li, H., Li, Z., Yang, H., Zhang, Y., & Sun, F. (2015). Stabilisation of networked delta operator systems with uncertainty. IET Control Theory and Applications, 8, 2289–2296.
  • Li, Y., Quevedo, D. E., Dey, S., & Shi, L. (2016). SINR-based DoS attack on remote state estimation: A game-theoretic approach. IEEE Transactions on Control of Network Systems, 4(3), 632–642.
  • Li, Y., Shi, L., Cheng, P., Chen, J., & Quevedo, D. E. (2013). Jamming attack on cyber-physical systems: A game-theoretic approach. In Proceedings of the IEEE international conference on cyber technology in automation, Control and Intelligent Systems (pp. 252–257). Nanjing, China.
  • Li, Y., Shi, L., Cheng, P., Chen, J., & Quevedo, D. E. (2015). Jamming attacks on remote state estimation in cyber-physicali systems: A game-theoretic approach. IEEE Transactions on Automatic Control, 60(10), 2831–2836.
  • Li, H., Yang, H., Sun, F., & Xia, Y. (2013). A network-bound-dependent stabilization method of networked control systems. Automatica, 49(8), 2561–2566.
  • Li, H., Yang, H., Sun, F., & Xia, Y. (2014). Sliding-mode predictive control of networked control systems under a multiple-packet transmission policy. IEEE Transactions on Industrial Electronics, 61(11), 6234–6243.
  • Lin, H., Su, H., Shi, P., Lu, R., & Wu, Z. (2015). Lqg control for networked control systems over packet drop links without packet acknowledgment. Journal of the Franklin Institute, 352(11), 5042–5060.
  • Liu, A., Zhang, Q., Yu, L., Liu, S., & Chen, M. (2015). New results on stabilization of networked control systems with packet disordering. Automatica, 52, 255–259.
  • Long, M., Wu, C. H., & Hung, J. Y. (2005). Denial-of-service attack-detection techniques. IEEE Internet Computing Magazine, 1(2), 85–96.
  • Maass, A., Vargas, F., & Silva, E. (2016). Optimal control over multiple erasure channels using a data dropout compensation scheme. Automatica, 68, 155–161.
  • Matusitza, J., & Mineib, E. (2009). In quest of benchmarking security risks to cyber-physical systems. Journal of Digital Forensic Practice, 2(4), 161–171.
  • Melin, A., Kisner, R., Fugate, D., & McIntyre, T. (2012). Minimum state awareness for resilient control systems under cyber-attack. In Proceedings of future of instrumentation international workshop (pp. 978–982). Gatlinburg, TN.
  • Mo, Y., Chabukswar, R., & Sinopoli, B. (2014). Detecting integrity attacks on scada systems. IEEE Transactions on Control Systems Technology, 61(11), 1396–1407.
  • Niu, Y., & Ho, D. W. C. (2014). Control strategy with adaptive quantizer's parameters under digital communication channels. Automatica, 50(10), 2665–2671.
  • Pang, Z., & Liu, G. P. (2012). Design and implementation of secure networked predictive control systems under deception attacks. IEEE Transactions on Control Systems Technology, 20(5), 1334–1342.
  • Pang, Z., Liu, G. P., & Zhou, D. (2016). Design and performance analysis of incremental networked predictive control systems. IEEE Transactions on Cybernetics, 46(6), 1400–1410.
  • Pang, Z., Liu, G., Zhou, D., Hou, F., & Sun, D. (2016). Two-channel false data injection attacks against output tracking control of networked control systems. IEEE Transactions on Industrial Electronics, 63(5), 3242–3251.
  • Park, K., Kim, J., Lim, H., & Eun, Y. (2014). Robust path diversity for network quality of service in cyber-physical systems. IEEE Transactions on Industrial Informatics, 10(4), 2204–2215.
  • Peng, Y., Jiang, C., Xie, F., Dai, Z., Xiong, Q., & Gao, Y. (2012). Industrial control system cybersecrity research. Journal of Tsinghua University, 52(10), 1396–1408.
  • Peters, E., Quevedo, D., & Ostergaard, J. (2016). Shaped gaussian dictionaries for quantized networked control systems with correlated dropouts. IEEE Transactions on Signal Processing, 64(1), 203–213.
  • Qiu, L., Li, S., Xu, B., & Xu, G. (2015). h∞ control of networked control systems based on Markov jump unified model. International Journal of Robust and Nonlinear Control, 26, 2770–2786.
  • Qiu, X., Yu, L., & Zhang, D. (2015). Stabilization of supply networks with transportation delay and switching topology. Neurocomputing, 155, 247–252.
  • Rieger, C. G., Gertman, D. I., & McQueen, M. A. (2009). Resilient control systems: Next generation design research. In Conference on human system interactions (pp. 629–633). Catania, Italy.
  • Sagduyu, Y. E., Berry, R. A., & Ephremides, A. (2011). Jamming games in wireless networks with incomplete information. IEEE Communications Magazine, 49(8), 112–118.
