Resilient Control for Networked Control Systems Subject to Cyber/Physical Attacks
In this paper, we investigate a resilient control strategy for networked control systems (NCSs) subject to zero dynamic attacks which are stealthy false-data injection attacks that are designed so that they cannot be detected based on control input and measurement data. Cyber resilience represents t...
Saved in:
Published in | International journal of automation and computing Vol. 15; no. 3; pp. 345 - 354 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Beijing
Institute of Automation, Chinese Academy of Sciences
01.06.2018
Springer Nature B.V |
Subjects | |
Online Access | Get full text |
ISSN | 1476-8186 2153-182X 1751-8520 2153-1838 |
DOI | 10.1007/s11633-017-1059-x |
Cover
Loading…
Abstract | In this paper, we investigate a resilient control strategy for networked control systems (NCSs) subject to zero dynamic attacks which are stealthy false-data injection attacks that are designed so that they cannot be detected based on control input and measurement data. Cyber resilience represents the ability of systems or network architectures to continue providing their intended behavior during attack and recovery. When a cyber attack on the control signal of a networked control system is computed to remain undetectable from passive model-based fault detection and isolation schemes, we show that the consequence of a zero dynamic attack on the state variable of the plant is undetectable during attack but it becomes apparent after the end of the attack. A resilient linear quadratic Gaussian controller, having the ability to quickly recover the nominal behavior of the closed-loop system after the attack end, is designed by updating online the Kalman filter from information given by an active version of the generalized likelihood ratio detector. |
---|---|
AbstractList | In this paper, we investigate a resilient control strategy for networked control systems (NCSs) subject to zero dynamic attacks which are stealthy false-data injection attacks that are designed so that they cannot be detected based on control input and measurement data. Cyber resilience represents the ability of systems or network architectures to continue providing their intended behavior during attack and recovery. When a cyber attack on the control signal of a networked control system is computed to remain undetectable from passive model-based fault detection and isolation schemes, we show that the consequence of a zero dynamic attack on the state variable of the plant is undetectable during attack but it becomes apparent after the end of the attack. A resilient linear quadratic Gaussian controller, having the ability to quickly recover the nominal behavior of the closed-loop system after the attack end, is designed by updating online the Kalman filter from information given by an active version of the generalized likelihood ratio detector. |
Author | Rhouma, Taouba Abdelkrim, Mohamed Naceur Chabir, Karim |
