Volume 15 Number 3
June 2018
Article Contents
Taouba Rhouma, Karim Chabir and Mohamed Naceur Abdelkrim. Resilient Control for Networked Control Systems Subject to Cyber/Physical Attacks. International Journal of Automation and Computing, vol. 15, no. 3, pp. 345-354, 2018. doi: 10.1007/s11633-017-1059-x
Cite as: Taouba Rhouma, Karim Chabir and Mohamed Naceur Abdelkrim. Resilient Control for Networked Control Systems Subject to Cyber/Physical Attacks. International Journal of Automation and Computing, vol. 15, no. 3, pp. 345-354, 2018.

# Resilient Control for Networked Control Systems Subject to Cyber/Physical Attacks

Author Biography:
• Karim Chabir  received the B.Eng.degree in electrical engineering and automatic engineering from The Higher School of Sciences and Technology of Tunis (ESSTT), Tunisia in 2003, the M.Sc.degree in automatic and intelligent techniques from the National Engineering School of Gabes, Tunisia in 2006, and the Ph.D.degree in automatic control from Henri Poincare University, France in 2011.The research works were carried out at the Research Centre for Automatic Control of Nancy (CRAN) and at the Research Unit of Modelling, Analysis and Control Systems of the National Engineering School of Gabes.He was a member of the dependability and system diagnosis group (SURFDIAG).He was a secondary school teacher of Gabes from 2003 to 2007, where he was also an assistant professor in the Faculty of Science of Gabes from 2007 to 2011.He is now assistant professor at the National Engineering School of Gabes (ENIG), Tunisia.
His research interests include model-based fault diagnosis and fault-tolerant control with emphasis on networked control systems.
E-mail:karim.chabir@yahoo.fr
ORCID iD:0000-0002-2377-7205

Mohamed Naceur Abdelkrim  received the B.Sc.degree in electrical construction in 1980, and the M.Sc.degree in electrical construction in 1981 from the High Normal School of Technical Education of Tunis, Tunisia.He also received the Ph.D.degree in automatic control from the National School of Engineers of Tunis, Tunisia in 2003.He began teaching in 1981 at the National School of Engineers of Tunis and since 2003, he has been a professor of automatic control at the National School of Engineers of Gabes, Tunisia.He is currently the head of the research unit on Modeling, Analysis and Control of Systems (MACS), Tunisia.
His research interests include diagnosis, optimal control, robust control and robotics.
E-mail:naceur.abdelkrim@enig.rnu.tn

