Du, Dajun, Zhang, Changda, Wang, Haikuan, Li, Xue, Hu, Huosheng and Yang, Tai (2018) Stability analysis of token-based wireless networked control systems under deception attacks. Information Sciences, 459. pp. 168-182. ISSN 0020-0255
![]() |
PDF
- Accepted Version
Available under License Creative Commons Attribution-NonCommercial No Derivatives. Download (2MB) |
Abstract
Currently, cyber-security has attracted a lot of attention, in particular in wireless industrial control networks (WICNs). In this paper, the stability of wireless networked control systems (WNCSs) under deception, attacks is studied with a token-based protocol applied to the data link layer (DLL) of WICNS. Since deception attacks cause the stability problem of WNCSs by changing the data transmitted over a wireless network, it is important to detect deception attacks, discard the injected false data and compensate for the missing data (i.e., the discarded original data with the injected false data). The main contributions of this paper are: 1) With respect to the character of the token-based protocol, a switched system model is developed. Different from the traditional switched system where the number of subsystems is fixed, in our new model this number will be changed under deception attacks. 2) For this model, a new Kalman filter (KF) is developed for the purpose of attack detection and the missing data reconstruction. 3) For the given linear feedback WNCSs, when the noise level is below a threshold derived in this paper, the maximum allowable duration of deception attacks is obtained to maintain the exponential stability of the system. Finally, a numerical example based on a linearized model of an inverted pendulum is provided to demonstrate the proposed design.
Item Type: | Article |
---|---|
Schools and Departments: | School of Engineering and Informatics > Engineering and Design |
Subjects: | Q Science > Q Science (General) > Q0179.9 Research |
Depositing User: | Tai Yang |
Date Deposited: | 08 May 2018 16:27 |
Last Modified: | 01 Jul 2019 15:45 |
URI: | http://sro.sussex.ac.uk/id/eprint/75666 |
View download statistics for this item
📧 Request an update