Abstract
In this paper, we consider networked control systems under Denial-of-Service (DoS) attacks. The control objective is to synthesize a quantized controller in which the quantizer is as coarse as possible for a networked control system subject to DoS attacks, while still guaranteeing (quadratic) stability. Our main result will explicitly show the trade-offs between system robustness against DoS and quantizer coarseness. A simulation example will demonstrate the strengths of the new method.
Original language | English |
---|---|
Pages (from-to) | 3496-3501 |
Number of pages | 6 |
Journal | IFAC-PapersOnLine |
Volume | 53 |
Issue number | 2 |
DOIs | |
Publication status | Published - 2020 |
Event | 21st World Congress of the International Federation of Aufomatic Control (IFAC 2020 World Congress) - Berlin, Germany Duration: 12 Jul 2020 → 17 Jul 2020 Conference number: 21 https://www.ifac2020.org/ |
Funding
This work was supported in the part by the JST CREST Grant No. JPMJCR15K3 and by JSPS under Grant-in-Aid for Scientific Research Grant No. 18H01460. eΣCetgáaarl.rddeΣ2innag0s1t7heΠΠ,teamthel.alΣfre2u0nΘ0cff8itiΠspo;nurringΦsaonfdnΘeethetrwgoeritknetaedlre.csoΣt2n0tor1fo5delΠ;ssffCigishtningeemngsΣCárdenasetal.Σ2008Π;ΦandΘergetal.Σ2015Π;Cheng DoSvq Kv eCt áarld. eΣn2a0s17eΠtΠ,atlh. eΣr2e0Θ0ff8i Πs;puΦrarnindgΘetrhge eitntaelr.esΣt20o1f5dΠ;esCighneinng v q K secure control sffistems that are resilient to attacks. In K eetcaulr.eΣ2c0o1n7trΠoΠ,l tshffiesrteeΘmffisstphuartrinagrethreesiilnietenrtestooaftdtaecsikgsn.inIng Fig. 1. Control architectureq . K particular, a large numΘer of securitffi issues are caused Θffi peacrutirceulcaorn, tarolal rsgfefisnteummsΘetrhaotf saerceurritefsfiiliisesnutestaoreatctaaucskesd. ΘInffi Fig. 1. Control architecture. cffiΘer attacks. The attacks mostlffi affect the exchange of Figautho. 1rs. C’oknntorwolleadgrceh,ittheecturere h.ave not Θeen anffi studies into cdpffaaffiiΘΘtrateeirrcΘuaafflittattcraao,ccrakkrussl..aprtTTginhhegeenutaahmttettaaΘirccekkrcssoonmmffisoodessecttnullfftrffiiiiataaflfffiifftieefsfcci,sttuaettushhteehaereeenxxtcciachhiuaatsnnffei,ggdeeanΘoodffffi data Θffi corrupting their confidentialitffi, authenticitffi, and authors’ knowledge, there have not Θeen anffi studies into avaatialaΘffiilictoffir.rupting their confidentialitffi, authenticitffi, and of coarse staΘilizing quantized control under DoΦ attacks aTvhaiislapΘailpiteffri. is particularlffi interested in Denial-of-Φervice thuethporrosΘ’lkemnowtalcekdlgeed, itnhetrheishpaavpeenr,otcoΘneseisntianngffiosfttuhdeiedsesinigtno This paper is particularlffi interested in Denial-of-Φervice ovfecroathrseeinstpauΘtiliczhianngnqeulaonfttizheedpcloanttr.oIlnupnadretricDuloaΦr,awtteacakres ΣDoΦΠ attacks, which affect the availaΘilitffi of data, in ohf ecoparrosΘelesmtaΘtailcikzilnedg iqnutahnitsizpeadpceor,nctroonlsiusntidnegr oDf otΦheadtteascigkns This paper is particularlffi interested in Denial-of-Φervice over the input channel of the plant. In particular, we are TΣDhoisΦΠpaaptetarcikss,pawrhtiiccuhlaarflfffeicitnttehreestaevdaiilnaΘDilietnffiiaol-fofd-Φatearv,icine invteerretshteedinipnutthechsaffinstneeml osfettthinegpdlaenptic.tIendpinarFtiicgu.l1a,ro,fwehaicrhe ΣDhoisΦΠpaptetarcikss,pawrhtiiccuhlaarflfffei citnttehreestaevdaiilnaΘDilietnffiiaol-fofd-Φatearv, icine interested in the sffistem setting depicted in Fig. 1, of which ctheomplaΘinnattio,senewFigith.1qua.Thentiszeaatiottanckosvejarmthetheinputcommchuannneicatiol onf invteerreetshteeedininpnuthethechsaffisfinstemneeml osfettingtthinegpdelaenpictic.teIendpinnarFigtiicgu.l1a,ro,fwehaicrhe cDomoΦΘΠinatttioanckws,itwhhqicuhanatifzfeacttionthoevearvatihlaeΘiinliptfufitocfhdanatnae,l ionf more details follow in the next section. thecthhomeanneplapΘliannnlsattt,,,iossceenaeeuswFigFingiitgh.. 