Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
143 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
46 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Resilient control of networked switched systems subject to deception attack and DoS attack (2405.06165v1)

Published 10 May 2024 in eess.SY and cs.SY

Abstract: In this paper, the resilient control for switched systems in the presence of deception attack and denial-of-service (DoS) attack is addressed. Due to the interaction of two kinds of attacks and the asynchronous phenomenon of controller mode and subsystem mode, the system dynamics becomes much more complex. A criterion is derived to ensure the mean square security level of the closed-loop system. This in turn reveals the balance of system resilience and control performance. Furthermore, a mixed-switching control strategy is put forward to make the system globally asymptotically stable. It is shown that the system will still converge to the equilibrium even if the deception attack occurs. Finally, simulations are carried out to verify the effectiveness of the theoretical results.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (51)
  1. \PatchFailed
  2. Linear Matrix Inequalities in System and Control Theory. SIAM.
  3. Hybrid-triggered-based security controller design for networked control system under multiple cyber attacks. Information Sciences, 548:69–84.
  4. Application of switched system theory in power system stability. In 2014 49th International Universities Power Engineering Conference (UPEC), pages 1–6.
  5. Stability analysis and control for switched stochastic delay systems. International Journal of Robust and Nonlinear Control, 26:303–328.
  6. Resilient distributed coordination control of multiarea power systems under hybrid attacks. IEEE Transactions on Systems Man Cybernetics: Systems, 52(1):7–18.
  7. A structural approach to unknown inputs observation for switching linear systems. Automatica, 129:109572.
  8. Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks. Automatica, 78:231–240.
  9. Event-based security control for discrete-time stochastic systems. IET Control Theory & Applications, 10(15):1808–1815.
  10. Admm-based distributed state estimation of smart grid under data deception and denial of service attacks. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 49(8):1698–1711.
  11. Resilient control under denial-of-service: Robust design. Automatica, 79:42–51.
  12. A new switching law for event-triggered switched systems under dos attacks. Automatica, 142:110373.
  13. Asynchronous distributed finite-time H∞subscript𝐻{H_{\infty}}italic_H start_POSTSUBSCRIPT ∞ end_POSTSUBSCRIPT filtering in sensor networks with hidden Markovian switching and two-channel stochastic attacks. IEEE Transactions on Cybernetics, 52(3):1502–1514.
  14. Event-triggered control for stochastic networked control systems against denial-of-service attacks. Information Sciences, 527:51–69.
  15. Event-triggered control of networked switched systems under network attacks. Transaction of the Institute of Measurement and Control, 44(6):1334–1343.
  16. Event-triggered H∞subscript𝐻{H}_{\infty}italic_H start_POSTSUBSCRIPT ∞ end_POSTSUBSCRIPT control of networked switched systems subject to denial-of-service attacks. Nonlinear Analysis: Hybrid Systems, 38:100930.
  17. Robust interval observer for switched systems with unknown inputs: Application to vehicle dynamics estimation. European Journal of Control, 44:3–14.
  18. Langner, R. (2011). Stuxnet: Dissecting a cyberwarfare weapon. IEEE Security & Privacy, 9(3):49–51.
  19. Enlightenment on the security of cyber information system under smart grid from Ukraine blackout. Electric Power, 5(50):71–77.
  20. Attack detection and distributed filtering for state-saturated systems under deception attack. IEEE Transactions on Control of Network Systems, 8(4):1918–1929.
  21. Resilient adaptive control of switched nonlinear cyber-physical systems under uncertain deception attacks. Information Sciences, 543:398–409.
  22. Liberzon, D. (2003). Switching in Systems and Control. Systems & Control: Foundations & Applications. Birkhäuser Boston, Boston, MA.
  23. Stability and stabilizability of switched linear systems: A survey of recent results. IEEE Transactions on Automatic Control, 54(2):308–322.
  24. Asynchronous finite-time H∞subscript𝐻{H}_{\infty}italic_H start_POSTSUBSCRIPT ∞ end_POSTSUBSCRIPT control for switched linear systems via mode-dependent dynamic state-feedback. Nonlinear Analysis: Hybrid Systems, 8:109–120.
