語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
FindBook
Google Book
Amazon
博客來
Cybersecurity for Networked Control System.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Cybersecurity for Networked Control System./
作者:
Tang, Jiacheng.
面頁冊數:
1 online resource (126 pages)
附註:
Source: Dissertations Abstracts International, Volume: 84-04, Section: A.
Contained By:
Dissertations Abstracts International84-04A.
標題:
Electrical engineering. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=29712439click for full text (PQDT)
ISBN:
9798845452498
Cybersecurity for Networked Control System.
Tang, Jiacheng.
Cybersecurity for Networked Control System.
- 1 online resource (126 pages)
Source: Dissertations Abstracts International, Volume: 84-04, Section: A.
Thesis (Ph.D.)--The Ohio State University, 2022.
Includes bibliographical references
This dissertation studies cybersecurity, with a focus on the control theory for cyber physical system (CPS). We consider CPS as a networked control system (NCS) where the sensing and control signals transmitted through the communication network can be compromised. To secure the NCS, we develop detection and response algorithms against adversarial attacks. In particular, we propose dynamic watermarking as an active detection scheme against sensor spoofing attacks, stochastic transmission of the control signals as a control response against bus-off (DoS) attack, and optimization on communication link elimination as a control response against general attack scenarios whenever network switching is needed. In all the cases, we show the efficacy of applying the proposed algorithms against attacks and the guarantee of control performance after applying security measures.For communication link elimination, we consider a group of agent switching from a fully connected communication network to a backup network with limited bandwidth due to attack. This problem is formulated as a linear quadratic Gaussian (LQG) team problem. We show that optimizing communication links in the backup network is equivalent to adding a cardianlity constraint to the original quadratic optimization problem. Due to the combinatorial nature of the problem, we apply convex relaxation on the constraint set and random projection on the objective function as dimensionality reduction tools. We provide the theoretical performance guarantee on the near-optimal solution obtained from the relaxed problem.For stochastic transmission against bus-off attacks, we present a mathematical model for the bus-off attack and formulate it as a non-zero sum game between the controller-transmitter pair and the attacker. A stochastic transmission policy is proposed as a proactive countermeasure when the attacker persists in the network. We determine the Nash equilibria of the non-zero sum game in the cases off open-loop and closed-loop attacker. To demonstrate the effectiveness of our theoretical results, we apply the stochastic transmission policy on an adaptive cruise control (ACC) and show that under the Nash equilibrium strategies, an appropriate stochastic transmission policy stabilizes the error counter and the ego vehicle maintains a safe distance with the leading vehicle.For dynamic watermarking against spoofing attacks, we extend the existing dynamic watermarking algorithm to a finite Markov decision process (MDP) setup. The watermark is added by changing the control policy of the controller. Compared with the linear/nonlinear model with dynamic watermarking, MDP model allows for more abstract elements (e.g., active and sleep) in the state and action space. Here, we propose a CUSUM-type detection scheme to detect whether the information coming from the feedback channel is authentic or has been compromised. We analyze the performance bound of the detection algorithm in terms of the detection delay and false alarms, and also the control loss due to introducing such watermarks into the system. We apply dynamic watermarking algorithm to detect a spoofing attack on a power management system in a sensor network. We demonstrate the trade-off between detection performance and control loss for different magnitude of the watermark applied to the system.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2023
Mode of access: World Wide Web
ISBN: 9798845452498Subjects--Topical Terms:
649834
Electrical engineering.
Subjects--Index Terms:
CybersecurityIndex Terms--Genre/Form:
542853
Electronic books.
Cybersecurity for Networked Control System.
LDR
:04684nmm a2200397K 4500
001
2356503
005
20230612110839.5
006
m o d
007
cr mn ---uuuuu
008
241011s2022 xx obm 000 0 eng d
020
$a
9798845452498
035
$a
(MiAaPQ)AAI29712439
035
$a
AAI29712439
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
$d
NTU
100
1
$a
Tang, Jiacheng.
$3
3696979
245
1 0
$a
Cybersecurity for Networked Control System.
264
0
$c
2022
300
$a
1 online resource (126 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Dissertations Abstracts International, Volume: 84-04, Section: A.
500
$a
Advisor: Gupta, Abhishek.
502
$a
Thesis (Ph.D.)--The Ohio State University, 2022.
504
$a
Includes bibliographical references
520
$a
This dissertation studies cybersecurity, with a focus on the control theory for cyber physical system (CPS). We consider CPS as a networked control system (NCS) where the sensing and control signals transmitted through the communication network can be compromised. To secure the NCS, we develop detection and response algorithms against adversarial attacks. In particular, we propose dynamic watermarking as an active detection scheme against sensor spoofing attacks, stochastic transmission of the control signals as a control response against bus-off (DoS) attack, and optimization on communication link elimination as a control response against general attack scenarios whenever network switching is needed. In all the cases, we show the efficacy of applying the proposed algorithms against attacks and the guarantee of control performance after applying security measures.For communication link elimination, we consider a group of agent switching from a fully connected communication network to a backup network with limited bandwidth due to attack. This problem is formulated as a linear quadratic Gaussian (LQG) team problem. We show that optimizing communication links in the backup network is equivalent to adding a cardianlity constraint to the original quadratic optimization problem. Due to the combinatorial nature of the problem, we apply convex relaxation on the constraint set and random projection on the objective function as dimensionality reduction tools. We provide the theoretical performance guarantee on the near-optimal solution obtained from the relaxed problem.For stochastic transmission against bus-off attacks, we present a mathematical model for the bus-off attack and formulate it as a non-zero sum game between the controller-transmitter pair and the attacker. A stochastic transmission policy is proposed as a proactive countermeasure when the attacker persists in the network. We determine the Nash equilibria of the non-zero sum game in the cases off open-loop and closed-loop attacker. To demonstrate the effectiveness of our theoretical results, we apply the stochastic transmission policy on an adaptive cruise control (ACC) and show that under the Nash equilibrium strategies, an appropriate stochastic transmission policy stabilizes the error counter and the ego vehicle maintains a safe distance with the leading vehicle.For dynamic watermarking against spoofing attacks, we extend the existing dynamic watermarking algorithm to a finite Markov decision process (MDP) setup. The watermark is added by changing the control policy of the controller. Compared with the linear/nonlinear model with dynamic watermarking, MDP model allows for more abstract elements (e.g., active and sleep) in the state and action space. Here, we propose a CUSUM-type detection scheme to detect whether the information coming from the feedback channel is authentic or has been compromised. We analyze the performance bound of the detection algorithm in terms of the detection delay and false alarms, and also the control loss due to introducing such watermarks into the system. We apply dynamic watermarking algorithm to detect a spoofing attack on a power management system in a sensor network. We demonstrate the trade-off between detection performance and control loss for different magnitude of the watermark applied to the system.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2023
538
$a
Mode of access: World Wide Web
650
4
$a
Electrical engineering.
$3
649834
650
4
$a
Computer engineering.
$3
621879
650
4
$a
Computer science.
$3
523869
650
4
$a
Multimedia communications.
$3
590562
653
$a
Cybersecurity
653
$a
Control system
653
$a
Bus-off attack
653
$a
Dynamic watermarking
655
7
$a
Electronic books.
$2
lcsh
$3
542853
690
$a
0544
690
$a
0984
690
$a
0464
690
$a
0558
710
2
$a
ProQuest Information and Learning Co.
$3
783688
710
2
$a
The Ohio State University.
$b
Electrical and Computer Engineering.
$3
1672495
773
0
$t
Dissertations Abstracts International
$g
84-04A.
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=29712439
$z
click for full text (PQDT)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9478859
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入