메뉴 건너뛰기




Volumn 20, Issue 5, 2012, Pages 1334-1342

Design and implementation of secure networked predictive control systems under deception attacks

Author keywords

Communication constraints; data confidentiality; deception attacks; experiments; recursive networked predictive control (RNPC); secure networked control systems (SNCSs); stability

Indexed keywords

COMMUNICATION CONSTRAINTS; DATA CONFIDENTIALITY; DECEPTION ATTACKS; PREDICTIVE CONTROL; SECURE NETWORKED CONTROL SYSTEMS (SNCSS);

EID: 84863519982     PISSN: 10636536     EISSN: None     Source Type: Journal    
DOI: 10.1109/TCST.2011.2160543     Document Type: Article
Times cited : (233)

References (33)
  • 1
    • 64149124758 scopus 로고    scopus 로고
    • A survey of recent results in networked control systems
    • Jan
    • J. P. Hespanha, P. Naghshtabrizi, and Y. Xu, "A survey of recent results in networked control systems," Proc. IEEE, vol. 95, no. 1, pp. 138-162, Jan. 2007.
    • (2007) Proc. IEEE , vol.95 , Issue.1 , pp. 138-162
    • Hespanha, J.P.1    Naghshtabrizi, P.2    Xu, Y.3
  • 3
    • 1642490255 scopus 로고    scopus 로고
    • Networked intelligent robots through the Internet: Issues and opportunities
    • Mar
    • R. C. Luo, K. L. Su, S. H. Shen, and K. H. Tsai, "Networked intelligent robots through the Internet: Issues and opportunities," Proc. IEEE, vol. 91, no. 3, pp. 371-382, Mar. 2003.
    • (2003) Proc. IEEE , vol.91 , Issue.3 , pp. 371-382
    • Luo, R.C.1    Su, K.L.2    Shen, S.H.3    Tsai, K.H.4
  • 4
    • 70349619163 scopus 로고    scopus 로고
    • Industrial wireless sensor networks: Challenges, design principles, and technical approaches
    • Oct
    • V. C. Gungor and G. P. Hancke, "Industrial wireless sensor networks: Challenges, design principles, and technical approaches," IEEE Trans. Ind. Electron., vol. 56, no. 10, pp. 4258-4265, Oct. 2009.
    • (2009) IEEE Trans. Ind. Electron. , vol.56 , Issue.10 , pp. 4258-4265
    • Gungor, V.C.1    Hancke, G.P.2
  • 6
    • 45149129308 scopus 로고    scopus 로고
    • Network-centric systems for military operations in urban terrain: The role of UAVs
    • Jan
    • T. Samad, J. S. Bay, and D. Godbole, "Network-centric systems for military operations in urban terrain: The role of UAVs," Proc. IEEE, vol. 95, no. 1, pp. 92-107, Jan. 2007.
    • (2007) Proc. IEEE , vol.95 , Issue.1 , pp. 92-107
    • Samad, T.1    Bay, J.S.2    Godbole, D.3
  • 7
    • 77956600225 scopus 로고    scopus 로고
    • NCSLab: A Web-based global-scale control laboratory with rich interactive features
    • Oct
    • Y. Qiao, G. P. Liu, G. Zheng, and W. Hu, "NCSLab: A Web-based global-scale control laboratory with rich interactive features," IEEE Trans. Ind. Electron., vol. 57, no. 10, pp. 3253-3265, Oct. 2010.
    • (2010) IEEE Trans. Ind. Electron. , vol.57 , Issue.10 , pp. 3253-3265
    • Qiao, Y.1    Liu, G.P.2    Zheng, G.3    Hu, W.4
  • 8
    • 77955803542 scopus 로고    scopus 로고
    • Modelling and remote control of an excavator
    • Aug
    • H. Yu, Y. Liu, and M. S. Hasan, "Modelling and remote control of an excavator," Int. J. Autom. Comput., vol. 7, no. 3, pp. 349-358, Aug. 2010.
    • (2010) Int. J. Autom. Comput. , vol.7 , Issue.3 , pp. 349-358
    • Yu, H.1    Liu, Y.2    Hasan, M.S.3
  • 10
    • 77957775842 scopus 로고    scopus 로고
    • Networked control systems under cyber attacks with applications to power networks
    • A. Teixeira, H. Sandberg, and K. H. Johansson, "Networked control systems under cyber attacks with applications to power networks," in Proc. Amer. Control Conf., 2010, pp. 3690-3696.
    • (2010) Proc. Amer. Control Conf. , pp. 3690-3696
    • Teixeira, A.1    Sandberg, H.2    Johansson, K.H.3
  • 11
    • 33847299487 scopus 로고    scopus 로고
    • Multi-Agent intrusion detection system in industrial network using ant colony clustering approach and unsupervised feature extraction
    • C. H. Tsang and S. Kwong, "Multi-Agent intrusion detection system in industrial network using ant colony clustering approach and unsupervised feature extraction," in Proc. IEEE Int. Conf. Ind. Technol., 2005, vol. 14-17, pp. 51-56.
    • (2005) Proc. IEEE Int. Conf. Ind. Technol. , vol.14-17 , pp. 51-56
    • Tsang, C.H.1    Kwong, S.2
  • 13
    • 21644440888 scopus 로고    scopus 로고
    • Security for industrial communication systems
    • DOI 10.1109/JPROC.2005.849714, Industrial Communication Systems
    • D. Dzung, M. Naedele, T. P. Von Hoff, and M. Crevatin, "Security for industrial communication systems," Proc. IEEE, vol. 93, no. 6, pp. 1152-1177, Jun. 2005. (Pubitemid 40928634)
    • (2005) Proceedings of the IEEE , vol.93 , Issue.6 , pp. 1152-1177
    • Dzung, D.1    Naedele, M.2    Von Hoff, T.P.3    Crevatin, M.4
  • 14
    • 31344437563 scopus 로고    scopus 로고
    • Securing a wireless world
    • Feb
    • H. Yang, F. Ricciato, S. Lu, and L. Zhang, "Securing a wireless world," Proc. IEEE, vol. 94, no. 2, pp. 442-454, Feb. 2006.
    • (2006) Proc. IEEE , vol.94 , Issue.2 , pp. 442-454
    • Yang, H.1    Ricciato, F.2    Lu, S.3    Zhang, L.4
  • 15
    • 34548049800 scopus 로고    scopus 로고
    • Industrial cybersecurity for a power system and SCADA networks - Be secure
    • DOI 10.1109/MIA.2007.4283509
    • A. A. Creery and E. J. Byres, "Industrial cybersecurity for a power system and SCADA networks-Be secure," IEEE Ind. Appl. Mag., vol. 13, no. 4, pp. 49-55, Jul. 2007. (Pubitemid 47278233)
    • (2007) IEEE Industry Applications Magazine , vol.13 , Issue.4 , pp. 49-55
    • Creery, A.A.1    Byres, E.J.2
  • 16
    • 34547598071 scopus 로고    scopus 로고
    • The secure field bus (SecFB) protocol-Network communication security for secure industrial process control
    • P. Swaminathan, K. Padmanabhan, S. Ananthi, and R. Pradeep, "The secure field bus (SecFB) protocol-Network communication security for secure industrial process control," in Proc. IEEE Region 10 Conf., 2006, pp. 1-4.
    • (2006) Proc. IEEE Region 10 Conf. , pp. 1-4
    • Swaminathan, P.1    Padmanabhan, K.2    Ananthi, S.3    Pradeep, R.4
  • 17
    • 63149119832 scopus 로고    scopus 로고
    • Performance assessment and compensation for secure networked control systems
    • R. A. Gupta and M.-Y. Chow, "Performance assessment and compensation for secure networked control systems," in Proc. 34th IEEE Ind. Electron. Conf., 2008, pp. 2929-2934.
    • (2008) Proc. 34th IEEE Ind. Electron. Conf. , pp. 2929-2934
    • Gupta, R.A.1    Chow, M.-Y.2
  • 19
    • 0037483064 scopus 로고    scopus 로고
    • The design and implementation of a general-purpose, secure, measurement and control network incorporating Internet-based access
    • J. Smit and G. P. Hancke, "The design and implementation of a general-purpose, secure, measurement and control network incorporating Internet-based access," in Proc. 20th IEEE Instrum. Meas. Technol. Conf., 2003, vol. 2, pp. 1643-1647.
    • (2003) Proc. 20th IEEE Instrum. Meas. Technol. Conf. , vol.2 , pp. 1643-1647
    • Smit, J.1    Hancke, G.P.2
  • 20
    • 1442304614 scopus 로고    scopus 로고
    • A coalition key-evolving signature scheme towards intrusion resilient mobile networks for industrial applications
    • Q. Zhang, C. H. Wu, and J. D. Irwin, "A coalition key-evolving signature scheme towards intrusion resilient mobile networks for industrial applications," in Proc. 29th IEEE Ind. Electron. Conf., 2003, vol. 2, 2-6, pp. 1447-1452.
    • (2003) Proc. 29th IEEE Ind. Electron. Conf. , vol.2 , Issue.2-6 , pp. 1447-1452
    • Zhang, Q.1    Wu, C.H.2    Irwin, J.D.3
  • 23
    • 70349660244 scopus 로고    scopus 로고
    • Study of digital signature with encryption based on combined symmetric key
    • S. Y. Wu, W. B. Li, and X. Y. Hu, "Study of digital signature with encryption based on combined symmetric key," in Proc. Int. Conf. E-Bus. Inf. Syst. Secur., 2009, pp. 1-4.
