CIESC Journal ›› 2025, Vol. 76 ›› Issue (9): 4524-4538.DOI: 10.11949/0438-1157.20250418
• Special Column: Modeling and Simulation in Process Engineering • Previous Articles Next Articles
Guanghui HE1,3(
), Jinjiang WANG1,3(
), Zhenqiang WEI2,3, Zheng WANG1,3, Laibin ZHANG1,3
Received:2025-04-18
Revised:2025-06-04
Online:2025-10-23
Published:2025-09-25
Contact:
Jinjiang WANG
何广汇1,3(
), 王金江1,3(
), 魏振强2,3, 汪征1,3, 张来斌1,3
通讯作者:
王金江
作者简介:何广汇(2002—),男,硕士研究生,1904580629@qq.com
基金资助:CLC Number:
Guanghui HE, Jinjiang WANG, Zhenqiang WEI, Zheng WANG, Laibin ZHANG. Research on CSTR industrial control security virtual reality fusion simulation method[J]. CIESC Journal, 2025, 76(9): 4524-4538.
何广汇, 王金江, 魏振强, 汪征, 张来斌. CSTR 工控安全虚实融合仿真方法研究[J]. 化工学报, 2025, 76(9): 4524-4538.
Add to citation manager EndNote|Ris|BibTeX
| 攻击形式 | 攻击手段 | 后果 |
|---|---|---|
| 传感器上的虚假数据注入攻击 | 篡改系统中的反应釜温度或物料流量等传感器数据 | 通过传感器获得的系统基本状态错误 |
| 恶意指令注入攻击 | 伪造控制中心的指令,修改正常系统过程状态 | 设定的系统过程状态与正常状态之间存在偏差 |
| 执行器上的虚假数据注入攻击 | 篡改控制系统中执行器的输出的夹套冷却液流量 | 控制系统实际输出的冷却液流量错误 |
| 拒绝服务攻击 | 破坏控制回路的数据传输和交流能力 | 控制系统的输出停止,处于瘫痪状态 |
Table 1 Attack forms against CSTR system
| 攻击形式 | 攻击手段 | 后果 |
|---|---|---|
| 传感器上的虚假数据注入攻击 | 篡改系统中的反应釜温度或物料流量等传感器数据 | 通过传感器获得的系统基本状态错误 |
| 恶意指令注入攻击 | 伪造控制中心的指令,修改正常系统过程状态 | 设定的系统过程状态与正常状态之间存在偏差 |
| 执行器上的虚假数据注入攻击 | 篡改控制系统中执行器的输出的夹套冷却液流量 | 控制系统实际输出的冷却液流量错误 |
| 拒绝服务攻击 | 破坏控制回路的数据传输和交流能力 | 控制系统的输出停止,处于瘫痪状态 |
| 攻击类型 | 仿真形式 |
|---|---|
| 传感器上的虚假数据注入攻击 | |
| 恶意指令注入攻击 | |
| 执行上的虚假数据注入攻击 | |
| 拒绝服务攻击 |
Table 2 Simulation forms of different types of network attacks
| 攻击类型 | 仿真形式 |
|---|---|
| 传感器上的虚假数据注入攻击 | |
| 恶意指令注入攻击 | |
| 执行上的虚假数据注入攻击 | |
| 拒绝服务攻击 |
| 变量 | 初值 | 平衡值 | 范围 |
|---|---|---|---|
| 10 | 10 | — | |
| 300 | 300 | N (300,1) | |
| 6 | 4.4 | [3.7,5.2] | |
| 2 | 1 | [0,10] | |
| 311 | 373 | [310,390] |
Table 3 Simulation related variables and parameters
| 变量 | 初值 | 平衡值 | 范围 |
|---|---|---|---|
| 10 | 10 | — | |
| 300 | 300 | N (300,1) | |
| 6 | 4.4 | [3.7,5.2] | |
| 2 | 1 | [0,10] | |
| 311 | 373 | [310,390] |
| 攻击类型 | 仿真形式 |
|---|---|
| 传感器上的虚假数据注入攻击 | |
| 恶意指令注入攻击 | |
| 执行器上的虚假数据注入攻击 | |
| 拒绝服务攻击 |
Table 4 Attack simulation scheme
| 攻击类型 | 仿真形式 |
|---|---|
| 传感器上的虚假数据注入攻击 | |
| 恶意指令注入攻击 | |
| 执行器上的虚假数据注入攻击 | |
| 拒绝服务攻击 |
| [14] | Zhang X B, Wang K F, Yang T, et al. Methodology for designing solution polymerization reactors based on multiscale model construction and simulation[J]. Chemical Engineering Science, 2023, 282: 119259. |
| [15] | Blauth D S, Damay D J, Osterroth D S, et al. Multi-scale simulation of a novel integrated reactor for hydrogen production by ammonia decomposition[J]. Chemie Ingenieur Technik, 2024, 96(5): 627-641. |
| [16] | Kaydouh M N, El Hassan N, Chalhoub E, et al. A review of computational fluid dynamics modeling of dry reforming of methane for improved catalyst and reactor design[J]. Fuel, 2024, 366: 131290. |