  25. Switched LQR/H∞subscript𝐻H_{\infty}italic_H start_POSTSUBSCRIPT ∞ end_POSTSUBSCRIPT steering vehicle control to detect critical driving situations. Control Engineering Practice, 24:1–14.
  26. Switching-like event-triggered control for networked control systems under malicious denial of service attacks. IEEE Transactions on Automatic Control, 65(9):3943–3949.
  27. Detecting generalized replay attacks via time-varying dynamic watermarking. IEEE Transactions on Automatic Control, 66(8):3502–3517.
  28. Smc for discrete-time networked semi-markovian switching systems with random dos attacks and applications. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 53(3):1982–1993.
  29. Dual-terminal decentralized event-triggered control for switched systems with cyber attacks and quantization. ISA Transactions, 110:15–27.
  30. Stabilisation of switched linear systems under denial of service. IET Control Theory & Applications, 14(11):1438–1444.
  31. Minimum (h,ϕℎitalic-ϕh,\phiitalic_h , italic_ϕ)-entropy control for non-gaussian stochastic networked control systems and its application to a networked DC motor control system. IEEE Transactions on Control Systems Technology, 23(1):406–411.
  32. Bumpless transfer control for switched linear systems and its appliaction to aero-engines. IEEE Transactions on Circuits and Systems-I: Regular Papers, 68(5):2171–2182.
  33. Switched Linear Systems: Control and Design. Springer.
  34. Memory-based event-triggering H∞subscript𝐻{H}_{\infty}italic_H start_POSTSUBSCRIPT ∞ end_POSTSUBSCRIPT load frequency control for power systems under deception attacks. IEEE Transactions on Cybernetics, 50(11):4610–4618.
  35. Varaiya, P. (1993). Smart cars on smart roads: Problems of control. IEEE Transactions on Automatic Control, 38(2):195–207.
  36. Security control for LPV system with deception attacks via model predictive control: A dynamic output feedback approach. IEEE Transactions on Automatic Control, 66(2):760–767.
  37. Input-to-state stability of switched linear systems with unstabilizable modes under dos attacks. Automatica, 146:110607.
  38. Dynamic event-triggered L∞subscript𝐿{L_{\infty}}italic_L start_POSTSUBSCRIPT ∞ end_POSTSUBSCRIPT control for networked control systems under deception attacks: A switching method. Information Sciences, 561:168–180.
  39. Event-driven finite-time control for continuous-time networked switched systems under cyber attacks. Journal of the Franklin Institute, 357(16):11690–11709.
  40. Security tracking control for discrete-time stochastic systems subject to cyber attacks. ISA Transactions, 127:133–145.
  41. Sampled-data resilient H∞subscript𝐻{H}_{\infty}italic_H start_POSTSUBSCRIPT ∞ end_POSTSUBSCRIPT control for networked stochastic systems subject to multiple attacks. Applied Mathematics and Computation, 405:126265.
  42. State and dynamic output feedback control of switched linear systems via a mixed time and state-dependent switching law. Nonlinear Analysis: Hybrid Systems, 22:228–248.
  43. Predictive sliding-mode control of networked high-order fully actuated systems under random deception attacks. Science China Information Sciences, 66(190204):1–14.
  44. A survey on attack detection, estimation and control of industrial cyber-physical systems. ISA Transactions, 116:1–16.
  45. Asynchronously switched control of switched linear systems with average dwell time. Automatica, 46(5):953–958.
  46. Proportional–integral observer design for uncertain time-delay systems subject to deception attacks: An outlier-resistant approach. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 52(8):5152–5164.
  47. A dynamic event-triggered approach to observer-based PID security control subject to deception attacks. Automatica, 120:109128.
  48. Event-triggered sliding mode control of uncertain switched systems under denial-of-service attacks. Journal of the Franklin Institute, 356(18):11414–11433.
  49. Multiple Lyapunov functions analysis approach for discrete-time-switched piecewise-affine systems under dwell-time constraints. IEEE Transactions on Automatic Control, 65(5):2177–2184.
  50. Observer-based control for cyber-physical systems with periodic DoS attacks via a cyclic switching strategy. IEEE Transactions on Automatic Control, 65(8):3714–3721.
  51. Ultimate boundedness control for networked systems with try-once-discard protocol and uniform quantization effects. IEEE Transactions on Automatic Control, 62(12):6582–6588.

Summary

We haven't generated a summary for this paper yet.