Skip to main content

Networked Control System Based on LQ Tracking and Response Strategy Under Data Injection Attack

  • Conference paper
  • First Online:
Intelligent Computing, Networked Control, and Their Engineering Applications (ICSEE 2017, LSMS 2017)

Abstract

It is one of the most important research topics in the field of automatic control to ensure stability of networked control system and keep controlled parameters unchanged in the presence of data injection attacks. On the basis of linear system state feedback, a linear quadratic (LQ) method keeping output error close to zero is presented. Stability condition of closed-loop system is given. Using integral control and LQ infinite time tracking strategy, a protective closed-loop control system is illustrated in detail. Simulation results show that the control strategy can reduce or remove the influence of illegal injecting data at sensor’s output terminal in some degree. Controlled parameters are limited within small variation range. The control method has certain application prospect and popularization value.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ge, X., Yang, F., Han, Q.-L.: Distributed networked control systems: a brief overview. Inf. Sci. 380, 117–131 (2015)

    Article  Google Scholar 

  2. Ji, X., He, G., Xu, J., Guo, Y.: Study on the mode of intelligent chemical industry based on cyber-physical system and its implementation. Adv. Eng. Softw. 99, 18–26 (2016)

    Article  Google Scholar 

  3. Ntalampiras, S.: Automatic identification of integrity attacks in cyber-physical systems. Expert Syst. Appl. 58, 164–173 (2016)

    Article  Google Scholar 

  4. Sullivan, J.E., Kamensky, D.: How cyber-attacks in ukraine show the vulnerability of the U.S. power grid. Electr. J. 30(3), 30–35 (2017)

    Google Scholar 

  5. Morris, T.H., Gao, W.: Industrial control system cyber attacks. In: Proceedings of the 1st International Symposium on ICS & SCADA Cyber Security Research, BCS 2013, pp. 22–29 (2013)

    Google Scholar 

  6. Hashimoto, Y., Toyoshima, T., Yogo, S., Koike, M., Hamaguchi, T., Jing, S., Koshijima, I.: Safety securing approach against cyber-attacks for process control system. Comput. Chem. Eng. 57(20), 181–186 (2013)

    Article  Google Scholar 

  7. Falliere, N., Murchu, L.O., Chien, E.: W32.Stuxnet Dossier. White Pap. Symantec Corp. Secur. Response 5, 6 (2011)

    Google Scholar 

  8. Han, J.: From PID to active disturbance rejection control. IEEE Trans. Ind. Electron. 56(3), 900–906 (2009)

    Article  Google Scholar 

  9. Modares, H., Lewis, F.L.: Linear quadratic tracking control of partially unknown continuous-time systems using reinforcement learning. IEEE Trans. Autom. Control 59(11), 3051–3056 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  10. Zdzislaw, B.: Modern control theory. Int. J. Robust Nonlinear Control 17(1), 89–90 (2007)

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported by National Key Scientific Instrument and Equipment Development Project of China (2012YQ15008703), National Science Foundation of China (61633016) and Key Project of Science and Technology Commission of Shanghai Municipality (No. 15220710400).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Minrui Fei .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Jie, X., Fei, M., Du, D., Yang, T.C. (2017). Networked Control System Based on LQ Tracking and Response Strategy Under Data Injection Attack. In: Yue, D., Peng, C., Du, D., Zhang, T., Zheng, M., Han, Q. (eds) Intelligent Computing, Networked Control, and Their Engineering Applications. ICSEE LSMS 2017 2017. Communications in Computer and Information Science, vol 762. Springer, Singapore. https://doi.org/10.1007/978-981-10-6373-2_49

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6373-2_49

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6372-5

  • Online ISBN: 978-981-10-6373-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics