Design Method of ICPS Comprehensive Security Controller With Multi-Target Constraints and DoS Intrusion Tolerance Capability Driven by Double End ADETCS

With a focus on industrial cyber-physical systems (ICPSs) that are subject to dual-ended denial-of-service (DoS) attacks and actuator faults, and in the context of a double-ended adaptive discrete event-triggered communication scheme (ADETCS), we study the design method of ICPS comprehensive securit...

Full description

Saved in:
Bibliographic Details
Main Authors: Yajie Li, Feiping Wang
Format: Article
Language:English
Published: IEEE 2025-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10988835/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849728013440122880
author Yajie Li
Feiping Wang
author_facet Yajie Li
Feiping Wang
author_sort Yajie Li
collection DOAJ
description With a focus on industrial cyber-physical systems (ICPSs) that are subject to dual-ended denial-of-service (DoS) attacks and actuator faults, and in the context of a double-ended adaptive discrete event-triggered communication scheme (ADETCS), we study the design method of ICPS comprehensive security controller with multi-target constraints. Firstly, a novel double-ended ADETCS is designed to double-screening the transmitted data on both the sensing and execution sides, and a comprehensive security control architecture based on ICPSs with multi-objective constraints that can simultaneously resist dual-ended DoS attacks and actuator failures has been constructed. Secondly, on the sensing side, a method based on integration of data driven and model mechanisms is used to deal with DoS attacks with different levels of severity. On the execution side, a Principal Component Analysis - Long Short-Term Memory (PCA-LSTM) data-driven method is used to reconstruct and compensate the lost data caused by DoS attacks. Thirdly, by introducing multi-target constraints, such as <inline-formula> <tex-math notation="LaTeX">$\alpha $ </tex-math></inline-formula>-stability and <inline-formula> <tex-math notation="LaTeX">$H_{\infty }$ </tex-math></inline-formula> performance index, and based on the constructed Lyapunov-Krascovskii function, a cooperative design method is derived for the observer and the comprehensive security controller under multi-target constraints. Finally, the effectiveness and practicability of the proposed method are verified by a simulation experiment involving an industrial four-capacity water tank. The results indicate that the integration method of data driven and model mechanisms enhances the ability of ICPSs to resist dual-ended DoS attacks, and the double-ended ADETCS further saves network communication resources.
format Article
id doaj-art-e63c98e244f146cd95d9201afa4b1fe8
institution DOAJ
issn 2169-3536
language English
publishDate 2025-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj-art-e63c98e244f146cd95d9201afa4b1fe82025-08-20T03:09:42ZengIEEEIEEE Access2169-35362025-01-0113830048302110.1109/ACCESS.2025.356744410988835Design Method of ICPS Comprehensive Security Controller With Multi-Target Constraints and DoS Intrusion Tolerance Capability Driven by Double End ADETCSYajie Li0Feiping Wang1https://orcid.org/0009-0007-8342-8406School of Electrical Engineering and Information Engineering, Lanzhou University of Technology, Lanzhou, Gansu, ChinaSchool of Electrical Engineering and Information Engineering, Lanzhou University of Technology, Lanzhou, Gansu, ChinaWith a focus on industrial cyber-physical systems (ICPSs) that are subject to dual-ended denial-of-service (DoS) attacks and actuator faults, and in the context of a double-ended adaptive discrete event-triggered communication scheme (ADETCS), we study the design method of ICPS comprehensive security controller with multi-target constraints. Firstly, a novel double-ended ADETCS is designed to double-screening the transmitted data on both the sensing and execution sides, and a comprehensive security control architecture based on ICPSs with multi-objective constraints that can simultaneously resist dual-ended DoS attacks and actuator failures has been constructed. Secondly, on the sensing side, a method based on integration of data driven and model mechanisms is used to deal with DoS attacks with different levels of severity. On the execution side, a Principal Component Analysis - Long Short-Term Memory (PCA-LSTM) data-driven method is used to reconstruct and compensate the lost data caused by DoS attacks. Thirdly, by introducing multi-target constraints, such as <inline-formula> <tex-math notation="LaTeX">$\alpha $ </tex-math></inline-formula>-stability and <inline-formula> <tex-math notation="LaTeX">$H_{\infty }$ </tex-math></inline-formula> performance index, and based on the constructed Lyapunov-Krascovskii function, a cooperative design method is derived for the observer and the comprehensive security controller under multi-target constraints. Finally, the effectiveness and practicability of the proposed method are verified by a simulation experiment involving an industrial four-capacity water tank. The results indicate that the integration method of data driven and model mechanisms enhances the ability of ICPSs to resist dual-ended DoS attacks, and the double-ended ADETCS further saves network communication resources.https://ieeexplore.ieee.org/document/10988835/Industrial cyber-physical systems (ICPSs)double-ended adaptive discrete event-triggered communication schememulti-target constraintsintegration of data driven and model mechanismsprediction and compensation reconstruction
spellingShingle Yajie Li
Feiping Wang
Design Method of ICPS Comprehensive Security Controller With Multi-Target Constraints and DoS Intrusion Tolerance Capability Driven by Double End ADETCS
IEEE Access
Industrial cyber-physical systems (ICPSs)
double-ended adaptive discrete event-triggered communication scheme
multi-target constraints
integration of data driven and model mechanisms
prediction and compensation reconstruction
title Design Method of ICPS Comprehensive Security Controller With Multi-Target Constraints and DoS Intrusion Tolerance Capability Driven by Double End ADETCS
title_full Design Method of ICPS Comprehensive Security Controller With Multi-Target Constraints and DoS Intrusion Tolerance Capability Driven by Double End ADETCS
title_fullStr Design Method of ICPS Comprehensive Security Controller With Multi-Target Constraints and DoS Intrusion Tolerance Capability Driven by Double End ADETCS
title_full_unstemmed Design Method of ICPS Comprehensive Security Controller With Multi-Target Constraints and DoS Intrusion Tolerance Capability Driven by Double End ADETCS
title_short Design Method of ICPS Comprehensive Security Controller With Multi-Target Constraints and DoS Intrusion Tolerance Capability Driven by Double End ADETCS
title_sort design method of icps comprehensive security controller with multi target constraints and dos intrusion tolerance capability driven by double end adetcs
topic Industrial cyber-physical systems (ICPSs)
double-ended adaptive discrete event-triggered communication scheme
multi-target constraints
integration of data driven and model mechanisms
prediction and compensation reconstruction
url https://ieeexplore.ieee.org/document/10988835/
work_keys_str_mv AT yajieli designmethodoficpscomprehensivesecuritycontrollerwithmultitargetconstraintsanddosintrusiontolerancecapabilitydrivenbydoubleendadetcs
AT feipingwang designmethodoficpscomprehensivesecuritycontrollerwithmultitargetconstraintsanddosintrusiontolerancecapabilitydrivenbydoubleendadetcs