Author_xml | – sequence: 1 givenname: Taouba orcidid: 0000-0002-3763-212X surname: Rhouma fullname: Rhouma, Taouba email: taouba.rhouma@gmail.com organization: Modeling, Analysis and Control of Systems (MACS) Laboratory, National Engineering School of Gabes (ENIG), University of Gabes – sequence: 2 givenname: Karim orcidid: 0000-0002-2377-7205 surname: Chabir fullname: Chabir, Karim organization: Modeling, Analysis and Control of Systems (MACS) Laboratory, National Engineering School of Gabes (ENIG), University of Gabes – sequence: 3 givenname: Mohamed Naceur surname: Abdelkrim fullname: Abdelkrim, Mohamed Naceur organization: Modeling, Analysis and Control of Systems (MACS) Laboratory, National Engineering School of Gabes (ENIG), University of Gabes |
BookMark | eNp9kF1LwzAUhoNMcE5_gHcFr-Ny2jRpL0fxC4Zf0-uQpol265qZZLj-ezsqCoJencPhfc4573uMRq1tNUJnQC6AED71ACxJMAGOgaQ53h2gMfAUcJbGZNT3lDOcQcaO0LH3S0IYj3M6Ro9P2tdNrdsQFbYNzjaRsS660-HDupWuvqeLzge99tFiWy61ClGwUdGV2k0f3jpfK9lEsxCkWvkTdGhk4_XpV52gl6vL5-IGz--vb4vZHKsEWMDUKJnThJm8TCBVVJUVr7JM0zhWGeGSaGW4URwI15CDAUkZqUotaZbkJmfJBJ0PezfOvm-1D2Jpt67tT4o4741mlADpVXxQKWe9d9oIVQcZ6r0rWTcCiNjnJ4b8RJ-f2Ocndj0Jv8iNq9fSdf8y8cD4Xtu-avfz09_QJ559ha8 |
CitedBy_id | crossref_primary_10_1016_j_jfranklin_2022_02_009 crossref_primary_10_1016_j_neucom_2019_01_099 crossref_primary_10_1080_00207721_2020_1772402 crossref_primary_10_1155_2022_6732343 crossref_primary_10_1007_s12555_018_0470_6 crossref_primary_10_1049_cmu2_12557 crossref_primary_10_1016_j_amc_2021_126593 crossref_primary_10_1080_23335777_2019_1631889 crossref_primary_10_1109_TFUZZ_2020_2983904 crossref_primary_10_1007_s11768_023_00141_2 crossref_primary_10_1007_s42835_022_01338_2 |
Cites_doi | 10.1016/j.arcontrol.2008.03.008 10.1145/2185505.2185515 10.1109/TAC.1976.1101146 10.3182/20140824-6-ZA-1003.02184 10.1080/00207721.2014.906683 10.1016/0005-1098(90)90018-D 10.1007/978-1-4615-5149-2 10.1109/JPROC.2006.887291 10.1007/978-3-642-00602-9_3 10.1007/s11633-015-0897-7 10.1109/JPROC.2006.887288 10.1145/1653662.1653666 |
ContentType | Journal Article |
Copyright | Institute of Automation, Chinese Academy of Sciences and Springer-Verlag GmbH Germany, part of Springer Nature 2017 Institute of Automation, Chinese Academy of Sciences and Springer-Verlag GmbH Germany, part of Springer Nature 2017. |
Copyright_xml | – notice: Institute of Automation, Chinese Academy of Sciences and Springer-Verlag GmbH Germany, part of Springer Nature 2017 – notice: Institute of Automation, Chinese Academy of Sciences and Springer-Verlag GmbH Germany, part of Springer Nature 2017. |
DBID | AAYXX CITATION 8FE 8FG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- P5Z P62 PHGZM PHGZT PKEHL PQEST PQGLB PQQKQ PQUKI |
DOI | 10.1007/s11633-017-1059-x |
DatabaseName | CrossRef ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central UK/Ireland Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Central Technology Collection (ProQuest) ProQuest One ProQuest Central Korea ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition |
DatabaseTitle | CrossRef Advanced Technologies & Aerospace Collection Computer Science Database ProQuest Central Student Technology Collection ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection ProQuest One Academic Eastern Edition SciTech Premium Collection ProQuest One Community College ProQuest Technology Collection ProQuest SciTech Collection ProQuest Central Advanced Technologies & Aerospace Database ProQuest One Applied & Life Sciences ProQuest One Academic UKI Edition ProQuest Central Korea ProQuest Central (New) ProQuest One Academic ProQuest One Academic (New) |