• Corresponding author: Taouba Rhouma  received B.Eng.degree in electrical-automatic engineering from the National Engineering School of Gabes (ENIG), Tunisia in 2013.Since that, she is a Ph.D.candidate in electrical engineering at Modeling, Analysis and Control of Systems Laboratory (MACS), Tunisia.
Her research interests include fault detection and diagnosis of networked control systems.
E-mail:taouba.rhouma@gmail.com (Corresponding author)
ORCID iD:0000-0002-3763-212X
• Accepted: 2016-07-08
• Published Online: 2017-08-07
Fund Project:  This work was supported by the Ministry of the Higher Education and Scientific Research in Tunisia
• In this paper, we investigate a resilient control strategy for networked control systems (NCSs) subject to zero dynamic attacks which are stealthy false-data injection attacks that are designed so that they cannot be detected based on control input and measurement data. Cyber resilience represents the ability of systems or network architectures to continue providing their intended behavior during attack and recovery. When a cyber attack on the control signal of a networked control system is computed to remain undetectable from passive model-based fault detection and isolation schemes, we show that the consequence of a zero dynamic attack on the state variable of the plant is undetectable during attack but it becomes apparent after the end of the attack. A resilient linear quadratic Gaussian controller, having the ability to quickly recover the nominal behavior of the closed-loop system after the attack end, is designed by updating online the Kalman filter from information given by an active version of the generalized likelihood ratio detector.
•  [1] P. Antsaklis, J. Baillieul. Special issue on technology of networked control systems. Proceedings of the IEEE, vol. 95, no. 1, pp. 5-8, 2007. [2] J. P. Hespanha, P. Naghshtabrizi, Y. G. Xu. A survey of recent results in networked control systems. Proceedings of the IEEE, vol. 95, no. 1, pp. 138-162, 2007.  doi: 10.1109/JPROC.2006.887288 [3] K. Stouffer, J. Falco, K. Scarfone. Guide to industrial control systems (ICS) security. NIST Special Publication, 2007. [4] Z. D. Tian, X. W. Gao, B. L. Gong, T. Shi. Time-delay compensation method for networked control system based on time-delay prediction and implicit PIGPC. International Journal of Automation and Computing, vol. 12, no. 6, pp. 648-656, 2015.  doi: 10.1007/s11633-015-0897-7 [5] A. Teixeira, D. Pérez, H. Sandberg, K. H. Johansson. Attack models and scenarios for networked control systems. In Proceedings of the 1st International Conference on High Confidence Networked Systems, ACM, New York, USA, pp. 55-64, 2012. [6] Y. Chen, S. Kar, J. M. F. Moura. Dynamic Attack Detection in Cyber-Physical Systems with Side Initial State Information, 2015. [7] S. Amin, A. A. Cárdenas, S. S. Sastry, Safe and secure networked control systems under denial-of-service attacks. In Proceedings of the 12th International Conference on Hybrid Systems: Computation and Control, Springer, San Francisco, USA, pp. 31-45, 2009. [8] Y. Liu, P. Ning, M. K. Reiter. False data injection attacks against state estimation in electric power grids. In Proceedings of the 16th ACM Conference on Computer and Communications Security, ACM, Chicago, USA, pp. 21-32, 2009. [9] A. Teixeira, H. Sandberg, K. H. Johansson. Networked control systems under cyber attacks with applications to power networks. In Proceedings of American Control Conference, IEEE, Baltimore, USA, pp. 3690-3696, 2010. [10] F. Pasqualetti, F. Dórfler, F. Bullo. Cyber-physical security via geometric control: Distributed monitoring and malicious attacks. In Proceedings of the 51th Annual Conference on Decision and Control, IEEE, Maui, USA, pp. 3418-3425, 2012. [11] Y. L. Mo, B. Sinopoli. Secure control against replay attacks. In Proceedings of the 47th Annual Allerton Conference on Communication, Control, and Computing, IEEE, Monticello, USA, pp. 911-918, 2009. [12] R. S. Smith. A decoupled feedback structure for covertly appropriating networked control systems. In Proceedings of the 18th IFAC World Congress, IFAC, Milan, Italy, pp. 90-95, 2011. [13] A. A. Cardenas, S. Amin, S. Sastry. Secure control: Towards survivable cyber-physical systems. In Proceedings of the 28th International Conference on Distributed Computing Systems Workshops, IEEE, Beijing, China, pp. 495-500, 2008. [14] F. Pasqualetti. Secure Control Systems: A ControlTheoretic Approach to Cyber-Physical Security, Ph. D. dissertation, University of California, USA, 2012. [15] P. M. Frank. Fault diagnosis in dynamic systems using analytical and knowledge-based redundancy:A survey and some new results. Automatica, vol. 26, no. 3, pp. 459-474, 1990.  doi: 10.1016/0005-1098(90)90018-D [16] J. Chen and R. J. Patton. Robust Model-Based Fault Diagnosis for Dynamic Systems, Boston, USA:Kluwer Academic Publishers, 1999. [17] S. X. Ding. Model-Based Fault Diagnosis Techniques:Design Schemes, Algorithms, and Tools, Berlin Heidelberg, Germany:Springer, 2008. [18] K. Chabir, D. Sauter, I. M. Al-Salami, C. Aubrun. On fault detection and isolation (FDI) design for networked control systems with bounded delay constraints. In Proceedings of the 8th IFAC Symposium on Fault Detection, Supervision and Safety of Technical Processes, Mexico City, Mexico, pp. 1107-1112, 2012. [19] M. Brunner, H. Hofinger, C. Krauss, C. Roblee, P. Schoo, S. Todt. Infiltrating critical infrastructures with next-generation attacks. Fraunhofer Institute for Secure Information Technology, [Online], Available: http://publica.fraunhofer.de/documents/N-151330.html, 2010. [20] A. Teixeira, I. Shames, H. Sandberg, K. H. Johansson. Revealing stealthy attacks in control systems. In Proceedings of the 50th Annual Allerton Conference on Communication, Control, and Computing, IEEE, Monticello, USA, pp. 1806-1813, 2012. [21] J. Y. Keller, D. Sauter. Monitoring of stealthy attack in networked control systems. In Proceedings of Conference on Control and Fault-Tolerant Systems, IEEE, Nice, France, pp. 462-467, 2013. [22] J. Y. Keller, K. Chabir, D. Sauter. Input reconstruction for networked control systems subject to deception attacks and data losses on control signals. International Journal of Systems Science, vol. 47, no. 4, pp. 814-820, 2016.  