Secure control of cyber physical systems subject to stochastic distributed DoS and deception attacks
Cyber Physical Systems (CPS) such as power plants, water desalination utilities are just a few examples of systems that may come under stealth attacks. These attacks can threaten the proper operations of such systems without any indication. This problem necessitates the design of a control system th...
Saved in:
Published in | International journal of systems science Vol. 51; no. 9; pp. 1653 - 1668 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
London
Taylor & Francis
03.07.2020
Taylor & Francis Ltd |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Cyber Physical Systems (CPS) such as power plants, water desalination utilities are just a few examples of systems that may come under stealth attacks. These attacks can threaten the proper operations of such systems without any indication. This problem necessitates the design of a control system that is able to work under such attacks. In this paper, an improved observer-based stabilising controller is proposed for CPS including random measurements and actuation delays and it is coming under distributed denial of service (DDoS) and deception attacks. The occurrences of DDoS and deception attacks are modelled as Bernoulli distributed white sequences with variable conditional probabilities. The criterion is presented in terms of linear matrix inequalities. Detailed simulation experiments on representative systems are shown to prove the applicability of the proposed methodology. |
---|---|
AbstractList | Cyber Physical Systems (CPS) such as power plants, water desalination utilities are just a few examples of systems that may come under stealth attacks. These attacks can threaten the proper operations of such systems without any indication. This problem necessitates the design of a control system that is able to work under such attacks. In this paper, an improved observer-based stabilising controller is proposed for CPS including random measurements and actuation delays and it is coming under distributed denial of service (DDoS) and deception attacks. The occurrences of DDoS and deception attacks are modelled as Bernoulli distributed white sequences with variable conditional probabilities. The criterion is presented in terms of linear matrix inequalities. Detailed simulation experiments on representative systems are shown to prove the applicability of the proposed methodology. |
Author | Hamdan, Mutaz M. Mahmoud, Magdi S. Baroudi, Uthman A. |
Author_xml | – sequence: 1 givenname: Magdi S. surname: Mahmoud fullname: Mahmoud, Magdi S. email: msmahmoud@kfupm.edu.sa organization: Systems Engineering Department, King Fahd University of Petroleum and Minerals – sequence: 2 givenname: Mutaz M. surname: Hamdan fullname: Hamdan, Mutaz M. organization: Systems Engineering Department, King Fahd University of Petroleum and Minerals – sequence: 3 givenname: Uthman A. surname: Baroudi fullname: Baroudi, Uthman A. organization: Computer Engineering Department, King Fahd University of Petroleum and Minerals |
