8th Session
8th Session
Cyber Attacks
In articles
Five Attacks:
False
Denial of
Data
Service Replay
Injection
(DoS)
(FDI)
Zero
Dynamics Covert
attacks attacks
(ZDAs)
2
Attack Space and Impact Space
3
4
ET-MFAC with False Data Injection Attacks (FDIA)
𝑦 ( 𝑘+1 ) = 𝑓 ( 𝑦 ( 𝑘 ) , … , 𝑦 ( 𝑘− 𝑛 𝑦 ) , 𝑢 ( 𝑘 ) ,… ,𝑢 ( 𝑘−𝑛𝑢 ) )
CFDL modeling:
^ ^ ( 𝑘 −1 ) + 𝜂 Δ 𝑢 ( 𝑘 −1 ) [ Δ 𝑦 ( 𝑘 ) − 𝜙
𝜙 ( 𝑘 )= 𝜙 ^ ( 𝑘 −1 ) Δ 𝑢 ( 𝑘 −1 ) ]
MFAC framework: 2
Δ 𝑢 ( 𝑘 −1 ) +𝜇
𝜌^
𝜙 (𝑘)
𝑢 ( 𝑘 )=𝑢 ( 𝑘 − 1 ) +
^ (𝑘)
2
[ 𝑦 ( 𝑘 +1 ) − 𝑦 ( 𝑘 ) ]
∗
𝜆+ 𝜙
5
ET-MFAC with False Data Injection Attacks (FDIA)
6
ET-MFAC with False Data Injection Attacks (FDIA)
Event-triggered Function:
event-triggered threshold
Event-triggering Condition:
𝜌^𝜙 ( 𝑘𝑖 )
𝑢 ( 𝑘 )=𝑢 ( 𝑘 − 1 ) + 2
^ (𝑘 )+ 𝜆
𝜙
[ 𝑦 ( 𝑘 +1 ) − 𝑦 ( 𝑘𝑖 ) ]
∗
𝑖 7
ET-MFAC with False Data Injection Attacks (FDIA)
^ ^ ( 𝑘 −1 ) + 𝜂 Δ 𝑢 ( 𝑘 −1 ) [ Δ 𝑦 ( 𝑘 ) − 𝜙
𝜙 ( 𝑘 )= 𝜙 ^ ( 𝑘 ) Δ 𝑢 ( 𝑘 −1 ) ]
2
Δ 𝑢 ( 𝑘 −1 ) +𝜇
^ ^ ( 1 ) , 𝑖𝑓 |𝜙
𝜙 ( 𝑘 )= 𝜙 ^ ( 𝑘 )| ≤ 𝜀 𝑜𝑟 | Δ 𝑢 ( 𝑘− 1 )|≤ 𝜀 𝑜𝑟 𝑠𝑖𝑔𝑛 ( 𝜙
^ ( 𝑘 ) ) ≠ 𝑠𝑖𝑔𝑛( ^
𝜙 ( 1 ))
𝜌𝜙^ (𝑘 )
𝑢 ( 𝑘 )=𝑢 ( 𝑘 − 1 ) + 2
𝑎 𝑖
^ (𝑘 )+ 𝜆
[ 𝑦 ( 𝑘 +1 ) − 𝑦 𝑎 (𝑘 𝑖) ]
∗
𝜙 𝑎 𝑖
8
ET-MFAC with False Data Injection Attacks (FDIA)
Problem:
Any Theorem to guarantee that the tracking error is uniformly bounded
with ET-MAFC algorithm using I/O data ?!
∗
𝑒 ( 𝑘) = 𝑦 ( 𝑘 ) − 𝑦 ( 𝑘 )
{ 𝑒 ( 𝑘 )||𝑒 (𝑘 )| ≤ 𝜖
9
ET-MFAC with False Data Injection Attacks (FDIA)
Theorem:
10
ET-MFAC with False Data Injection Attacks (FDIA)
11
ET-MFAC with False Data Injection Attacks (FDIA)
Simulation:
Nonlinear Plant:
Desired Trajectory:
False Data:
Parameter:
12
ET-MFAC with False Data Injection Attacks (FDIA)
Simulation Results:
13
ET-MFAC with False Data Injection Attacks (FDIA)
Simulation Results:
14
15
Data-Driven Control with DA and FDIA
Information exchange
need to rely on network
transmission in a wired or
wireless communication
mode.