DatabaseTitleList | Advanced Technologies & Aerospace Collection |
Database_xml | – sequence: 1 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1751-8520 2153-1838 |
EndPage | 354 |
ExternalDocumentID | 10_1007_s11633_017_1059_x |
GroupedDBID | -5B -5G -BR -EM -Y2 -~C .86 .VR 06D 0R~ 0VY 1N0 29~ 2B. 2C0 2J2 2KG 2KM 2LR 2VQ 2~H 30V 4.4 408 40D 40E 5VR 5VS 6NX 8TC 8UJ 92H 92I 92R 93N 95- 95. 95~ 96X AAAVM AABHQ AAHNG AAIAL AAJKR AANZL AARHV AARTL AATVU AAUYE AAWCG AAYIU AAYQN AAYTO ABDZT ABECU ABFTD ABFTV ABHQN ABJNI ABJOX ABKCH ABMNI ABMQK ABNWP ABQBU ABSXP ABTEG ABTHY ABTMW ABWNU ABXPI ACBXY ACGFS ACHXU ACKNC ACMLO ACOKC ACOMO ACSNA ADHHG ADHIR ADINQ ADKNI ADKPE ADRFC ADURQ ADYFF ADZKW AEBTG AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEOHA AEPYU AETLH AEVLU AEXYK AFGCZ AFLOW AFQWF AFUIB AFWTZ AFZKB AGAYW AGDGC AGJBK AGQMX AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AHYZX AIAKS AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMYQR AOCGG ARMRJ AXYYD B-. BA0 BDATZ BGNMA CAG CCEZO CHBEP COF CS3 CSCUP CUBFJ CW9 DNIVK EBS EIOEI EJD ESBYG FA0 FERAY FFXSO FINBP FNLPD FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNWQR GQ6 GQ7 H13 HF~ HG6 HLICF HMJXF HRMNR HZ~ IHE IJ- IXD I~X I~Z J-C JBSCW KOV M4Y MA- NQJWS NU0 O9- O9J P9O PF0 QOS R89 R9I RNS ROL RPX RSV S16 S1Z S27 S3B SAP SCL SDH SEG SHX SISQX SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 TCJ TSG TUC U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W48 WK8 YLTOR Z7R Z7X Z83 Z88 ZMTXR ~A9 AAYXX ACSTC CITATION 8FE 8FG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- P62 PHGZM PHGZT PKEHL PQEST PQGLB PQQKQ PQUKI |
ID | FETCH-LOGICAL-c316t-4fca9436f9b315c4cbd7d88e422c807a0ecf7fc7107e191f1a460dbea4839f963 |
IEDL.DBID | U2A |
ISSN | 1476-8186 2153-182X |
IngestDate | Fri Jul 25 23:29:49 EDT 2025 Tue Jul 01 01:06:03 EDT 2025 Thu Apr 24 23:11:56 EDT 2025 Fri Feb 21 02:35:02 EST 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 3 |
Keywords | anomaly detector cyber physical attacks Kalman filtering Networked control systems (NCSs) resilient control |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c316t-4fca9436f9b315c4cbd7d88e422c807a0ecf7fc7107e191f1a460dbea4839f963 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0002-3763-212X 0000-0002-2377-7205 |
PQID | 2918684010 |
PQPubID | 6623301 |
PageCount | 10 |
ParticipantIDs | proquest_journals_2918684010 crossref_citationtrail_10_1007_s11633_017_1059_x crossref_primary_10_1007_s11633_017_1059_x springer_journals_10_1007_s11633_017_1059_x |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 20180600 2018-6-00 20180601 |
PublicationDateYYYYMMDD | 2018-06-01 |
PublicationDate_xml | – month: 6 year: 2018 text: 20180600 |
PublicationDecade | 2010 |
PublicationPlace | Beijing |
PublicationPlace_xml | – name: Beijing |
PublicationTitle | International journal of automation and computing |
PublicationTitleAbbrev | Int. J. Autom. Comput |
PublicationYear | 2018 |
Publisher | Institute of Automation, Chinese Academy of Sciences Springer Nature B.V |