doi: 10.1080/00207721.2014.906683 [23] V. L. Do, L. Fillatre, I. Nikiforov. A statistical method for detecting cyber/physical attacks on SCADA systems. In Proceedings of IEEE Conference on Control Applications, IEEE, Antibes, France, pp. 364-369, 2014. [24] A. Willsky, H. Jones. A generalized likelihood ratio approach to the detection and estimation of jumps in linear systems. IEEE Transactions on Automatic Control, vol. 21, no. 1, pp. 108-112, 1976.  doi: 10.1109/TAC.1976.1101146 [25] Y. M. Zhang, J. Jiang. Bibliographical review on reconfigurable fault-tolerant control systems. Annual Reviews in Control, vol. 32, no. 2, pp. 229-252, 2008.  doi: 10.1016/j.arcontrol.2008.03.008 [26] Y. Yuan, Q. Y. Zhu, F. C. Sun, Q. Y. Wang, T. Başar. Resilient control of cyber-physical systems against denialof-service attacks. In Proceedings of the 6th International Symposium on Resilient Control Systems, IEEE, San Francisco, USA, pp. 54-59, 2013. [27] C. De Persis, P. Tesi. Resilient control under denial-ofservice. IFAC Proceedings Volumes, vol. 47, no. 3, pp. 134-139, 2014.  doi: 10.3182/20140824-6-ZA-1003.02184 [28] X. Zhu. Resilient Control and Intrusion Detection for SCADA Systems, Ph. D. dissertation, University of California, USA, 2011.
•  [1] Lei Zou, Zi-Dong Wang, Dong-Hua Zhou. Event-based Control and Filtering of Networked Systems: A Survey . International Journal of Automation and Computing, 2017, 14(3): 239-253.  doi: 10.1007/s11633-017-1077-8 [2] Yuan Ge, Yaoyiran Li. SCHMM-based Compensation for the Random Delays in Networked Control Systems . International Journal of Automation and Computing, 2016, 13(6): 643-652.  doi: 10.1007/s11633-016-1001-7 [3] Huan Du, Guo-Liang Fan, Jian-Qiang Yi. Nonlinear Longitudinal Attitude Control of an Unmanned Seaplane with Wave Filtering . International Journal of Automation and Computing, 2016, 13(6): 634-642.  doi: 10.1007/s11633-016-0962-x [4] Chang-Chun Hua,  Shao-Chong Yu,  Xin-Ping Guan. Finite-time Control for a Class of Networked Control Systems with Short Time-varying Delays and Sampling Jitter . International Journal of Automation and Computing, 2015, 12(4): 448-454.  doi: 10.1007/s11633-014-0849-7 [5] Yuan-Qing Xia,  Yu-Long Gao,  Li-Ping Yan,  Meng-Yin Fu. Recent Progress in Networked Control Systems-A Survey . International Journal of Automation and Computing, 2015, 12(4): 343-367.  doi: 10.1007/s11633-015-0894-x [6] Shuang Huang,  Chun-Jie Zhou,  Shuang-Hua Yang,  Yuan-Qing Qin. Cyber-physical System Security for Networked Industrial Processes . International Journal of Automation and Computing, 2015, 12(6): 567-578.  doi: 10.1007/s11633-015-0923-9 [7] Fei Li,  Jian-Bo Hu,  Lei Zheng,  Jian-Hao Wang. Terminal Sliding Mode Control for Cyber Physical System Based on Filtering Backstepping . International Journal of Automation and Computing, 2015, 12(5): 497-502.  doi: 10.1007/s11633-015-0903-0 [8] Teerawat Sangpet,  Suwat Kuntanapreeda,  Rüdiger Schmidt. Hysteretic Nonlinearity Observer Design Based on Kalman Filter for Piezo-actuated Flexible Beams with Control Applications . International Journal of Automation and Computing, 2014, 11(6): 627-634.  doi: 10.1007/s11633-014-0817-2 [9] Yu-Yan Zhang,  Jun-Ling Zhang,  Xiao-Yuan Luo,  Xin-Ping Guan. Sensor/Actuator Faults Detection for Networked Control Systems via Predictive Control . International Journal of Automation and Computing, 2013, 10(3): 173-180.  doi: 10.1007/s11633-013-0710-4 [10] Zhen-Chun Wang, Yin-Tang Wen, Xiao-Yuan Luo. Quantized H∞ Fault-tolerant Control for Networked Control Systems . International Journal of Automation and Computing, 2012, 9(4): 352-357.  doi: 10.1007/s11633-012-0655-z [11] Xiao-Ming Tang,  Bao-Cang Ding. Design of Networked Control Systems with Bounded Arbitrary Time Delays . International Journal of Automation and Computing, 2012, 9(2): 182-190.  doi: 10.1007/s11633-012-0632-6 [12] Chun-Jie Zhou,  Hui Chen,  Yuan-Qing Qin,  Yu-Feng Shi,  Guang-Can Yu. Self-organization of Reconfigurable Protocol Stack for Networked Control Systems . International Journal of Automation and Computing, 2011, 8(2): 221-235.  doi: 10.1007/s11633-011-0577-1 [13] Xiu-Lan Wang, Chun-Guo Fei, Zheng-Zhi Han. Adaptive Predictive Functional Control for Networked Control Systems with Random Delays . International Journal of Automation and Computing, 2011, 8(1): 62-68.  doi: 10.1007/s11633-010-0555-z [14] Ming-Yue Zhao, He-Ping Liu, Zhi-Jun Li, De-Hui Sun. Fault Tolerant Control for Networked Control Systems with Packet Loss and Time Delay . International Journal of Automation and Computing, 2011, 8(2): 244-253.  doi: 10.1007/s11633-011-0579-z [15] Xu-Hui Bu,  Zhong-Sheng Hou. Stability of Iterative Learning Control with Data Dropouts via Asynchronous Dynamical System . International Journal of Automation and Computing, 2011, 8(1): 29-36.  doi: 10.1007/s11633-010-0551-3 [16] Zhi-Sheng Chen, Yong He, Min Wu. Robust Fuzzy Tracking Control for Nonlinear Networked Control Systems with Integral Quadratic Constraints . International Journal of Automation and Computing, 2010, 7(4): 492-499.  doi: 10.1007/s11633-010-0532-6 [17] Jun Ren,  Chun-Wen Li,  De-Zong Zhao. Linearizing Control of Induction Motor Based on Networked Control Systems . International Journal of Automation and Computing, 2009, 6(2): 192-197.  doi: 10.1007/s11633-009-0192-6 [18] Bao-Feng Wang,  Ge Guo. Kalman Filtering with Partial Markovian Packet Losses . International Journal of Automation and Computing, 2009, 6(4): 395-400.  doi: 10.1007/s11633-009-0395-x [19] Xian-Ming Tang,  Jin-Shou Yu. Feedback Scheduling of Model-based Networked Control Systems with Flexible Workload . International Journal of Automation and Computing, 2008, 5(4): 389-394.  doi: 10.1007/s11633-008-0389-0 [20] Shumei Mu, Tianguang Chu, Long Wang, Wensheng Yu. Output Feedback Control of Networked Systems . International Journal of Automation and Computing, 2004, 1(1): 26-34.  doi: 10.1007/s11633-004-0026-5
###### 通讯作者: 陈斌, bchen63@163.com
• 1.