BookMark | eNqFkElLBDEUhIMoOC4_QQh47jFLL2m8KO4geFDPIXlJmIw9nTFJI_3vnWbGiwc9vTrUV_WoI7Tfh94idEbJnBJBLghhpGkYnbONmNONLAnbQzNa1mVRcdruo9nkKSbTITpKaUkIqSpGZsi8WhiixRD6HEOHg8MwahvxejEmD6rDaUzZrhJOg15ayDgHnHKAhUrZAzY-5ej1kK3Bt-EVq95gY8Gusw89Vjkr-Egn6MCpLtnT3T1G7_d3bzePxfPLw9PN9XMBnItcCGWo1tA2LW9oDY4x1RJdNqVotGuZaQHACM6JFfXUIbiquXaNqLQyrqr5MTrf5q5j-BxsynIZhthvKiUrGS95I_jkuty6IIaUonUSfFbTvzkq30lK5DSr_JlVTrPK3awbuvpFr6NfqTj-y11tOd-7EFfqK8TOyKzGLkQXVQ8-Sf53xDfbLJIh |
CitedBy_id | crossref_primary_10_1007_s11071_023_08246_8 crossref_primary_10_1080_00207721_2021_1900449 crossref_primary_10_1016_j_eswa_2025_127138 crossref_primary_10_1016_j_jfranklin_2024_106836 crossref_primary_10_3390_electronics11193161 crossref_primary_10_1080_00207721_2021_1874075 crossref_primary_10_1109_TAC_2021_3107145 crossref_primary_10_1007_s11424_024_3401_z crossref_primary_10_1080_00207721_2021_2017508 crossref_primary_10_1002_asjc_2604 crossref_primary_10_1016_j_jfranklin_2021_05_017 crossref_primary_10_1155_2022_8761612 crossref_primary_10_1002_rnc_7000 crossref_primary_10_1016_j_jfranklin_2024_106774 crossref_primary_10_1002_acs_3834 crossref_primary_10_1080_00207721_2024_2337899 crossref_primary_10_1007_s11071_021_06825_1 crossref_primary_10_1016_j_nahs_2023_101383 crossref_primary_10_1080_00207721_2021_1872118 crossref_primary_10_1080_00207721_2024_2332644 crossref_primary_10_1016_j_isatra_2020_10_002 crossref_primary_10_1016_j_isatra_2023_06_040 crossref_primary_10_1109_JSYST_2022_3183863 crossref_primary_10_1088_1402_4896_ad6485 crossref_primary_10_1109_ACCESS_2024_3361476 crossref_primary_10_1109_TII_2024_3383520 crossref_primary_10_1080_00207721_2020_1831647 crossref_primary_10_1007_s00034_024_02678_2 crossref_primary_10_1080_00207721_2024_2395931 crossref_primary_10_1016_j_jfranklin_2024_106661 crossref_primary_10_1002_acs_3707 crossref_primary_10_1080_00207721_2024_2304128 |
Cites_doi | 10.1007/s10957-009-9560-1 10.1109/TCNS.2016.2613445 10.1016/j.comcom.2017.05.015 10.17265/2159-5313/2016.09.003 10.1016/j.conengprac.2004.02.012 10.1109/TCST.2012.2211873 10.1016/j.ins.2018.04.082 10.1109/CDC.2012.6425868 10.1049/iet-cta.2017.0868 10.1080/23307706.2019.1651225 10.1016/j.neucom.2017.10.009 10.1109/CCDC.2017.7978214 10.1016/j.comnet.2018.02.025 10.1007/s12555-014-0316-9 10.1016/j.jfranklin.2017.05.016 10.1016/j.automatica.2017.04.047 10.1145/1837274.1837461 10.1007/s11633-017-1059-x 10.1109/TAC.2005.864207 10.1049/iet-cta.2017.0819 10.1109/CDC.2015.7402972 10.1007/978-1-4419-6394-9_5 10.1016/j.neucom.2016.09.009 10.1109/ISGT.2015.7131827 10.3182/20140824-6-ZA-1003.02184 10.1109/JAS.2019.1911861 10.1016/j.ijcip.2011.06.003 10.1007/s11768-018-8002-8 10.1109/CDC.2014.7040210 10.1049/iet-cta.2016.0135 10.1016/j.automatica.2019.108557 10.1080/23307706.2018.1458659 |
