Next Article in Journal
Reduced-Order Model for Cell Volume Homeostasis: Application to Aqueous Humor Production
Previous Article in Journal
Rich Dynamics of Seasonal Carrying Capacity Prey-Predator Models with Crowley–Martin Functional Response
Previous Article in Special Issue
Data-Driven Fault Diagnosis in Water Pipelines Based on Neuro-Fuzzy Zonotopic Kalman Filters
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Cyber–Physical System Attack Detection and Isolation: A Takagi–Sugeno Approach

by
Angel R. Guadarrama-Estrada
,
Gloria L. Osorio-Gordillo
*,
Rodolfo A. Vargas-Méndez
,
Juan Reyes-Reyes
and
Carlos M. Astorga-Zaragoza
Tecnológico Nacional de México/CENIDET, Interior Internado Palmira S/N, Col. Palmira, Cuernavaca 62490, Morelos, Mexico
*
Author to whom correspondence should be addressed.
Math. Comput. Appl. 2025, 30(1), 12; https://doi.org/10.3390/mca30010012
Submission received: 3 December 2024 / Revised: 18 January 2025 / Accepted: 21 January 2025 / Published: 23 January 2025
(This article belongs to the Special Issue Numerical and Evolutionary Optimization 2024)

Abstract

:
This paper presents an approach for designing a generalized dynamic observer (GDO) aimed at detecting and isolating attack patterns that compromise the functionality of cyber–physical systems. The considered attack patterns include denial-of-service (DoS), false data injection (FDI), and random data injection (RDI) attacks. To model an attacker’s behavior and enhance the effectiveness of the attack patterns, Markovian logic is employed. The design of the generalized dynamic observer is grounded in the mathematical model of a system, incorporating its dynamics and potential attack scenarios. An attack-to-residual transfer function is utilized to establish the relationship between attack signals and the residuals generated by the observer, enabling effective detection and isolation of various attack schemes. A three-tank interconnected system, modeled under the discrete Takagi–Sugeno representation, is used as a case study to validate the proposed approach.

1. Introduction

Cyber–physical systems (CPSs) have applications in various engineering fields, including smart grids, water distribution systems, intelligent transportation, and industrial plants. The connectivity and integration of these systems offer numerous benefits by enabling remote monitoring and control of sensor measurements and control signals. However, the use of different communication architectures can also increase the vulnerability of the systems to cyber-attacks, which can cause human losses, economic and environmental damage, and disruptions in essential activities [1,2,3].
CPSs are composed of two primary layers: a physical layer and a cyber layer. The physical layer comprises sensors and actuators responsible for gathering information about a physical system’s behavior. In contrast, the cyber layer consists of a control network that determines the system’s behavior by making decisions and a communication infrastructure that transmits the acquired data and control signals to the actuators [4,5,6].
A cyber-attack is defined as the intervention of an external agent that adversely affects the behavior of the physical system. The literature identifies various types of attacks, including denial-of-service (DoS) attacks, replay attacks, zero-dynamics attacks, and false data injection (FDI) [7,8,9,10]. Addressing cyber-attacks in CPSs from a control perspective offers the advantage of modeling attack signals as disturbances to system operation. This approach facilitates the understanding of their behavior and enables strategies for predicting and mitigating their effects [11,12,13].
The Takagi–Sugeno (T-S) representation is an approach that is widely used in the field of automatic control to represent nonlinear systems using a set of fuzzy rules and local linear models associated with each rule. This allows for the design of robust and adaptive control strategies that can address uncertainties, disturbances, failures, or attacks directed at CPSs [14,15,16,17,18]. Several recent studies have addressed significant challenges in the field of CPSs. For instance, the authors of [9] investigate the H performance of discrete-time networked systems affected by network-induced delays (NIDs) and malicious packet dropouts (MPDs). This study highlights the critical impact of communication impairments on system stability and performance. Similarly, the authors of [6] propose an innovative approach to synchronizing master–slave neural networks using event-triggered mechanisms. These mechanisms effectively reduce data transmission over communication channels subject to stochastic attacks modeled by Markov processes. The proposed method leverages static output feedback and conditions formulated through linear matrix inequalities (LMIs), ensuring synchronization while minimizing resource utilization. These contributions underscore the importance of advanced modeling and control techniques to mitigate the vulnerabilities of CPSs in various disruptive scenarios.
Generalized dynamic observers (GDOs) are highly effective tools for detecting and isolating attack schemes in cyber–physical systems [19,20]. These structures offer significant advantages due to their additional degrees of freedom compared to other observers, such as proportional observers (POs) and proportional–integral observers (PIOs). This flexibility enables GDOs to achieve higher accuracy, especially under steady-state conditions. Unlike simpler observer designs, GDOs are particularly suited for systems with high nonlinearity or dynamic and complex attacks that require greater adaptability and robustness. This approach ensures that the observer can adapt to the specific characteristics of the system, enhancing its precision and robustness in attack detection and isolation.
One of the key strengths of GDOs lies in their adaptability. The flexibility offered by the design based on LMIs allows the incorporation of various performance criteria, such as robustness against noise, resilience to slowly varying attack signals, and the ability to handle complex system dynamics, including nonlinearities represented by T-S models.
In this work, a system of three interconnected tanks will be considered as a cyber–physical system due to its integration of physical and logical components that interact with each other. It should be noted that the three-tank system is susceptible to various attack schemes. Such systems are fundamental tools in chemical process engineering.
The main contribution of this paper is the design of a GDO to detect and isolate different attack schemes targeting the input of a CPS under the T-S representation. To ensure observer stability, various techniques (Lyapunov, elimination lemma, and Schur complement) will be used to solve LMIs. Additionally, a residual attack transfer function is used to isolate different attack scenarios.
To provide clarity and guide the reader, a brief description of the structure of the paper is included. Section 2 presents the problem formulation, detailing the mathematical modeling of a CPS within the T-S approach and incorporating potential attack scenarios. Section 3 describes the formulation of various attack schemes, including DoS, FDI, and RDI. Section 4 outlines the design of the GDO, emphasizing the role of residual attack transfer functions in detection and isolation. Section 5 provides an in-depth analysis of the stability of the proposed observer using the Lyapunov theory, the elimination lemma, and the Schur complement. Section 6 introduces a case study featuring a three-tank interconnected system modeled under the T-S framework, followed by simulation results to validate the proposed approach. Finally, Section 7 summarizes the conclusions and potential future research directions.

