1
|
Wu X, Yang X, Huang J, Shardt YAW. A remaining useful life prediction algorithm incorporating real-time and integrated model for hidden actuator degradation. ISA TRANSACTIONS 2024:S0019-0578(24)00236-2. [PMID: 38839549 DOI: 10.1016/j.isatra.2024.05.033] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 08/22/2023] [Revised: 05/19/2024] [Accepted: 05/19/2024] [Indexed: 06/07/2024]
Abstract
This paper proposed a prediction algorithm for the degraded actuator taking into account the impact of estimation error of hidden index in the closed-loop system. To this end, a unified prediction framework is established to evaluate the hidden degradation information and recursively update the degradation model parameters simultaneously. The advantage is that the prediction framework can comprehensively compensate the estimation error of hidden degradation index caused by system uncertainty. To jointly estimate the degradation information in avoidance of the impact of system uncertainty, a modified adaptive Kalman filter is designed, and the proof of stability is provided. With the priori estimate from the filter, the degradation model parameters are updated by the inverse filtering probability based on Bayes' theorem. It is followed by the computation of the remaining useful life (RUL) prediction utilizing aforementioned hidden degradation information and the latest degradation model. The effectiveness of the proposed RUL prediction algorithm is demonstrated by the degraded actuator in the continuous casting process.
Collapse
Affiliation(s)
- Xia Wu
- Key Laboratory of Knowledge Automation for Industrial Processes of Ministry of Education, School of Automation and Electrical Engineering, University of Science and Technology Beijing, China.
| | - Xu Yang
- Key Laboratory of Knowledge Automation for Industrial Processes of Ministry of Education, School of Automation and Electrical Engineering, University of Science and Technology Beijing, China.
| | - Jian Huang
- Key Laboratory of Knowledge Automation for Industrial Processes of Ministry of Education, School of Automation and Electrical Engineering, University of Science and Technology Beijing, China.
| | - Yuri A W Shardt
- Department of Automation Engineering, Technical University of Ilmenau, Germany.
| |
Collapse
|
2
|
Geng Q, Li J, Li L. Dynamic event-triggered control for CPSs under QoS-based variable sampling approach. ISA TRANSACTIONS 2024:S0019-0578(24)00233-7. [PMID: 38821850 DOI: 10.1016/j.isatra.2024.05.030] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/03/2023] [Revised: 05/16/2024] [Accepted: 05/16/2024] [Indexed: 06/02/2024]
Abstract
In this article, a quality of service (QoS) dependent variable sampling dynamic event-triggered control method is designed for a cyber-physical system (CPS) with delays and packets dropout to cope with non-ideal network environments, maintain the desired control performance and improve the communication efficiency. To achieve the variable period sampling, a sampler is designed based on the QoS of the wireless network by using the delta operator discretization method. Then, a variable period sampling scheme for the delta operator system converted from the CPS is designed. Furthermore, a dynamic event-triggered mechanism (DETM) is proposed using the variable period sampling signal, which can reduce event triggered data calculations and increase event triggered intervals. By utilizing the average dwell time (ADT) approach, sufficient conditions contains the explicit variable sampling period are derived for the derived switched CPS. Finally, the effectiveness of the designed method is verified by numerical examples.
Collapse
Affiliation(s)
- Qing Geng
- School of Electrical Engineering, Yanshan University, Qinhuangdao 066004, China.
| | - Jinling Li
- School of Electrical Engineering, Yanshan University, Qinhuangdao 066004, China
| | - Li Li
- School of Electrical Engineering, Yanshan University, Qinhuangdao 066004, China
| |
Collapse
|
3
|
Li J, Wang L, Xi J, Xia K, Gao J, Zheng Y. Induced attack with prescribed consensus trajectory against multiagent systems. ISA TRANSACTIONS 2024; 146:274-284. [PMID: 38242734 DOI: 10.1016/j.isatra.2024.01.015] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/05/2023] [Revised: 12/02/2023] [Accepted: 01/12/2024] [Indexed: 01/21/2024]
Abstract
This paper proposes a new induced attack strategy against multiagent systems from the perspective of the attacker. It is noted that the induced attack can drive multiagent systems as a whole to follow a specific trajectory prescribed by the attacker, which cannot be achieved by denial-of-service attacks or deception attacks. Firstly, the induced attack signal is produced by establishing an attack generation exosystem, whose dynamics can be regulated to generate the prescribed consensus trajectory. Then, by the local state information and the induced attack signal among partial agents, a new induced attack protocol is proposed, which consists of the nominal consensus term and the induced attack term. By constructing the projection of the induced attack signal onto the consensus subspace, an explicit expression of the prescribed consensus trajectory is determined, which describes the movement trajectory of the entire multiagent system under the induced attack. Meanwhile, the induced attack design criterion is proposed to determine the dynamics matrix of the attack generation exosystem via the robust H∞ scheme. Finally, the simulation example is performed to illustrate the effectiveness of theoretical results.
