A Hierarchical Game Approach to the Coupled Resilient Control of CPS against Denial-of-Service Attack

Peng Zhang, Yuan Yuan, Zidong Wang, Chong Sun

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

6 Scopus citations

Abstract

In this paper, the resilient control problem has been studied for cyber-physical systems (CPSs) under the Denial-of-Service (DoS) attack. The term resilience is interpreted as the ability to be robust to the physical layer external disturbance and defending against cyber layer DoS attacks. The overall resilient control system is described by a hierarchical game, where the cyber security issue is modeled as a zerosum matrix game, and physical H∞ minimax control problem is described by a zero-sum dynamic game. In virtue of the reinforcement learning method, the defense/attack policy in the cyber layer can be obtained. Additionally, the physical layer control strategy can be obtained by using the dynamical programming method. The criteria to judge whether a cyber system is capable of protecting the underlying control system are provided as well. Finally, the proposed method is verified by a numerical example.

Original languageEnglish
Title of host publication2019 IEEE 15th International Conference on Control and Automation, ICCA 2019
PublisherIEEE Computer Society
Pages15-20
Number of pages6
ISBN (Electronic)9781728111643
DOIs
StatePublished - Jul 2019
Externally publishedYes
Event15th IEEE International Conference on Control and Automation, ICCA 2019 - Edinburgh, United Kingdom
Duration: 16 Jul 201919 Jul 2019

Publication series

NameIEEE International Conference on Control and Automation, ICCA
Volume2019-July
ISSN (Print)1948-3449
ISSN (Electronic)1948-3457

Conference

Conference15th IEEE International Conference on Control and Automation, ICCA 2019
Country/TerritoryUnited Kingdom
CityEdinburgh
Period16/07/1919/07/19

Fingerprint

Dive into the research topics of 'A Hierarchical Game Approach to the Coupled Resilient Control of CPS against Denial-of-Service Attack'. Together they form a unique fingerprint.

Cite this