Supercharge Your Innovation With Domain-Expert AI Agents!

Self-adaptive elastic tracking control method and system with spoofing attack

A technology of deception attack and tracking control, applied in the field of information security, which can solve the problems of unavailability of system state, difficulty in tracking, and destruction of system state.

Pending Publication Date: 2022-04-12
SHANDONG NORMAL UNIV
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] So far, there are few studies on the adaptive elastic tracking control of cyber-physical attack systems with spoofing attacks based on Nussbaum technology, and there are many problems, such as the state of the system after being attacked by spoofing will be destroyed, while the original system The state is unavailable, only the system state after being attacked is available, and this brings great difficulties to the implementation of tracking, however, for cps with false data injection attacks based on Nussbaum technology, it is not easy to implement tracking control Easy, since the state information is corrupted by the attack, only the corrupted state is usable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Self-adaptive elastic tracking control method and system with spoofing attack
  • Self-adaptive elastic tracking control method and system with spoofing attack
  • Self-adaptive elastic tracking control method and system with spoofing attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] Such as figure 1 As shown, an adaptive elastic tracking control method with spoofing attack, including:

[0041] Obtain the relationship between the system state before the spoofing attack and the system state after the spoofing attack;

[0042] Construct a virtual controller and an actual controller according to the obtained system state relationship;

[0043] Build adaptive elastic tracking controllers using virtual controllers and real controllers;

[0044] Stable tracking of the target signal is achieved through an adaptive elastic tracking controller;

[0045] Among them, the adaptive elastic tracking controller is constructed by using the virtual controller and the actual controller, which is realized through the nonlinear cyber-physical system based on Nussbaum's spoofing attack.

[0046] Further, said obtaining the relationship between the system state before the spoofing attack and the system state after the spoofing attack includes constructing a model of t...

Embodiment approach

[0061] As one or more implementation manners, the constructing the nonlinear model of the cyber-physical system subjected to spoofing attack includes: considering the influence of the system state and the attack gain caused by the spoofing attack on constructing the nonlinear model of the cyber-physical system.

[0062] As one or more implementations, the introduction of a new Nussbaum technology and obtaining the basis for inferring that the system reaches global bounding includes: considering the needs of the present invention, selecting and constructing the correct Nussbaum technology and inferring the variables in the system according to this theorem Is there a bound.

[0063] As one or more implementations, the introduction of a new coordinate transformation includes: designing a new coordinate transformation, which is different from the traditional coordinate transformation, successfully avoiding the disadvantage that the unattacked state cannot be obtained, using The co...

Embodiment 2

[0165] An adaptive elastic tracking control system with spoofing attack, comprising:

[0166] The state acquisition module is configured to obtain the relationship between the system state before the spoofing attack and the system state after the spoofing attack;

[0167] a controller module configured to construct a virtual controller and an actual controller according to the obtained system state relationship;

[0168] an adaptive module configured to construct an adaptive elastic tracking controller using the virtual controller and the actual controller;

[0169] The signal tracking module is configured to realize stable tracking of the target signal through an adaptive elastic tracking controller;

[0170] Among them, the adaptive elastic tracking controller is constructed by using the virtual controller and the actual controller, and Tongnuo is based on Nussbaum's nonlinear cyber-physical system with deception attack.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a self-adaptive elastic tracking control method with a spoofing attack. The self-adaptive elastic tracking control method comprises the following steps: acquiring a relationship between a system state before the spoofing attack and a system state after the spoofing attack; constructing a virtual controller and an actual controller according to the obtained system state relationship; constructing a self-adaptive elastic tracking controller by using a virtual controller and an actual controller; stable tracking of a target signal is realized through a self-adaptive elastic tracking controller; wherein the adaptive elastic tracking controller is constructed by using a virtual controller and an actual controller, and the adaptive elastic tracking controller is realized through a Nussbaum-based deception attack nonlinear information physical system. The control method provided by the invention can ensure that the signal of the closed-loop system is globally bounded and the tracking error is converged to a small area of an original point.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an adaptive elastic tracking control method and system with deception attacks. Background technique [0002] The statements in this section merely provide background information related to the present invention and do not necessarily constitute prior art. [0003] A system that is composed of network and physical components and integrates system computing and physical capabilities through a network communication channel is called a cyber-physical system. Cyber-physical systems are able to communicate and interact with humans in a variety of ways, playing an important role in many practical applications such as power grids or unmanned ships. Due to the highly open nature of network connections between sensors, one of the threats facing cyber-physical systems is the security of the system, which is more vulnerable to attacks from controllers and actuators. Therefore,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G05B13/04
Inventor 牛奔陈文娣高亚辉闫柏诚王新君
Owner SHANDONG NORMAL UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More