Collapse
Affiliation(s)
- Junlong Li
- Department of Physics, Lüliang University, Lüliang, 033000, PR China; High-Tech Institute of Xi'an, Xi'an, 710025, PR China
| | - Le Wang
- High-Tech Institute of Xi'an, Xi'an, 710025, PR China; School of Aerospace Engineering, Beijing Institute of Technology, Beijing, 100081, PR China
| | - Jianxiang Xi
- High-Tech Institute of Xi'an, Xi'an, 710025, PR China.
| | - Kehan Xia
- High-Tech Institute of Xi'an, Xi'an, 710025, PR China
| | - Jiuan Gao
- High-Tech Institute of Xi'an, Xi'an, 710025, PR China
| | - Yuanshi Zheng
- Shaanxi Key Laboratory of Space Solar Power Station System, School of MechanoElectronic Engineering, Xidian University, Xian 710071, PR China
| |
Collapse
|
4
|
Chen Y, Xu H, Dong L, Li Z. Fully distributed secure observation and consensus for multi-agent systems with uncertain communication topology. ISA TRANSACTIONS 2024; 145:176-189. [PMID: 37996358 DOI: 10.1016/j.isatra.2023.11.026] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/14/2022] [Revised: 10/25/2023] [Accepted: 11/17/2023] [Indexed: 11/25/2023]
Abstract
This article investigates the fully distributed secure observation and consensus problem for networked multi-agent systems (MASs) with uncertain communication topology. The complexities of dual-channel false data injection (FDI) attacks and fuzzy communication among agents are considered, bringing direct challenges to the acquisition of system states and the design of consensus protocols. To address these difficulties, on the one hand, adaptive coupling weights that vary with observation and consensus errors are neatly designed to avoid the use of global topology information in the whole mechanism. On the other hand, an auxiliary observation system is constructed based on intermediate variables to realize the simultaneous estimation of system states and dual-channel FDI attacks. After that, a distributed attack compensation controller that can guarantee secure consensus among agents is proposed. Finally, a simulation example and an experiment compared with existing results are given to examine the feasibility and advantages of the developed strategy.
Collapse
Affiliation(s)
- Yuqing Chen
- School of Mathematics and Statistics, Nanjing University of Science and Technology, Nanjing, 210094, China.
| | - Huiling Xu
- School of Mathematics and Statistics, Nanjing University of Science and Technology, Nanjing, 210094, China.
| | - Lewei Dong
- School of Mathematics and Statistics, Nanjing University of Science and Technology, Nanjing, 210094, China.
| | - Zhengcai Li
- School of Mathematics and Statistics, Nanjing University of Science and Technology, Nanjing, 210094, China.
| |
Collapse
|
5
|
Piao X, Lin C, Zhang M, Chen B. Attack estimation and state reconstruction for cyber-physical systems with state delay via reduced-order observer. ISA TRANSACTIONS 2024; 144:11-17. [PMID: 37891071 DOI: 10.1016/j.isatra.2023.10.013] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/15/2022] [Revised: 08/23/2023] [Accepted: 10/13/2023] [Indexed: 10/29/2023]
Abstract
This paper investigates the attack estimation and state reconstruction problem for linear cyber-physical systems with state delay and simultaneous sensor and actuator attacks. Reduced-order observer is designed for the augmented system to simultaneously estimate the actuator attack, sensor attack and the state of system. By adopting the double integral term into the Lyapunov-Krasovskii functional and decomposing the cross term, the delay-dependent results are obtained. The method proposed in this paper can accurately estimate the state, actuator and sensor attacks simultaneously without additional design. Compared with the previous method, the time delay information is fully utilized and the conservation is greatly reduced. Finally, the correctness of the results is verified by simulation.
Collapse
Affiliation(s)
- Xianglin Piao
- Institute of Complexity Science, Shandong Key Laboratory of Industrial Control Technology, School of Automation, Qingdao University, Qingdao 266071, China.
| | - Chong Lin
- Institute of Complexity Science, Shandong Key Laboratory of Industrial Control Technology, School of Automation, Qingdao University, Qingdao 266071, China.
| | - Man Zhang
- Institute of Complexity Science, Shandong Key Laboratory of Industrial Control Technology, School of Automation, Qingdao University, Qingdao 266071, China.
| | - Bing Chen
- Institute of Complexity Science, Shandong Key Laboratory of Industrial Control Technology, School of Automation, Qingdao University, Qingdao 266071, China.
| |
Collapse
|
6
|
Sun Y, Ju Y, Ding D, Liu H. Distributed H ∞ filtering of replay attacks over sensor networks. ISA TRANSACTIONS 2023; 141:113-120. [PMID: 37156690 DOI: 10.1016/j.isatra.2023.04.018] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/03/2022] [Revised: 04/05/2023] [Accepted: 04/14/2023] [Indexed: 05/10/2023]
Abstract
A distributed H∞ filtering issue is addressed in this paper for discrete-time nonlinear systems in the face of replay attacks over sensor networks, where an indicator variable is introduced to describe whether a replay attack is launched by the adversaries. First, an interesting pattern dependent on three parameters including a time-varying one is established to account for the temporal behavior of malicious attacks. Then, taking advantage of such a model, the resulting filter dynamic is transformed into a switching system with a subsystem with time-varying delays. By means of the famous switching system theory, a sufficient condition guaranteeing the H∞ performance is derived to disclose the tolerant attack condition, that is, the attack-active duration and proportion. In addition, the applicable filter gains are achieved with the aid of the solutions of matrix inequalities. Finally, an example is purposively given to adequately illustrate the availability of the developed secure filtering strategy.
