2020
DOI: 10.1016/j.isatra.2019.04.017
|View full text |Cite
|
Sign up to set email alerts
|

Guaranteed cost control of hybrid-triggered networked systems with stochastic cyber-attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 31 publications
(12 citation statements)
references
References 25 publications
0
12
0
Order By: Relevance
“…This article studies the guaranteed cost resilient controller design problem for uncertain system with two quantizers, sensor failures, and hybrid cyber attacks. Compared with the existing related literature, 29‐31 we consider the influences of deception attacks and DoS attacks that the adversary may exert on the signal in the channel transmission. Meanwhile, to ensure the validity and practicality of the signal, the system signal is quantized twice. In this article, the system uncertainty and the fluctuation of the controller gain are considered.…”
Section: Simulation Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…This article studies the guaranteed cost resilient controller design problem for uncertain system with two quantizers, sensor failures, and hybrid cyber attacks. Compared with the existing related literature, 29‐31 we consider the influences of deception attacks and DoS attacks that the adversary may exert on the signal in the channel transmission. Meanwhile, to ensure the validity and practicality of the signal, the system signal is quantized twice. In this article, the system uncertainty and the fluctuation of the controller gain are considered.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…Robust guaranteed cost control for polytopic parameter uncertain systems is studied in Reference 26. However, as far as we know, there are few studies discussing quantized guaranteed cost control under hybrid attacks 29‐31 . Wu et al 29 presented the guaranteed cost control strategy of closed‐loop system under hybrid network attack with two hybrid communication schemes of event triggering and time triggering.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…When the transmission of xfalse(tkhfalse)$$ x\left({t}_kh\right) $$ is attempted at tkh$$ {t}_kh $$, the attacker can replace it. In this work, stochastic deception attacks are considered as in References 20,27‐29. Hence, a random variable β𝔹 with Bernoulli distribution is considered to model the attack's success rate.…”
Section: Problem Formulationmentioning
confidence: 99%
“…Remark In the literature, 20,27‐29 it is usual to assume that the attack is norm‐bounded and the attack bound matrix G$$ G $$ is accurately known, that is, gfalse(xfalse)Gx$$ \left\Vert g(x)\right\Vert \le \left\Vert Gx\right\Vert $$. This assumption on the attack signal guarantees that only norm‐bounded attacks will affect the system, which is reasonable since the attackers aim to be stealthy and attacks with higher energy are easily detected by any detection system.…”
Section: Problem Formulationmentioning
confidence: 99%