Publisher_xml | – name: Institute of Automation, Chinese Academy of Sciences – name: Springer Nature B.V |
References | Amin, Cárdenas, Sastry (CR7) 2009 Zhu (CR28) 2011 Mo, Sinopoli (CR11) 2009 De Persis, Tesi (CR27) 2014; 47 Chen, Kar, Moura (CR6) 2015 Teixeira, Shames, Sandberg, Johansson (CR20) 2012 Pasqualetti, Dórfler, Bullo (CR10) 2012 Willsky, Jones (CR24) 1976; 21 Stouffer, Falco, Scarfone (CR3) 2007 Keller, Chabir, Sauter (CR22) 2016; 47 Antsaklis, Baillieul (CR1) 2007; 95 Keller, Sauter (CR21) 2013 Frank (CR15) 1990; 26 Brunner, Hofinger, Krauss, Roblee, Schoo, Todt (CR19) 2010 Pasqualetti (CR14) 2012 Hespanha, Naghshtabrizi, Xu (CR2) 2007; 95 Chabir, Sauter, Al-Salami, Aubrun (CR18) 2012 Zhang, Jiang (CR25) 2008; 32 Teixeira, Sandberg, Johansson (CR9) 2010 Chen, Patton (CR16) 1999 Yuan, Zhu, Sun, Wang, Ba¸sar (CR26) 2013 Teixeira, Pérez, Sandberg, Johansson (CR5) 2012 Smith (CR12) 2011 Ding (CR17) 2008 Do, Fillatre, Nikiforov (CR23) 2014 Tian, Gao, Gong, Shi (CR4) 2015; 12 Liu, Ning, Reiter (CR8) 2009 Cardenas, Amin, Sastry (CR13) 2008 P. M. Frank (1059_CR15) 1990; 26 A. Teixeira (1059_CR9) 2010 J. Y. Keller (1059_CR21) 2013 M. Brunner (1059_CR19) 2010 V. L. Do (1059_CR23) 2014 Y. Chen (1059_CR6) 2015 P. Antsaklis (1059_CR1) 2007; 95 X. Zhu (1059_CR28) 2011 Y. L. Mo (1059_CR11) 2009 Y. Liu (1059_CR8) 2009 F. Pasqualetti (1059_CR14) 2012 K. Chabir (1059_CR18) 2012 Y. M. Zhang (1059_CR25) 2008; 32 Y. Yuan (1059_CR26) 2013 A. A. Cardenas (1059_CR13) 2008 J. P. Hespanha (1059_CR2) 2007; 95 R. S. Smith (1059_CR12) 2011 K. Stouffer (1059_CR3) 2007 S. X. Ding (1059_CR17) 2008 J. Y. Keller (1059_CR22) 2016; 47 A. Teixeira (1059_CR5) 2012 Z. D. Tian (1059_CR4) 2015; 12 S. Amin (1059_CR7) 2009 F. Pasqualetti (1059_CR10) 2012 J. Chen (1059_CR16) 1999 A. Willsky (1059_CR24) 1976; 21 A. Teixeira (1059_CR20) 2012 C. Persis De (1059_CR27) 2014; 47 |
References_xml | – volume: 32 start-page: 229 issue: 2 year: 2008 end-page: 252 ident: CR25 article-title: Bibliographical review on reconfigurable fault-tolerant control systems publication-title: Annual Reviews in Control doi: 10.1016/j.arcontrol.2008.03.008 – start-page: 462 year: 2013 end-page: 467 ident: CR21 article-title: Monitoring of stealthy attack in networked control systems publication-title: Proceedings of Conference on Control and Fault-Tolerant Systems – start-page: 90 year: 2011 end-page: 95 ident: CR12 article-title: A decoupled feedback structure for covertly appropriating networked control systems publication-title: Proceedings of the 18th IFAC World Congress – start-page: 55 year: 2012 end-page: 64 ident: CR5 article-title: Attack models and scenarios for networked control systems publication-title: Proceedings of the 1st International Conference on High Confidence Networked Systems doi: 10.1145/2185505.2185515 – year: 2008 ident: CR17 publication-title: Model-Based Fault Diagnosis Techniques: Design Schemes, Algorithms, and Tools – year: 2015 ident: CR6 publication-title: Dynamic Attack Detection in Cyber-Physical Systems with Side Initial State Information – start-page: 1107 year: 2012 end-page: 1112 ident: CR18 article-title: On fault detection and isolation (FDI) design for networked control systems with bounded delay constraints