Collapse
Affiliation(s)
- Ying Sun
- Business School, University of Shanghai for Science and Technology, Shanghai 200093, China
| | - Yamei Ju
- Department of Control Science and Engineering, University of Shanghai for Science and Technology, Shanghai 200093, China.
| | - Derui Ding
- Department of Control Science and Engineering, University of Shanghai for Science and Technology, Shanghai 200093, China
| | - Hongjian Liu
- School of Mathematics and Physics, Anhui Polytechnic University, Wuhu 241000, China
| |
Collapse
|
7
|
Li Z, Xu H, Lin Z, Dong L, Chen Y. Event-triggered robust distributed output feedback model predictive control for nonlinear MASs against false data injection attacks. ISA TRANSACTIONS 2023; 141:197-211. [PMID: 37481438 DOI: 10.1016/j.isatra.2023.06.039] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 02/08/2023] [Revised: 06/18/2023] [Accepted: 06/30/2023] [Indexed: 07/24/2023]
Abstract
In this paper, an event-triggered distributed output feedback model predictive control scheme for the nonlinear disturbed multiagent systems with sensor-controller channel false data injection attacks is proposed. To provide valid system states to the controller in the event of cyber attacks, a robust multivariate observer is designed to realize the estimation and separation of uncompromised system states, false data injection attacks, and measurement disturbances, simultaneously. Based on these reconstructed signals and a newly-designed linear robustness constraint, the distributed predictive controller is established to achieve smooth cooperative stabilization among agents. Meanwhile, an event-triggered mechanism is applied to save computing resources, and it restricts the error of predictive states and estimated states to guarantee the feasibility of the optimization control problem. Theoretical analyses on robustness and security for the nonlinear multiagent systems under event-triggered distributed output feedback model predictive control are presented. Finally, a simulation on two pairs of one-link flexible joint manipulator systems verifies the theoretical results.
Collapse
Affiliation(s)
- Zhengcai Li
- School of Mathematics and Statistics, Nanjing University of Science and Technology, Nanjing, 210094, China.
| | - Huiling Xu
- School of Mathematics and Statistics, Nanjing University of Science and Technology, Nanjing, 210094, China.
| | - Zhiping Lin
- School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore, 639798, Singapore.
| | - Lewei Dong
- School of Mathematics and Statistics, Nanjing University of Science and Technology, Nanjing, 210094, China.
| | - Yuqing Chen
- School of Mathematics and Statistics, Nanjing University of Science and Technology, Nanjing, 210094, China.
| |
Collapse
|
8
|
Li YG, Yang GH, Wang X. Optimal energy constrained deception attacks in cyber-physical systems with multiple channels: A fusion attack approach. ISA TRANSACTIONS 2023; 137:1-12. [PMID: 36725413 DOI: 10.1016/j.isatra.2023.01.020] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/02/2022] [Revised: 01/12/2023] [Accepted: 01/14/2023] [Indexed: 06/04/2023]
Abstract
This paper studies the issue of developing the optimal deception attacks on the multiple channels in cyber-physical systems, where the attackers are limited by energy constraints. To fully utilize the eavesdropped data, by linearly combining the innovations from the different channels, a fusion attack model is proposed under the stealthiness condition. According to the statistical characteristics of the correlated stochastic variables and the orthogonality principle, the state estimation error is quantified and analyzed by deriving the iteration of the error covariance matrices of the remote estimators under the proposed attack framework. Moreover, by analyzing the correlations of the decision variables in the objective function, it is shown that the attack parameters and energy allocation strategy can be derived by two steps without loss of optimality, such that the optimal attack scheme is acquired by solving a multivariate semi-definite programming (SDP) problem and a linear 0-1 programming problem respectively. Finally, simulation examples are provided to illustrate the effectiveness of the proposed method.
Collapse
Affiliation(s)
- Yi-Gang Li
- School of Artificial Intelligence, Shenyang University of Technology, 110870, China.
| | - Guang-Hong Yang
- College of Information Science and Engineering, Northeastern University, Shenyang, 110819, China; State Key Laboratory of Synthetical Automation of Process Industries, Northeastern University, Shenyang, 110819, China; Department of Electrical and Computer Engineering, King Abdulaziz University, Jeddah 21589, Saudi Arabia.
| | - Xiangdong Wang
- School of Artificial Intelligence, Shenyang University of Technology, 110870, China.
| |
Collapse
|
9
|
Mei Z, Li Z, Su L, Wang J, Li F. Quantized H ∞ filtering for networked persistent dwell-time switched piecewise-affine systems. ISA TRANSACTIONS 2023; 136:173-181. [PMID: 36336471 DOI: 10.1016/j.isatra.2022.10.017] [Citation(s) in RCA: 1] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/01/2022] [Revised: 10/15/2022] [Accepted: 10/15/2022] [Indexed: 05/16/2023]
Abstract
In this study, the problem of quantized H∞ filtering is addressed for networked switched piecewise-affine systems, in which the switching mechanism obeys the persistent dwell-time constraint. To process the measurement output and schedule the transmission sequence for alleviating the burden of the limited communication channel, a logarithmic quantizer is employed, which can further improve the bandwidth utilization in networked switched systems. On the basis of state-space division, the objective is to design a mode-dependent and region-dependent filter that ensuresthe filtering error system is globally uniformly exponentially stable and meets an H∞ performance. By using the mode-dependent Lyapunov function approach and employing appropriate decoupling methods, sufficient conditions for obtaining desired filter gains are deduced. Eventually, two illustrated examples are given to demonstrate the effectiveness of our proposed method.