ContentType | Journal Article |
Copyright | 2020 Informa UK Limited, trading as Taylor & Francis Group 2020 2020 Informa UK Limited, trading as Taylor & Francis Group |
Copyright_xml | – notice: 2020 Informa UK Limited, trading as Taylor & Francis Group 2020 – notice: 2020 Informa UK Limited, trading as Taylor & Francis Group |
DBID | AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
DOI | 10.1080/00207721.2020.1772402 |
DatabaseName | CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Computer and Information Systems Abstracts |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1464-5319 |
EndPage | 1668 |
ExternalDocumentID | 10_1080_00207721_2020_1772402 1772402 |
Genre | Research Article |
GroupedDBID | -~X .7F .DC .QJ 0BK 0R~ 29J 30N 4.4 5GY 5VS 8VB AAENE AAJMT AALDU AAMIU AAPUL AAQRR ABCCY ABFIM ABHAV ABJNI ABLIJ ABPAQ ABPEM ABTAI ABXUL ABXYU ACGEJ ACGFS ACNCT ACTIO ADCVX ADGTB ADXPE AEISY AENEX AEOZL AEPSL AEYOC AFKVX AGDLA AGMYJ AHDZW AIJEM AJWEG AKBVH AKOOK ALMA_UNASSIGNED_HOLDINGS ALQZU AQRUH AVBZW AWYRJ BLEHA CCCUG CE4 CS3 DGEBU DKSSO DU5 EBS E~A E~B F5P GTTXZ H13 HF~ HZ~ H~P IPNFZ J.P KYCEM LJTGL M4Z MS~ NA5 NX~ O9- P2P QWB RIG RNANH ROSJB RTWRZ S-T SNACF TBQAZ TDBHL TEN TFL TFT TFW TNC TTHFI TUROJ TWF UT5 UU3 ZGOLN ZL0 ~02 ~S~ AAGDL AAHIA AAYXX ADYSH AFRVT AIYEW AMPGV CITATION 7SC 8FD JQ2 L7M L~C L~D TASJS |
ID | FETCH-LOGICAL-c338t-8ad1bbc9793716cf22a90b47487bf92d9cccd8330e86dece83a63bf785badf563 |
ISSN | 0020-7721 |
IngestDate | Fri Jul 25 03:03:23 EDT 2025 Thu Apr 24 23:11:19 EDT 2025 Tue Jul 01 01:02:46 EDT 2025 Wed Dec 25 09:08:17 EST 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 9 |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-c338t-8ad1bbc9793716cf22a90b47487bf92d9cccd8330e86dece83a63bf785badf563 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
PQID | 2423437836 |
PQPubID | 2045514 |
PageCount | 16 |
ParticipantIDs | crossref_citationtrail_10_1080_00207721_2020_1772402 crossref_primary_10_1080_00207721_2020_1772402 informaworld_taylorfrancis_310_1080_00207721_2020_1772402 proquest_journals_2423437836 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2020-07-03 |
PublicationDateYYYYMMDD | 2020-07-03 |
PublicationDate_xml | – month: 07 year: 2020 text: 2020-07-03 day: 03 |
PublicationDecade | 2020 |
PublicationPlace | London |
PublicationPlace_xml | – name: London |
PublicationTitle | International journal of systems science |
PublicationYear | 2020 |
Publisher | Taylor & Francis Taylor & Francis Ltd |
Publisher_xml | – name: Taylor & Francis – name: Taylor & Francis Ltd |
References | CIT0030 CIT0010 CIT0032 CIT0031 Kim K. D. (CIT0018) 2013; 93 CIT0034 CIT0011 CIT0033 Zhang X. (CIT0036) 2019 Fadali M. S. (CIT0012) 2012 CIT0014 CIT0013 CIT0035 CIT0016 CIT0015 CIT0017 CIT0019 CIT0021 CIT0020 CIT0001 CIT0023 CIT0022 CIT0003 CIT0025 CIT0002 CIT0024 CIT0005 CIT0027 CIT0004 CIT0026 CIT0007 CIT0029 CIT0006 CIT0028 CIT0009 CIT0008 |