  • Sandberg, H., Amin, S., & Johansson, K. (2015). Cyberphysical security in networked control systems an introduction to the issue. IEEE Control Systems Magazine, 31(1), 20–23.
  • Schenato, L., Sinopoli, B., Franceschetti, M., Poolla, K., & Sastry, S. (2007). Foundations of control and estimation over lossy networks. Proceedings of the IEEE, 95(1), 163–187.
  • Smith, R. S. (2015). Covert misappropriation of networked control systems: Presenting a feedback structure. IEEE Control Systems Magazine, 35(1), 82–92.
  • Tan, X. H., & Jose, B. C. (2010). Adaptive noncooperative-person games with unknown general quadratic objectives. IEEE Transactions on Control Systems Technology, 18(5), 1033–1043.
  • Teixeira, A., Perez, D., Sandberg, H., & Johansson, K. H. (2012). Attack models and scenarios for networked control systems. In Proceedings of the 1st international conference on high confidence networked systems (pp. 55–64), Beijing, China, April 17–18, 2012.
  • Truong, D. Q., & Ahn, K. K. (2015). Robust variable sampling period control for networked control systems. IEEE Transactions on Industrial Electronics, 62(9), 5630–5643.
  • Tsumura, K., Ishii, H., & Hoshina, H. (2009). Tradeoffs between quantization and packet loss in networked control of linear systems. Automatica, 45, 2963–2970.
  • Virvilis, N., & Gritzalis, D. (2013). The big four-what we did wrong in advanced persistent threat detection? In International conference on availability, reliability and security, (pp. 248–254). Greece.
  • Wang, D., Liu, D., Wei, Q., Zhao, D., & Jin, N. (2012). Optimal control of unknown nonaffine nonlinear discrete-time systems based on adaptive dynamic programming. Automatica, 48, 1825–1832.
  • Wang, B., Wu, Y., Liu, K., & Clancy, T. (2011). An anti-jamming stochastic game for cognitive radio networks. IEEE Journal on Selected Areas in Communications, 29(4), 877–889.
  • Wei, X., Chen, N., Deng, C., Liu, X., & Tang, M. (2012). Composite stratified anti-disturbance control for a class of mimo discrete-time system with nonlinearity. International Journal of Robust and Nonlinear Control, 22, 453–472.
  • Wu, L., Lam, J., Yao, X., & Xiong, J. (2011). Robust guaranteed cost control of discrete-time networked control systems. Optimal Control Application and Methods, 32(1), 95–112.
  • Wu, J., Ota, K., Dong, M., & Li, C. (2016). A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities. IEEE Access, 4, 416–424.
  • Xiao, L., Chen, T., Liu, J., & Dai, H. (2015). Anti-jamming transmission stackelbeg game with observation errors. IEEE Communications Letters, 19(6), 949–952.
  • Xiao, N., Xie, L., & Qiu, L. (2012). Feedback stabilization of discrete-time networked systems over fading channels. IEEE Transactions on Automatic Control, 57, 2176–2189.
  • Xu, H., Jagannathan, S., & Lewis, F. (2012). Stochastic optimal control of unknown linear networked control system in the presence of random delays and packet losses. Automatica, 48, 1017–1030.
  • Yan, J., Xia, Y., & Li, L. (2014). Stabilization of fuzzy systems with quantization and packet dropout. International Journal of Robust and Nonlinear Control, 24(10), 1563–1583.
  • Yang, Y., Fan, X., & Zhang, T. (2015). Anti-disturbance tracking control for systems with nonlinear disturbances using t-s fuzzy modeling. Neurocomputing, 171, 1027–1037.
  • Yang, J., Li, S., Sun, C., & Guo, L. (2013). Nonlinear-disturbance-observer-based robust flight control for air breathing hypersonic vehicles. IEEE Transactions on Aerospace and Electronic Systems, 49, 1263–1275.
  • Yang, R., Liu, G. P., Shi, P., Thomas, C., & Basin, M. V. (2014). Predictive output feedback control for networked control systems. IEEE Transactions on Indurstrial Electronics, 61(1), 512–520.
  • Yang, C., Ren, X., Yang, W., Shi, H., & Shi, L. (2015). Jamming attack in centralized state estimation. In Proceedings of the 34th Chinese control conference (pp. 28–30). Hangzhou, China.
  • Yang, F. W., Wang, Z. D., Hung, Y. S., & Gani, M. (2006). h∞ control for networked systems with random communication delays. IEEE Transactions on Automatic Control, 51(3), 511–518.
  • Yang, H., Xia, Y., Shi, P., & Fu, M. (2012). Stability analysis for high frequency networked control systems. IEEE Transactions on Automatic Control, 57(10), 2694–2700.
  • Yang, H., Xia, Y., Shi, P., & Liu, B. (2013). Guaranteed cost control of networked control systems based on delta operator kalman filter. International Journal of Adaptive Control and Signal Processing, 27(8), 707–717.
  • Yang, H., Xia, Y., Shi, P., & Zhao, L. (2012). Analysis and synthesis of delta operator systems. Berlin: Springer-Verlag.