2. Problem Formulation

This section introduces a discrete-time nonlinear cyber–physical system under the Takagi–Sugeno (T-S) representation, an actuator attack model, a GDO structure, and a residual equation used for attack detection. The CPS is described as follows:
x ( k + 1 ) = i = 1 κ μ i ( x ( k ) ) ( A i x ( k ) ) + B u ( k ) + F a a a ( k ) , y ( k ) = C x ( k ) ,
where x ( k ) R n is the system state vector, u ( k ) R m is the input, and y ( k ) R p represents the measured output variables.
The system’s nonlinearity is represented through the matrices A i , which vary with the nonlinear operating points of the system. These points are characterized by the weighting functions μ i ( x ( k ) ) , which satisfy the following convex sum condition:
i = 1 κ μ i ( x ( k ) ) = 1 , μ i ( x ( k ) ) 0 , i { 1 , , κ } .
Here, κ = 2 s , where s denotes the number of nonlinearities in the system, and each A i corresponds to a local linear model associated with a specific operating region. The matrices A i R n × n , B R n × m , C R p × n , and F a R n × r are known.
The actuator attack a a ( k ) R r is defined as
a a ( k ) = α ( k ) a ( k ) ,
where α ( k ) refers to stochastic Markovian processes whose values lie between 0 and 1, and a ( k ) denotes the actuator attack. To enable the design of the generalized dynamic observer, it is assumed that the T-S cyber–physical system satisfies the following observability condition:
r a n k C C A i C A i n 1 = n .
Figure 1 shows the GDO structure used to detect attacks directed at the actuator.
This observer allows one to obtain the estimation of the residuals generated by different attack schemes applied to the cyber–physical system under the T-S representation.
Consider a GDO structure for System (1).
ζ ( k + 1 ) = i = 1 κ μ i ( x ( k ) ) [ N i ζ ( k ) + H i v ( k ) + F i y ( k ) ] + J u ( k ) ,
v ( k + 1 ) = i = 1 κ μ i ( x ( k ) ) [ S i ζ ( k ) + G i v ( k ) + M i y ( k ) ] ,
x ^ ( k ) = P ζ ( k ) + Q y ( k ) ,
where ζ ( k ) R q 0 represents the functional observer state vector, v ( k ) R q 1 is an auxiliary vector, and x ^ ( k ) R n is the observer estimation vector. N i , H i , F i , J , S i , M i , P , and Q are unknown matrices of appropriate dimensions.
The following is the residual equation used for the purpose of detecting and isolating attacks:
r ( k ) = W ( y ( k ) y ^ ( k ) ) ,
Lemma 1. 
There exists an observer of the form (5)–(7) for System (1) if and only if the following two statements are valid.
  • There exists a matrix T with appropriate dimensions such that the following conditions are satisfied:
    N i T + F i C T A i = 0 ,
    J = T B ,
    S i T + M i C = 0 ,
    P T + Q C = I n .
  • The matrix N i H i S i L i is stable i = 1 , , κ .
Consider a matrix T R q 0 × ( n + r ) to define the transformed error vector ε ( k ) = ζ ( k ) T ( k ) , whose dynamics can be expressed as follows:
ε ( k + 1 ) = ζ ( k + 1 ) T x ( k + 1 ) .
Solving for ζ ( k ) , the expression ζ ( k ) = ε ( k ) + T x ( k ) is acquired. Substituting ζ ( k ) into (13), the following is obtained:
ε ( k + 1 ) = 1 = i κ μ i ( x ( k ) ) [ N i ε ( k ) + ( N i T + F i C T A i ) = 0 x ( k ) + H i v ( k ) ] + ( J T B ) = 0 u ( k ) T F a a a ( k ) .
Subsequently, Equations (6) and (7) can be rewritten as follows:
v ( k + 1 ) = i = 1 κ μ i ( x ( k ) ) [ ( S i T + M i C ) = 0 x ( k ) + S i ε ( k ) + G i v ( t ) ] ,
x ^ ( k ) = P ε ( k ) + ( P T + Q C ) = I x ( k ) .
Thus, the residual equation takes the following form:
r ( k ) = W ( y ^ ( k ) y ( k ) ) , = W C ( x ^ ( k ) x ( k ) ) e ( k ) .
Then, the dynamics of the observation error formed by (15) and (15) can be written as follows:
ε ( k + 1 ) v ( k + 1 ) = N i H i S i G i ε ( k ) v ( k ) + T F a 0 a a ( k ) .
Now, the problem of attack isolation is reduced to determining the matrices N i , H i , F i , S i , G i , M i , P, Q, W, and T.

3. Formulation of Attack Schemes

In this section, the different attack schemes are defined.

3.1. Denial-of-Service (DoS) Attacks

DoS attacks are aimed at disrupting the transmission of information in control and monitoring systems. These attacks can be carried out through interference in communication channels, the overload of data packets on the network, or other similar means.
The cyber-attack schemes on actuators have the following form:
a ( k ) = u ( k ) .
Replacing the actuator attack of Equation (19) in (3) and using the system in Equation (1), the following system is obtained:
x ( k + 1 ) = 1 = i κ μ i ( x ( k ) ) [ A i x ( k ) ] + B u ( k ) α ( k ) F a u ( k ) , y ( k ) = C x ( k ) ,
where F a is a known matrix by the attacker with the dimensions of the matrix B. α ( k ) refers to Markovian stochastic processes that take values of 0 and 1.

3.2. False Data Injection (FDI) Attack

The purpose of these attacks is to affect the system’s operation through the manipulation of actuators. An actuator attack aims to alter the control signal that the system receives, generating instability in the system.
When System (1) is affected by a false data injection attack, the equation described in (3) should consider the following structure:
a ( k ) = u ( k ) + b a ( k ) ,
where b a ( k ) are deceptive data that the adversary tries to inject into the actuator. Substituting Equation (21) into (3) and, in turn, into (20), the following system is derived:
x ( k + 1 ) = 1 = i κ μ i ( x ( k ) ) [ A i x ( k ) ] + B u ( k ) α ( k ) F a u ( k ) + α ( k ) F a b a ( k ) , y ( k ) = C x ( k ) .

