Keywords: DoS attack; event-triggered mechanism; cyber-physical system
@article{10_14736_kyb_2020_2_0340,
author = {Peng, Huaye and Peng, Chen and Shao, Yong and Zeng, Deliang},
title = {Event-triggered control of cyber-physical systems under asynchronous denial of service attacks},
journal = {Kybernetika},
pages = {340--362},
year = {2020},
volume = {56},
number = {2},
doi = {10.14736/kyb-2020-2-0340},
mrnumber = {4103721},
zbl = {07250728},
language = {en},
url = {http://geodesic.mathdoc.fr/articles/10.14736/kyb-2020-2-0340/}
}
TY - JOUR AU - Peng, Huaye AU - Peng, Chen AU - Shao, Yong AU - Zeng, Deliang TI - Event-triggered control of cyber-physical systems under asynchronous denial of service attacks JO - Kybernetika PY - 2020 SP - 340 EP - 362 VL - 56 IS - 2 UR - http://geodesic.mathdoc.fr/articles/10.14736/kyb-2020-2-0340/ DO - 10.14736/kyb-2020-2-0340 LA - en ID - 10_14736_kyb_2020_2_0340 ER -
%0 Journal Article %A Peng, Huaye %A Peng, Chen %A Shao, Yong %A Zeng, Deliang %T Event-triggered control of cyber-physical systems under asynchronous denial of service attacks %J Kybernetika %D 2020 %P 340-362 %V 56 %N 2 %U http://geodesic.mathdoc.fr/articles/10.14736/kyb-2020-2-0340/ %R 10.14736/kyb-2020-2-0340 %G en %F 10_14736_kyb_2020_2_0340
Peng, Huaye; Peng, Chen; Shao, Yong; Zeng, Deliang. Event-triggered control of cyber-physical systems under asynchronous denial of service attacks. Kybernetika, Tome 56 (2020) no. 2, pp. 340-362. doi: 10.14736/kyb-2020-2-0340
[1] Amin, S., Schwartz, G. A., Sastry, S.: Security of interdependent and identical networked control systems. Automatica 49 (2013), 186-192. | DOI | MR
[2] Cardenas, A. A., Amin, S., al, S. Sastry et: Secure control: Towards survivable cyber-physical systems. In: Proc. 28th International Conference on Distributed Computing Systems Workshops, Beijing 2008, pp. 495-500. | DOI
[3] Cetinkaya, A., Ishii, H., Hayakawa, T.: Networked control under random and malicious packet losses. IEEE Trans. Automat. Control 62 (2017), 2434-2449. | DOI | MR
[4] Chang, Y. H., Hu, Q., Qie, Tomlin, C. J.: Secure estimation based Kalman filter for cyber-physical systems against sensor attacks. Automatica 95 (2018), 399-412. | DOI | MR
[5] Ding, D., Han, Q.-L., al, Z. Wang et: A survey on model-based distributed control and filtering for industrial cyber-physical systems. IEEE Trans. Industr. Inform. 15 (2019), 2483-2499. | DOI
[6] Farwell, J. P., Rohozinski, R.: Stuxnet and the future of cyber war. Survival 53 (2011), 23-40. | DOI
[7] Feng, S., Tesi, P.: Resilient control under denial-of-service: Robust design. Automatica 79 (2017), 42-51. | DOI | MR
[8] Ge, X., Han, Q.-L., Wang, Z.: A threshold-parameter-dependent approach to designing distributed event-triggered $H_{\infty}$ consensus filters over sensor networks. IEEE Trans. Cybernet. 49 (2019), 1148-1159. | DOI
[9] Ge, X., Han, Q.-L., al, X.-M. Zhang et: Distributed event-triggered estimation over sensor networks: A survey. IEEE Trans. Cybernet. 50 (2019), 3, 1306-1320 | DOI
[10] Ge, X., Han, Q.-L., Zhong, M., Zhang, X.-M.: Distributed Krein space-based attack detection over sensor networks under deception attacks. Automatica 109 (2019), 108557. | DOI | MR
[11] Heemels, W. P. M. H., Donkers, M. C. F., Teel, A. R.: Periodic event-triggered control for linear systems. IEEE Trans. Automat. Control 58 (2013), 847-861. | DOI | MR
[12] Hu, S., Yue, D., al, Q.-L. Han et: Observer-based event-triggered control for networked linear systems subject to denial-of-service attacks. IEEE Trans. Cybernet. (2019), 1-13. | DOI | MR
[13] Hu, S., Yue, D., Xie, X., Chen, X., Yin, X.: Resilient event-triggered controller synthesis of networked control systems under periodic DoS jamming attacks. IEEE Trans. Cybernet. 49 (2019), 4271-4281. | DOI
