首页 | 本学科首页   官方微博 | 高级检索  
     

基于鲁棒性能的信息物理融合系统乘性攻击检测
引用本文:赵振根,李渝哲. 基于鲁棒性能的信息物理融合系统乘性攻击检测[J]. 控制理论与应用, 2022, 39(10): 1952-1960
作者姓名:赵振根  李渝哲
作者单位:南京航空航天大学自动化学院,江苏南京211106;东北大学流程工业综合自动化国家重点实验室,辽宁沈阳110004
基金项目:国家自然科学基金项目(62003161, 61890924, 61991404), 江苏省自然科学基金项目(BK20190399), 中央高校基本科研业务费项目(NS2020020, N180805002)资助, 飞行器自主控制技术教育部工程研究中心开放课题(NJ2020004)
摘    要:针对信息物理融合系统乘性攻击检测的难题,本文提出两种基于鲁棒性能的乘性攻击检测与数据驱动实现策略. 首先, 利用互质分解和间隙度量理论, 建立信息物理融合系统和乘性攻击模型. 其次,利用稳定裕度性能指标, 评估乘性攻击对闭环系统稳定性能的影响,给出了稳定裕度的下界. 再次,提出基于稳定裕度和基于残差鲁棒性能的乘性攻击检测策略,并设计相应的检测阈值和检测逻辑. 进一步,利用子空间辨识方法,在线辨识稳定裕度和残差鲁棒性能,提出基于鲁棒性能的乘性攻击检测的数据驱动实现方法. 最后, 利用飞行器系统的仿真, 验证了所提出的基于鲁棒性能的乘性攻击检测方法的有效性.

关 键 词:信息物理融合系统  攻击检测  稳定裕度  数据驱动
收稿时间:2021-06-24
修稿时间:2021-11-05

Robust Performance Based Multiplicative Attack Detection for Cyber-Physical Systems
ZHAO Zhen-gen and LI Yu-zhe. Robust Performance Based Multiplicative Attack Detection for Cyber-Physical Systems[J]. Control Theory & Applications, 2022, 39(10): 1952-1960
Authors:ZHAO Zhen-gen and LI Yu-zhe
Affiliation:1.Nanjing University of Aeronautics and Astronautics,2.Northeastern University
Abstract:To address the problem of multiplicative attack detection in closed-loop cyber-physical systems, this paper proposes two methods of robust performance based multiplicative attack detection and their data-driven realization. First, apply the coprime factorization and gap metric to establish the models of cyber-physical systems and multiplicative attacks. Then, the stability margin is used to evaluate the effects of multiplicative attacks on the stability performance of closed-loop systems, and the low bound of stability margin is presented. Furthermore, the stability margin based and residual robust performance based attack detection schemes are proposed, and the corresponding detection thresholds and detection logics are designed. Moreover, with the aid of subspace identification, the data-driven realizations of the robust performance based attack detection are presented, via online identifying the stability margin and residual robust performance. Finally, the simulations on flight vehicle system are applied to verify the effectiveness of the robust performance based multiplicative attack detection methods.
Keywords:
本文献已被 万方数据 等数据库收录!
点击此处可从《控制理论与应用》浏览原始摘要信息
点击此处可从《控制理论与应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号