3.3. Random Data Injection (RDI) Attack

This type of attack aims to make the sensor reading or controller signal different from the real value. Recall that a random data injection attack assumes incomplete knowledge of the system being attacked, unlike an FDI attack. An RDI attack has the following form:
a ( k ) = ± b a ( k ) .
The positive and negative signs in Equation (23) are included because the effect of the random data injection can either add or subtract dynamics to the system, depending on the nature of the attack. This is due to the random nature of the attack scheme, which does not follow a fixed pattern and can, therefore, unpredictably alter the system’s input matrix. Substituting Equation (23) into (3) yields the following system:
x ( k + 1 ) = 1 = i κ μ i ( x ( k ) ) [ A i x ( k ) ] + B u ( k ) ± α ( k ) F a b a ( k ) , y ( k ) = C x ( k ) ,
Finally, the classification shown in Figure 2 is presented for the different attack schemes to be used. These schemes have been divided by type of attack, followed by a sub-classification based on the logic of the attack. Likewise, a more detailed classification has been made based on the location of the application of the attack scheme.

4. Design of the Generalized Dynamic Observer

This section undertakes the parameterization of the observer matrices alongside the formulation of a design targeting the detection and isolation of attacks.

4.1. Parameterization of the Observer

It is considered that the following conditions hold for Equations (15) and (16):
a ) N i T + F i C T A i = 0 , b ) J = T B , c ) S i T + M i C = 0 , d ) P T + Q C = I n .
We define a matrix E R q 0 × n of full row rank, Σ = E C and Ω = I n C . Conditions (c–d) can be written as follows:
S i M i P Q T C = 0 I n .
The necessary and sufficient conditions for (25) to have a solution are
r a n k T C = r a n k T C I n = n .
From [21], since r a n k Ω Σ = r a n k ( Ω ) = n , condition (26) is equivalent to the existence of two matrices T R q 0 × n and K R q 0 × p such that
T + K C = E ,
where E R q 0 × n is an arbitrary matrix such that r a n k E C = n .
Equation (27) can also be written as
T K Ω = E .
Using the particular solution to solve for the matrices T and K, the ensuing results are obtained:
T = E Ω + I n 0 , K = E Ω + 0 I p .
Considering matrix T from Equation (27) into condition a), it can be rewritten as
N i E + ( F i N i K ) K ˜ = T A i ,
where K ˜ i = F i N i K , and Equation (30) can be written as
N i K ˜ i E C Σ = T A i .
Using the general solution, the subsequent formulation is derived for matrices N i and K ˜ i .
N i = T A i Σ + I q 0 0 N i 1 Y i 1 ( I q 0 + p Σ Σ + ) I q 0 0 N 2 ,
K ˜ i = T A i Σ + 0 I p K ˜ i 1 Y i 1 ( I q 0 + p Σ Σ + ) 0 I p K ˜ 2 ,
where Y i 1 is a matrix of appropriate dimensions with arbitrary elements.
From Equation (30), we can deduce the value of matrix F i as follows:
F i = K ˜ i 1 + N i K , = K ˜ i 1 Y i 1 K ˜ 2 + N i 1 K Y i 1 N 2 K , = F i 1 Y i 1 F 2 ,
where F i 1 = T A i Σ + K I p and F 2 = ( I q 0 + p Σ Σ + ) K I p . To obtain the matrices S i , M i , P , and Q, we consider the following equation and incorporate it into (25):
T C = I q 0 K 0 I p E C Σ ,
resulting in the following expression:
S i M i P Q I q 0 K 0 I p Σ = 0 I n ,
which has the following general solution:
S i M i P Q I q 0 K 0 I p = 0 I n Σ + W i 1 W 2 ( I q 0 + p Σ Σ + ) ,
where W i 1 and W 2 are matrices of appropriate dimensions with arbitrary elements. Then, the matrices S i , M i , P, and Q can be written as
S i = W i 1 N 2 ,
M i = W i 1 F 2 ,
P = Σ + I q 0 0 W 2 N 2 ,
Q = Σ + K I p W 2 F 2 .
By employing (32) and (38), the error dynamics (18) are expressed as
φ ( k + 1 ) = ( A i 1 Y i A 2 ) φ ( k ) + B a a ( k ) ,
where A i 1 = N 1 0 0 0 , A 2 = N 2 0 0 I q 1 , B = T F a 0 , Y i = Y i 1 H i W i 1 G i and φ ( k ) = ε ( k ) v ( k ) .
Finally, the system residue is as follows:
r ( k ) = W C P 0 C ε ( k ) v ( k ) ,
where, without loss of generality, W 2 = 0 is taken for simplicity.