Collapse
Affiliation(s)
- Zhen Mei
- School of Electrical and Information Engineering, Anhui University of Technology, Ma'anshan 243032, China
| | - Ziwei Li
- School of Electrical and Information Engineering, Anhui University of Technology, Ma'anshan 243032, China
| | - Lei Su
- School of Electrical and Information Engineering, Anhui University of Technology, Ma'anshan 243032, China.
| | - Jing Wang
- School of Electrical and Information Engineering, Anhui University of Technology, Ma'anshan 243032, China
| | - Feng Li
- School of Electrical and Information Engineering, Anhui University of Technology, Ma'anshan 243032, China
| |
Collapse
|
10
|
Chen J, Liu B, Li T, Hu Y. Multiplicative Attacks with Essential Stealthiness in Sensor and Actuator Loops against Cyber-Physical Systems. SENSORS (BASEL, SWITZERLAND) 2023; 23:1957. [PMID: 36850552 PMCID: PMC9959309 DOI: 10.3390/s23041957] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 12/31/2022] [Revised: 01/24/2023] [Accepted: 02/06/2023] [Indexed: 06/18/2023]
Abstract
Stealthy attacks in sensor and actuator loops are the research priorities in the security of cyber-physical systems. Existing attacks define the stealthiness conditions against the Chi-square or Kullback-Leibler divergence detectors and parameterize the attack model based on additive signals. Such conditions ignore the potential anomalies of the vulnerable outputs in the control layer, and the attack sequences need to be generated online, increasing the hardware and software costs. This paper investigates a type of multiplicative attack with essential stealthiness where the employed model is a novel form. The advantage is that the parameters can be designed in a constant form without having to be generated online. An essential stealthiness condition is proposed for the first time and complements the existing ones. Two sufficient conditions for the existence of constant attack matrices are given in the form of theorems, where two methods for decoupling the unknown variables are particularly considered. A quadruple-tank process, an experimental platform for attack and defense, is developed to verify the theoretical results. The experiments indicate that the proposed attack strategy can fulfill both the attack performance and stealthiness conditions.
Collapse
Affiliation(s)
- Jingzhao Chen
- Engineering Research Center of Metallurgical Automation and Measurement Technology, Ministry of Education, Wuhan University of Science and Technology, Wuhan 430081, China
- School of Information Science and Engineering, Wuhan University of Science and Technology, Wuhan 430081, China
| | - Bin Liu
- Engineering Research Center of Metallurgical Automation and Measurement Technology, Ministry of Education, Wuhan University of Science and Technology, Wuhan 430081, China
- School of Information Science and Engineering, Wuhan University of Science and Technology, Wuhan 430081, China
| | - Tengfei Li
- Engineering Research Center of Metallurgical Automation and Measurement Technology, Ministry of Education, Wuhan University of Science and Technology, Wuhan 430081, China
- School of Information Science and Engineering, Wuhan University of Science and Technology, Wuhan 430081, China
| | - Yong Hu
- Science and Technology on Space Intelligent Control Laboratory, Beijing Institute of Control Engineering, Beijing 100190, China
| |
Collapse
|
11
|
Zhang W, Zhang BL, Han QL, Pang FB, Sun YT, Zhang XM. Recoil attenuation for deepwater drilling riser systems via delayed H ∞ control. ISA TRANSACTIONS 2023; 133:248-261. [PMID: 35863933 DOI: 10.1016/j.isatra.2022.07.003] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 04/16/2022] [Revised: 06/08/2022] [Accepted: 07/05/2022] [Indexed: 06/15/2023]
Abstract
This paper deals with the recoil suppression problem of a deepwater drilling riser system via active H∞ control using both current and delayed states. First, based on the three degrees of freedom spring-mass-damping model of the riser system, an incremental dynamic equation of the system subject to the platform heave motion and the friction force induced by drilling discharge mud and seawater is established. Then, to reject recoil movements of the riser, a delayed state feedback H∞ controller with delayed states as well as current states is designed. The existence conditions and the design method of the delayed H∞ recoil controllers are presented. Third, the effects of the introduced time-delays on the recoil control of the riser are analyzed, and the design of optimal artificial time-delays is formulated as the minimum value problem of a series of quintic algebraic polynomials, which are related to the weights of average response amplitudes, steady-state errors, and the control force. Lastly, simulation results are provided to demonstrate the effectiveness of delay-free and delayed H∞ recoil control schemes for the riser. It is shown that (i) under the delayed H∞ controllers, the recoil responses of the riser can be controlled significantly; (ii) the decay rate of the recoil response under the delay-free H∞ controller is slightly faster than the one under the delayed H∞ controllers. However, the former requires more control cost than the latter; (iii) compared with the delayed H∞ controller with the existing linear quadratic optimal controller, the control cost by the former is larger than that by the latter. However, the steady-state errors of the riser under the latter are slightly smaller than that under the former; (iv) the introduced time-delays with proper size play positive role of suppressing recoil response of the system, and the corresponding delayed H∞ controller series provide more options for recoil control of the riser.
Collapse
Affiliation(s)
- Wei Zhang
- College of Automation and Electronic Engineering, Qingdao University of Science & Technology, Qingdao, Shandong 266061, China.
| | - Bao-Lin Zhang
- College of Automation and Electronic Engineering, Qingdao University of Science & Technology, Qingdao, Shandong 266061, China.
| | - Qing-Long Han
- School of Science, Computing and Engineering Technologies, Swinburne University of Technology, Melbourne, VIC 3122, Australia.
| | - Feng-Bin Pang
- College of Automation and Electronic Engineering, Qingdao University of Science & Technology, Qingdao, Shandong 266061, China.
| | - Yue-Ting Sun
- College of Automation and Electronic Engineering, Qingdao University of Science & Technology, Qingdao, Shandong 266061, China.
| | - Xian-Ming Zhang
- School of Science, Computing and Engineering Technologies, Swinburne University of Technology, Melbourne, VIC 3122, Australia.
| |
Collapse
|
12
|
Zhang D, Ye Z, Feng G, Li H. Intelligent Event-Based Fuzzy Dynamic Positioning Control of Nonlinear Unmanned Marine Vehicles Under DoS Attack. IEEE TRANSACTIONS ON CYBERNETICS 2022; 52:13486-13499. [PMID: 34860659 DOI: 10.1109/tcyb.2021.3128170] [Citation(s) in RCA: 4] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/13/2023]
Abstract
This article addresses the dynamic positioning control problem of a nonlinear unmanned marine vehicle (UMV) system subject to network communication constraints and deny-of-service (DoS) attack, where the dynamics of UMV are described by a Takagi-Sugeno (T-S) fuzzy system (TSFS). In order to save limited communication resource, a new intelligent event-triggering mechanism is proposed, in which the event triggering threshold is optimized by a Q -learning algorithm. Then, a switched system approach is proposed to deal with the aperiodic DoS attack occurring in the communication channels. With a proper piecewise Lyapunov function, some sufficient conditions for global exponential stability (GES) of the closed-loop nonlinear UMV system are derived, and the corresponding observer and controller gains are designed via solving a set of matrix inequalities. A benchmark nonlinear UMV system is adopted as an example in simulation, and the simulation results validate the effectiveness of the proposed control method.
Collapse
|
13
|
Yang F, Gu Z, Hua L, Yan S. A resource-aware control approach to vehicle platoons under false data injection attacks. ISA TRANSACTIONS 2022; 131:367-376. [PMID: 35581023 DOI: 10.1016/j.isatra.2022.04.046] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 04/30/2021] [Revised: 04/28/2022] [Accepted: 04/28/2022] [Indexed: 06/15/2023]
Abstract
Wireless vehicle-to-vehicle communication brings inevitable imperfections. This work simultaneously addresses the resource utilization and security issues for a vehicle platoon. Inspired by the modeling of denial of service attacks, a novel queuing model is constructed to depict false data injection attacks. A switched event-triggered mechanism is proposed to optimize network resources. The transmission rate can be actively reduced when the system is under malicious attacks. Then, a unified error system is established, where string stability is interpreted as global exponential stability. By using a proper Lyapunov function, a co-design approach is developed for closed-loop controllers and event-triggering parameters, with which the vehicle platoon can maintain a small safety distance and resist the negative impacts of cyber attacks. Finally, the proposed methods are verified by a virtual vehicle platoon.
Collapse
Affiliation(s)
- Fan Yang
- College of Mechanical & Electronics Engineering, Nanjing Forestry University, Nanjing, 210037, PR China.
| | - Zhou Gu
- College of Mechanical & Electronics Engineering, Nanjing Forestry University, Nanjing, 210037, PR China
| | - Lingzhi Hua
- Graduate School, Nanjing University of Finance and Economics, Nanjing, 210023, PR China
| | - Shen Yan
- College of Mechanical & Electronics Engineering, Nanjing Forestry University, Nanjing, 210037, PR China
| |
Collapse
|
14
|
Agrawal N, Kumar R. Security Perspective Analysis of Industrial Cyber Physical Systems (I-CPS): A Decade-wide Survey. ISA TRANSACTIONS 2022; 130:10-24. [PMID: 35396141 DOI: 10.1016/j.isatra.2022.03.018] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 09/19/2021] [Revised: 03/21/2022] [Accepted: 03/21/2022] [Indexed: 06/14/2023]
Abstract
Considering the exceptional growth of Cyber Physical Systems (CPSs), multiple and potentially grave security challenges have emerged in this field. Different vulnerabilities and attacks are present in front of new generation CPSs, such as Industrial CPS (I-CPS). The underlying non-uniform standards, device heterogeneity, network complexity, etc., make it difficult to offer a systematized coverage on CPS security in an industrial environment. This work considers the security perspective of I-CPSs, and offers a decade-wide survey including different vulnerabilities, attacks, CPS components, and various other aspects. The comparative year-wise analysis of the existing works w.r.t objective, approach referred, testbed used and derived inference, is also presented over a decade. Additionally, the work details different security issues and research challenges present in I-CPS. This work attempts to offer a concise and precise literature study focused on the state-of-the-art I-CPS security. This work also encourages the young researchers to explore the wide possibilities present in this emerging field.
Collapse
Affiliation(s)
| | - Rohit Kumar
- KREA University, Sri City, Chittoor, A.P, 517646, India.
| |
Collapse
|
15
|
Koay AMY, Ko RKL, Hettema H, Radke K. Machine learning in industrial control system (ICS) security: current landscape, opportunities and challenges. J Intell Inf Syst 2022. [DOI: 10.1007/s10844-022-00753-1] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
Abstract
AbstractThe advent of Industry 4.0 has led to a rapid increase in cyber attacks on industrial systems and processes, particularly on Industrial Control Systems (ICS). These systems are increasingly becoming prime targets for cyber criminals and nation-states looking to extort large ransoms or cause disruptions due to their ability to cause devastating impact whenever they cease working or malfunction. Although myriads of cyber attack detection systems have been proposed and developed, these detection systems still face many challenges that are typically not found in traditional detection systems. Motivated by the need to better understand these challenges to improve current approaches, this paper aims to (1) understand the current vulnerability landscape in ICS, (2) survey current advancements of Machine Learning (ML) based methods with respect to the usage of ML base classifiers (3) provide insights to benefits and limitations of recent advancement with respect to two performance vectors; detection accuracy and attack variety. Based on our findings, we present key open challenges which will represent exciting research opportunities for the research community.