publication-title: Proceedings of the 8th IFAC Symposium on Fault Detection, Supervision and Safety of Technical Processes – year: 2012 ident: CR14 publication-title: Secure Control Systems: A Control- Theoretic Approach to Cyber-Physical Security – start-page: 1806 year: 2012 end-page: 1813 ident: CR20 article-title: Revealing stealthy attacks in control systems publication-title: Proceedings of the 50th Annual Allerton Conference on Communication, Control, and Computing – start-page: 3690 year: 2010 end-page: 3696 ident: CR9 article-title: Networked control systems under cyber attacks with applications to power networks publication-title: Proceedings of American Control Conference – volume: 21 start-page: 108 issue: 1 year: 1976 end-page: 112 ident: CR24 article-title: A generalized likelihood ratio approach to the detection and estimation of jumps in linear systems publication-title: IEEE Transactions on Automatic Control doi: 10.1109/TAC.1976.1101146 – volume: 47 start-page: 134 issue: 3 year: 2014 end-page: 139 ident: CR27 article-title: Resilient control under denial-ofservice publication-title: IFAC Proceedings Volumes doi: 10.3182/20140824-6-ZA-1003.02184 – start-page: 3418 year: 2012 end-page: 3425 ident: CR10 article-title: Cyber-physical security via geometric control: Distributed monitoring and malicious attacks publication-title: Proceedings of the 51th Annual Conference on Decision and Control – volume: 47 start-page: 814 issue: 4 year: 2016 end-page: 820 ident: CR22 article-title: Input reconstruction for networked control systems subject to deception attacks and data losses on control signals publication-title: International Journal of Systems Science doi: 10.1080/00207721.2014.906683 – year: 2010 ident: CR19 article-title: Infiltrating critical infrastructures with next-generation attacks publication-title: Fraunhofer Institute for Secure Information Technology – year: 2011 ident: CR28 publication-title: Resilient Control and Intrusion Detection for SCADA^Systems – volume: 26 start-page: 459 issue: 3 year: 1990 end-page: 474 ident: CR15 article-title: Fault diagnosis in dynamic systems using analytical and knowledge-based redundancy: A survey and some new results publication-title: Automatica doi: 10.1016/0005-1098(90)90018-D – year: 1999 ident: CR16 publication-title: Robust Model-Based Fault Diagnosis for Dynamic Systems doi: 10.1007/978-1-4615-5149-2 – volume: 95 start-page: 5 issue: 1 year: 2007 end-page: 8 ident: CR1 article-title: Special issue on technology of networked control systems publication-title: Proceedings of the IEEE doi: 10.1109/JPROC.2006.887291 – year: 2007 ident: CR3 article-title: Guide to industrial control systems (ICS) security publication-title: NIST^Special Publication – start-page: 31 year: 2009 end-page: 45 ident: CR7 article-title: Safe and secure networked control systems under denial-of-service attacks publication-title: Proceedings of the 12th International Conference on Hybrid Systems: Computation and Control doi: 10.1007/978-3-642-00602-9_3 – start-page: 911 year: 2009 end-page: 918 ident: CR11 article-title: Secure control against replay attacks publication-title: Proceedings of the 47th Annual Allerton Conference on