Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
164 tokens/sec
GPT-4o
10 tokens/sec
Gemini 2.5 Pro Pro
47 tokens/sec
o3 Pro
5 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Scheduling networked control systems under jamming attacks (2002.01757v1)

Published 5 Feb 2020 in eess.SY and cs.SY

Abstract: This paper deals with the design of scheduling policies for networked control systems whose shared networks have limited communication capacity and the controller to plant channels are vulnerable to jamming attacks. We assume that among N plants, only M (< N) plants can communicate with their controllers at any time instant, and the attack sequences follow an (m,k)-firm model, i.e., in any k consecutive time instants, the control inputs sent to some or all of the plants accessing the communication network, are deactivated at most at m (< k) time instants. We devise a new algorithm to allocate the network to the plants periodically such that stability of each plant is preserved under the admissible attack signals. The main apparatus for our analysis is a switched systems representation of the individual plants in an NCS. We rely on matrix commutators (Lie brackets) between the stable and unstable modes of operation of the plants to guarantee stability under our scheduling policies.

Citations (3)

Summary

We haven't generated a summary for this paper yet.