王江寧 嚴懷成 李郅辰 詹習生
摘要 本文主要研究在隨機出現(xiàn)的雙通道DoS攻擊下的網(wǎng)絡控制系統(tǒng)基于事件觸發(fā)的安全控制問題.首先,提出了一個具有補償策略的DoS攻擊模型,且此攻擊模型應用于網(wǎng)絡系統(tǒng)的傳感器-控制器通道和控制器-執(zhí)行器通道;其次,為了降低通信負擔,提出事件觸發(fā)機制,通過定義一個觸發(fā)條件,當觸發(fā)條件滿足時,才進行信息傳遞;最終得到閉環(huán)控制系統(tǒng)模型.根據(jù)最優(yōu)控制理論和線性矩陣不等式技術,得到閉環(huán)系統(tǒng)以一定概率輸入到狀態(tài)穩(wěn)定的充分條件,進一步通過一系列矩陣變換處理技巧,通過解線性矩陣不等式方程組得到控制器參數(shù).最后,通過計算機仿真驗證了該控制器設計的有效性. 關鍵詞
網(wǎng)絡控制系統(tǒng);安全控制;事件觸發(fā)機制;DoS攻擊
中圖分類號? TP273
文獻標志碼? A
0 引言
過去的10多年間,網(wǎng)絡控制系統(tǒng)(NCS)在交通管理系統(tǒng)、遠程醫(yī)療檢測、取暖控制系統(tǒng)等許多領域有了廣泛應用,這使其受到越來越多的重視.因傳感器、控制器和執(zhí)行器間的開放式網(wǎng)絡連接,網(wǎng)絡間傳輸?shù)男畔⒑苋菀妆还?,這使得信息的完整性、真實性和可控性受到嚴重的威脅.近年來,網(wǎng)絡安全問題在業(yè)界受到越來越多的關注,同時取得了一系列有意義的研究成果[1-8] .
目前研究的主要攻擊形式為拒絕服務(DoS)攻擊和欺騙攻擊.DoS攻擊通過持續(xù)發(fā)送過剩的數(shù)據(jù)來占用有限的網(wǎng)絡資源達到攻擊的目的.一種典型的DoS攻擊方式是阻斷信息的傳輸,使得接收者接收不到傳送者發(fā)送的信息.欺騙攻擊通過破壞數(shù)據(jù)的完整性來達到攻擊的目的.重放攻擊是一種特殊的欺騙攻擊,攻擊者對系統(tǒng)未知但卻能訪問、記錄、重放傳感器的數(shù)據(jù);另一種欺騙攻擊形式是錯誤數(shù)據(jù)注入攻擊,相比重放攻擊,攻擊者有完整的系統(tǒng)信息.
從防御者的角度,由于攻擊的隨機性,攻擊成功的概率大多依賴于保護設備或軟件的檢測能力以及通信協(xié)議和網(wǎng)絡運行條件(如網(wǎng)絡負載、網(wǎng)絡干擾、網(wǎng)絡傳輸速率等).基于此,DoS攻擊或欺騙攻擊下網(wǎng)絡控制系統(tǒng)的安全性和穩(wěn)定性的研究取得了一定的進展[9-11] .從攻擊者的角度來看,攻擊者希望自己有無窮的能量,且在攻擊的過程中不被發(fā)現(xiàn),但事實是攻擊者的能量是有限的,并在發(fā)動攻擊時消耗得很快.基于此,網(wǎng)絡系統(tǒng)中的DoS攻擊或欺騙攻擊研究取得了一定的成果[12-13] .
為節(jié)省網(wǎng)絡能源,傳統(tǒng)的時間觸發(fā)策略已經(jīng)成為次優(yōu)的選擇.在這種情況下,傳輸測量或控制信息的過程中尋求有效利用網(wǎng)絡資源的新的控制策略具有一定的理論和現(xiàn)實意義.為達到節(jié)約能源的目的,最近幾年,基于事件觸發(fā)的控制問題在控制領域得到了更多的重視,并在基于事件觸發(fā)反饋控制的系統(tǒng)穩(wěn)定性上取得了不少成果[14-18] .基于事件觸發(fā)的控制策略主要特征是只有當系統(tǒng)狀態(tài)函數(shù)或測量數(shù)據(jù)超過一定閾值時控制信息才被傳輸更新,與傳統(tǒng)的時間觸發(fā)相比,事件觸發(fā)策略可以有效地降低通信負擔,提高資源有效利用率.
本文針對雙通道DoS攻擊下的網(wǎng)絡控制系統(tǒng)的穩(wěn)定性問題進行了研究,通過利用隨機分析技術得到所需系統(tǒng)穩(wěn)定的充分條件,解線性矩陣不等式方程組得到控制器的增益矩陣,完成控制器的設計.最后通過仿真研究,驗證了所設計的控制方法的有效性.
1 符號說明
本文中使用的符號是標準的, R? n和 R n×m 分別表示n維歐式空間和一組n×m的實矩陣. I 是有適當維數(shù)的單位矩陣.當 X 和 Y 是對稱矩陣時, X ≥ Y (或 X > ?Y ),表示 X - Y 是正半定(或正定)矩陣. A? ?T 表示 A 的轉(zhuǎn)置.λ ?max ?( A )和λ ?min ?( A )分別表示 A 的最大和最小特征值.對矩陣 A ∈ R m×n 和 B ∈ R p×q ,它們的克羅內(nèi)克積定義為 AB ∈ R mp×nq . ?E {x}表示隨機變量x的期望.‖ x ‖表示矢量 x 的歐幾里得范數(shù). diag {…}表示分塊對角矩陣.γ-1 表示單調(diào)函數(shù)γ的逆函數(shù).符號*用來表示對稱矩陣中省略的部分.
