Elsevier

Information Sciences

Volume 527, July 2020, Pages 51-69
Information Sciences

Event-triggered control for stochastic networked control systems against Denial-of-Service attacks

https://doi.org/10.1016/j.ins.2020.03.045Get rights and content

Abstract

Recently, the security issues in networked control systems have become a major challenge, since networked control systems (NCSs) are vulnerable to malicious attacks. In this paper, a new event-triggered mechanism (ETM) is proposed, under which data packets could be actively dropped within consecutive steps, saving more communication resource than the existing ETM. Moreover, the effect of Denial-of-Service (DoS) attacks obeying Bernoulli distribution is considered and analysed. Furthermore, the corresponding estimation error covariance of the state is derived and the performance of system is analysed under the ETM both in the absence and presence of DoS attacks. Finally, the effectiveness of the proposed ETM is demonstrated by Monte Carlo simulation experiments and the feasibility of theoretical results is validated by numerical examples.

Introduction

During the past few decades, NCSs have been widely applied in various practical areas, such as traffic management, mobile sensor networks, health care devices and so on [1], [2], [6], [35], [40]. However, the use of communication networks in NCSs makes the systems vulnerable to the possible malicious attacks, e.g., Denial-of-Service (DoS) attacks [3], replay attacks [45], false data injection attacks [27], deception attacks [10], stealthy attacks [36], covert attacks [29] and zero dynamics attacks [37], which may destabilize the systems, even destroy the systems in the worst case. In particular, the critical NCS-based infrastructures play a fundamental role in modern society. Their disruption can have a significant impact on public health, safety and lead to large economic losses. A well-known network security incident is the attack to Ukraine’s power grid in 2015 as described in [41]. In this incident, the computers at a power grid control center were remotely operated by adversaries, causing power outages in the Ukraine. Therefore, secure control of these NCSs is of greatest importance, which has really attracted much attention.

Recently, security issue of NCSs subject to DoS attacks have been studied widely. DoS attacks aim at blocking the communication link and effectively prevent transmission of data packets, causing the loss of data packets or even destroy the system in some severe cases. In [7], the authors considered the problem of finding optimal control and attack strategies assuming a maximum number of jamming actions over a prescribed finite control horizon, when DoS attacks either evolve according to a Bernoulli process or follow a hidden Markov process model. The authors of [11] proposed a novel attack model to describe a more complex case, that is, the DoS attacks and the deception attacks occur simultaneously in the system. Meanwhile, the behaviors of the attacker satisfy Bernoulli distribution with known conditional probabilities. From the view of energy-constrained DoS attacks, an optimal attack strategy has been presented to maximize the cost of the Linear Quadratic Gaussian control (LQG) [46]. The authors further studied the attack effect on the systems with multiple subsystems [47].

Different from the traditional time-triggered control, i.e., the sampling of sensors and updating of controllers are executed periodically, the control tasks under event-triggered control (ETC) are executed after the occurrence of an event, which is generated by designed triggering conditions [38]. The event-triggered dissipative control was considered in [42], where the system states of the stochastic plant were first sampled non-uniformly. Some effective ETMs were proposed to alleviate the degradation of system performance under different situations of DoS attacks. For example, the resilient event-triggering communication scheme was given under periodic DoS jamming attacks in [23]. Similarly, in [33], the resilient ETM was given based on the output such that the system could tolerate a larger time delay when DoS attacks occur. And the security-based resilient ETM was also proposed to guarantee the security performance of systems in [34]. As well as the authors of [26] considered the decentralized observed-based ETM when DoS attacks occurred on different channels. However, the transmission source saved due to the existence of ETMs, which is the main feature brought by ETMs, is not considered and analysed in these work. Some other research, see [12], [13], [15], [21], [25], [30], [44], demonstrated that ETC can hugely decrease communication traffic over networks and maintain a satisfactory closed-loop performance. This indicated that each sampling in ETC systems is very important to ensure the stability of the closed-loop systems. In [39], the authors analysed the trade-off between the sensor-to-controller communication rate and the closed-loop system performance indexed by the conventional LQG control cost. Several sensor data schedules were presented and compared, and two event-based sensor data schedules were demonstrated which have better trade-off than an optimal off-line schedule. However, the data in [39] would be transmitted from sensor to estimator at least once within any two consecutive instants, i.e., the average transmission rate of ETM is at least 50%, which motivates us to investigate a new ETM to save more communication resource.

In this paper, a class of linear stochastic systems subject to DoS attacks are considered, where ETC is employed to mitigate communication loads. The contributions of this paper are summarised as follows.

  • 1.

    A new ETM is proposed, under which data packets could be actively dropped for every steps, in order to save more communication resources.

  • 2.

    The estimation error covariance of the state is derived and the performance indexed by LQG control cost function of system is analysed.

  • 3.

    The scenario when the system is under DoS attacks is considered and analysed.

