How can we make resilient decision under malicious environments?
The research on the security of CPS is essential to guarantee the normal operation of CPS. For denial-of-service (DoS) attacks, we studied the optimal DoS attack schedule problem (ASP) and showed that the optimal strategy is a sequential attack scheme. For deception attacks, we investigated linear-deception ASP for a single system and multiple subsystems, respectively. Moreover, we addressed the optimal cooperative ASP of DoS attacks and deception attacks in the multiple-attacker case. This work expanded the existing results in which only one type of attacker was included. For multiple linear systems with a multi-channel network, we formulated a zero-sum game model to describe the interactive decision-making process between DoS attacker and smart sensors and developed a Nash Q-learning algorithm to solve their Nash equilibrium strategies (NES).
The structure of cyber-physical systems.
References
2022
Auto
Neural Network-based Control for RRP-based Networked Systems under DoS Attacks with Power Interval
Junhui Zhang, Qing-Guo Wang, Tshilidzi Marwala, and 1 more author
@article{zhang2022neural,title={Neural Network-based Control for RRP-based Networked Systems under DoS Attacks with Power Interval},author={Zhang, Junhui and Wang, Qing-Guo and Marwala, Tshilidzi and Sun, Jitao},journal={Automatica},volume={145},pages={110555},year={2022},publisher={Elsevier}}
IEEE TSMCS
Stochastic Game in Linear Quadratic Gaussian Control for Wireless Networked Control Systems under DoS Attacks
Junhui Zhang, Jitao Sun, and Chengcui Zhang
IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2022
@article{zhang2022stochastic,title={Stochastic Game in Linear Quadratic Gaussian Control for Wireless Networked Control Systems under DoS Attacks},author={Zhang, Junhui and Sun, Jitao and Zhang, Chengcui},journal={IEEE Transactions on Systems, Man, and Cybernetics: Systems},volume={52},number={2},pages={902--910},year={2022},publisher={IEEE}}
2021
IEEE TSP
Optimal Stealthy Linear-Attack Schedules on Remote State Estimation
@article{zhang2021optimal1,title={Optimal Stealthy Linear-Attack Schedules on Remote State Estimation},author={Zhang, Junhui and Sun, Jitao},journal={IEEE Transactions on Signal Processing},volume={69},pages={2807--2817},year={2021},publisher={IEEE}}
Auto
Optimal DoS Attack Schedules on Remote State Estimation under Multi-Sensor Round-Robin Protocol
@article{zhang2021optimal2,title={Optimal DoS Attack Schedules on Remote State Estimation under Multi-Sensor Round-Robin Protocol},author={Zhang, Junhui and Sun, Jitao and Lin, Hai},journal={Automatica},volume={127},pages={109517},year={2021},publisher={Elsevier}}
2020
SCL
Optimal Cooperative Multiple-Attackers Scheduling against Remote State Estimation of Cyber-Physical Systems
@article{zhang2020optimal,title={Optimal Cooperative Multiple-Attackers Scheduling against Remote State Estimation of Cyber-Physical Systems},author={Zhang, Junhui and Sun, Jitao},journal={Systems \& Control Letters},volume={144},pages={104771},year={2020},publisher={Elsevier}}
2019
SCL
A Game Theoretic Approach to Multi-Channel Transmission Scheduling for Multiple Linear Systems under DoS Attacks
@article{zhang2019game,title={A Game Theoretic Approach to Multi-Channel Transmission Scheduling for Multiple Linear Systems under DoS Attacks},author={Zhang, Junhui and Sun, Jitao},journal={Systems \& Control Letters},volume={133},pages={104546},year={2019},publisher={Elsevier}}