2020
DOI: 10.1109/tcyb.2019.2903817
|View full text |Cite
|
Sign up to set email alerts
|

Observer-Based Event-Triggered Control for Networked Linear Systems Subject to Denial-of-Service Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
109
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
8

Relationship

2
6

Authors

Journals

citations
Cited by 288 publications
(110 citation statements)
references
References 47 publications
1
109
0
Order By: Relevance
“…Proof: See the Appendix. Remark 8: It is clearly shown in Theorems 1 and 2 that the proposed ellipsoidal set-membership filtering problem can be cast into the feasibility problem of a set of recursive linear matrix inequalities (RLMIs) (20) and (21). Thus, Theorems 1 and 2 provide criteria for designing two ellipsoidal sets which always have intersection since they both guarantee to contain the true state x i k+1 in an attack-free system.…”
Section: Distributed Attack Detection and Recovery Mechanism Desmentioning
confidence: 99%
See 2 more Smart Citations
“…Proof: See the Appendix. Remark 8: It is clearly shown in Theorems 1 and 2 that the proposed ellipsoidal set-membership filtering problem can be cast into the feasibility problem of a set of recursive linear matrix inequalities (RLMIs) (20) and (21). Thus, Theorems 1 and 2 provide criteria for designing two ellipsoidal sets which always have intersection since they both guarantee to contain the true state x i k+1 in an attack-free system.…”
Section: Distributed Attack Detection and Recovery Mechanism Desmentioning
confidence: 99%
“…In light of Theorems 1 and 2, for the i-th attack-free vehicle, the one-step ahead state x i k+1 always resides in both the state prediction ellipsoidal set X i k+1|k and its updated state estimation ellipsoidal set X i k+1 if (20) and (21) hold. Therefore, there exists a vector z satisfying z ≤ 1 such that x i k+1 =x i k+1|k + E i k+1|k z and x i k+1 =x i k+1 + E i k+1 z, respectively.…”
Section: B Recursive Convex Optimization and Cyber Attack Detection mentioning
confidence: 99%
See 1 more Smart Citation
“…Some e ective manners such as event-triggered scheme (ETS) [10], signal quantization [11], and real-time scheduling [12,13] have been proposed to save communication resources and reduce computation burden. Recently, ETS has gained growing attention and interests in existing research studies [14][15][16][17][18][19][20][21][22][23] for its simplicity of execution and e ectiveness of reducing data transmissions. Due to this fact, the idea of ETS is introduced into security control for CPSs and has produced many interesting results [24][25][26][27][28][29].…”
Section: Introductionmentioning
confidence: 99%
“…From the attacker's perspective, the security studies fasten on the design of optimal attack strategies, to provide a guide role for CPS protection . The denial‐of‐service (DoS) attack as the most reachable attack pattern, aiming at jamming wireless communication channels and resulting in degradation of the system performance, has been widely investigated by proposing different secure strategies . Moreover, various types of optimal DoS attack strategies under different frameworks have been constructed under a natural constraint, ie, limited energy budget .…”
Section: Introductionmentioning
confidence: 99%