16
Data-Driven Control with DA and FDIA
𝑦 ( 𝑘+1 ) = 𝑓 ( 𝑦 ( 𝑘 ) , … , 𝑦 ( 𝑘− 𝑛 𝑦 ) , 𝑢 ( 𝑘 ) ,… ,𝑢 ( 𝑘−𝑛𝑢 ) )
CFDL modeling:
^ ^ ( 𝑘 −1 ) + 𝜂 Δ 𝑢 ( 𝑘 −1 ) [ Δ 𝑦 ( 𝑘 ) − 𝜙
𝜙 ( 𝑘 )= 𝜙 ^ ( 𝑘 ) Δ 𝑢 ( 𝑘 −1 ) ]
MFAC framework: 2
Δ 𝑢 ( 𝑘 −1 ) +𝜇
𝜌^ 𝜙 (𝑘)
𝑢 ( 𝑘 )=𝑢 ( 𝑘 − 1 ) +
^ 2 [ 𝑦 𝑑 ( 𝑘 +1 ) − 𝑦 ( 𝑘 ) ]
𝜙 ( 𝑘) + 𝜆
17
Data-Driven Control with DA and FDIA
- sensor-to-controller:
- controller-to-actuator:
18
Data-Driven Control with DA and FDIA
1’st order:
19
Data-Driven Control with DA and FDIA
- sensor-to-controller side:
- controller-to-actuator side:
20
Data-Driven Control with DA and FDIA
- sensor-to-controller side:
actual output:
- controller-to-actuator side:
21
Data-Driven Control with DA and FDIA
22
Data-Driven Control with DA and FDIA
^ ^ ( 𝑘 −1 ) + 𝜂 Δ 𝑣 ( 𝑘 −1 ) [ Δ 𝑧 ( 𝑘 ) − 𝜙
𝜙 ( 𝑘 )= 𝜙 ^ ( 𝑘 −1 ) Δ 𝑢 ( 𝑘 −1 ) ]
2
𝜇+ Δ 𝑣 ( 𝑘 −1 )
^ ^ ( 1 ) , 𝑖𝑓 |𝜙
𝜙 ( 𝑘 )= 𝜙 ^ ( 𝑘 )| ≤ 𝜀 𝑜𝑟 | Δ 𝑣 ( 𝑘− 1 )| ≤ 𝜀 𝑜𝑟 𝑠𝑖𝑔𝑛 ( 𝜙
^ ( 𝑘) ) ≠ 𝑠𝑖𝑔𝑛( 𝜙
^ ( 1 ))
^ ( 𝑘)
𝜌𝜙
𝑣 ( 𝑘 )=𝑣 ( 𝑘 − 1 ) + [ 𝑦
′
( 𝑘 +1 ) − 𝑧 ( 𝑘 ) ] , 𝑦
′
𝑑 ( 𝑘 ) =− 𝑦 𝑑 (𝑘 )
𝜆+ ^
𝑑
𝜙2 ( 𝑘 )
Theorem: For the time-varying trajectory , there exists a in security data-driven control
scheme the system tracking error is convergent monotonically.
23
Data-Driven Control with DA and FDIA
Compensation Scheme
^ ^ ( 𝑘 −1 ) + 𝜂 Δ 𝑣 ( 𝑘 −1 ) [ Δ 𝑟 ( 𝑘 ) − 𝜙
𝜙 ( 𝑘 )= 𝜙 ^ ( 𝑘 −1 ) Δ 𝑢 ( 𝑘 −1 ) ]
2
𝜇+ Δ 𝑣 ( 𝑘 −1 )
^ ^ ( 1 ) , 𝑖𝑓 |𝜙
𝜙 ( 𝑘 )= 𝜙 ^ ( 𝑘 )| ≤ 𝜀 𝑜𝑟 | Δ 𝑣 ( 𝑘− 1 )| ≤ 𝜀 𝑜𝑟 𝑠𝑖𝑔𝑛 ( 𝜙
^ ( 𝑘) ) ≠ 𝑠𝑖𝑔𝑛( 𝜙
^ ( 1 ))
^ ( 𝑘)
𝜌𝜙
𝑣 ( 𝑘 )=𝑣 ( 𝑘 − 1 ) + [ 𝑦 𝑑 ( 𝑘 +1 ) − 𝑟 ( 𝑘 ) ]
𝜆+ ^
𝜙2 ( 𝑘 )
𝑎
compensated output 𝑟 ( 𝑘 )=𝜃−𝑦 1 𝜃 𝑦 ( 𝑘 ) 𝑦 ( 𝑘 ) +𝛼 −1
𝑦 𝛼𝑦 (𝑘) 𝑦 (𝑘)+ 𝜁 𝑦 (𝑘)
−1 −1 𝑎
compensated input 𝑐 ( 𝑘 ) = 𝜃 𝑢 𝜃 𝑢 ( 𝑘 ) 𝑣 ( 𝑘 ) + 𝛼𝑢 𝛼𝑢 ( 𝑘 ) 𝑢 ( 𝑘 ) + 𝜁 𝑢 ( 𝑘 )
24
Data-Driven Control with DA and FDIA
25
Data-Driven Control with DA and FDIA
26
Data-Driven Control with DA and FDIA
:
compensated output −1 −1 𝑎
𝑟 ( 𝑘 )= 𝜃 𝑦 𝜃 𝑦 ( 𝑘 ) 𝑦 ( 𝑘 ) +𝛼 𝑦 𝛼 𝑦 ( 𝑘 ) 𝑦 ( 𝑘 ) + 𝜁 𝑦 ( 𝑘 )
−1 −1 𝑎
compensated input 𝑐 ( 𝑘 ) = 𝜃 𝑢 𝜃 𝑢 ( 𝑘 ) 𝑣 ( 𝑘 ) + 𝛼𝑢 𝛼𝑢 ( 𝑘 ) 𝑢 ( 𝑘 ) + 𝜁 𝑢 ( 𝑘 )
28