Design Method of ICPS Comprehensive Security Controller With Multi-Target Constraints and DoS Intrusion Tolerance Capability Driven by Double End ADETCS
With a focus on industrial cyber-physical systems (ICPSs) that are subject to dual-ended denial-of-service (DoS) attacks and actuator faults, and in the context of a double-ended adaptive discrete event-triggered communication scheme (ADETCS), we study the design method of ICPS comprehensive securit...
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IEEE
2025-01-01
|
| Series: | IEEE Access |
| Subjects: | |
| Online Access: | https://ieeexplore.ieee.org/document/10988835/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849728013440122880 |
|---|---|
| author | Yajie Li Feiping Wang |
| author_facet | Yajie Li Feiping Wang |
| author_sort | Yajie Li |
| collection | DOAJ |
| description | With a focus on industrial cyber-physical systems (ICPSs) that are subject to dual-ended denial-of-service (DoS) attacks and actuator faults, and in the context of a double-ended adaptive discrete event-triggered communication scheme (ADETCS), we study the design method of ICPS comprehensive security controller with multi-target constraints. Firstly, a novel double-ended ADETCS is designed to double-screening the transmitted data on both the sensing and execution sides, and a comprehensive security control architecture based on ICPSs with multi-objective constraints that can simultaneously resist dual-ended DoS attacks and actuator failures has been constructed. Secondly, on the sensing side, a method based on integration of data driven and model mechanisms is used to deal with DoS attacks with different levels of severity. On the execution side, a Principal Component Analysis - Long Short-Term Memory (PCA-LSTM) data-driven method is used to reconstruct and compensate the lost data caused by DoS attacks. Thirdly, by introducing multi-target constraints, such as <inline-formula> <tex-math notation="LaTeX">$\alpha $ </tex-math></inline-formula>-stability and <inline-formula> <tex-math notation="LaTeX">$H_{\infty }$ </tex-math></inline-formula> performance index, and based on the constructed Lyapunov-Krascovskii function, a cooperative design method is derived for the observer and the comprehensive security controller under multi-target constraints. Finally, the effectiveness and practicability of the proposed method are verified by a simulation experiment involving an industrial four-capacity water tank. The results indicate that the integration method of data driven and model mechanisms enhances the ability of ICPSs to resist dual-ended DoS attacks, and the double-ended ADETCS further saves network communication resources. |
| format | Article |
| id | doaj-art-e63c98e244f146cd95d9201afa4b1fe8 |
| institution | DOAJ |
| issn | 2169-3536 |
| language | English |
| publishDate | 2025-01-01 |
| publisher | IEEE |
| record_format | Article |
| series | IEEE Access |
| spelling | doaj-art-e63c98e244f146cd95d9201afa4b1fe82025-08-20T03:09:42ZengIEEEIEEE Access2169-35362025-01-0113830048302110.1109/ACCESS.2025.356744410988835Design Method of ICPS Comprehensive Security Controller With Multi-Target Constraints and DoS Intrusion Tolerance Capability Driven by Double End ADETCSYajie Li0Feiping Wang1https://orcid.org/0009-0007-8342-8406School of Electrical Engineering and Information Engineering, Lanzhou University of Technology, Lanzhou, Gansu, ChinaSchool of Electrical Engineering and Information Engineering, Lanzhou University of Technology, Lanzhou, Gansu, ChinaWith a focus on industrial cyber-physical systems (ICPSs) that are subject to dual-ended denial-of-service (DoS) attacks and actuator faults, and in the context of a double-ended adaptive discrete event-triggered communication scheme (ADETCS), we study the design method of ICPS comprehensive security controller with multi-target constraints. Firstly, a novel double-ended ADETCS is designed to double-screening the transmitted data on both the sensing and execution sides, and a comprehensive security control architecture based on ICPSs with multi-objective constraints that can simultaneously resist dual-ended DoS attacks and actuator failures has been constructed. Secondly, on the sensing side, a method based on integration of data driven and model mechanisms is used to deal with DoS attacks with different levels of severity. On the execution side, a Principal Component Analysis - Long Short-Term Memory (PCA-LSTM) data-driven method is used to reconstruct and compensate the lost data caused by DoS attacks. Thirdly, by introducing multi-target constraints, such as <inline-formula> <tex-math notation="LaTeX">$\alpha $ </tex-math></inline-formula>-stability and <inline-formula> <tex-math notation="LaTeX">$H_{\infty }$ </tex-math></inline-formula> performance index, and based on the constructed Lyapunov-Krascovskii function, a cooperative design method is derived for the observer and the comprehensive security controller under multi-target constraints. Finally, the effectiveness and practicability of the proposed method are verified by a simulation experiment involving an industrial four-capacity water tank. The results indicate that the integration method of data driven and model mechanisms enhances the ability of ICPSs to resist dual-ended DoS attacks, and the double-ended ADETCS further saves network communication resources.https://ieeexplore.ieee.org/document/10988835/Industrial cyber-physical systems (ICPSs)double-ended adaptive discrete event-triggered communication schememulti-target constraintsintegration of data driven and model mechanismsprediction and compensation reconstruction |
| spellingShingle | Yajie Li Feiping Wang Design Method of ICPS Comprehensive Security Controller With Multi-Target Constraints and DoS Intrusion Tolerance Capability Driven by Double End ADETCS IEEE Access Industrial cyber-physical systems (ICPSs) double-ended adaptive discrete event-triggered communication scheme multi-target constraints integration of data driven and model mechanisms prediction and compensation reconstruction |
| title | Design Method of ICPS Comprehensive Security Controller With Multi-Target Constraints and DoS Intrusion Tolerance Capability Driven by Double End ADETCS |
| title_full | Design Method of ICPS Comprehensive Security Controller With Multi-Target Constraints and DoS Intrusion Tolerance Capability Driven by Double End ADETCS |
| title_fullStr | Design Method of ICPS Comprehensive Security Controller With Multi-Target Constraints and DoS Intrusion Tolerance Capability Driven by Double End ADETCS |
| title_full_unstemmed | Design Method of ICPS Comprehensive Security Controller With Multi-Target Constraints and DoS Intrusion Tolerance Capability Driven by Double End ADETCS |
| title_short | Design Method of ICPS Comprehensive Security Controller With Multi-Target Constraints and DoS Intrusion Tolerance Capability Driven by Double End ADETCS |
| title_sort | design method of icps comprehensive security controller with multi target constraints and dos intrusion tolerance capability driven by double end adetcs |
| topic | Industrial cyber-physical systems (ICPSs) double-ended adaptive discrete event-triggered communication scheme multi-target constraints integration of data driven and model mechanisms prediction and compensation reconstruction |
| url | https://ieeexplore.ieee.org/document/10988835/ |
| work_keys_str_mv | AT yajieli designmethodoficpscomprehensivesecuritycontrollerwithmultitargetconstraintsanddosintrusiontolerancecapabilitydrivenbydoubleendadetcs AT feipingwang designmethodoficpscomprehensivesecuritycontrollerwithmultitargetconstraintsanddosintrusiontolerancecapabilitydrivenbydoubleendadetcs |