Resilient networking and cyber attack detection in cyber-physical systems가상 물리 시스템에 대한 강인한 네트워킹 및 가상 공격 탐지

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 605
  • Download : 0
The threats on cyber-physical system have changed much into a level of sophistication that elude the traditional security and protection methods. A paradigm shift is necessary to incorporate a proactive approach on top the reactive protection methods employed in dealing with the evolving threats. This work addresses a proactive and reactive approaches to the cyber security of a formation flying UAVs. In the proactive approach, resilient formation control of UAVs in the presence of non-cooperative (defective or malicious) UAVs are presented. The problem of network resilient consensus in the presence of misbehaving nodes based on local information is dealt with fault-tolerant consensus algorithm. In the proposed framework, a graph-theoretic property of network robustness conveying the notion of a direct information exchange between two sets of UAVs in the network is introduced to analyze the behavior and convergence of the distributed consensus algorithm. A distributed control policy is developed to maintain the network connectivity threshold to satisfy the topological requirement put forward for the resiliency of the consensus algorithm. The reactive approach deals with attack/fault detection and isolation of the compromised UAV in the network. In the multi-agent formation control, fault detection and Isolation (FDI) in control systems theory is used to detect and isolate the malicious agents using only local information. In this aspect, a bank of Unknown Input Observer (UIO) based distributed fault detection schemes, along with a rule based on residuals generated using the bank of UIOs, are proposed to detect the attacks and to identify the compromised UAV in the formation. Furthermore, an algorithm is developed to remove the faulty UAV from the network and isolate the compromised UAV once an attack is detected, while maintaining the flight formation with a missing UAV node. Various numerical examples are presented to show the applicability of both proactive and reactive approach used in deal with the cyber attack treat on a formation flying UAVs.
Advisors
Choi, Han-Limresearcher최한림researcher
Description
한국과학기술원 :항공우주공학과,
Publisher
한국과학기술원
Issue Date
2018
Identifier
325007
Language
eng
Description

학위논문(박사) - 한국과학기술원 : 항공우주공학과, 2018.8,[vi, 93 p. :]

Keywords

cyber attack▼acyber-physical system▼aresilient network▼aresilient formation▼aformation control▼afault detection and isolation (FDI)▼aUIO▼aUAVs; 가상 공격▼a가상 물리 시스템▼aresilient 네트워크▼aresilient 편대 제어▼a결함 탐지 및 격리 (FDI)▼aUIO▼aUAVs

URI
http://hdl.handle.net/10203/265433
Link
http://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=828247&flag=dissertation
Appears in Collection
AE-Theses_Ph.D.(박사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0