Method for designing event trigger filter of cyber-physical system under spoofing attack

A cyber-physical system and filter design technology, which is applied in the field of cyber-physical systems, can solve problems such as damage to the perception execution layer and data transmission layer of the cyber-physical system, increase in false triggers of data packets, and complex means of deception attacks, etc., to reduce the average The effect of data release rate, saving network communication resources, and improving bandwidth utilization

Pending Publication Date: 2021-11-02
南京市初仁智能科技有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The security problem of the cyber-physical system is mainly caused by the destruction of the perception execution layer and the data transmission layer. Malicious attackers destroy or tamper with the data information of the communication channel, thereby destroying the control system of the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for designing event trigger filter of cyber-physical system under spoofing attack
  • Method for designing event trigger filter of cyber-physical system under spoofing attack
  • Method for designing event trigger filter of cyber-physical system under spoofing attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. The components of the embodiments of the invention generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations. Accordingly, the following detailed description of the embodiments of the invention provided in the accompanying drawings is not intended to limit the scope of the claimed invention, but merely represents selected embodiments of the invention. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention.

[0025] The present invention is realized through the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for designing an event trigger filter of an cyber-physical system under spoofing attack, and the method comprises the following steps: designing an event trigger mechanism according to a formulated T-S fuzzy model, and constructing measurement output of a filter to describe the spoofing attack suffered by the cyber-physical system; according to the spoofing attack suffered by the information physical system, constructing an elastic fuzzy filter corresponding to the spoofing attack; according to the elastic fuzzy filter, constructing a filtering error system for detecting the filtering effect of the elastic fuzzy filter; and under a spoofing attack, verifying the stability of the information physical system in which the elastic fuzzy filter is constructed. The invention aims to improve the bandwidth utilization rate of the information physical system and reduce the false triggering of the data packet.

Description

technical field [0001] The invention relates to the technical field of cyber-physical systems, in particular to an event-triggered filter design method for cyber-physical systems under deception attacks. Background technique [0002] System security is a key issue for the practical application of cyber-physical systems (CPS). In CPS, the deep integration of information space and physical space brings important technical advantages, but at the same time, it also makes it possible for attackers to invade by attacking information space. Physical space, and then willfully destroy cyber-physical systems. Since 2010, the number of security incidents has increased significantly year by year, especially in major industrial control network security incidents showing explosive growth. [0003] The security problem of the cyber-physical system is mainly caused by the destruction of the perception execution layer and the data transmission layer. Malicious attackers destroy or tamper wi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1441H04L63/0227
Inventor 施乃溶张惠娟张荣谢畅
Owner 南京市初仁智能科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products