| [17] | Melik-Merkumians D I M, Chebotarev Y. Implementing automation services for a process plant via OPC UA[D]. Vienna: Technischen Universität Wien, 2024. |
| [18] | Camacho O, Smith C A. Sliding mode control: an approach to regulate nonlinear chemical processes[J]. ISA Transactions, 2000, 39(2): 205-218. |
| [19] | Guo B J, Hua X M, Jutan A. Generic model controller tuning for chemical processes with input saturation[J]. The Canadian Journal of Chemical Engineering, 2002, 80(2): 275-280. |
| [20] | 曹柳林, 孙娅苹, 吴海燕. 基于反应基元的非线性系统灰箱建模方法[J]. 中南大学学报(自然科学版), 2011, 42(2): 414-418. |
| Cao L L, Sun Y P, Wu H Y. Grey-box modeling based on fundamental genes for nonlinear system[J]. Journal of Central South University (Science and Technology), 2011, 42(2): 414-418. | |
| [21] | Li Q S, Zhu R. Stochastic simulation of chemical chua system[J]. International Journal of Bifurcation and Chaos, 2004, 14(3): 1053-1057. |
| [22] | 白锦川. 现代化工仿真系统在企业培训中的应用[J]. 化纤与纺织技术, 2023, 52(11): 81-83. |
| Bai J C. Application of modern chemical simulation system in enterprise training[J]. Chemical Fiber & Textile Technology, 2023, 52(11): 81-83. | |
| [23] | Bemporad A, Morai M, Ricker N L. Model Predictive Control Toolbox[EB/OL]. United States, 2024 [2025-04-17]. . |
| [1] | 马奔, 叶紫蒙, 杨悦兮. 中国式现代化与第四次工业革命:风险和应对[J]. 山东大学学报(哲学社会科学版), 2023(1): 11-19. |
| Ma B, Ye Z M, Yang Y X. Chinese path to modernization and the fourth industrial revolution: risks and solutions[J]. Journal of Shandong University (Philosophy and Social Sciences), 2023(1): 11-19. | |
| [2] | Karmakar A, Dey N, Baral T, et al. Industrial internet of things: a review[C]//2019 International Conference on Opto-Electronics and Applied Optics (Optronix). IEEE, 2019: 1-6. |
| [3] | Xu H S, Yu W, Griffith D, et al. A survey on industrial internet of things: a cyber-physical systems perspective[J]. IEEE Access, 2018, 6: 78238-78259. |
| [4] | 卫昭新. 基于网络化控制的化工工业自动化系统安全研究[J]. 自动化与仪器仪表, 2024(8): 159-162. |
| Wei Z X. Research on the security of chemical industry automation system based on networked control[J]. Automation & Instrumentation, 2024(8): 159-162. | |
| [5] | Hemsley K E, Fisher E. History of industrial control system cyber incidents[R]. Idaho National Lab (INL), 2018. |
| [6] | Campo-Flores A. US news: hacker tampers with Florida water system[N]. Wall Street Journal, 2021. |
| [7] | Iaiani M, Tugnoli A, Bonvicini S, et al. Major accidents triggered by malicious manipulations of the control system in process facilities[J]. Safety Science, 2021, 134: 105043. |
| [8] | Obaidat I, Palko Z, Sridhar M. From DDoSim to DDoSimQ: enhancing DDoS attack simulations through full system emulation[C]//Proceedings of the 5th Workshop on CPS&IoT Security and Privacy. Copenhagen Denmark: ACM, 2023: 37-37. |
