<abstract><p>This paper investigates the event-triggered state estimation problem for a class of complex networks (CNs) suffered by hybrid cyber-attacks. It is assumed that a wireless network exists between sensors and remote estimators, and that data packets may be modified or blocked by malicious attackers. Adaptive event-triggered scheme (AETS) is introduced to alleviate the network congestion problem. With the help of two sets of Bernoulli distribution variables (BDVs) and an arbitrary function related to the system state, a mathematical model of the hybrid cyber-attacks is developed to portray randomly occurring denial-of-service (DoS) attacks and deception attacks. CNs, AETS, hybrid cyber-attacks, and state estimators are then incorporated into a unified architecture. The system state is cascaded with state errors as an augmented system. Furthermore, based on Lyapunov stability theory and linear matrix inequalities (LMIs), sufficient conditions to ensure the asymptotic stability of the augmented system are derived, and the corresponding state estimator is designed. Finally, the effectiveness of the theoretical method is demonstrated by numerical examples and simulations.</p></abstract>
In this paper, the deception attacks are the research object, which are widely concerned in cyber attacks, and the feasibility of H ∞ filtering for networked system based on event-triggered mechanism (ETM) is discussed. Firstly, in order to avoid waste of limited bandwidth, the ETM are introduced. At the same time, considering the impact of two types of different deception attacks, we introduce respectively two sets of random variables satisfying the Bernoulli distribution to depict the probability of the data transmitted by the network being subjected to deception attacks and the switching law of two types of deception attacks. Furthermore, a function model in accordance with the above situation is established. Then, by using Lyapunov-Krasovskii functional (LKF) and linear matrix inequalities (LMIs) techniques, the stability criterion of the established system model and the display expression of filter parameters are obtained. For the single integral terms in the derivative of LKF, we utilize Jensen's Inequality and reciprocally convex combination lemma (RCCL) to process them. Finally, the feasibility of the proposed method is verified by a simulation example. INDEX TERMS H ∞ filter design, event-triggered mechanism, deception attack, Lyapunov-Krasovskii functional.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.