2.765

2022影响因子

(CJCR)

  • 中文核心
  • EI
  • 中国科技核心
  • Scopus
  • CSCD
  • 英国科学文摘

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

受攻击信息物理系统的分布式安全状态估计与控制—一种有限时间方法

敖伟 宋永端 温长云

敖伟, 宋永端, 温长云. 受攻击信息物理系统的分布式安全状态估计与控制—一种有限时间方法. 自动化学报, 2019, 45(1): 174-184. doi: 10.16383/j.aas.c180385
引用本文: 敖伟, 宋永端, 温长云. 受攻击信息物理系统的分布式安全状态估计与控制—一种有限时间方法. 自动化学报, 2019, 45(1): 174-184. doi: 10.16383/j.aas.c180385
AO Wei, SONG Yong-Duan, WEN Chang-Yun. Distributed Secure State Estimation and Control for CPSs Under Sensor Attacks -A Finite Time Approach. ACTA AUTOMATICA SINICA, 2019, 45(1): 174-184. doi: 10.16383/j.aas.c180385
Citation: AO Wei, SONG Yong-Duan, WEN Chang-Yun. Distributed Secure State Estimation and Control for CPSs Under Sensor Attacks -A Finite Time Approach. ACTA AUTOMATICA SINICA, 2019, 45(1): 174-184. doi: 10.16383/j.aas.c180385

受攻击信息物理系统的分布式安全状态估计与控制—一种有限时间方法

doi: 10.16383/j.aas.c180385
基金项目: 

国家自然科学基金 61773081

国家自然科学基金 61860206008

重庆高校优秀成果转化项目 KJZH17102

详细信息
    作者简介:

    敖伟  重庆科技学院数理与大数据学院副教授.2003年获得国防科技大学自动化学士学位, 2017年获得重庆大学控制理论与控制工程博士学位.主要研究方向为自适应控制, 容错控制, 信息物理系统攻击监测与安全控制.E-mail:craneaow@cqu.edu.cn

    温长云  新加坡南洋大学终身教授.1983年7月获得西安交通大学学士学位, 1990年2月获得澳大利亚纽卡斯尔大学博士学位, 1989年8月至1991年8月在澳大利亚阿德莱德大学从事博士后研究, 1991年8月加入新加坡南洋理工大学.IEEE会士, 2011年, 2013年担任IEEE会士委员会委员, 2010年, 2013年IEEE控制系统协会卓越讲座人; 曾获2005年新加坡工程师学会卓越工程成就奖, 2017年IEEE Transactions on Industrial Electronics最佳论文奖等.曾任/担任包括IEEE Trans.Automatic Control(2000, 2002), Automatica (从2006年起), IEEE Trans.Industrial Electronics(从2013年起), IEEE Control Systems Magazine(从2009年起)等国际学术期刊编委.主要研究方向为自适应控制, 自主机器人系统, 智慧电能管理系统复杂网络系统控制, 信息物理系统.E-mail:ecywen@ntu.edu.sg

    通讯作者:

    宋永端  中国自动化学会常务理事, 中国自动化学会"可信控制系统"专委会主任, IEEE CIS重庆计算智能分会主席, 任包括IEEE Translation on Automatic Control在内的6部国际学术杂志编委.1992年获得田纳西理工大学电气与计算机博士学位.主要研究方向为智慧系统, 导航与控制, 仿生自适应控制, 系统安全与控制.本文通信作者.E-mail:ydsong@cqu.edu.cn

Distributed Secure State Estimation and Control for CPSs Under Sensor Attacks -A Finite Time Approach

Funds: 

National Natural Science Foundation of China 61773081

National Natural Science Foundation of China 61860206008

the Technology Transformation Program of Chongqing Higher Education University KJZH17102

More Information
    Author Bio:

      Associate professor at the School of mathematics, Physics and Big-data of the Chongqing Unversity of Science and Technology. He received his bachelor degree from the National University of Defense Technology in 2003 and Ph. D. degree in Control Theory and Control Engineering from Chongqing University in 2017. His research interest covers adaptive control, fault tolerant control, attack detection, and secure control of cyber-physical systems

