Industrial network closed-loop control method with attack protection, and architecture of the same

A closed-loop control and industrial network technology, applied in data exchange networks, digital transmission systems, electrical components, etc., can solve problems such as system robustness decline and system collapse, and achieve the effects of low cost, simplified structure, and high efficiency

Active Publication Date: 2017-06-20
NANJING UNIV OF POSTS & TELECOMM
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Because in a typical closed-loop control system, the control signal from the controller to the remote controlled object and the output feedback signal fed back from the remote controlled object to the controller, through the closed-loop bidirectional loop, both the control command and the output feedback signal are possible Due to the insecurity of the network links, possible network attacks such as interception and tampering will cause the robustness of the system to decline or even crash the system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Industrial network closed-loop control method with attack protection, and architecture of the same
  • Industrial network closed-loop control method with attack protection, and architecture of the same
  • Industrial network closed-loop control method with attack protection, and architecture of the same

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The technical solutions involved in the present invention will be described in detail below in conjunction with the accompanying drawings.

[0023] At the beginning of the system startup, at the control object side, due to the existence of good data for training and learning, in [0,t s ] During the time period, the system status is normal, which provides a basis for selecting the required credible data in the follow-up process. This is a very important design premise.

[0024] according to figure 1 , the working principle and working process of the anti-attack architecture of the closed-loop system are as follows, start the system, and control the sequence according to figure 2 The three parts shown in the figure carry out data encapsulation, and the work signal and identification signal are respectively encoded by explicit coding and implicit coding technology, and then transmitted to the remote control terminal through the network medium, the remote control terminal...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an industrial network closed-loop control method with attack protection, and architecture of the same. Based on a hidden attack model existing in a network control system, the architecture designs links of intelligent detection and defense capability, and can detect attack and harm brought by the network. The architecture not only contains some links in a classical network control system, but also increases a preprocessing link of control signals and a preprocessing link of feedback output signals on the front end of a controlled object and a controller. Besides, the architecture increases a comparison link at the output end of the controlled object according to the attack intelligent level, thus having the anti-attack capability and being able to effectively eliminate the influence brought by the hidden attack, due to these links. For the industrial network closed-loop control method with attack protection, and the architecture of the same, two kinds of architectures are designed according to the level of the hidden attack and the intelligent degree, wherein one of the architectures mainly aims at a common hidden attack and the other one aims at a hidden attack having certain anti-detection intelligent characteristic.

Description

technical field [0001] The invention relates to the field of control and information security of physical system fusion with network characteristics, and specifically relates to a framework design and model establishment for security and attack detection and defense applied to a network control system. Background technique [0002] In the network control system, with the wide application of control targets and controllers distributed in different places, information security issues have gradually become threats to the normal operation of control systems with network characteristics and even cause harm, especially for national security and major Key equipment safety for economic benefits and prospects. The safety of the so-called key equipment, such as the SCADA system in the power grid system, the centrifuge speed monitoring system in the nuclear power plant, and the coordinated control system of the air force cruise team performing tasks in distributed formations, etc. It ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24
CPCH04L41/145H04L63/123H04L63/1416H04L63/1441H04L63/145H04L63/1466
Inventor 葛辉岳东邓松解相朋胡松林
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products