Collapse
|
16
|
Lu Q, Chen J, Wang Q, Zhang D, Sun M, Su CY. Practical fixed-time trajectory tracking control of constrained wheeled mobile robots with kinematic disturbances. ISA TRANSACTIONS 2022; 129:273-286. [PMID: 35039151 DOI: 10.1016/j.isatra.2021.12.039] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 09/09/2021] [Revised: 12/09/2021] [Accepted: 12/31/2021] [Indexed: 06/14/2023]
Abstract
This paper addresses the problem of practical fixed-time trajectory tracking for wheeled mobile robots (WMRs) subject to kinematic disturbances and input saturation. Firstly, considering the under-actuated characteristics of the WMR systems, the WMR model under kinematic disturbances is transformed into a two-input two-output interference system by using a set of output equations. Then, the tracking error state equation with lumped disturbances in the acceleration-level pseudo-dynamic control (ALPDC) structure is established. The lumped disturbances are estimated by a designed fixed-time extended state observer (FESO) without requiring the differentiability of the first-time derivatives of the kinematic disturbances. Meanwhile, a practical fixed-time output feedback control law is developed for trajectory tracking. By resorting to the Lyapunov stability theorem, the fixed-time stability analysis of the closed-loop WMR system in the presence of input saturation is conducted. Finally, simulation results are presented to show the effectiveness of the proposed approach.
Collapse
Affiliation(s)
- Qun Lu
- College of Electrical Engineering, Yancheng Institute of Technology, Yancheng 224003, China
| | - Jian Chen
- College of Electrical Engineering, Yancheng Institute of Technology, Yancheng 224003, China
| | - Qianjin Wang
- College of Electrical Engineering, Yancheng Institute of Technology, Yancheng 224003, China
| | - Dan Zhang
- Zhejiang Provincial United Key Laboratory of Embedded Systems, Zhejiang University of Technology, Hangzhou 310023, China.
| | - Mingxuan Sun
- Zhejiang Provincial United Key Laboratory of Embedded Systems, Zhejiang University of Technology, Hangzhou 310023, China
| | - Chun-Yi Su
- Department of Mechanical, Industrial, and Aerospace Engineering, Concordia University, Montreal, QC H3G 1M8, Canada
| |
Collapse
|
17
|
Shao J, Ye Z, Zhang D, Yan H, Zhu J. Injection attack estimation of networked control systems subject to hidden DoS attack. ISA TRANSACTIONS 2022; 129:1-14. [PMID: 35216804 DOI: 10.1016/j.isatra.2022.02.005] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/04/2021] [Revised: 01/20/2022] [Accepted: 02/05/2022] [Indexed: 06/14/2023]
Abstract
This paper is concerned with the injection attack estimation for a class of networked control systems with Deny-of-Service (DoS) attack, where unknown signals are injected into the sensor reading and actuator. The main goal is to design an estimator to estimate the injected signals subject to stochastic hidden DoS attack. By introducing a semi-Markov chain, the complex aperiodic sampling behavior caused by DoS attack is first modeled as a stochastic switching system. By using the Lyapunov stability theory and stochastic system analysis method, the σ-error mean square stability (σ-EMSS) conditions of estimation error system are then derived and the state of the attack estimation error system is shown to be uniformly ultimately bounded. Some linear matrix inequalities are proposed to determine the estimation gain matrices. Finally, both simulation and experimental studies on the motor system are conducted, and the effectiveness of the main results are demonstrated.
Collapse
Affiliation(s)
- Jie Shao
- Research Center of Automation and Artificial Intelligence, Zhejiang University of Technology, Hangzhou, 310023, China
| | - Zehua Ye
- Research Center of Automation and Artificial Intelligence, Zhejiang University of Technology, Hangzhou, 310023, China
| | - Dan Zhang
- Research Center of Automation and Artificial Intelligence, Zhejiang University of Technology, Hangzhou, 310023, China.
| | - Huaicheng Yan
- Key Laboratory of Advanced Control and Optimization for Chemical Process of Ministry of Education, East China University of Science & Technology, Shanghai, 200237, China
| | - Junwei Zhu
- Research Center of Automation and Artificial Intelligence, Zhejiang University of Technology, Hangzhou, 310023, China
| |
Collapse
|
18
|
Zhang Z, Li F, Fang T, Shi K, Shen H. Event-triggered H ∞/passive synchronization for Markov jumping reaction-diffusion neural networks under deception attacks. ISA TRANSACTIONS 2022; 129:36-43. [PMID: 35031128 DOI: 10.1016/j.isatra.2021.12.035] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/26/2021] [Revised: 11/28/2021] [Accepted: 12/24/2021] [Indexed: 06/14/2023]
Abstract
The issue of H∞/passive master-slave synchronization for Markov jumping neural networks with reaction-diffusion terms is investigated in this paper via an event-triggered control scheme under deception attacks. To lighten the burden of limited communication bandwidth as well as ensure the control performance, an event-triggered transmission scheme is developed. Meanwhile, the randomly occurring deception attacks, which received from the event generator are assumed to modify the sign of the control signal, are taken into account. Furthermore, sufficient conditions ensuring the prescribed H∞/passive performance level of the neural networks, are deduced beyond Lyapunov stability theory, and the controller gains are derived dealing with the matrix convex optimization problem. At last, the availability of the approach proposed is demonstrated via a numerical example.
Collapse
Affiliation(s)
- Ziwei Zhang
- School of Electrical and Information Engineering, Anhui University of Technology, Ma' anshan 243032, China
| | - Feng Li
- School of Electrical and Information Engineering, Anhui University of Technology, Ma' anshan 243032, China.
| | - Ting Fang
- School of Electrical and Information Engineering, Anhui University of Technology, Ma' anshan 243032, China.
