Loading…

Event-triggering control scheme for discrete time Cyberphysical Systems in the presence of simultaneous hybrid stochastic attacks

Industry Revolution 4.0 pushes the industry to digitize all its operations. Cyberphysical Systems (CPSs), such as autonomous automobile systems and medical monitoring are examples of this revolution. However, as these systems are interconnected via the Internet, they become more vulnerable to cyber-...

Full description

Saved in:
Bibliographic Details
Published in:ISA transactions 2022-03, Vol.122, p.1-12
Main Authors: Hamdan, Mutaz M., Mahmoud, Magdi S., Baroudi, Uthman A.
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Industry Revolution 4.0 pushes the industry to digitize all its operations. Cyberphysical Systems (CPSs), such as autonomous automobile systems and medical monitoring are examples of this revolution. However, as these systems are interconnected via the Internet, they become more vulnerable to cyber-attacks and in particular, stealthy attacks. Cyber attacks could affect the operations of CPS and cause physical damages before any indication. So, there is a need to design a secure control system to withstand in these circumstances. In this article, an event-triggering control scheme is designed for discrete time CPSs contain random delays in measurements and actuation signals and subject to simultaneous hybrid distributed denial of service (DDoS) and deception attacks. The cyber attacks are designed as Bernoulli distributed white sequences with conditional probabilities that are variable. Moreover, An event-triggering control scheme is proposed for decreasing the communication overhead in the system, such that the measurements’ signals are sent when a selected triggering condition is met. An observer based control is designed to maintain the stability of the CPS under all possible scenarios of single or hybrid simultaneous attacks in the forward and or backward communication. Linear matrix inequalities are used to represent the overall control scheme. At the end, two illustrative examples are presented and discussed to show the effectiveness of the presented scheme.
ISSN:0019-0578
1879-2022
DOI:10.1016/j.isatra.2021.04.027