  • Yang, D., Xue, G., Zhang, J., Richa, A., & Fang, X. (2013). Coping with a smart jamming in wireless networks: A Stackelberg game approach. IEEE Transactions on Wireless Communications, 12(8), 4038–4047.
  • Yang, H., Yan, C., Xia, Y., & Zhang, J. (2016). Stabilization on null controllable region of delta operator systems subject to actuator saturation. International Journal of Robust and Nonlinear Control, 26(7), 3481–3506.
  • Yao, X., & Guo, L. (2013). Composite anti-disturbance control for markovian jump nonlinear systems via disturbance observer. Automatica, 49(8), 2538–2545.
  • Yin, X., Yue, D., Hu, S., Peng, C., & Xue, Y. (2016). Model-based event-triggered predictive control for networked systems with data dropout. SIAM Journal on Control and Optimization, 54(2), 567–586.
  • Yuan, Y., Guo, L., & Wang, Z. (2017). Composite control of linear quadratic games in delta domain with disturbance observers. Journal of the Franklin Institute, 354(4), 1673–1695.
  • Yuan, Y., & Sun, F. (2015). Data fusion-based resilient control system underi dos attacks: A game theoretic approach. International Journal of Control Automation and Systems, 13(3), 513–520.
  • Yuan, Y., Sun, F., & Liu, H. (2015). Resilient control of cyber-physical systems against intelligent attacker: A hierarchal stackelberg game approach. International Journal of Systems Science, 47(9), 1–11.
  • Yuan, Y., Wang, Z., & Guo, L. (2018). Event-triggered strategy design for discrete-time nonlinear quadratic games with disturbance compensations: The noncooperative case. IEEE Transactions on Systems, Man,and Cybernetics: Systems, 99, 1–12.
  • Yuan, Y., Yuan, H., Guo, L., Yang, H., & Sun, S. (2016). Resilient control of networked control system under dos attacks: A unified game approach. IEEE Transactions on Industrial Informatics, 12(5), 1786–1794.
  • Yuan, Y., Yuan, H., Wang, Z., Guo, L., & Yang, H. (2017). Optimal control for networked control systems with disturbances: A delta operator approach. IET Control Theory & Applications, 11(9), 1325–1332.
  • Yuan, Y., Zhu, Q., Sun, F., Wang, Q., & Başar, T. (2013). Resilient control of cyber-physical systems against denial-of-service attacks. In Proceedings of the 6th international symposium on resilient control systems (pp. 54–59). Beijing, China.
  • Zhang, H., Cheng, P., Shi, L., & Chen, J. (2016). Optimal dos attack scheduling in wireless networked control system. IEEE Transactions on Control Systems Technology, 24(3), 843–852.
  • Zhang, H., Feng, G., Yan, H., & Chen, Q. (2016). Sampled-data control of nonlinear networked systems with time-delay and quantization. International Journal of Robust and Nonlinear Control, 26, 919–933.
  • Zhang, L., Gao, H., & Kaynak, O. (2013). Network-induced constraints in networked control systems–a survey. IEEE Transactions on Industrial Informatics, 9(1), 403–416.
  • Zhang, X., Lu, C., Xie, X., & Dong, Z. (2016). Stability analysis and controller design of a wide-areai time-delay system based on the expectation model method. IEEE Transactions on Smart Grid, 7(1), 520–529.
  • Zhang, J., Xia, Y., & Shi, P. (2013). Design and stability analysis of networked predictive control systems. IEEE Transactions on Control Systems Technology, 21(4), 1495–1501.
  • Zhao, L., Yang, Y., Xia, Y., & Liu, Z. (2015). Active disturbance rejection position control for a magnetic rodless pneumatic cylinder. IEEE Transactions on Industrial Electronics, 62, 5838–5846.
  • Zhu, Q., & Başar, T. (2009). Dynamic policy-based ids configurationi. In IEEE conference on decision and control (pp. 8600–8605). Atlanta, GA.
  • Zhu, Q., & Başar, T. (2011). Robust and resilient control design for cyber-physical systems with an application to power systems. In IEEE conference on decision and control (pp. 4066–4071). Nashville.
  • Zhu, Q., & Başar, T. (2015). Game-theoretic methods for robustness, security, and resilience of cyberphysical control systems: Games-in-games principle for opyimal cross-layer resilient control systems. IEEE Control Systems Magazine, 35(1), 46–65.
  • Zhu, M., & Martínez, S. (2014). On the performance analysis of resilient networked control systems under replay attacks. IEEE Transactions on Automatic Control, 59(3), 804–808.
  • Zhu, Q., Rieger, C., & Başar, T. (2011). Stealthy deception attacks on water scada systems. In Proceedings of international symposium on resilient control systems, pp. 161–170, Stockholm, Sweden.
  • Zhu, M. H., & Sonia, M. (2011). Stackelberg-game analysis of correlated attacks in cyber-physical systems. In American control conference (pp. 4063–4068). San Francisco, CA.