沈阳化工大学材料科学与工程学院 沈阳 110142

Figures (16)

## Resilient Control for Networked Control Systems Subject to Cyber/Physical Attacks

• ###### Corresponding author:Taouba Rhouma  received B.Eng.degree in electrical-automatic engineering from the National Engineering School of Gabes (ENIG), Tunisia in 2013.Since that, she is a Ph.D.candidate in electrical engineering at Modeling, Analysis and Control of Systems Laboratory (MACS), Tunisia.   Her research interests include fault detection and diagnosis of networked control systems.   E-mail:taouba.rhouma@gmail.com (Corresponding author)   ORCID iD:0000-0002-3763-212X
Fund Project:  This work was supported by the Ministry of the Higher Education and Scientific Research in Tunisia

Abstract: In this paper, we investigate a resilient control strategy for networked control systems (NCSs) subject to zero dynamic attacks which are stealthy false-data injection attacks that are designed so that they cannot be detected based on control input and measurement data. Cyber resilience represents the ability of systems or network architectures to continue providing their intended behavior during attack and recovery. When a cyber attack on the control signal of a networked control system is computed to remain undetectable from passive model-based fault detection and isolation schemes, we show that the consequence of a zero dynamic attack on the state variable of the plant is undetectable during attack but it becomes apparent after the end of the attack. A resilient linear quadratic Gaussian controller, having the ability to quickly recover the nominal behavior of the closed-loop system after the attack end, is designed by updating online the Kalman filter from information given by an active version of the generalized likelihood ratio detector.

Taouba Rhouma, Karim Chabir and Mohamed Naceur Abdelkrim. Resilient Control for Networked Control Systems Subject to Cyber/Physical Attacks. International Journal of Automation and Computing, vol. 15, no. 3, pp. 345-354, 2018. doi: 10.1007/s11633-017-1059-x
 Citation: Taouba Rhouma, Karim Chabir and Mohamed Naceur Abdelkrim. Resilient Control for Networked Control Systems Subject to Cyber/Physical Attacks. International Journal of Automation and Computing, vol. 15, no. 3, pp. 345-354, 2018.
Reference (28)

/