      Full prafessor at Nanyang Technological University, Singapore. He received his bachelor degree from Xi'an Jiaotong University, Xi'an, China, in July 1983, and the Ph. D. degree from the University of Newcastle, Australia, in February 1990. From August 1989 to August 1991, he was a Postdoctoral Fellow at the University of Adelaide, Australia. He joined the Nanyang Technological University, Singapore in August 1991, where he has been a tenured Full Professor since 2008. He was/has been an Associate Editor of a number of journals including IEEE Trans. Automatic Control (2000 ~ 2002), Automatica (since 2006), IEEE Trans. Industrial Electronicsv (since 2013), IEEE Control Systems Magazine (since 2009) etc. He is a Fellow of IEEE, was a Member of the IEEE Fellow Committee from January 2011 to December 2013 and a Distinguished Lecturer of IEEE Control Systems Society from 2010 to 2013. He was awarded the IES Prestigious Engineering Achievement Award 2005 by the Institution of Engineers, Singapore (IES) in 2005. He received the Best Paper Award of IEEE Transactions on Industrial Electronics in 2017. His research interest covers adaptive control, autonomous robotic system, intelligent power management system, complex systems and networks

    Corresponding author: SONG Yong-Duan   He is the standing director of Automation Association of China and the chair of the committee on Reliable Control Systems under Automation Association of China. He is also the founding chair of the Chongqing Chapter of IEEE Computational Intelligence Society (CIS). He is serving as an Associate Editor for 6 international scientific journals including IEEE Translation on Automatic Control. He received his Ph. D. degree in electrical and computer engineering from Tennessee Technological University, Cookeville, TN, USA in 1992. His research interest covers intelligent systems, guidance navigation and control, bioinspired adaptive control, system cooperation and reliability. Corresponding author of this paper
  • 摘要: 研究具有非线性耦合特性信息物理系统(Cyber physical systems,CPS)在被攻击情况下的分布式有限时间状态安全估计和控制问题.首先,提出一种由分布式安全测量预选器和有限时间观测器组成的分布式有限时间状态安全估计策略,可确保系统的状态在预设的有限时间之内被准确估计出来.然后,利用获得的安全状态估计,借助反步设计方法,建立一套分布式有限时间安全控制算法.理论分析表明,该方法可以保证系统能在有限时间内实现对给定信号的跟踪.最后,通过微电网系统仿真验证了所提方法的有效性.
    1)  本文责任编委 刘向杰
  • 图  1  受到传感器攻击的信息物理系统与有限时间状态安全估计与控制框图

    Fig.  1  The diagram of the CPS under sensor attacks and the finite time secure state estimation and control

