2021
DOI: 10.1002/rnc.5944
|View full text |Cite
|
Sign up to set email alerts
|

Stabilization of random nonlinear systems subject to deception attacks

Abstract: In this article, the stabilization problem of a class of random networked control nonlinear systems suffering from deception attacks is considered. First, an appropriate attack model described by the random impulsive nonlinear system is developed, and the discrete dynamics have multiple random impulsive intensity, whose type is determined by a Markov chain. Second, the criteria of noise‐to‐state exponential stability in the mth moment are given for the general random impulsive nonlinear systems based on the (m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 39 publications
0
2
0
Order By: Relevance
“…8 According to some literature, deception attacks can bypass the existing detection technology, resulting in a severe decline in the system performance. 9,10 Therefore, in recent years, the synchronization problem of MASs under deception attacks has received extensive attention. For example, in References 11-13, deception attacks are described by random variables obeying Bernoulli distribution.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…8 According to some literature, deception attacks can bypass the existing detection technology, resulting in a severe decline in the system performance. 9,10 Therefore, in recent years, the synchronization problem of MASs under deception attacks has received extensive attention. For example, in References 11-13, deception attacks are described by random variables obeying Bernoulli distribution.…”
Section: Introductionmentioning
confidence: 99%
“…Generally, deception attacks can be classified into three types: data replay, data modification, and false data injection 8 . According to some literature, deception attacks can bypass the existing detection technology, resulting in a severe decline in the system performance 9,10 . Therefore, in recent years, the synchronization problem of MASs under deception attacks has received extensive attention.…”
Section: Introductionmentioning
confidence: 99%