Communication, Control, and Computing – start-page: 495 year: 2008 end-page: 500 ident: CR13 article-title: Secure control: Towards survivable cyber-physical systems publication-title: Proceedings of the 28th International Conference on Distributed Computing SystemsWorkshops – volume: 12 start-page: 648 issue: 6 year: 2015 end-page: 656 ident: CR4 article-title: Time-delay compensation method for networked control system based on time-delay prediction and implicit PIGPC publication-title: International Journal of Automation and Computing doi: 10.1007/s11633-015-0897-7 – start-page: 21 year: 2009 end-page: 32 ident: CR8 article-title: False data injection attacks against state estimation in electric power grids. publication-title: Proceedings of the 16th ACM^Conference on Computer and Communications Security – start-page: 364 year: 2014 end-page: 369 ident: CR23 article-title: A statistical method for detecting cyber/physical attacks on SCADA^systems publication-title: Proceedings of IEEE Conference on Control Applications – start-page: 54 year: 2013 end-page: 59 ident: CR26 article-title: Resilient control of cyber-physical systems against denialof- service attacks publication-title: Proceedings of the 6th International Symposium on Resilient Control Systems – volume: 95 start-page: 138 issue: 1 year: 2007 end-page: 162 ident: CR2 article-title: A survey of recent results in networked control systems publication-title: Proceedings of the IEEE doi: 10.1109/JPROC.2006.887288 – volume-title: Dynamic Attack Detection in Cyber-Physical Systems with Side Initial State Information year: 2015 ident: 1059_CR6 – start-page: 462 volume-title: Proceedings of Conference on Control and Fault-Tolerant Systems year: 2013 ident: 1059_CR21 – start-page: 3418 volume-title: Proceedings of the 51th Annual Conference on Decision and Control year: 2012 ident: 1059_CR10 – start-page: 1806 volume-title: Proceedings of the 50th Annual Allerton Conference on Communication, Control, and Computing year: 2012 ident: 1059_CR20 – start-page: 1107 volume-title: Proceedings of the 8th IFAC Symposium on Fault Detection, Supervision and Safety of Technical Processes year: 2012 ident: 1059_CR18 – start-page: 21 volume-title: Proceedings of the 16th ACM^Conference on Computer and Communications Security year: 2009 ident: 1059_CR8 doi: 10.1145/1653662.1653666 – volume-title: Robust Model-Based Fault Diagnosis for Dynamic Systems year: 1999 ident: 1059_CR16 doi: 10.1007/978-1-4615-5149-2 – volume: 32 start-page: 229 issue: 2 year: 2008 ident: 1059_CR25 publication-title: Annual Reviews in Control doi: 10.1016/j.arcontrol.2008.03.008 – volume: 95 start-page: 5 issue: 1 year: 2007 ident: 1059_CR1 publication-title: Proceedings of the IEEE doi: 10.1109/JPROC.2006.887291 – start-page: 90 volume-title: Proceedings of the 18th IFAC World Congress year: 2011 ident: 1059_CR12 – start-page: 54 volume-title: Proceedings of the 6th International Symposium on Resilient Control Systems year: 2013 ident: 1059_CR26 – start-page: 31 volume-title: Proceedings of the 12th International Conference on Hybrid Systems: Computation and Control year: 2009 ident: 1059_CR7 doi: 10.1007/978-3-642-00602-9_3 – volume: 95 start-page: 138 issue: 1 year: 2007 