4.2. Design of the Attack Detection and Isolation Observer

The objective of attack isolation in this article is to obtain a residual attack transfer function equal to a diagonal in order to deal with attacks that may occur simultaneously.
To carry out attack detection and isolation, it is necessary to represent Equations (42) and (43) in transfer function form, where G z is a transfer function from the attack a a ( k ) to the residual r ( k ) :
G z = A i 1 Y i A 2 B W C 0 .
The next step involves proposing a transfer function that has an input–output dependence, where the desired behavior is that when there is a change in an input, only one output reacts.
Proposition 1. 
The transfer function (44) can be diagonalized if and only if ( C B ) has a full column, i.e., p r .
Proposition 1 verifies the output separability condition, which means that to isolate r attacks, it is required to measure p outputs.
The following theorem shows how to design an observer of the form (5)–(7) to isolate attacks.
Theorem 1. 
Consider that p r and let
Λ = d i a g ( λ 1 , , λ r ) R r × r , 1 < λ i < 1 ,
Γ = d i a g ( γ 1 , , γ r ) R r × r , | γ i | > 0 , i = 1 , r ,
be given. Then, there exist matrices Y i and W such that
( A i 1 Y i A 2 ) B = B Λ ,
W C B = Γ ,
Then, the solutions of matrices Y i and W are given by
Y i = ( A i 1 B B Λ ) ( A 2 B ) + Z i ( I ( A 2 B ) ( A 2 B ) + ) ,
W = Γ ( C B ) + ,
where Z i is an arbitrary matrix of appropriate dimensions.
If there exist matrices Y i and W satisfying (47) and (48), then
G z = Λ I Γ 0 , = d i a g γ 1 z λ 1 , , γ r z λ r ,
Proof. 
Consider that CB has full column rank, and hence, for B , there exists a matrix completion B such that
B ˜ = B B is a nonsingular matrix that allows
B ˜ 1 = B ˜ 1 B ˜ 2 T . Thus, the following expression is obtained:
G z = B ˜ 1 ( A i 1 Y i A 2 ) B ˜ B ˜ 1 B W C B ˜ 0 ,
= B ˜ 1 T B ˜ 2 T ( A i 1 Y i A 2 ) B B B ˜ 1 T B ˜ 2 T B W C B B 0 ,
= B ˜ 1 T ( A i 1 Y i A 2 ) B B ˜ 1 T ( A i 1 Y i A 2 ) B I q 0 + q 1 B ˜ 2 T ( A i 1 Y i A 2 ) B B ˜ 2 T ( A i 1 Y i A 2 ) B 0 W CB W CB 0 .
We consider B ˜ 1 B ˜ 2 T B B = I 2 ( q 0 + q 1 ) to obtain
G z = B ˜ 1 T ( A i 1 Y i A 2 ) B B ˜ 1 T ( A i 1 Y i A 2 ) B I q 0 + q 1 0 B ˜ 2 T ( A i 1 Y i A 2 ) B 0 W CB W CB 0 .
Removing an uncontrollable subspace, the following result is obtained:
G z = Λ I r Γ 0 .
From (56), we find that
( A i 1 Y i A 2 ) B = B Λ ,
W C B = Γ ,
Then, from (57), the general solution of matrix Y i is given by
Y i = ( A i 1 B B Λ ) ( A 2 B ) + Z i ( I ( A 2 B ) ( A 2 B ) + ) ,
where Z i is an arbitrary matrix of appropriate dimensions. From (58), the particular solution of W is
W = Γ ( C B ) + ,
Substituting Equations (59) and (60) into Equation (42) yields
φ ( k + 1 ) = [ A i 1 ( A i 1 B B Λ ) ( A 2 B ) + A 2 A ¯ i 1 +
Z i ( I ( A 2 B ) ( A 2 B ) + ) A 2 A ¯ 2 ] φ ( k ) + B a a ( k ) ,
r ( k ) = Γ ( C B + ) C φ ( k ) .
Equations (61) and (62) can be rewritten as
φ ( k + 1 ) = ( A ¯ i 1 + Z i A ¯ 2 ) φ ( k ) + B a a ( k ) ,
r ( k ) = Γ ( C B ) + C φ ( k ) ,
The problem is now to find the matrix Z i such that (42) is stable.

5. Observer Stability Analysis

In this section, an observer stability analysis is carried out. Consider the following Lyapunov function:
V ( φ ( k ) ) = φ T ( k ) X φ ( k ) > 0 ,
where X = X 1 0 0 X 2 > 0 , with X 1 R q 0 × q 0 and X 2 R q 1 × q 1 . The difference in V ( φ ( k ) ) is
Δ V ( φ ( k ) ) = φ T ( k + 1 ) X φ ( k + 1 ) φ T ( k ) X φ ( k ) < 0 ,
= φ T ( k ) ( A ¯ i 1 Z i A ¯ 2 ) T X ( A ¯ i 1 Z i A ¯ 2 ) X φ ( k ) < 0 .
The inequality Δ V ( φ ( k ) ) < 0 holds for all φ ( k ) 0 if and only if
( A ¯ i 1 Z i A ¯ 2 ) T X ( A ¯ i 1 Z i A ¯ 2 ) X < 0 .
Considering the Schur complement [22], the inequality (68) is equivalent to
X ( A ¯ i 1 Z i A ¯ 2 ) T X X ( A ¯ i 1 Z i A ¯ 2 ) X < 0 ,
which can be rewritten as
C X i D + ( C X i D ) T + E i < 0 ,
where E i = X A ¯ i 1 T X X A ¯ i 1 X , C = 0 I , D = A ¯ 2 0 , and X i = X Z i .
According to the elimination lemma, inequality (70) is equivalent to the following two conditions [23]:
C E i C T < 0 ,
D T E i D T T < 0 .
Replacing matrices C = [ I 0 ] , E i = X 1 0 Π a T 0 0 X 2 0 0 Π a 0 X 1 0 0 0 0 X 2 , where Π a = N 1 + ( T F a Λ N 1 T F a ) ( N 2 T F a ) + N 2 , and the inequality X > 0 is obtained.
From (72), D T = Π b T 0 0 0 0 0 I 0 0 0 0 I where Π b = N 2 ( N 2 T F a ) ( N 2 T F a ) + N 2 , and matrix E i , the following result is obtained:
Π b T X 1 Π b T T Π b T Π a T 0 Π a Π b T T X 1 0 0 0 X 2 < 0 .
Then, the matrix X i in (70) can be obtained as follows:
X i = C r + K i D l + + Z C r + C r Z D l D l + ,
where Z is an arbitrary matrix of appropriate dimensions, and ( D l , D r ) and ( C l , C r ) represent complete rank constituents of C and D , respectively. This arrangement holds such that C = C l C r and D = D l D r .
The matrices K i , S i , and V i are obtained as follows:
K i = R 1 C l T V i D r T ( D r V i D r T ) 1 + S i 1 2 L ( D r V i D r T ) 1 2 ,
S i = R 1 R 1 C l T [ V i V i D r T ( D r V i D r T ) 1 D r V i ] C l R 1 ,
V i = ( C l R 1 C l T E i ) 1 > 0 ,
where L and R are arbitrary matrices satisfying | | L | | < 1 and R > 0 such that V i is positive definite.
Matrix Z i is parameterized as follows:
Z i = X 1 X i .
To summarize the stability analysis, it is necessary to ensure the feasibility of the solution of inequalities (71) and (72) to obtain a matrix X > 0 ; then, using (74)–(77), matrix X i must be determined from (70) to finally obtain matrix Z i from (78).

