Artificial intelligence for detection, estimation, and compensation of malicious attacks in nonlinear cyber-physical systems and industrial IoT

Faezeh Farivar*, Mohammad Sayad Haghighi, Alireza Jolfaei, Mamoun Alazab

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

217 Citations (Scopus)

Abstract

This article proposes a hybrid intelligent-classic control approach for reconstruction and compensation of cyber attacks launched on inputs of nonlinear cyber-physical systems (CPS) and industrial Internet of Things systems, which work through shared communication networks. In this article, a class of n-order nonlinear systems is considered as a model of CPS while it is in presence of cyber attacks only in the forward channel. An intelligent-classic control system is developed to compensate cyber-attacks. Neural network (NN) is designed as an intelligent estimator for attack estimation and a classic nonlinear control system based on the variable structure control method is designed to compensate the effect of attacks and control the system performance in tracking applications. In the proposed strategy, nonlinear control theory is applied to guarantee the stability of the system when attacks happen. In this strategy, a Gaussian radial basis function NN is used for online estimation and reconstruction of cyber-attacks launched on the networked system. An adaptation law of the intelligent estimator is derived from a Lyapunov function. Simulation results demonstrate the validity and feasibility of the proposed strategy in car cruise control application as the testbed.

Original languageEnglish
Pages (from-to)2716-2725
Number of pages10
JournalIEEE Transactions on Industrial Informatics
Volume16
Issue number4
DOIs
Publication statusPublished - Apr 2020

Keywords

  • Cyber physical system (CPS)
  • intelligent estimator
  • Internet of Things (IoT)
  • intrusion
  • neural network (NN)
  • nonlinear control
  • security

Fingerprint

Dive into the research topics of 'Artificial intelligence for detection, estimation, and compensation of malicious attacks in nonlinear cyber-physical systems and industrial IoT'. Together they form a unique fingerprint.

Cite this