ident: 1059_CR2 publication-title: Proceedings of the IEEE doi: 10.1109/JPROC.2006.887288 – start-page: 55 volume-title: Proceedings of the 1st International Conference on High Confidence Networked Systems year: 2012 ident: 1059_CR5 doi: 10.1145/2185505.2185515 – volume-title: Secure Control Systems: A Control- Theoretic Approach to Cyber-Physical Security year: 2012 ident: 1059_CR14 – volume: 12 start-page: 648 issue: 6 year: 2015 ident: 1059_CR4 publication-title: International Journal of Automation and Computing doi: 10.1007/s11633-015-0897-7 – start-page: 495 volume-title: Proceedings of the 28th International Conference on Distributed Computing SystemsWorkshops year: 2008 ident: 1059_CR13 – volume-title: Fraunhofer Institute for Secure Information Technology year: 2010 ident: 1059_CR19 – volume: 21 start-page: 108 issue: 1 year: 1976 ident: 1059_CR24 publication-title: IEEE Transactions on Automatic Control doi: 10.1109/TAC.1976.1101146 – volume: 47 start-page: 814 issue: 4 year: 2016 ident: 1059_CR22 publication-title: International Journal of Systems Science doi: 10.1080/00207721.2014.906683 – volume: 26 start-page: 459 issue: 3 year: 1990 ident: 1059_CR15 publication-title: Automatica doi: 10.1016/0005-1098(90)90018-D – volume-title: NIST^Special Publication year: 2007 ident: 1059_CR3 – start-page: 3690 volume-title: Proceedings of American Control Conference year: 2010 ident: 1059_CR9 – start-page: 911 volume-title: Proceedings of the 47th Annual Allerton Conference on Communication, Control, and Computing year: 2009 ident: 1059_CR11 – volume-title: Model-Based Fault Diagnosis Techniques: Design Schemes, Algorithms, and Tools year: 2008 ident: 1059_CR17 – start-page: 364 volume-title: Proceedings of IEEE Conference on Control Applications year: 2014 ident: 1059_CR23 – volume: 47 start-page: 134 issue: 3 year: 2014 ident: 1059_CR27 publication-title: IFAC Proceedings Volumes doi: 10.3182/20140824-6-ZA-1003.02184 – volume-title: Resilient Control and Intrusion Detection for SCADA^Systems year: 2011 ident: 1059_CR28 |
SSID | ssj0067294 ssj0003320693 |
Score | 2.1569107 |
Snippet | In this paper, we investigate a resilient control strategy for networked control systems (NCSs) subject to zero dynamic attacks which are stealthy false-data... |
SourceID | proquest crossref springer |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 345 |
SubjectTerms | Automation CAE) and Design Closed loops Communication Communications networks Computer Applications Computer-Aided Engineering (CAD Control Control systems Controllers Cybersecurity Design Engineering Fault detection Feedback control Kalman filters Likelihood ratio Linear quadratic Gaussian control Mechatronics Network control Nuclear power plants Random variables Research Article Resilience Robotics Sensors Systems stability |
SummonAdditionalLinks | – databaseName: ProQuest Central dbid: BENPR link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LSwMxEA7aXryIomK1Sg6elNDdJN3NnqSWliJYarHQ27J5gVBabVeo_97JbraLgr3uI4eZZOabycw3CN0xJYVOdEiEoV3ClTVEaBUSJTLH7iQDy1xz8ss4Gs3487w79wm3jS-rrGxiYaj1SrkceYcmjtgdooHg8eOTuKlR7nbVj9A4RE0wwQKCr-bTYDyZ7rIsjNEgKph3wbUxAmB6Xl1tFv1zgEZcOVFMHMwg29_OqUacfy5JC98zPEHHHjTiXqnlU3RglmfodWo27wvXzoj7Zb05BgCKx2Vdt9G7p56UHIONcEkXnK9w_1uadWfidYR7ee5a7c_RbDh464-IH5BAFAujnHCrsoSzyCaShV3FldSxFsJwSpUI4iwwysZWAYiIDcRlNsx4FGhpMg6wyMLRu0CN5WppLhGWhqnM6q62FCJmC0BM8iQTklINkCkSLRRUkkmVZw93QywWac177ISZgjBTJ8x020L3u18-SuqMfR-3K3Gn_hRt0lrnLfRQqaB-_e9iV_sXu0ZHAHtEWfDVRo18_WVuAFrk8tbvnx9phsuR priority: 102 providerName: ProQuest |