6. Case Study

Model of an Three-Tank Interconnected System

Interconnected tank systems are a fundamental tool in chemical process engineering. These systems consist of several tanks that are interconnected through pipes and valves. The aim of these systems is to control the liquid level in the tanks, as shown in Figure 3.
The interconnected three-tank system [24] is characterized by the following set of three differential equations:
x 1 ( k + 1 ) = x 1 ( k ) T d S a [ a z 1 S n 2 g ( x 1 ( k ) x 3 ( k ) ) ] + T d S a Q 1 ( k ) , x 2 ( k + 1 ) = x 2 ( k ) + T d S a [ a z 3 S n 2 g ( x 1 ( k ) x 3 ( k ) ] T d S a a z 2 S n 2 g x 2 ( k ) + T d S a Q 2 ( k ) , x 3 ( k + 1 ) = x 3 ( k ) + T d S a [ a z 1 S n 2 g ( x 1 ( k ) x 3 ( k ) ) ] T d S a a z 3 S n 2 g ( x 3 ( k ) x 2 ( k ) ) ,
where T d = 0.01 is the discretization time, and Q 1 ( k ) and Q 2 ( k ) represent the flow rates of pump 1 and pump 2, respectively. x 1 ( k ) , x 2 ( k ) , and x 3 ( k ) denote the heights of the three interconnected tanks. Table 1 presents the parameters of the model.
By writing model (79) in a nonlinear state space representation, it is found that
x ( k + 1 ) = A ( x ( k ) ) x ( k ) + B u ( k ) , y ( k ) = C x ( k ) ,
where x ( k ) = x 1 ( k ) x 2 ( k ) x 3 ( k ) , y ( k ) = x 1 ( k ) x 2 ( k ) , u ( k ) = Q 1 ( k ) Q 2 ( k ) , A ( x ( k ) ) = A 11 0 A 13 0 A 22 A 23 A 31 A 32 A 33 ,
B = T d S a 0 0 T d S a 0 0 , C = 1 0 0 0 1 0 ,
A 11 = 1 T d a z 1 S n 2 g S a ρ 1 ( k ) , A 13 = T d a z 1 S n 2 g S a ρ 1 ( k ) , A 22 = 1 T d a z 3 S n 2 g S a ρ 2 ( k ) T d a z 2 S n 2 g S a ρ 3 ( k ) , A 23 = T d a z 3 S n 2 g S a ρ 2 ( k ) , A 31 = a z 1 S n T d 2 g S a ρ 2 ( k ) , A 23 = T d a z 3 S n 2 g S a ρ 2 ( k ) , A 33 = 1 T d a z 1 S n 2 g S a ρ 1 ( k ) T d a z 3 S n S a ρ 2 ( k ) ,
where a z 1 , a z 2 and a z 3 are the outlet coefficients taking values from 0 to 1; Q 1 ( k ) and Q 2 ( k ) are input flow rates 1 and 2, respectively, and S a and S n are the cross-sections of the tank and pipe.
Examining the nonlinear model of System (80), three premise variables can be identified, and they are
ρ 1 ( k ) = 1 x 1 ( k ) x 3 ( k ) , ρ 2 ( k ) = 1 x 3 ( k ) x 2 ( k ) , ρ 3 ( k ) = 1 x 2 ( k ) ,
To determine the maximum and minimum variations in each nonlinearity, the input behavior in Figure 4 and the parameters in Table 1 are considered to obtain the following values.
ρ 1 ( k ) : ρ 1 ̲ = min 1 x 1 ( k ) x 3 ( k ) = 2.2305 ρ 1 ¯ = max 1 x 1 ( k ) x 3 ( k ) = 4.7567
ρ 2 ( k ) : ρ 2 ̲ = min 1 x 3 ( k ) x 2 ( k ) = 3.1623 ρ 2 ¯ = max 1 x 3 ( k ) x 2 ( k ) = 7.4649
ρ 3 ( k ) : ρ 3 ̲ = min 1 x 2 ( k ) = 1.5342 ρ 3 ¯ = max 1 x 2 ( k ) = 2.0930
The weighting functions are defined as follows:
n 0 1 ( ρ 1 ( k ) ) = ρ ¯ 1 ρ 1 ( k ) ρ 1 ¯ ρ 1 ̲ , n 1 1 ( ρ 1 ( k ) ) = 1 n 0 1 ,
n 0 2 ( ρ 2 ( k ) ) = ρ ¯ 2 ρ 2 ( k ) ρ 2 ¯ ρ 2 ̲ , n 2 1 ( ρ 2 ( k ) ) = 1 n 0 2 ,
n 0 3 ( ρ 3 ( k ) ) = ρ ¯ 3 ρ 3 ( k ) ρ 3 ¯ ρ 3 ̲ , n 3 1 ( ρ 3 ( k ) ) = 1 n 0 3 .
In this case, the number of membership functions is κ = 2 3 = 8 , and they are defined by
μ 1 ( ρ ) = n 0 1 n 0 2 n 0 3 , μ 2 ( ρ ) = n 0 1 n 0 2 n 1 3 , μ 3 ( ρ ) = n 0 1 n 1 2 n 0 3 , μ 4 ( ρ ) = n 0 1 n 1 2 n 1 3 , μ 5 ( ρ ) = n 1 1 n 0 2 n 0 3 , μ 6 ( ρ ) = n 1 1 n 0 2 n 1 3 , μ 7 ( ρ ) = n 1 1 n 1 2 n 0 3 , μ 8 ( ρ ) = n 1 1 n 1 2 n 1 3 .
Then, the variables ρ 1 ( k ) , ρ 2 ( k ) , and ρ 3 ( k ) vary within a bounded region ρ ( k ) = [ ρ ̲ ( k ) , ρ ¯ ( k ) ] , where ρ ̲ ( k ) and ρ ¯ ( k ) are the lower and upper bounds, respectively. Consequently, the following system matrices are obtained:
A ( ρ ( t ) ) = 1 T d C p p g S ρ 1 ( k ) T d C p p g S ρ 1 ( k ) 0 T d C p p g S ρ 1 ( k ) 1 T d C p p g S ( ρ 1 ( k ) + ρ 2 ( k ) ) T d C p p g S ρ 2 ( k ) 0 T d C p p g S ρ 2 ( k ) 1 T d C p p g S ( ρ 2 ( k ) + ρ 3 ( k ) ) .
Then, the T-S model that represents the dynamics of model (1) is
x ( k + 1 ) = μ 1 ( ρ ( k ) ) A 1 + + μ 8 ( ρ ( k ) ) A 8 x ( k ) + B u ( k ) ,
where the matrices that correspond to each local model are
A 1 = A ( ρ 1 ̲ , ρ 2 ̲ , ρ 3 ̲ ) , A 2 = A ( ρ 1 ̲ , ρ 2 ̲ , ρ 3 ¯ ) , A 3 = A ( ρ 1 ̲ , ρ 2 ¯ , ; ρ 3 ̲ ) , A 4 = A ( ρ 1 ̲ , ρ 2 ¯ , ρ 3 ¯ ) , A 5 = A ( ρ 1 ¯ , ρ 2 ̲ , ρ 3 ̲ ) , A 6 = A ( ρ 1 ¯ , ρ 2 ̲ , ρ 3 ¯ ) , A 7 = A ( ρ 1 ¯ , ρ 2 ¯ , ρ 3 ̲ ) , A 8 = A ( ρ 1 ¯ , ρ 2 ¯ , ρ 3 ¯ ) ,
where matrix A ( ρ ) is defined in (87).
Finally, the mathematical T-S model of (88) can be rewritten as
x ( k + 1 ) = i = 1 8 μ i ( ρ ( k ) ) ( A i x ( k ) ) + B u ( k ) , y ( k ) = C x ( k ) .

