Skip to main navigation Skip to search Skip to main content

An Optimal Sliding Mode Controller Against False Data Injection Attacks

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

This paper investigates the optimal discrete sliding mode control problem of cyber-physical systems, actuators of which are intercepted by false data injection attacks. Although false data injection attacks can be regarded as matched input uncertainties, some existing sliding mode control schemes cannot be directly applied since attacks may not satisfy some properties of uncertainties, for example, the smoothness condition. In the design process, the linear quadratic optimal control is combined to design an optimal sliding mode surface, based on which an optimal discrete-time sliding mode controller is derived by using a modified Gao's reaching law. To implement such a control scheme, an estimator is introduced to estimate false data injection attacks. Finally, a numerical example is given to validate the effectiveness of the proposed secure controller.

Original languageEnglish
Title of host publicationProceedings of 2022 IEEE 11th Data Driven Control and Learning Systems Conference, DDCLS 2022
EditorsMingxuan Sun, Zengqiang Chen
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages102-107
Number of pages6
ISBN (Electronic)9781665496759
DOIs
StatePublished - 2022
Event11th IEEE Data Driven Control and Learning Systems Conference, DDCLS 2022 - Emeishan, China
Duration: 3 Aug 20225 Aug 2022

Publication series

NameProceedings of 2022 IEEE 11th Data Driven Control and Learning Systems Conference, DDCLS 2022

Conference

Conference11th IEEE Data Driven Control and Learning Systems Conference, DDCLS 2022
Country/TerritoryChina
CityEmeishan
Period3/08/225/08/22

Keywords

  • Cyber-Physical Systems
  • False Data Injection Attacks
  • Optimal Sliding Mode Control

Fingerprint

Dive into the research topics of 'An Optimal Sliding Mode Controller Against False Data Injection Attacks'. Together they form a unique fingerprint.

Cite this