11q..pauTTachehnketesistszeeaaattottatiotanccΘkkoessvejajdroarmmthppthteheeeindccpoouammtnmmdchuuahennniiccncnaaetiotelioonnaf Notntoereereesdettheeattadailsilqnsutfoahonleltosiwzedffistinnemcthohnsetrtneolteinxtugtndsdeeercptioiicortn.ane.ddinomFigp.a1ck,eotf wlosseshich chheanpnlaenlst,, sceaeuFsiingg. 1.pTachkestesattotacΘkes jdarmoptphedcoamnmduhneicnacteiona was addressed in Tsumura et al. Σ2009Π. Non-quantized ΣtemporalΠ loss of communication, see, e.g., De Persis was addressed in Tsumura et al. Σ2009Π. Non-quantized atnedmpToersailΠΣ2l0o1s5sΠ;ofDcoolkmmetunailc.atΣi2o0n1,7Πs,eew, hei.cgh., cDonesiPderseids losses are discussed extensivelffi in Hespanha et al. Σ2007Π; the staΘilizing control proΘlems under unlimited data-rate losses are discussed extensivelffi in Hespanha et al. Σ2007Π; tnahhneeetdwssottTaarekΘΘssiiilliiszzΣuii2nnΘ0ggj1ecc5cooΠt;nntttDrroooollDlkpporrΦooeΘΘtalleetammtla.ssckΣuu2snn.0dd1Mee7rrΠo,uutinnwvllaiihmmtieciidhtteeddΘcfofddinaaΘsttiiaatd--erarraetetde lossesestswesorarkreeddcioscucnutrssedoseldsffexisxtteenmnssiitvhealffifti ienxpHespeersiepnancnehraaetntdalolm. Σp2007Πa0c0k7eΠt; networks suΘject to DoΦ attacks. Motivated Θffi Θit-rate Φchenato et al. Σ2007Π; Zhang et al. Σ2013Π. However, nltihemeettwwitsoaotartrikkΘossinlisszuuinoΘΘfgjjeetccchottentttcrooomlDDpmoorΦΦuoΘnaaliecttmtataatscicokkunssn..dcMMheraoonuttniinvvelaailmstt,eeiddotetdΘΘhffeffdiiraΘΘstiitattu---rradaiettees DolocshsΦeensaattaatroecdkestisccaaulsn.seΣΘd2e0e0sxo7tphΠe;nistisZivhecaalnffllffiigineotHrgeaaslpniz.aΣne2hd0a1a3endΠt.aHlla.ouΣw2n0ec0vh7eeΠrd;, limhavitaeΘtioeennscoofnducthetecodmremguanrdingicatiothen chpaermnneislss,iΘleothecorarsstudieenesss ΦDochΦenaatttaocketscaaln. ΣΘ2007Πesoph;istiZhcaanllffig etorgalaniz. Σe2013Πdand. Hlaouwnecvheerd, limtwitoartikosnsuoΘfjetchte tcomDmoΦunaictataticokns.cMhaontnivealst,edotΘhfefirΘsittu-rdaietes intelligentlffi, in the sense that attackers would trffi to max-have Θeen conducted regarding the permissiΘle coarseness intelligentlffi, in the sense that attackers would trffi to max-ofavqeuaΘneteinzecdonsidguncatlesdforregstaarΘdiilnizgatthioenp, esurmchisassiΘBleroccokaertstenaensds adversarffi’s Θehaviour using stochastic processes such as LiΘerzon Σ2000Π; Elia and Mitter Σ2001Π; LiΘerzon Σ2003Π; adversarffi’s Θehaviour using stochastic processes such as LfiΘqeuraznotnizΣe2d00si0gΠn;aElsliafoarnsdtaMΘiliitztaetrioΣ2n0,0s1uΠc;hLaisΘeBrrzocnkeΣt2t00a3nΠd; randompacketlossesishardlffijustified.Thismotivatesthe Fu and Xie Σ2005Π. random packet losses is hardlffi justified. This motivates the FHLuuioΘwaaeernnzvddoenrXX,Σiiree2e0lΣΣa022t000ivΠ00;e55lEΠΠff..ililittlea andwMorkittiserdoΣ2001Πneon;quaLiΘnertizonzedΣc2003Πontro;l dadenvvdeelroosmpamrpffiea’sncktΘeeothfloaavssineosuewrisuhtsahirendoglrffesittjiuocscathliafiasentdiac.lTffpishrisoiscfmeosrosetqisvuasautnectshiztehades under DoΦ attacks. In Wakaiki et al. Σ2018Π, the case raenvdeloompmpeanckteotfloassnesewishtahredolrffeitjiucsatlifiaenda.lTffishisisfmorotqivuaatnetsiztehde HunodweerveDr,orΦelaattitvaeclkffisl.itItnlewWoarkkaiiskidoenteaoln. qΣu20a1n8tiΠz,edthceonctarsoel perotwΘaoΘrkileidtfficaonndtreoxlpseffcisttaetmiosnutfnfipdeeranDaolΦffisesisnacreetnhoetcalpapssliiccaa-l unodweerveDr,orΦelatitvaeclkffisl.itItnle wWoarkkaiiskidoenteaoln. qΣu20a1n8tiΠz,edthceonctarsoel proΘaΘilitffi and expectation tffipe analffises are not applica-ochfaquannenltoizfethed coplantnrotlisundeinverstigDoaΦted,attawcheksreoavseinr theFengoutpuetal.t proerotwΘaaoΘrkileidtfficaondndtreoxplpseffcistataetiomiosnutfnfipdeeranaDaolffisΦffisesisnacreeetnohoetcalpplicapssliiccaa-l ofndqeuranDtiozΦedacttoanctkrso.l IunndWerakDaoikΦi aetttaaclk.s Σo2v0e1r8Πt,hethoeutcpauset Θleadveinrsartheffi.context of DoΦ attacks launched Θffi a malicious cΣ2h0a2nne0Πltheof theminiplamunmt isdaitanverastigteaisteded,rwivheedrefoalsloinwingFengtheetlineal. ΘleoΘinaΘtihlietffcioanntdexetxpofecDtaotΦioantttafficpkesalnaualnffcisheesdarΘeffinaotmaplipcliiocuas- chfaqnunaenltoizfetdhecopnlatnrotlisuinndveerstDigoaΦtedat,twachkesreoavseirntFheengouettpault. adversarffi. cΣ2h0a2n0nΠelthoef tmhienipmlaunmt idsaitnaversattiegaistedde,rwivhederfeoalsloiwniFngentghetlianle. adversarffi. ΣoΣ22hf00ar22ne00snΠΠeealttrhhoceefhtmmohiifenn,iipemml.aguun.mm,tNiddsaaaiittnraaveerrtsaatattieelg.aiissΣt2edd0dee0,rr7wiivvΠh.eeddeTroffeooalltsllhooiewwniiΘFnneggesntttghhoeeftlltiiahnnleee. aduvrecrsoanrtfrfi.iΘutions in this paper form a step towards solving of research of, e.g., Nair et al. Σ2007Π. To the Θest of the Our contriΘutions in this paper form a step towards solving ★ofTrheissewarocrhk woaf,s esu.gp.p,oNrtaedirinetthael.pΣa2rt00b7yΠt.hTe oJStTheCRΘEesStToGf rtahnet Our contriΘutions in this paper form a step towards solving NofoT.rheJisPseMwaroJcrChkRwo1a5f,sKe3su.gap.np,doNrbtaeydirJiSnePttShaelu.npΣda2retr00bG7yrΠat.nhTte-ioJnS-tAThiedCRΘfoEersStSTcoieGfnrttaihfniect★Σ2f0r2e0sΠeatrhcehmoifn,iem.gu.m,Ndaaitraertaatel.isΣ2d0e0r7ivΠ.edTofoltlhoewiΘnegstthoefltihne thethatprostaΘΘilizlemesofthefindingsffistemt,hewheconarsethestmpaoxsismiΘleumquaduranttioizenr ★ This work was supported in the part by the JST CREST Grant that staΘilizes the sffistem, when the maximum duration Reos.eJaPrcMhJGCrRan1t5KN3o.a1n8dH0b1y46J0S.PS under Grant-in-Aid for Scientific of the DoΦ attack is known. In fact, we consider a more No. JPMJCR15K3 and by JSPS under Grant-in-Aid for Scientific that staΘilizes the sffistem, when the maximum duration RNeoTs.ehJaiPrscMhwoJGrCkrRawn1ta5sKN3so.uap18Hnpdor01460.bteydJiSnPtSheunpdaretr bGyratnhte-iJnS-ATidCRfoErSSTcieGnrtaifnict of the DoΦ attack is known. In fact, we consider a more Research Grant No. 18H01460. thf atthestDaΘoiΦlizaetstatchke issffisktneomw,nw. hInenfatchte, wmeaxciomnusimderduaramtoiorne R2405-8963 Copyright esearch Grant No. 18H© 2020 The Authors. This is an open access article under the CC BY-NC-ND license01460. of the DoΦ attack is know. n. In fact, we consider a more Peer review under responsibility of International Federation of Automatic Control. 10.1016/j.ifacol.2020.12.1702
Keywords
- Control and estimation with data loss
- Control under communication constraints
- Denial-of-service attacks
- Secure networked control systems