7. Simulation Results

The performance of the proposed GDO for detecting and isolating attacks is evaluated using the discrete T-S system model defined in (89), where F a = B . The input signals, corresponding to the operation of two water pumps, are illustrated in Figure 4. These signals represent the variable flow rates that govern the system dynamics both under normal conditions and during various attack scenarios. The analysis of these signals serves as a foundation for understanding the effectiveness of the GDO in maintaining system stability and detecting deviations caused by external disruptions such as DoS, FDI, and RDI attacks.
The input signals u ( k ) control the flow of water in the three-tank system and serve as the basis for system behavior. These signals are crucial for the simulation, as they establish a baseline for comparison when different attack scenarios are introduced. The following subsections present the system’s response in the presence of various attack types, focusing on state estimation accuracy, residual generation, and attack detection effectiveness.
Figure 5 shows the Markovian distribution logic signals used in the simulation, comparing the behavior of a uniform signal (black line) and a non-uniform signal (red line), which influences the attack activation patterns.
Three simulations will be presented below considering the different attack schemes a ( k ) shown in Section 3 with uniform or non-uniform Markovian logic α ( k ) , affecting one or both actuators of the CPS.

7.1. Simulated DoS Attack

The first simulation considers a DoS attack affecting the input u 1 ( k ) with uniform logic distribution. Figure 6 shows the system states and their estimations under these conditions. The observer effectively tracks the states despite the disruption caused by the attack.
Figure 7 presents the residuals generated by the observer. Residual 1 detects the attack on u 1 ( k ) , demonstrating the observer’s ability to isolate the disruption effectively.

7.2. Simulated FDI Attack

The second simulation explores the impact of an FDI attack on u 2 ( k ) using a non-uniform logic distribution. Figure 8 illustrates the false data b a ( k ) injected into the system, which replace the original data to alter the system’s behavior.
Figure 9 shows the system states and their estimations. The observer handles the FDI attack’s challenges caused by its variable intensity and activation frequency. Residual 2, as shown in Figure 10, successfully detects the attack on u 2 ( k ) .
Figure 10 shows the residuals in the scenario of the FDI attack, where only residual 2 detects the attack in u 2 ( k ) .

7.3. Simulated RDI Attack

The final simulation investigates a mixed attack scenario where u 1 ( k ) is subjected to an FDI attack and u 2 ( k ) is subjected to an RDI attack, with both under a uniform logic distribution. Figure 11 illustrates the system states and their estimations, while Figure 12 shows the residuals. Both residuals successfully identify the attacks, confirming the robustness of the observer.
Figure 11 shows the state estimation obtained from the observer.
In Figure 12, the residuals generated by the observer are shown, where both residues detect the scenario of simultaneous attacks.

7.4. Different Attacks

In this simulation, a different scheme of attacks in both inputs is considered. The input u 1 ( k ) is affected by an FDI attack, while the input u 2 ( k ) is affected by an RDI attack, both with a uniform logic distribution.
Figure 13 shows the system states and their estimations. In Figure 14, the residuals generated by the observer are presented, and both residues detect the attacks.

8. Conclusions

This article presents an approach for designing a GDO capable of detecting and isolating various attack schemes with Markovian logic in a discrete T-S cyber–physical system. The considered attack schemes include DoS attacks, FDI attacks, and RDI attacks. To realistically simulate attacker behavior, Markovian logic was employed, enabling the modeling of complex attack dynamics and enhancing the detection scheme’s effectiveness.
A discrete-time interconnected three-tank system was used as a case study due to its cyber–physical nature, which integrates physical components and digital communication. The stability conditions for the observer were verified using LMIs and leveraging the Schur complement and the elimination lemma to ensure feasible and robust solutions.
This approach demonstrates the effectiveness of a GDO in detecting and isolating attack schemes in CPSs. Moreover, the proposed scheme lays the groundwork for establishing an integrated diagnostic and detection system that can support the implementation of resilient or adaptive control schemes. These features aim to ensure both the security and functionality of the system in various attack scenarios.
However, while GDOs provide significant advantages, their application is not without limitations. A key limitation of the detection and isolation framework is that it addresses only part of the broader diagnostic and control process. Although the GDO effectively identifies and isolates attacks, these capabilities alone are insufficient to fully counteract the effects of the identified attack schemes. Achieving comprehensive system protection requires integrating additional control strategies based on the estimated attack signals, enabling the system inputs to be dynamically adjusted to mitigate adverse effects. Future research should focus on extending this approach to include attack compensation or robust control mechanisms that complement the observer’s current capabilities.