References_xml | – ident: CIT0021 doi: 10.1007/s10957-009-9560-1 – ident: CIT0011 doi: 10.1109/TCNS.2016.2613445 – ident: CIT0016 doi: 10.1016/j.comcom.2017.05.015 – ident: CIT0030 doi: 10.17265/2159-5313/2016.09.003 – ident: CIT0025 doi: 10.1016/j.conengprac.2004.02.012 – ident: CIT0002 doi: 10.1109/TCST.2012.2211873 – volume: 93 start-page: 341 issue: 3 year: 2013 ident: CIT0018 publication-title: Journal of the Indian Institute of Science – ident: CIT0033 doi: 10.1016/j.ins.2018.04.082 – ident: CIT0014 doi: 10.1109/CDC.2012.6425868 – ident: CIT0032 doi: 10.1049/iet-cta.2017.0868 – ident: CIT0027 doi: 10.1080/23307706.2019.1651225 – ident: CIT0007 doi: 10.1016/j.neucom.2017.10.009 – ident: CIT0017 doi: 10.1109/CCDC.2017.7978214 – ident: CIT0024 doi: 10.1016/j.comnet.2018.02.025 – ident: CIT0031 doi: 10.1007/s12555-014-0316-9 – ident: CIT0034 doi: 10.1016/j.jfranklin.2017.05.016 – volume-title: Digital control engineering: Analysis and design year: 2012 ident: CIT0012 – ident: CIT0003 doi: 10.1016/j.automatica.2017.04.047 – ident: CIT0022 doi: 10.1145/1837274.1837461 – ident: CIT0023 doi: 10.1007/s11633-017-1059-x – ident: CIT0028 doi: 10.1109/TAC.2005.864207 – ident: CIT0029 doi: 10.1049/iet-cta.2017.0819 – ident: CIT0010 doi: 10.1109/CDC.2015.7402972 – ident: CIT0020 doi: 10.1007/978-1-4419-6394-9_5 – ident: CIT0009 doi: 10.1016/j.neucom.2016.09.009 – ident: CIT0026 doi: 10.1109/ISGT.2015.7131827 – ident: CIT0006 doi: 10.3182/20140824-6-ZA-1003.02184 – ident: CIT0019 doi: 10.17265/2159-5313/2016.09.003 – start-page: 1 year: 2019 ident: CIT0036 publication-title: IEEE Transactions on Cybernetics – ident: CIT0035 doi: 10.1109/JAS.2019.1911861 – ident: CIT0004 doi: 10.1016/j.ijcip.2011.06.003 – ident: CIT0001 doi: 10.1007/s11768-018-8002-8 – ident: CIT0005 doi: 10.1109/CDC.2014.7040210 – ident: CIT0008 doi: 10.1049/iet-cta.2016.0135 – ident: CIT0015 doi: 10.1016/j.automatica.2019.108557 – ident: CIT0013 doi: 10.1080/23307706.2018.1458659 |
SSID | ssj0005520 |
Score | 2.4218025 |
Snippet | Cyber Physical Systems (CPS) such as power plants, water desalination utilities are just a few examples of systems that may come under stealth attacks. These... |
SourceID | proquest crossref informaworld |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 1653 |
SubjectTerms | Actuation Computer simulation Control systems design Cyber physical systems Deception deception attack Denial of service attacks Desalination distributed denial of service (DDoS) attack Electric power generation Linear matrix inequalities Mathematical analysis Power plants secure control system Stability Water utilities |
Title | Secure control of cyber physical systems subject to stochastic distributed DoS and deception attacks |
URI | https://www.tandfonline.com/doi/abs/10.1080/00207721.2020.1772402 https://www.proquest.com/docview/2423437836 |