The rest of the paper is organized as follows. Section II presents the problem description. A new ETM is proposed in both situations that DoS attacks are absent or present and the stability of systems in both two situations are shown as well in Section III. Then the corresponding performance of systems indexed by LQG control cost function is analysed. Numerical examples are given to illustrate the efficiency and the feasibility of the proposed results in Section IV, followed by the conclusions in Section V.

Notations: R is the set of real number. Z is the set of non-negative integers. N is the set of positive integers. S+n and S++n denote the set of n by n symmetric positive semi-define and positive define matrices over the real field, respectively. kZ is the time index. Rn stands for the n dimensional Euclidean space. E[·] is the expectation of a random variable and E[ · | · ] is the conditional expectation. Var( · ) stands for the variance of a random variable. Pr( · ) is the probability of a random event. Tr[ · ] is the trace of a matrix. ( · )T stands for the transposition. ‖ · ‖ stands for the Infinity norm. ‖ · ‖ stands for the Euclidean norm. ϱ( · ) denotes the spectral radius of a matrix. Define a function h:S+nS+n as h(X)AXAT+Q. Define Γ(δ)E[ggT|gδ], where δR>0 and gRr is a random variable obeying the standard normal distribution. If gR, then Γ(δ)=1β(δ), where β(δ) is defined by β(δ)=22πδeδ22[12q(δ)]1 and q(δ) is the standard q-function defined by q(δ)δ12πex22dx.

Section snippets

Problem statement

In this section, the system model studied in this paper is introduced and the problem formulation is presented.

Main results

In this section, the analyse is divided into two scenarios. One is the absence of DoS attacks in the system, the other is the presence of DoS attacks.

Simulation results

Consider a linear system and assume x^ks is Gaussian withA=[0.6750.3150.360.72],B=[0.010.050.060.04],C=[1001],G=[0.1000.1],H=[0.5000.5],Q=R=[0.1000.1].

The performance of system is obtained by 5000 different initials and every initial value is iterated 500 steps. It is worthy noting that the method proposed in this paper is suitable for some practical application, such as the applications mentioned in [18], [19], [20], [43].

When δ=3 and δ=5, we have ϱ(A^)=0.5045<1 and ϱ(A^)=0.5184<1,

Conclusion

In this work, we have proposed a new ETM under which data packets could be actively dropped within consecutive steps, as long as the data packet at initial time is transmitted successfully. Then much more communication resource could be spared, reducing the burden of communication in the system. We investigated the estimation error covariance and the system performance with the proposed ETM when DoS attacks obeying Bernoulli distribution are present or absent. An upper bound of E[Pk] is given,

Declaration of Competing Interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

CRediT authorship contribution statement

Li Guo: Investigation, Conceptualization, Methodology, Formal analysis, Writing - original draft, Data curation, Software, Validation, Writing - review & editing. Hao Yu: Investigation, Methodology, Software. Fei Hao: Investigation, Funding acquisition, Supervision.

Acknowledgements

This work was supported by National Nature Science Foundation of China under Grant 61573036 and 61174057.

References (47)

  • B.D.O. Anderson et al.

    Optimal filtering

    (1979)
  • I. Arasaratnam et al.

    IEEE Trans. Automat. Contr.

    (2009)
  • G.K. Befekadu et al.

    Risk-sensitive control under markov modulated denial-of-service attack strategies

    IEEE Trans. Autom. Control

    (2015)
  • T.M. Cover et al.

    Elements of information theory

    (2012)
  • T.T. Cui et al.

    Security control for linear systems subject to Denial-of-Service attacks

    Proceedings of 2017 36th Chinese Control Conference

    (2017)
  • D. Ding et al.

    Security control for discretetime stochastic nonlinear systems subject to deception attacks

    IEEE Trans. Syst., Man, Cybern., Syst.

    (2018)
  • D. Ding et al.

    Event-based security control for discrete-time stochastic systems

    IET Control Theory Applications

    (2016)
  • L. Ding et al.

    An overview of recent advances in event-triggered consensus of multiagent systems

    IEEE Trans. Cybern.

    (2018)
  • M.C.F. Donkers et al.

    Output-based event-triggered control with guaranteed l-gain and improved and decentralized event-triggering

    IEEE Trans. Autom. Control

    (2012)
  • V.S. Dolk et al.

    Dynamic event-triggered control under packet losses: the case with acknowledgements, event-based control

    Communication and Signal Processing (EBCCSP)

    (2015)
  • L. Guo et al.

    Stability of networked control system subject to denial-of-service

    SCIENCE CHINA Information Sciences

    (2018)
  • V. Gupta et al.

    Networked sensing, estimation and control systems

    Dept. Control Dyn. Syst. California Inst. Technol., Pasadena

    (2009)
  • G. Guo et al.

    Fuel-efficient en route speed planning and tracking control of truck platoons

    IEEE Trans. Intelligent Transportation Sys.

    (2019)
  • Cited by (0)

    View full text