2021 60th IEEE Conference on Decision and Control (CDC) 2021
DOI: 10.1109/cdc45484.2021.9682870
|View full text |Cite
|
Sign up to set email alerts
|

Reducing Attack Vulnerabilities Through Decentralized Event-Triggered Control

Abstract: Decentralized control systems are widely used in a number of situations and applications. In order for these systems to function properly and achieve their desired goals, information must be propagated between agents, which requires connecting to a network. To reduce opportunities for attacks that may be carried out through the network, we design an event-triggered mechanism for network connection and communication that minimizes the amount of time agents must be connected to the network, in turn decreasing co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 21 publications
0
1
0
Order By: Relevance
“…For software rejuvenation this time period corresponds to the secure execution interval when the software can be trusted, for overlay networks this is the set of times where data is sent over uncompromised pathways, and for reconfigurable control and resilient estimation this is the set of times where a subset of the actuators or sensors can be trusted. Some approaches have leveraged decentralized eventtriggered control to design protocols that minimize the amount of time components are untrusted or potentially compromised [44], [45].…”
Section: Trust and Timementioning
confidence: 99%
“…For software rejuvenation this time period corresponds to the secure execution interval when the software can be trusted, for overlay networks this is the set of times where data is sent over uncompromised pathways, and for reconfigurable control and resilient estimation this is the set of times where a subset of the actuators or sensors can be trusted. Some approaches have leveraged decentralized eventtriggered control to design protocols that minimize the amount of time components are untrusted or potentially compromised [44], [45].…”
Section: Trust and Timementioning
confidence: 99%