Volume | 51 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lj9MwELZK9wIHxFMsLMgHbqtUSew4zrGwu6rQ7nIgFRWXyHYSisQ2qJsc2P_B_2Umdh5VVyxwiaK0jlvPZ3tmPPMNIW9hG425EQxnWuxhjStPBoHxCuPnSptE6pbx5uJSLJb8wypaTSa_RlFLTa1n5ubWvJL_kSo8A7liluw_SLZ_KTyAe5AvXEHCcP0rGbfO8iHcHCPEf-pi69wVmAli-ciPrxuN_hZUNEHZM2uF7Mx4OGPrXYHSeVJ9as8R8sLFuRyrusb8-7H2uus-HJFO9P3YlWJwc6-vqsaWLVZf82-Dn3WhrnLrer1oanUz-GTfqS20aEMMlvUaDxjmY8cEWKHo9GQ9lNK9GiGjQCWbR-Cjbm-RVdjllwvu4aowXp8dIa3FYTJabANheYbdxh0IW6Bnb1PooihDH7ub4W-dBXDL_XDYBbuT_8uP2dny_DxLT1fpPXIQwvfCKTmYL06-fB5ihyLH9-n-QpcahqTtt3Wzo_TsUOLuqQCtXpM-Ig-dQULnFl2PyaTYPCEPRjSVT0lucUYdzmhV0hZntMMZdfKnDme0ruiAMzrCGQWcUcAZ7XFGHc6ekeXZafp-4bnqHJ5hTNaeVHmgYTYjwWIgTBmGKvE1j8EC1mUS5okxJpeM-YUU-E7JlGC6jGWkVV5Ggj0n0021KV4Qyn1YGeC5ZELxRHIZldoPVQjWBNgfcX5IeDd8mXHU9VhB5XsW9Ay3dtQzHPXMjfohmfXNfljulrsaJGPZZHUL4dKiN2N3tD3qBJm5-XedobHCGSZKvfzzx6_I_WEKHZFpvW2K16Dt1vqNw95vgXmnFw |
linkProvider | Library Specific Holdings |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV07T8MwELZQGYCBN6JQwANrqiR2EmdEQFWg7UIrdbP8ipBAbdWmA_x6fIlTWhDq0C1ydJYfZ_vu9N13CN3aZzShKiZw0hIPalx5LAiUZ5SvhVQpkwXjTbcXtwf0eRgNl3JhAFYJPnRWEkUUdzUcbghGV5A4SOH2rVUI7l1om-wnBT7J7SiNE6hiQPzeD8wjctSM1k0CmSqL579uVt6nFfbSP7d18QS1DpCqBl8iT96b81w21dcvXsfNZneI9p2Fiu9KlTpCW2Z0jPaWeAtPkC6i9AY7nDseZ1h9SjPFE7fruCSInuHZXEKgB-djbK1M9SaAFhprYOuFQltG44fxK7Zjxdo4gA0WeQ6J_6do0Hrs37c9V67BU9bPzT0mdCDt9gLjXhCrLAxF6kuaWJdIZmmoU6WUZoT4hsXQJyMiJjJLWCSFzqKYnKHaaDwy5whT36qKbWckFjRllEWZ9ENhnVnfGqSJriNabRJXjsscSmp88GBBeVouIodF5G4R66i5EJuUZB7rBNJlDeB5EUXJypInnKyRbVTqwt29MONgvVICmTMXG3R9g3ba_W6Hd556L5doF34VCGLSQLV8OjdX1k7K5XVxEL4BKwwCwA |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpZ3NS8MwFMCDTBA9-C1-TM3Ba0fbpG16FOeYX0PQgbeQTwRlG7Y76F9vXpvOTREP3krKC23ykrwX3vs9hM7cMZpRlRJYaVkANa4CFkUqMCrUQqqcyYp4czdI-0N6_ZQ00YSFD6sEH9rWoIhqr4bFPdG2iYiDDO7QGYXg3cWuyT1SwEkupwAPhyyOcPAV5ZF4MqPzkkCmSeL5rZuF42kBXvpjs65OoN4Gks2314EnL51pKTvq4xvW8V8_t4nWvX2Kz2uF2kJLZrSN1uaohTtIV3f0Bvsodzy2WL1L84Ynfs5xjYcucDGVcM2DyzF2NqZ6FgCFxhpYvVBmy2jcHT9g96lYGx9eg0VZQtr_Lhr2Lh8v-oEv1hAo5-WWARM6km5ygbcXpcrGschDSTPnEEmbxzpXSmlGSGhYCn0yIlIibcYSKbRNUrKHWqPxyOwjTEOnKK6dkVTQnFGWWBnGwrmyoTNHM32AaDNHXHmSORTUeOXRDHhaDyKHQeR-EA9QZyY2qVEefwnk8wrAy-oOxdYFTzj5Q7bdaAv3u0LBwXalBPJmDv_R9Slaue_2-O3V4OYIrcKbKnyYtFGrfJuaY2cklfKkWgaf7NoBZA |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Secure+control+of+cyber+physical+systems+subject+to+stochastic+distributed+DoS+and+deception+attacks&rft.jtitle=International+journal+of+systems+science&rft.au=Mahmoud%2C+Magdi+S&rft.au=Hamdan%2C+Mutaz+M&rft.au=Baroudi%2C+Uthman+A&rft.date=2020-07-03&rft.pub=Taylor+%26+Francis+Ltd&rft.issn=0020-7721&rft.eissn=1464-5319&rft.volume=51&rft.issue=9&rft.spage=1653&rft.epage=1668&rft_id=info:doi/10.1080%2F00207721.2020.1772402&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0020-7721&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0020-7721&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0020-7721&client=summon |