| [9] | Bekeneva Y A, Shorov A V. Simulation of DRDoS-attacks and protection systems against them[C]//2017 ⅩⅩ IEEE International Conference on Soft Computing and Measurements (SCM). IEEE, 2017: 165-167. |
| [10] | 陶源, 夏永恒, 刘增良, 等. 基于免疫神经网络的网络攻击仿真模型研究[J]. 计算机应用研究, 2009, 26(1): 334-336. |
| Tao Y, Xia Y H, Liu Z L, et al. Model of network attacks simulation research based on immune-based neural networks[J]. Application Research of Computers, 2009, 26(1): 334-336. | |
| [11] | 夏杨添. 网络攻击仿真系统设计与实现[D]. 成都: 电子科技大学, 2022. |
| Xia Y T. Design and implementation of network attack simulation system[D]. Chengdu: University of Electronic Science and Technology of China, 2022. | |
| [12] | Mao Z S, Yang C. Computational chemical engineering—towards thorough understanding and precise application[J]. Chinese Journal of Chemical Engineering, 2016, 24(8): 945-951. |
| [13] | 赵实柱, 郎翠莲. 考虑传质过程的化工反应器多相流体动力学优化[J]. 化学工程与装备, 2024(9): 37-39. |
| Zhao S Z, Lang C L. Multiphase hydrodynamic optimization of chemical reactor considering mass transfer process[J]. Chemical Engineering & Equipment, 2024(9): 37-39. | |
| [24] | 韩雨. 随机CSTR模型与自催化等温模型的动力学行为[D]. 长春: 长春师范大学, 2024. |
| Han Y. Dynamic behavior of stochastic CSTR model and autocatalytic isothermal model[D]. Changchun: Changchun Normal University, 2024. | |
| [25] | 王宗刚, 史军, 刘春元. CSTR模型中非线性因素线性化的分析[J]. 制造业自动化, 2012, 34(1): 63-66, 74. |
| Wang Z G, Shi J, Liu C Y. Linear analysis on continuous stirred tank reactor non-linear model[J]. Manufacturing Automation, 2012, 34(1): 63-66, 74. | |
| [26] | 王子硕. 连续搅拌反应釜的硬件在回路实时仿真平台开发[D]. 吉林: 吉林化工学院, 2019. |
| Wang Z S. Development of hardware-in-the-loop real-time simulation platform for continuous stirred tank reactor[D]. Jilin: Jilin Institute of Chemical Technology, 2019. | |
| [27] | Arauz T, Chanfreut P, Maestre J M. Cyber-security in networked and distributed model predictive control[J]. Annual Reviews in Control, 2022, 53: 338-355. |
| [28] | Giraldo J, Urbina D, Cardenas A, et al. A survey of physics-based attack detection in cyber-physical systems[J]. ACM Computing Surveys, 2018, 51(4): 1-36. |
| [29] | Pawar M V, Anuradha J. Network security and types of attacks in network[J]. Procedia Computer Science, 2015, 48: 503-506. |
| [30] | Wen H, Khan F, Ahmed S, et al. Risk assessment of human-automation conflict under cyberattacks in process systems[J]. Computers & Chemical Engineering, 2023, 172: 108175. |
| [31] | 陈秀菊. 单神经元PID在CSTR系统温度控制中的应用[J]. 福建电脑, 2010, 26(12): 81-83. |
| Chen X J. Application of single neuron PID in temperature control of CSTR system[J]. Journal of Fujian Computer, 2010, 26(12): 81-83. | |
| [32] | 石星喜. 连续搅拌反应釜的自抗扰控制算法研究[D]. 桂林: 桂林理工大学, 2024. |
| Shi X X. Research on active disturbance rejection control algorithm for continuous stirred reactor[D]. Guilin: Guilin University of Technology, 2024. | |
| [33] | 陈露, 李凌. 模糊无模型自适应控制在CSTR中的仿真研究[J]. 工业仪表与自动化装置, 2022(1): 36-40, 47. |