2 問題描述
5 結(jié)束語
本文研究了基于事件觸發(fā)機制的網(wǎng)絡控制系統(tǒng)在雙通道DoS攻擊下的穩(wěn)定性問題.假設通道間DoS攻擊是隨機且獨立的,給出了閉環(huán)系統(tǒng)狀態(tài)空間模型,應用李雅普諾夫穩(wěn)定性理論得到了一定概率輸入到狀態(tài)穩(wěn)定的充分條件.同時,設計了狀態(tài)反饋控制器.最后應用計算機仿真驗證了所設計的控制器的可行性.
參考文獻
References
[ 1 ]?Gao ?H,Meng X,Chen T.Stabilization of networked control systems with a new delay characterization[J].IEEE Transactions on Automatic Control,2008,53(9):2142-2148
[ 2 ] Zhang ?X M,Han Q L.Network-based ?H ?∞ filtering using a logic jumping-like trigger[J].Automatica,2013,49(5):1428-1435
[ 3 ] Kruszewski A,Jiang W,F(xiàn)ridman E,et al.A switched system approach to exponential stabilization through communication network[J].IEEE Transactions on Control Systems Technology,2012,20(4):887-900
[ 4 ] Yan H C,Qian F F,Zhang H,et al. H ?∞ fault detection for networked mechanical spring-mass systems with incomplete information[J].IEEE Transactions on Industrial Electronics,2016,63(9):5622-5631
[ 5 ] Sun X M,Liu G P,Wang W,et al.Stability analysis for networked control systems based on average dwell time method[J].International Journal of Robust and Nonlinear Control,2010,20(15):1774-1784
[ 6 ] Donkers ?M,Heemels W,Bernardini D,et al.Stability analysis ?of stochastic networked control systems[J].Automatica,2012,48(5):917-925
[ 7 ] Tabbara ?M,Nesic D.Input-output stability of networked control systems with stochastic protocols and channels[J].IEEE Transactions on Automatic Control,2008,53(5):1160-1175
[ 8 ] Zhang H,Zhou X,Wang Z Q,et al.Adaptive consensus-based distributed target tracking with dynamic cluster in sensor networks[J].IEEE Transactions on Cybernetics,2018,DOI:10.1109/TCYB.2018.2805717
[ 9 ] Zhang H,Qi Y F,Wu J F.DoS attack energy management against remote state estimation[J].IEEE Transactions on Control Systems Technology,2014,27(10):1109-1117
[10] Zhang J,Peng C,Masroor S H B,et al.Stability analysis of networked control systems with denial-of-service attacks[C]∥UKACC 11th International Conference on Control Belfast,2016:1-6
[11] Ding D R,Wang Z D,Dong H.Dynamic output feedback control for discrete-time stochastic nonlinear systems with adversaries[C]∥Proceedings of the 33rd Chinese Control Conference,2014:5428-5432
[12] Zhang ?H,Cheng P,Shi L,et al.Optimal denial-of-service attack scheduling with energy constraint[J].IEEE Transactions on Automatic Control,2015,63(6):1648-1663
[13] Guo Z,Shi D,Johansson K H,et al.Optimal linear cyber-attack on remote state estimation[J].IEEE Transactions Control of Network Systems,2017,4(1):4-13
[14] Yan ?H C,Zhang H,Yang F W,et al.Event-triggered asynchronous ?guaranteed cost control for Markov jump discrete-time neural networks with distributed delay and channel fading[J].IEEE Transactions on Neural Networks and Learning Systems,2018,29(8):3588-3598
[15] Tabuada P.Event-triggered real-time scheduling of stabilizing control tasks[J].IEEE Transactions on Automatic Control,2007,52(9):1680-1685
[16] Wang X,Lemmon M.Self-triggered feedback control systems with finite-gain stability[J].IEEE Transactions on Automatic Control,2009,45(3):452-467
[17] Donkers ?M,Heemels W.Output-based event-triggered control with guaranteed ?l ?1-gain and improved and decentralized event-triggering[J].IEEE Transactions on Automatic Control,2012,57(6):1362-1376
[18] Zhang H,Wang Z P,Yan H C,et al.Adaptive event-triggered transmission scheme and? ?H ?∞ filtering co-design over a filtering networked with switching topology[J].IEEE Transactions on Cybernetics,2018,DOI:10.1109/TCYB.2018.2862828
Event-based security control for networked
control systems with DoS attacks
WANG Jiangning 1 YAN Huaicheng1,2 ?LI Zhichen 1 ZHAN Xisheng 2
1 School of Information Science and Engineering,East China University of Science and Technology,Shanghai 200237
2 College of Mechatronics and Control Engineering,Hubei Normal University,Huangshi 435002
Abstract?? An event-based security control for networked control systems(NCSs) under two-channel denial of service(DoS) attacks is presented in this paper.First,a model is proposed to describe the DoS attacks with a compensation strategy and applied to the sensor-controller channel and controller-actuator channel of the NCSs.Second,an event-triggered mechanism is proposed to induce the burden of information transmission.By definition,information can transfer only when the trigger condition is met.According to the optimal control theory and linear matrix inequality,sufficient conditions of the closed-loop system with a certain probability of the input-to-state security are derived,and the controller is designed.Finally,the effectiveness of the controller is verified through computer simulation.
Key words? networked control systems(NCSs);security control;event-triggered mechanism;DoS attacks