2022
DOI: 10.1002/rnc.6551
|View full text |Cite
|
Sign up to set email alerts
|

Novel attack‐defense framework for nonlinear complex networks: An important‐data‐based method

Abstract: This article addresses the state estimation problem for a class of nonlinear complex networks (CNs) under attack. First, a novel important-data-based (IDB) attack strategy is skillfully proposed from the adversary's point of view to maximize the attack effect. Different from most existing attack models, the IDB attacker has the ability to eavesdrop measurements and only attacks the packets which play an important role in the system. As such, a larger system performance degradation can be expected. Second, a ne… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
17
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 36 publications
(17 citation statements)
references
References 43 publications
0
17
0
Order By: Relevance
“…, where c l and c l are the scalars to be derived. To solve the inequality (23), the following lemma will be utilized.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…, where c l and c l are the scalars to be derived. To solve the inequality (23), the following lemma will be utilized.…”
Section: Resultsmentioning
confidence: 99%
“…The denial‐of‐service (DoS) attack, the replay attack and the deception attack 19‐22 are three extensively used attack behaviors by the adversaries. It is noteworthy that in engineering practice, these attack behaviors might be failed because of the employment of protection equipments 23 . Thus, in many cases the hostile attacks are characterized by some random sequences 24 .…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…It is worth mentioning that the deception attack model used in most literatures is quite standard, and the energy constraint problem is ignored by researchers. In view of this, a new multimodal and energy‐constrained deception attack model is proposed in reference 26,27 to describe the complex and covert behavior of deception attacks, and the influence of attack energy on system performance is quantitatively analyzed. More interestingly, some works investigate the network security and the communication efficiency in an unified way, please refer to References 28–30.…”
Section: Introductionmentioning
confidence: 99%
“…During recent years, the related issues of nonlinear networked control systems (NCSs) have received widespread attention from scholars [1][2][3][4][5] with the development of some intelligent control technologies. [6][7][8][9][10][11][12][13][14][15][16][17] With the development of NCSs, nonlinear terms inevitably appear in the control system. The Takagi-Sugeno (T-S) fuzzy model, as a mathematical technique for linearizing nonlinear systems, has been proven to be effective in characterizing and describing the nonlinear NCSs.…”
Section: Introductionmentioning
confidence: 99%