Abstract
From security perspective, cyber physical system (CPS) security issue is investigated in this note. Based on a double-loop security control structure, the typical cyber attack called information disclosure, denial-of-service (DoS), deception attack and stealth attack are analyzed from uncertainty perspective. The performance of these attacks are formulated, meaningful models are proposed meanwhile. According to aforementioned attacks, security control scenarios are obtained via the character of each kind cyber attack. And some novel results are obtained via a well designed double closed loop structure. At last, from traditional standpoint, uncertainties of a separately excited DC motor is taken as an example to demonstrate the problem.
This work is supported by National Natural Science Foundation (NNSF) of China under Grant 61533010, 61374055, 51507084.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Sandberg, H., Amin, S., Johansson, K.: Cyberphysical security in networked control systems: an introduction to the issue. IEEE Control Syst. 35(1), 20–23 (2015)
How, J.P.: Cyberphysical security in networked control systems [about this issue]. IEEE Control Syst. 35(1), 8–12 (2015)
Cárdenas, A.A., Amin, S., Sinopoli, B., Perrig, A., Sastry, S.: Challenges for securing cyber physical systems. In: First Workshop on Cyber-Physical Systems Security, pp. 363–369 (2006)
Neuman, D.C.: Challenges in security for cyber-physical systems. In: Proceedings of S&T Workshop Future Directions Cyber-Physical System Security, No. 1, pp. 1–2 (2009)
Zhu, Q., Basar, T.: Game-theoretic methods for robustness, security, and resilience of cyberphysical control systems: games-in-games principle for optimal cross-layer resilient control systems. IEEE Control Syst. 35(1), 46–65 (2015)
Yue, D., Tian, E., Han, Q.L.: A delay system method for designing event-triggered controllers of networked control systems. IEEE Trans. Autom. Control 58(2), 475–481 (2013)
Householder, A., Manion, A., Pesante, L., Weaver, G.: Managing the threat of denial-of-service attacks. CERT Coord. Center 33(4), 99–110 (2001)
Smith, R.S.: Covert misappropriation of networked control systems: presenting a feedback structure. IEEE Control Syst. 35(1), 82–92 (2015)
Pasqualetti, F., Dorfler, F., Bullo, F.: Attack detection and identification in cyber-physical systems. IEEE Trans. Autom. Control 58(11), 2715–2729 (2013)
Zhou, K., Doyle, J.C., Glover, K.: Robust and Optimal Control. Prentice-Hall, Inc., Upper Saddle River (1996)
Ding, S.: Model-Based Fault Diagnosis Techniques: Design Schemes, Algorithms, and Tools. Springer Science & Business Media, Heidelberg (2008)
Knapp, E.D.: Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems. Syngress, Rockland (2011)
Zhou, J., Wang, Y., Zhou, R.: Global speed control of separately excited DC motor. In: Power Engineering Society Winter Meeting, vol. 3, pp. 1425–1430 (2001)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Ge, H., Yue, D., Xie, Xp., Deng, S., Hu, Sl. (2017). Analysis of Cyber Physical Systems Security Issue via Uncertainty Approaches. In: Fei, M., Ma, S., Li, X., Sun, X., Jia, L., Su, Z. (eds) Advanced Computational Methods in Life System Modeling and Simulation. ICSEE LSMS 2017 2017. Communications in Computer and Information Science, vol 761. Springer, Singapore. https://doi.org/10.1007/978-981-10-6370-1_42
Download citation
DOI: https://doi.org/10.1007/978-981-10-6370-1_42
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-6369-5
Online ISBN: 978-981-10-6370-1
eBook Packages: Computer ScienceComputer Science (R0)