| Chen L, Li L. Simulation research of fuzzy model-free adaptive control in CSTR[J]. Industrial Instrumentation & Automation, 2022(1): 36-40, 47. | |
| [34] | Rangan K K, Oyama H, Durand H. Actuator cyberattack handling using Lyapunov-based economic model predictive control[J]. IFAC-PapersOnLine, 2022, 55(7): 489-494. |
| [35] | Syfert M, Ordys A, Kościelny J M, et al. Integrated approach to diagnostics of failures and cyber-attacks in industrial control systems[J]. Energies, 2022, 15(17): 6212. |
| [36] | Wu Z, Albalawi F, Zhang J F, et al. Detecting and handling cyber-attacks in model predictive control of chemical processes[J]. Mathematics, 2018, 6(10): 173. |
| [37] | 陈金喆. 工业控制网络攻防靶场的设计与实现[D]. 沈阳: 沈阳化工大学, 2023. |
| Chen J Z. Design and implementation of industrial control network attack and defense shooting range[D]. Shenyang: Shenyang University of Chemical Technology, 2023. | |
| [38] | Lin C T, Wu S L, Lee M L. Cyber attack and defense on industry control systems[C]//2017 IEEE Conference on Dependable and Secure Computing. IEEE, 2017: 524-526. |
| [39] | 郭佳, 徐兴洋, 张佳兴, 等. 基于MATLAB的PID控制和模糊控制比较[J]. 工程机械, 2025, 56(5): 67-72. |
| Guo J, Xu X Y, Zhang J X, et al. Comparison of PID control and fuzzy control based on MATLAB[J]. Construction Machinery and Equipment, 2025, 56(5): 67-72. |
| [1] | Zihao ZHONG, Sai'er LIU, Minjing SHANG, Yuanhai SU. Flow characteristics and micromixing performance of micro-CSTR with magnetic stirring [J]. CIESC Journal, 2024, 75(11): 4217-4225. |
| [2] | WANG Yuhong, YANG Pu. Application of a control strategy based on PWA model in CSTR system [J]. CIESC Journal, 2016, 67(3): 865-870. |
| [3] | GUO Qing, LIU Haiyan, CHEN Juan. Grade transition strategy for polymerization process based on dynamic optimization and feedback control [J]. CIESC Journal, 2015, 66(1): 299-306. |
| [4] | ZHU Qunxiong, WANG Junxia. Robust optimal control for nonlinear continuous stirred tank reactor [J]. , 2013, 64(11): 4114-4120. |
| [5] | WANG Shubin,SHAN Shengnan,LUO Xionglin. Nonlinear predictive control based on T-S fuzzy model and particle-swarm optimization [J]. CIESC Journal, 2012, 63(S1): 176-187. |
| [6] | LI Jianzheng,YU Ze,CHANG Sheng,SU Xiaoyu. Operation characteristic comparison of CSTR and ACR systems for hydrogen production by butyric acid type fermentation [J]. CIESC Journal, 2012, 63(5): 1551-1557. |
| [7] | LIU Xin;WANG Shudong. Effects of SO2,NH3 and temperature on non-thermal plasma flue gas denitrification [J]. , 2006, 57(10): 2411-2415. |
| [8] | Xie Fangning;Pan Qinmin;Pan Zuren(Institute of Polymer Science and Engineering,Zhejiang University,Hangzhou 310027). MODELING AND SIMULATION OF THERMAL BULK POLYMERIZATION OF STYRENE IN CSTR [J]. , 1996, 47(5): 563-570. |
| Viewed | ||||||
|
Full text |
|
|||||
|
Abstract |
|
|||||