2019
DOI: 10.1016/j.jfranklin.2018.04.001
|View full text |Cite
|
Sign up to set email alerts
|

Security-based resilient event-triggered control of networked control systems under denial of service attacks

Abstract: This paper is concerned with the security control problem of the networked control system (NCSs) subjected to denial of service (DoS) attacks. In order to guarantee the security performance, this paper treats the influence of packet dropouts due to DoS attacks as a uncertainty of triggering condition. Firstly, a novel resilient triggering strategy by considering the uncertainty of triggering condition caused by DoS attacks is proposed. Secondly, the event-based security controller under the resilient triggerin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
44
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 76 publications
(45 citation statements)
references
References 37 publications
1
44
0
Order By: Relevance
“…An increasing trend, with respect to the period 2006-2015, can be seen in networked CPSs ( Satchidanandan and Kumar, 2017;Ding et al, 2016;Sun et al, 2018;Teixeira et al, 2017 ). Several aspects have been investigated on this topic, with paper focusing on stability ( De Persis and Tesi, 2016;Feng and Tesi, 2017;Dolk et al, 2017;Pang et al, 2018 ), state estimation ( Tsiamis et al, 2017;Miao et al, 2017;Keller et al, 2016;Guo et al, 2018;, and output tracking control ( Pang et al, 2016 ).…”
Section: Implications For Future Researchmentioning
confidence: 99%
“…An increasing trend, with respect to the period 2006-2015, can be seen in networked CPSs ( Satchidanandan and Kumar, 2017;Ding et al, 2016;Sun et al, 2018;Teixeira et al, 2017 ). Several aspects have been investigated on this topic, with paper focusing on stability ( De Persis and Tesi, 2016;Feng and Tesi, 2017;Dolk et al, 2017;Pang et al, 2018 ), state estimation ( Tsiamis et al, 2017;Miao et al, 2017;Keller et al, 2016;Guo et al, 2018;, and output tracking control ( Pang et al, 2016 ).…”
Section: Implications For Future Researchmentioning
confidence: 99%
“…For example, the H ∞ control issue for a class of NCSs is addressed in [13]. The authors in [16] concentrate on the problem of the security-based control for the resilient event-triggered NCSs. The quantized stabilization for NCSs with quantization is studied in [9].…”
Section: Introductionmentioning
confidence: 99%
“…Cyber attacks pose a great threat to system performance [24]- [26]. Generally, cyber attacks widely investigated in the literatures include replay attacks [27], denial of service (DoS) attacks [9], [16], [28] and deception attacks [12], [20], [29]. Replay attackers launch an attack by registering the transmitted signals then randomly releasing these recorded signals again.…”
Section: Introductionmentioning
confidence: 99%
“…[30] investigated dynamic event-triggered control strategies, which gave rise to a larger inter-execution time compared to static strategies. In [31], a novel re-silient triggering strategy was established by taking into account the uncertainty caused by DoS attacks. In [32], the event-triggered strategy and periodic control strategy were integrated to reduce the transmission delay caused by DoS attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, this work devotes to the perfection of ETMs. Compared to the improved schemes [29][30][31][32], the properties of deception attacks are tightly integrated in the design of event-triggered strategies. To sum up, the main contributions of this paper are summarized as follows: 1) Improved T-S fuzzy models are employed to increase the design flexibility, and a novel queuing model is constructed to depict deception attacks; 2) A new dynamic event-triggered communication scheme is developed to alleviate the burden of network resources, which is adaptive for the intermittent aggressive behaviors of deception attacks; and 3) By using piecewise Lyapunov functional methods, we propose a solution to jointly design fuzzy controllers and event-triggering parameters, which can guarantee the monitored system exponentially stable under deception attacks.…”
Section: Introductionmentioning
confidence: 99%