Author Contributions

Conceptualization, A.R.G.-E., G.L.O.-G.; methodology, A.R.G.-E., G.L.O.-G. and R.A.V.-M.; software, A.R.G.-E., G.L.O.-G. and J.R.-R.; validation, G.L.O.-G. and C.M.A.-Z.; formal analysis, A.R.G.-E., G.L.O.-G. and C.M.A.-Z.; investigation, A.R.G.-E., G.L.O.-G. and R.A.V.-M.; writing—original draft preparation, A.R.G.-E., G.L.O.-G. and J.R.-R.; writing—review and editing, A.R.G.-E., G.L.O.-G. and R.A.V.-M.; supervision, G.L.O.-G., C.M.A.-Z. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Data are contained within the article.

Acknowledgments

The authors acknowledge CONAHCYT for supporting Angel Rodrigo Guadarrama Estrada through a Ph.D. Scholarship.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
RDIRandom Data Injection
DoSDenial of Service
FDIFalse Data Injection
T-STakagi–Sugeno Systems
CPSCyber–Physical System
LMILinear Matrix Inequalities
GDOGeneralized Dynamic Observer

References

  1. Sharma, A.K.; Galav, R.K.; Sharma, B. A Comprehensive Survey of various Cyber Attacks. In Proceedings of the 2023 6th International Conference on Information Systems and Computer Networks (ISCON), Mathura, India, 3–4 March 2023; pp. 1–4. [Google Scholar] [CrossRef]
  2. Geetha, G.; Rajagopal, M.; Purna Chand, K. A Survey on Cyber Attack Detection: Techniques, Datasets, and Challenge. In Proceedings of the 2023 International Conference on Research Methodologies in Knowledge Management, Artificial Intelligence and Telecommunication Engineering (RMKMATE), Chennai, India, 1–2 November 2023; pp. 1–7. [Google Scholar] [CrossRef]
  3. Balarengadurai, C.; C D, D.; C, H. Survey on Cyber Crime Problems and Prevention. In Proceedings of the 2022 International Conference on Smart and Sustainable Technologies in Energy and Power Sectors (SSTEPS), Mahendragarh, India, 7–11 November 2022; pp. 117–121. [Google Scholar] [CrossRef]
  4. Karnik, N.; Bora, U.; Bhadri, K.; Kadambi, P.; Dhatrak, P. A comprehensive study on current and future trends towards the characteristics and enablers of industry 4.0. J. Ind. Inf. Integr. 2022, 27, 100294. [Google Scholar] [CrossRef]
  5. Arghandeh, R.; von Meier, A.; Mehrmanesh, L.; Mili, L. On the definition of cyber-physical resilience in power systems. Renew. Sustain. Energy Rev. 2016, 58, 1060–1069. [Google Scholar] [CrossRef]
  6. Somers, R.J.; Douthwaite, J.A.; Wagg, D.J.; Walkinshaw, N.; Hierons, R.M. Digital-twin-based testing for cyber–physical systems: A systematic literature review. Inf. Softw. Technol. 2023, 156, 107145. [Google Scholar] [CrossRef]
  7. Zhao, X.; Yin, Y.; Bu, X. Resilient iterative learning control for a class of discrete-time nonlinear systems under hybrid attacks. Asian J. Control 2023, 25, 1167–1179. [Google Scholar] [CrossRef]
  8. Huang, X.; Han, X. Adaptive output-feedback resilient tracking control using virtual closed-loop reference model for cyber-physical systems with false data injection attacks. Asian J. Control 2023, 25, 1380–1391. [Google Scholar] [CrossRef]
  9. Zhang, L.; Chen, Y.; Li, M. Resilient Predictive Control for Cyber—Physical Systems Under Denial-of-Service Attacks. IEEE Trans. Circuits Syst. II Express Briefs 2022, 69, 144–148. [Google Scholar] [CrossRef]
  10. Deng, C.; Wen, C. MAS-Based Distributed Resilient Control for a Class of Cyber-Physical Systems With Communication Delays Under DoS Attacks. IEEE Trans. Cybern. 2021, 51, 2347–2358. [Google Scholar] [CrossRef] [PubMed]
  11. Nateghi, S.; Shtessel, Y.; Edwards, C.; Barbot, J.P. Resilient control of cyber-physical systems using adaptive super-twisting observer. Asian J. Control 2023, 25, 1775–1790. [Google Scholar] [CrossRef]
  12. Li, Y.; Voos, H.; Darouach, M.; Hua, C. An application of linear algebra theory in networked control systems: Stochastic cyber-attacks detection approach. Ima J. Math. Control. Inf. 2016, 33, 1081–1102. [Google Scholar] [CrossRef]
  13. Taheri, M.; Khorasani, K.; ImanShames; Meskin, N. Cyberattack and Machine-Induced Fault Detection and Isolation Methodologies for Cyber-Physical Systems. IEEE Trans. Control. Syst. Technol. 2023, 32, 502–517. [Google Scholar] [CrossRef]
  14. Peixoto, M.L.C.; Coutinho, P.H.S.; Bessa, I.; Pessim, P.S.P.; Palhares, R.M. Event-triggered control of Takagi-Sugeno fuzzy systems under deception attacks. Int. J. Robust Nonlinear Control. 2023, 33, 7471–7487. [Google Scholar] [CrossRef]
  15. Asai, Y.; Itami, T.; Yoneyama, J. Static Output Feedback Stabilizing Control for Takagi-Sugeno Fuzzy Systems. In Proceedings of the 2021 Joint 10th International Conference on Informatics, Electronics & Vision (ICIEV) and 2021 5th International Conference on Imaging, Vision & Pattern Recognition (icIVPR), Kitakyushu, Japan, 16–20 August 2021; pp. 1–6. [Google Scholar] [CrossRef]
  16. Huang, X.; Chang, C.; Li, J.; Xiao, S.; Su, Q. Cooperative Interaction Observer-Based Security Control for T-S Fuzzy Cyber-Physical Systems Against Sensor and Actuator Attacks. IEEE Trans. Reliab. 2024, 73, 1982–1992. [Google Scholar] [CrossRef]
  17. Hmaiddouch, I.; Essabre, M.; El Assoudi, A.; El Yaagoubi, E.H. Discrete-time Takagi-Sugeno Fuzzy Systems with Unmeasurable Premise Variables: Application to an Electric Vehicle. In Proceedings of the 2021 Fifth International Conference On Intelligent Computing in Data Sciences (ICDS), Fez, Morocco, 20–22 October 2021; pp. 1–6. [Google Scholar] [CrossRef]