    • (2009) Proc. Int. Conf. E-Bus. Inf. Syst. Secur. , pp. 1-4
    • Wu, S.Y.1    Li, W.B.2    Hu, X.Y.3
  • 24
    • 0346947091 scopus 로고    scopus 로고
    • High-performance FPGA implementation of DES using a novel method for implementing the key schedule
    • Oct
    • M. McLoone and J. V. McCanny, "High-performance FPGA implementation of DES using a novel method for implementing the key schedule," IEE Proc.-Circuits Devices Syst., vol. 150, no. 5, pp. 373-378, Oct. 2003.
    • (2003) IEE Proc.-Circuits Devices Syst. , vol.150 , Issue.5 , pp. 373-378
    • McLoone, M.1    McCanny, J.V.2
  • 25
    • 74849087444 scopus 로고    scopus 로고
    • Design and implementation of data encryption for networked control systems
    • K. Y. Yuan, J. Chen, G. P. Liu, and J. Sun, "Design and implementation of data encryption for networked control systems," in Proc. IEEE Int. Conf. Syst. Man Cybern., 2009, pp. 2105-2109.
    • (2009) Proc. IEEE Int. Conf. Syst. Man Cybern. , pp. 2105-2109
    • Yuan, K.Y.1    Chen, J.2    Liu, G.P.3    Sun, J.4
  • 28
    • 24944591357 scopus 로고    scopus 로고
    • How to break MD5 and other hash functions
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • X. Wang and H. Yu, "How to break MD5 and other Hash functions," in Proc. Eurocrypt., 2005, vol. 3494, pp. 19-35. (Pubitemid 41313944)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 19-35
    • Wang, X.1    Yu, H.2
  • 29
    • 33644583045 scopus 로고    scopus 로고
    • Design and stability analysis of networked control systems with random communication time delay using the modified MPC
    • Apr
    • G. P. Liu, J. X. Mu, D. Rees, and S. C. Chai, "Design and stability analysis of networked control systems with random communication time delay using the modified MPC," Int. J. Control, vol. 79, no. 4, pp. 288-297, Apr. 2006.
    • (2006) Int. J. Control , vol.79 , Issue.4 , pp. 288-297
    • Liu, G.P.1    Mu, J.X.2    Rees, D.3    Chai, S.C.4
  • 30
    • 52649143230 scopus 로고    scopus 로고
    • Networked predictive control over the Internet using round-Trip delay measurement
    • Oct
    • W. S. Hu, G. P. Liu, and D. Rees, "Networked predictive control over the Internet using round-Trip delay measurement," IEEE Trans. Instru. Meas., vol. 57, no. 10, pp. 2231-2241, Oct. 2008.
    • (2008) IEEE Trans. Instru. Meas. , vol.57 , Issue.10 , pp. 2231-2241
    • Hu, W.S.1    Liu, G.P.2    Rees, D.3
  • 31
    • 37749041311 scopus 로고    scopus 로고
    • Design and practical implementation of Internet-based predictive control of a servo system
    • Jan
    • S. H. Chai, G. P. Liu, D. Rees, and Y. Q. Xia, "Design and practical implementation of Internet-based predictive control of a servo system," IEEE Trans. Control Syst. Technol., vol. 16, no. 1, pp. 158-168, Jan. 2008.
    • (2008) IEEE Trans. Control Syst. Technol. , vol.16 , Issue.1 , pp. 158-168
    • Chai, S.H.1    Liu, G.P.2    Rees, D.3    Xia, Y.Q.4
  • 32
    • 44349160270 scopus 로고    scopus 로고
    • Event-driven networked predictive control
    • Jun
    • W. S. Hu, G. P. Liu, and D. Rees, "Event-driven networked predictive control," IEEE Trans. Ind. Electron., vol. 54, no. 3, pp. 1603-1613, Jun. 2007.
    • (2007) IEEE Trans. Ind. Electron. , vol.54 , Issue.3 , pp. 1603-1613
    • Hu, W.S.1    Liu, G.P.2    Rees, D.3
  • 33
    • 0036857323 scopus 로고    scopus 로고
    • Stability analysis and control synthesis for switched systems: A switched Lyapunov function approach
    • DOI 10.1109/TAC.2002.804474
    • J. Daafouz, P. Riedinger, and C. Iung, "Stability analysis and control synthesis for switched systems: A switched Lyapunov function approach," IEEE Trans. Autom. Control, vol. 47, no. 11, pp. 1883-1887, Nov. 2002. (Pubitemid 35422587)
    • (2002) IEEE Transactions on Automatic Control , vol.47 , Issue.11 , pp. 1883-1887
    • Daafouz, J.1    Riedinger, P.2    Iung, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.