Title | Resilient Control for Networked Control Systems Subject to Cyber/Physical Attacks |
URI | https://link.springer.com/article/10.1007/s11633-017-1059-x https://www.proquest.com/docview/2918684010 |
Volume | 15 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlZ1LS8NAEMcXbS96EJ9YrWUPnpTFZLNJNsdY2opiqcVCPYXsC4TSShtBv72zeTQqKngKJJs9zL5-k5n5B6FzTwquIuUSrqlPmDSacCVdInlq1Z2EYzxbnHw_DG4m7HbqT8s67lWV7V6FJPOdui52A3SwuT8hsUxAABybvnXdYRJPaFxtvwHQYh5KZmFArFxbFcr8qYuvh1FNmN-CovlZ099FOyUk4rgY1T20oef7aPuTdOABehjr1fPMFjPibpFtjgE_8bDI6tZqfbeUJMewQ9hPLjhb4O670MurUTlCOM4yW2h_iCb93mP3hpS_RyDSc4OMMCPTiHmBiYTn-pJJoULFuWaUSu6EqaOlCY0EhAg1eGXGTVngKKFTBlBkYOEdocZ8MdfHCAvtydQoXxkK_rIBDBMsSrmgVAEwBbyFnMpOiSy1w-0vLGZJrXpsTZuAaRNr2uSthS7Wr7wUwhl_NW5Xxk_KNbRKaGSl_MH_c1roshqQ-vGvnZ38q_Up2gIG4kX2Vxs1suWrPgPOyEQHbfL-oIOa8eDprgfX695wNO7ks-0D217PMQ |
linkProvider | Springer Nature |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LTxsxEB5RONALKgJEIBQf4AKy2LWdXe8BIZQ2JDwiQCDltqxfEhJKINmq8Kf6GxnvI1GR4JbrPnwYf_Z8Y898A7DHtZImMSGVlrWo0M5SaXRItcy8upMKHPfFyVf9qHsvzgetwQL8q2thfFplvScWG7UZaX9GfsQSL-yO0UBw8vxCfdcof7tat9AoYXFh3_5iyDY57v3C-d1nrPP7rt2lVVcBqnkY5VQ4nSWCRy5RPGxpoZWJjZRWMKZlEGeB1S52Gj1vbDGYcWEmosAomwnkEg7xiuN-gyXBeeJXlOycTc90OGdBVOj8oiPlFKn7oL5ILar1kPv45KWYelJDX_93hTN---FKtvB0nR-wUlFUclpiahUW7HANbm7t5PHJF0-SdpndTpDukn6ZRW7N9GklgU5wR_JHPCQfkfabsuOj6woR5DTPfWH_OtzPxXAbsDgcDe0mEGW5zpxpGccwPndI-5RIMqkYM0jQItmAoLZMqiutct8y4ymdqSx7Y6ZozNQbM31twMH0l-dSqOOrj5u1udNqzU7SGcIacFhPwez1p4NtfT3YLix3764u08te_2IbviPhkmWqWRMW8_Efu4OkJlc_CyQReJg3dN8BghUHug |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlZ3PS8MwFMeDKIgexJ84nZqDJyWsTdM2PY7pmL_GFAe7heYXCKMbWwX9731Z21VFBa9tmsNL8vJJ33vfIHQeKMl1on3CDQ0JU9YQrpVPFE-dupP0bOCKkx_6UW_IbkfhqLzndF5lu1chyaKmwak0ZXlrqm2rLnwDjHB5QDFxfEAAItfAG_tuWg9pu3LFEZDjIqzM4og46bYqrPlTF183ppo2vwVIF_tOdxttlcCI28UI76AVk-2izU8ygnvo8cnMX8ausBF3isxzDCiK-0WGt9HLp6U8OQZv4X6_4HyCO-_SzFqDcrRwO89d0f0-Gnavnzs9Ul6VQFTgRzlhVqUJCyKbyMAPFVNSx5pzwyhV3ItTzygbWwU4ERs4oVk_ZZGnpUkZAJKFRXiAVrNJZg4RliZQqdWhthTOzhaQTLIk5ZJSDfAU8QbyKjsJVeqIu-ssxqJWQHamFWBa4Uwr3hroYvnJtBDR-KtxszK-KNfTXNDEyfrDWdBroMtqQOrXv3Z29K_WZ2h9cNUV9zf9u2O0AWjEi6SwJlrNZ6_mBPAjl6eLKfYBAqzSTA |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Resilient+Control+for+Networked+Control+Systems+Subject+to+Cyber%2FPhysical+Attacks&rft.jtitle=International+journal+of+automation+and+computing&rft.au=Rhouma%2C+Taouba&rft.au=Chabir%2C+Karim&rft.au=Abdelkrim%2C+Mohamed+Naceur&rft.date=2018-06-01&rft.pub=Institute+of+Automation%2C+Chinese+Academy+of+Sciences&rft.issn=1476-8186&rft.eissn=1751-8520&rft.volume=15&rft.issue=3&rft.spage=345&rft.epage=354&rft_id=info:doi/10.1007%2Fs11633-017-1059-x&rft.externalDocID=10_1007_s11633_017_1059_x |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1476-8186&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1476-8186&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1476-8186&client=summon |