  18. Kavikumar, R.; Kaviarasan, B.; Lee, Y.G.; Kwon, O.M.; Sakthivel, R.; Choi, S.G. Robust dynamic sliding mode control design for interval type-2 fuzzy systems. Discret. Contin. Dyn. Syst. -S 2022, 15, 1839–1858. [Google Scholar] [CrossRef]
  19. Bezzaoucha Rebaï, S.; Voos, H.; Darouach, M. Attack-tolerant Control and Observer-based Trajectory Tracking for Cyber-Physical Systems. Eur. J. Control. 2018, 47, 30–36. [Google Scholar] [CrossRef]
  20. Osorio-Gordillo, G.L.; Darouach, M.; Boutat-Baddas, L.; Astorga-Zaragoza, C.M. Dynamical observer-based fault detection and isolation for linear singular systems. Syst. Sci. Control. Eng. 2015, 3, 189–197. [Google Scholar] [CrossRef]
  21. Bernstein, D.S. Matrix Mathematics: Theory, Facts, and Formulas—Second Edition, 2nd ed.; Princeton University Press: Princeton, NJ, USA, 2011; English Edition. [Google Scholar]
  22. Boyd, S.; Ghaoui, L.; Feron, E.; Balakrishnan, V. Linear Matrix Inequalities in Systems and Control Theory; SIAM: Delhi, India, 1994. [Google Scholar]
  23. Skelton, R.; Iwasaki, T.; Grigoriadis, D. A Unified Algebraic Approach To Control Design; Taylor & Francis: Abingdon, UK, 1997. [Google Scholar]
  24. Li, H.; He, X.; Zhang, Y.; Guan, W. Attack Detection in Cyber-Physical Systems Using Particle Filter: An Illustration on Three-Tank System. In Proceedings of the 2018 IEEE 8th Annual International Conference on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER), Tianjin, China, 19–23 July 2018; pp. 504–509. [Google Scholar] [CrossRef]
Figure 1. Generalized dynamic observer scheme.
Figure 1. Generalized dynamic observer scheme.
Mca 30 00012 g001
Figure 2. Types of attacks and structure.
Figure 2. Types of attacks and structure.
Mca 30 00012 g002
Figure 3. The case study diagram (three interconnected tanks).
Figure 3. The case study diagram (three interconnected tanks).
Mca 30 00012 g003
Figure 4. Variable flow inputs for the water pumps.
Figure 4. Variable flow inputs for the water pumps.
Mca 30 00012 g004
Figure 5. Markovian distribution logic.
Figure 5. Markovian distribution logic.
Mca 30 00012 g005
Figure 6. Behavior in the presence of a uniform DoS attack on u 1 .
Figure 6. Behavior in the presence of a uniform DoS attack on u 1 .
Mca 30 00012 g006
Figure 7. Residues generated in the presence of the DoS attack type.
Figure 7. Residues generated in the presence of the DoS attack type.
Mca 30 00012 g007
Figure 8. False data b a ( k ) .
Figure 8. False data b a ( k ) .
Mca 30 00012 g008
Figure 9. Behavior in the presence of an FDI attack on input u 2 .
Figure 9. Behavior in the presence of an FDI attack on input u 2 .
Mca 30 00012 g009
Figure 10. Residues generated in the presence of an FDI attack.
Figure 10. Residues generated in the presence of an FDI attack.
Mca 30 00012 g010
Figure 11. Behavior in the presence of an RDI attack on inputs u 1 and u 2 .
Figure 11. Behavior in the presence of an RDI attack on inputs u 1 and u 2 .
Mca 30 00012 g011
Figure 12. Residues generated in the presence of an RDI attack.
Figure 12. Residues generated in the presence of an RDI attack.
Mca 30 00012 g012
Figure 13. Behavior in the presence of a uniform simultaneous attack on u 1 and u 2 .
Figure 13. Behavior in the presence of a uniform simultaneous attack on u 1 and u 2 .
Mca 30 00012 g013
Figure 14. Residues generated in the presence of a simultaneous attack.
Figure 14. Residues generated in the presence of a simultaneous attack.
Mca 30 00012 g014
Table 1. Parameters of the system.
Table 1. Parameters of the system.
ParameterValueUnitsDefinition
S a 0.0154m2Tank cross-section
S n 5 × 10 5 m2Pipe cross-section
g 9.82 m2/sGravity
a z 1 0.46-Outlet coefficient of tank 1
a z 2 0.58-Outlet coefficient of tank 2
a z 3 0.48-Outlet coefficient of tank 3
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Guadarrama-Estrada, A.R.; Osorio-Gordillo, G.L.; Vargas-Méndez, R.A.; Reyes-Reyes, J.; Astorga-Zaragoza, C.M. Cyber–Physical System Attack Detection and Isolation: A Takagi–Sugeno Approach. Math. Comput. Appl. 2025, 30, 12. https://doi.org/10.3390/mca30010012

AMA Style

Guadarrama-Estrada AR, Osorio-Gordillo GL, Vargas-Méndez RA, Reyes-Reyes J, Astorga-Zaragoza CM. Cyber–Physical System Attack Detection and Isolation: A Takagi–Sugeno Approach. Mathematical and Computational Applications. 2025; 30(1):12. https://doi.org/10.3390/mca30010012

Chicago/Turabian Style

Guadarrama-Estrada, Angel R., Gloria L. Osorio-Gordillo, Rodolfo A. Vargas-Méndez, Juan Reyes-Reyes, and Carlos M. Astorga-Zaragoza. 2025. "Cyber–Physical System Attack Detection and Isolation: A Takagi–Sugeno Approach" Mathematical and Computational Applications 30, no. 1: 12. https://doi.org/10.3390/mca30010012

APA Style

Guadarrama-Estrada, A. R., Osorio-Gordillo, G. L., Vargas-Méndez, R. A., Reyes-Reyes, J., & Astorga-Zaragoza, C. M. (2025). Cyber–Physical System Attack Detection and Isolation: A Takagi–Sugeno Approach. Mathematical and Computational Applications, 30(1), 12. https://doi.org/10.3390/mca30010012

Article Metrics

Back to TopTop