| | - Kaibo Shi
- School of Information Science and Engineering, Chengdu University, Chengdu, 610106, China
| | - Hao Shen
- School of Electrical and Information Engineering, Anhui University of Technology, Ma' anshan 243032, China
| |
Collapse
|
19
|
Liu S, Cheng J, Zhang D, Yan H, Park JH. Saturation control for fuzzy markovian switching systems with singularly perturbation and cyber-attacks. Inf Sci (N Y) 2022. [DOI: 10.1016/j.ins.2022.07.088] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
|
20
|
Huang Z, Lv W, Chen H, Rao H, Xu Y. Consensus-based distributed receding horizon estimation. ISA TRANSACTIONS 2022; 128:106-114. [PMID: 34756756 DOI: 10.1016/j.isatra.2021.10.015] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/16/2021] [Revised: 10/12/2021] [Accepted: 10/13/2021] [Indexed: 06/13/2023]
Abstract
This paper studies the distributed state estimation over sensor networks based on receding horizon estimation (RHE). Firstly, a new scheme of centralized RHE is introduced, which gathers the decomposition terms instead of collecting the measurements of each node. Then, we present a distributed estimate algorithm based on the centralized RHE. To avoid the quadratic programming (QP) problem, the proposed algorithm takes advantage of the analytical solution of the centralized RHE and performs consensus steps to generalize the distributed estimation for each node, which greatly reduces each node's computation. Under the assumption of collective observability over networks, the proposed algorithm can guarantee the stability of estimation error in the case of enough consensus steps. Finally, the simulation results verify the effectiveness of the proposed method.
Collapse
Affiliation(s)
- Zenghong Huang
- Guangdong Provincial Key Laboratory of Intelligent Decision and Cooperative Control, School of Automation, Guangdong University of Technology, Guangzhou 510006, China.
| | - Weijun Lv
- Guangdong Provincial Key Laboratory of Intelligent Decision and Cooperative Control, School of Automation, Guangdong University of Technology, Guangzhou 510006, China.
| | - Hui Chen
- Guangdong Provincial Key Laboratory of Intelligent Decision and Cooperative Control, School of Automation, Guangdong University of Technology, Guangzhou 510006, China.
| | - Hongxia Rao
- Guangdong Provincial Key Laboratory of Intelligent Decision and Cooperative Control, School of Automation, Guangdong University of Technology, Guangzhou 510006, China.
| | - Yong Xu
- Guangdong Provincial Key Laboratory of Intelligent Decision and Cooperative Control, School of Automation, Guangdong University of Technology, Guangzhou 510006, China.
| |
Collapse
|
21
|
Narasimhan S, El‐Farra NH, Ellis MJ. A Control‐Switching Approach for Cyberattack Detection in Process Systems with Minimal False Alarms. AIChE J 2022. [DOI: 10.1002/aic.17875] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/10/2022]
Affiliation(s)
- Shilpa Narasimhan
- Department of Chemical Engineering University of California Davis USA
| | - Nael H. El‐Farra
- Department of Chemical Engineering University of California Davis USA
| | - Matthew J. Ellis
- Department of Chemical Engineering University of California Davis USA
| |
Collapse
|
22
|
Chen X, Hu C, Tian E, Peng C. Event-based fuzzy resilient control of nonlinear DC Microgrids under denial-of-service attacks. ISA TRANSACTIONS 2022; 127:206-215. [PMID: 35525605 DOI: 10.1016/j.isatra.2022.04.019] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/25/2021] [Revised: 03/17/2022] [Accepted: 04/12/2022] [Indexed: 06/14/2023]
Abstract
This paper focuses on designing an event-triggered fuzzy resilient controller for networked nonlinear DC microgrid (MG) with constant power loads (CPLs) in the presence of denial-of-service (DoS) attacks. First, an attack-resilient event-triggered communication scheme is introduced to reduce the communication overhead of the DC MG while achieving the desired performance despite the presence of the DoS attacks. Second, the nonlinear event-triggered DC MG system with CPLs is modeled as a T-S fuzzy system with artificial delay through the sector nonlinearity approach combined with time-delay system modeling method. Then, by employing the noncontinuous piecewise Lyapunov-Krasovskii functional (NPLKF) approach, the asymptotic stability criterion of the built event-triggered T-S fuzzy DC MG is obtained in the form of linear matrix inequalities (LMIs), and a design method of fuzzy controller is proposed. Finally, case studies are presented to validate the efficiency of our proposed method.
Collapse
Affiliation(s)
- Xiaoli Chen
- College of Information Engineering, Nanjing University of Finance and Economics, Nanjing, 210023, China
| | - Chunyang Hu
- School of Computer Engineering, Hubei University of Arts and Science, Xiangyang 441052, China.
| | - Engang Tian
- School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology, Shanghai, China
| | - Chen Peng
- School of Mechatronic Engineering and Automation, Shanghai University, Shanghai, 200072, China
| |
Collapse
|
23
|
Xie J, Zhu S, Zhang D. Distributed interval state estimation with l ∞-gain optimization for cyber-physical systems subject to bounded disturbance and random stealthy attacks. ISA TRANSACTIONS 2022; 127:22-31. [PMID: 35086672 DOI: 10.1016/j.isatra.2022.01.010] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/16/2021] [Revised: 01/06/2022] [Accepted: 01/06/2022] [Indexed: 06/14/2023]
Abstract
This paper studies the distributed interval state estimation problem for cyber-physical systems with bounded disturbance and random stealthy attacks. Since conventional interval observers cannot complete the task of real-time monitoring system under random attacks, an attack-resistant distributed interval observer is designed by using attack frequency and interval attack estimation. Using the designed observer, upper- and lower-bounding estimation error systems are modeled by positive interconnected systems with hybrid deterministic and random bounded inputs. To explicitly attenuate the effect of disturbance and attacks, the resulting deterministic positive error system between upper- and lower-bounding estimates is formulated. By linear programming, the results of interval observer design and l∞-gain optimization are proposed. The remote monitoring of vehicle lateral dynamic is given for numerical verification of the results.
