2017
DOI: 10.1016/j.automatica.2017.01.031
|View full text |Cite
|
Sign up to set email alerts
|

Resilient control under Denial-of-Service: Robust design

Abstract: Abstract-In this paper, we study networked control systems in the presence of Denial-of-Service (DoS) attacks, namely attacks that prevent transmissions over the communication network. The control objective is to maximize frequency and duration of the DoS attacks under which closed-loop stability is not destroyed. Analog and digital predictor-based controllers with state resetting are proposed, which achieve the considered control objective for a general class of DoS signals. An example is given to illustrate … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
83
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 371 publications
(84 citation statements)
references
References 32 publications
1
83
0
Order By: Relevance
“…Thus, combining (19) with (23), we can derive ΔV( (k), (k)) < V( (k), (k)), which can be reformulated as follows:…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…Thus, combining (19) with (23), we can derive ΔV( (k), (k)) < V( (k), (k)), which can be reformulated as follows:…”
Section: Resultsmentioning
confidence: 99%
“…Vivid examples with reference to this process involving the active and silent subintervals of DoS attacks were properly depicted in ( Figure 2 in the work of De Persis and Tesi 7 and Figure 2 in the work of Wu et al 25 ). In that case, for the time interval [1,19), we can see n (1,19) = 3 while the number of total switchings is 5, which in turn verifies that the number of DoS attacks is not equal to the total switching times obviously. Thus, obviously, for considered time interval [0, k[, the number of total switchings  (0, k) = n(0, k) +n ≤ 2n(0, k), wheren represents the switching times from mode 0 to mode 1, and obviously, for the prescribed time domain [0, k), we havē n ≤ n(0, k).…”
Section: Assumptionmentioning
confidence: 98%
See 2 more Smart Citations
“…Here, a general DoS model is considered, which the attack behavior is characterized as time by posing restrictions on the frequency and duration merely. Denote by false{hnfalse}ndouble-struckN with h 0 ≥ 0 the sequence of DoS off/on transitions, which are the time instants when DoS attacks transform from null (transmission attempts are all successful) to one (transmission attempts fail) . The n th DoS interval is defined as H n ={ h n }∪[ h n , h n + τ n ), where τndouble-struckR0 is its length.…”
Section: Preliminaries and Problem Formulationmentioning
confidence: 99%