    图  2  受到传感器攻击的微电网系统框图

    Fig.  2  The diagram of the micro-grid system under sensor attacks

    图  3  发电机1受控状态及其估计值

    Fig.  3  The angle of the 1st generator and its estimation

    图  4  发电机2受控状态及其估计值

    Fig.  4  The angle of the 2nd generator and its estimation

    图  5  发电机3受控状态及其估计值

    Fig.  5  The angle of the 3rd generator and its estimation

    图  6  发电机4受控状态及其估计值

    Fig.  6  The angle of the 4th generator and its estimation

    图  7  设计的安全控制输入

    Fig.  7  The designed secure control law

    表  1  微电网系统模型参数

    Table  1  Parameters of isolated grids systems

    发电机1发电机2发电机3发电机4
    模型 $\tau_{Pi}$ 0.016 0.016 0.016 0.016
    $k_{Pi}$ 6E-5 3E-5 2E-5 1.5E-5
    负载 $P_{1i}$ 0.01 0.01 0.01 0.01
    $P_{2i}$ 1 2 3 4
    $P_{3i}$ 1E-4 1E-4 1E-4 1E-4
    母线 $B_{12}=10 \Omega^{-1}$, $B_{23}=10.67 \Omega^{-1}$, $B_{34}=9.82 \Omega^{-1}$
    参考电气角 $\delta_i ^{d}$=1 (rad)
    下载: 导出CSV
  • [1] Park K J, Zheng R, and Liu X. Cyber-physical systems: Milestones and research challenges. Computer Communications, 2012, 36(1): 1-7 http://d.old.wanfangdata.com.cn/Periodical/jsjyy2013z2001
    [2] Conti J P. The day the samba stopped. Engineering & Technology, 2010, 25(4): 46-47
    [3] Langner R. Stuxnet: Dissecting a cyberwarfare weapon. IEEE Security & Privacy, 2011, 9(3): 49-51 http://d.old.wanfangdata.com.cn/Periodical/sysyjyts201408030
    [4] Pasqualetti F, Dörfler F, and Bullo F. Attack detection and identiflcation in cyber-physical systems. IEEE Transactions on Automatic Control, 2013, 58(11): 2715-2729 doi: 10.1109/TAC.2013.2266831
    [5] Ao W, Song Y and Wen C. Adaptive cyber-physical system attack detection and reconstruction with application to power systems. IET Control Theory & Applications, 2016, 10(12): 1458-1468 http://www.wanfangdata.com.cn/details/detail.do?_type=perio&id=52c0111162369eb5d70e0c7dfc1c148e
    [6] Chen Y, Kar S, and Moura J M. Dynamic attack detection in cyber-physical systems with side initial state information. IEEE Transactions on Automatic Control, 2017, 62(9): 4618-4624 doi: 10.1109/TAC.2016.2626267
    [7] Fawzi H, Tabuada P, and Diggavi S. Secure state-estimation for dynamical systems under active adversaries. In: Proceeding of Forty-Ninth Annual Allerton Conference. Monticello, USA: IEEE, 2011. 337-344
    [8] Fawzi H, Tabuada P, and Diggavi S. Secure estimation and control for cyber-physical systems under adversarial attacks. IEEE Transactions on Automatic Control, 2014, 59(6): 1454-1467 doi: 10.1109/TAC.2014.2303233
    [9] Shoukry Y and Tabuada P. Event-triggered state observers for sparse sensor noise/attacks. IEEE Transactions on Automatic Control, 2016, 61(8): 2079-2091 doi: 10.1109/TAC.2015.2492159
    [10] Shoukry Y, Chong M, Wakaiki M, Nuzzo P, Sangiovanni-Vincentelli A L, Seshia S A, Hespanha J P and Tabuada P. Smt-based observer design for cyber-physical systems under sensor attacks, In: Proceeding of 7th ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS). IEEE Computer Society, 2016. 1-10
    [11] Ao W, Song Y, Wen C, and Lai J. Finite time attack detection and supervised secure state estimation for CPSs with malicious adversaries. Information Sciences, 2018, 451-452: 67-82 doi: 10.1016/j.ins.2018.03.056
    [12] Ao W, Song Y and Wen C. Distributed secure state estimation and control for CPSs under sensor attacks. IEEE Transactions on Cybernatics, 2018, DOI: 10.1109/TCYB.2018.2868781
    [13] Wang Y, Song Y, Gao H and Lewis F L. Distributed fault-tolerant control of virtually and physically interconnected systems with application to high-speed trains under traction/braking failures. IEEE Transactions on Intelligent Transportation Systems, 2016, 17(2): 535-545 doi: 10.1109/TITS.2015.2479922
    [14] Mo Y, Hespanha J P, and Sinopoli B. Resilient detection in the presence of integrity attacks. IEEE Transactions on Signal Processing, 2014, 62(1): 31-43 doi: 10.1109/TSP.2013.2284145
    [15] Mo Y and Sinopoli B. Secure estimation in the presence of integrity attacks. IEEE Transactions on Automatic Control, 2015, 60(4): 1145-1151 doi: 10.1109/TAC.2014.2350231
    [16] Engel R and Kreisselmeier G. A continuous-time observer which converges in flnite time. IEEE Transactions on Automatic Control, 2002, 47(7): 1202-1204 doi: 10.1109/TAC.2002.800673
    [17] Li S, Sun H, Yang J, and Yu X. Continuous flnite-time output regulation for disturbed systems under mismatching condition. IEEE Transactions on Automatic Control, 2015, 60(1): 277-282 doi: 10.1109/TAC.2014.2324212
    [18] Guo F, Wen C, Mao J and Song Y. Distributed secondary voltage and frequency restoration control of droopcontrolled inverter-based microgrids. IEEE Transactions on Industrial Electronics, 2015, 62(7): 4355-4364 doi: 10.1109/TIE.2014.2379211
  • 加载中
图(7) / 表(1)
计量
  • 文章访问数:  3124
  • HTML全文浏览量:  358
  • PDF下载量:  974
  • 被引次数: 0
出版历程
  • 收稿日期:  2018-05-31
  • 录用日期:  2018-08-14
  • 刊出日期:  2019-01-20

目录

    /

    返回文章
    返回