Collapse
Affiliation(s)
- Jiyang Xie
- School of Mathematics, Shandong University, Jinan, Shandong, 250100, China
| | - Shuqian Zhu
- School of Mathematics, Shandong University, Jinan, Shandong, 250100, China
| | - Dawei Zhang
- School of Mathematics, Shandong University, Jinan, Shandong, 250100, China.
| |
Collapse
|
24
|
Yu Y, Liu GP, Hu W. Security tracking control for discrete-time stochastic systems subject to cyber attacks. ISA TRANSACTIONS 2022; 127:133-145. [PMID: 35216807 DOI: 10.1016/j.isatra.2022.02.001] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/19/2021] [Revised: 01/29/2022] [Accepted: 02/02/2022] [Indexed: 06/14/2023]
Abstract
This paper is concerned with the security tracking problem under the quadratic cost criterion for a class of discrete-time stochastic linear networked control systems (NCSs) exposed to cyber attacks, covering false data injection attacks as well as a class of DoS attacks. Taking into account factors such as network congestion and the defensive role of intrusion detection systems, successful attack events are modeled as a Bernoulli random sequence. To describe the transient trajectory of an NCS under the impact of a random attack, a probabilistic definition of secure trackability is taken. Therefore, an observer-based dynamic output feedback controller is designed in order to achieve the specified probabilistic secure trackability. Specifically, the probabilistic safety output tracking problem is transformed into an input-to-state stability problem in the probabilistic sense for closed-loop systems with some new sufficient conditions, provided that an augmented incremental model is utilized Then, the controller parameters and the upper bound of the quadratic cost function are determined by solving matrix inequalities, while easy-solution forms of the matrix inequalities to be solved are presented by the Schur complementary lemma. Both simulation studies and practical experiments demonstrate the effectiveness of the proposed control scheme.
Collapse
Affiliation(s)
- Yi Yu
- Department of Artificial Intelligence and Automation, School of Electrical Engineering and Automation, Wuhan University, Wuhan, 430072, China.
| | - Guo-Ping Liu
- Department of Electronic and Electrical Engineering, Southern University of Science and Technology, Shenzhen, 518055, China.
| | - Wenshan Hu
- Department of Artificial Intelligence and Automation, School of Electrical Engineering and Automation, Wuhan University, Wuhan, 430072, China.
| |
Collapse
|
25
|
Zha L, Liao R, Liu J, Cao J, Xie X. Dynamic event-triggered security control of cyber-physical systems against missing measurements and cyber-attacks. Neurocomputing 2022. [DOI: 10.1016/j.neucom.2022.05.096] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
|
26
|
Event-based security tracking control for networked control systems against stochastic cyber-attacks. Inf Sci (N Y) 2022. [DOI: 10.1016/j.ins.2022.08.085] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
|
27
|
Padhan S, Turuk AK. Design of false data injection attacks in cyber-physical systems. Inf Sci (N Y) 2022. [DOI: 10.1016/j.ins.2022.06.082] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
|
28
|
Wang H, Cheng J, Yan H, Shi K, Qi W. Component-based dynamic event-triggered control for nonlinear singularly perturbed systems: A gain-scheduling method. Inf Sci (N Y) 2022. [DOI: 10.1016/j.ins.2022.01.069] [Citation(s) in RCA: 5] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
|
29
|
He N, Ma K, Li R. Toward Optimal False Data Injection Attack against Self‐Triggered Model Predictive Controllers. ADVANCED THEORY AND SIMULATIONS 2022. [DOI: 10.1002/adts.202200025] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/10/2022]
Affiliation(s)
- Ning He
- School of Mechanical and Electrical Engineering Xi'an University of Architecture and Technology No.13 Yanta Road xi'an Shaanxi 710055 China
| | - Kai Ma
- School of Mechanical and Electrical Engineering Xi'an University of Architecture and Technology No.13 Yanta Road xi'an Shaanxi 710055 China
| | - Ruoxia Li
- School of Information and Control Engineering Xi'an University of Architecture and Technology No.13 Yanta Road xi'an Shaanxi 710055 China
| |
Collapse
|
30
|
Key Concepts of Systemological Approach to CPS Adaptive Information Security Monitoring. Symmetry (Basel) 2021. [DOI: 10.3390/sym13122425] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022] Open
Abstract
Modern cyber-physical systems (CPS) use digital control of physical processes. This allows attackers to conduct various cyberattacks on these systems. According to the current trends, an information security monitoring system (ISMS) becomes part of a security management system of CPS. It provides information to make a decision and generate a response. A large number of new methods are aimed at CPS security, including security assessment, intrusion detection, and ensuring sustainability. However, as a cyber-physical system operates over time, its structure and requirements may change. The datasets available for the protection object (CPS) and the security requirements have become dynamic. This dynamic effect causes asymmetry between the monitoring data collection and processing subsystem and the presented security tasks. The problem herein is the choice of the most appropriate set of methods in order to solve the security problems of a particular CPS configuration from a particular bank of the available methods. To solve this problem, the authors present a method for the management of an adaptive information security monitoring system. The method consists of solving a multicriteria discrete optimization problem under Pareto-optimality conditions when the available data, methods or external requirements change. The experimental study was performed on an example of smart home intrusion detection. In the study, the introduction of a constraint (a change in requirements) led to the revision of the monitoring scheme and a different recommendation of the monitoring method. As a result, the information security monitoring system gains the property of adaptability to changes in tasks and the available data. An important result from the study is the fact that the monitoring scheme obtained using the proposed management method has a proven optimality under the given conditions. Therefore, the asymmetry between the information security monitoring data collection and processing subsystem and the set of security requirements in cyber-physical systems can be overcome.
Collapse
|