[14] Kim, S., Won, Y., Park, I.-H., Eun, Y., Park, K.-J.: Cyber-physical vulnerability analysis of communication-based train control. IEEE Internet Things J. 6 (2019), 6353-6362. | DOI
[15] Kwon, Ch., Hwang, I.: Cyber attack mitigation for cyber-physical systems: hybrid system approach to controller design. IET Control Theory Appl. 10 (2016), 731-741. | DOI | MR
[16] Liang, G., Weller, S. R., Zhao, J., Luo, F., Dong, Z. Y.: The 2015 Ukraine blackout: Implications for false data injection attacks. IEEE Trans. Power Syst. 32 (2017), 3317-3318. | DOI
[17] Liu, J., Yang, M., al, X. Xie et: Finite-time ${H}_\infty$ filtering for state-dependent uncertain systems with event-triggered mechanism and multiple attacks. IEEE Trans. Circuits Systems I: Regular Papers /2019), 1-14.. | MR
[18] Lu, A.-Y., Yang, G.-H.: Input-to-state stabilizing control for cyber-physical systems with multiple transmission channels under denial of service. IEEE Trans. Automat. Control 63 (2018), 1813-1820. | DOI | MR
[19] Millan, P., Orihuela, L., al, I. Jurado et: Distributed estimation in networked systems under periodic and event-based communication policies. Int. J. Systems Sci. 46 (2015), 139-151. | DOI | MR
[20] Peng, C., Sun, H. T.: Switching-like event-triggered control for networked control systems under malicious denial of service attacks. IEEE Trans. Automat. Control (2020) | DOI | MR
[21] Mo, Y., Weerakkody, S., Sinopoli, B.: Physical authentication of control systems: Designing watermarked control inputs to detect counterfeit sensor outputs. IEEE Control Systems Mag. 35 (2015), 93-109. | DOI | MR
[22] Muehlebach, M., Trimpe, S.: Distributed event-based state estimation for networked systems: An LMI approach. IEEE Trans. Automat. Control 63 (2018), 269-276. | DOI | MR
[23] Pasqualetti, F., Dorfler, F., Bullo, F.: Attack detection and identification in cyber-physical systems. IEEE Trans. Automat. Control 58 (2013), 2715-2729. | DOI | MR
[24] Peng, C., Li, J., Fei, M.: Resilient event-triggering $H_\infty$ load frequency control for multi-area power systems with energy-limited DoS attacks. IEEE Trans. Power Syst. 32 (2017), 4110-4118. | DOI
[25] Peng, C., Ma, S., Xie, X.: Observer-based non-PDC control for networked T-S fuzzy systems with an event-triggered Communication. IEEE Trans. Cybernet. 47 (2017), 2279-2287. | DOI
[26] Peng, C., Sun, H., Yang, M., Wang, Y.: A survey on security communication and control for smart grids under malicious cyber attacks. IEEE Trans. Systems Man Cybernet.: Systems 49 (2019), 1554-1569. | DOI | MR
[27] Persis, C. de, Tesi, P.: Input-to-state stabilizing control under denial-of-service. IEEE Trans. Automat. Control 60 (2015), 2930-2944. | DOI | MR
[28] Seuret, A., Gouaisbaut, F.: Wirtinger-based integral inequality: Application to time-delay systems. Automatica 49 (2013), 2860-2866. | DOI | MR
[29] Sun, Y.-Ch., Yang, G.-H.: Event-triggered resilient control for cyber-physical systems under asynchronous DoS attacks. Inform. Sci. 465 (2018), 340-352. | DOI | MR
[30] Tabuada, P.: Event-triggered real-time scheduling of stabilizing control tasks. IEEE Trans. Automat. Control 52 (2007), 1680-1685. | DOI | MR
[31] Do, L. Van, Fillatre, L., al, I. Nikiforov et: Security of SCADA systems against cyber-physical attacks. IEEE Aerospace Electron. Systems Mag. 32 (2017), 28-45. | DOI
[32] Xiaon, S., Han, Q.-L., Ge, X., Zhang, Y.: Secure distributed finite-time filtering for positive systems over sensor networks under deception attacks. IEEE Trans. Cybernet. 50 (2019), 3, 1220-1229. | DOI
[33] Xie, X., Yue, D., Peng, Ch.: Relaxed real-time scheduling stabilization of discrete-time takagi-sugeno fuzzy systems via a alterable-weights-based ranking switching mechanism. IEEE Trans. Cybernet. 26 (2018), 3808-3819. | DOI
[34] Zhang, X.-M., Han, Q.-L., al, X. Ge et: Networked control systems: A survey of trends and techniques. IEEE/CAA J. Automat. Sinica (2019), 1-17. | DOI | MR
[35] Zhang, X.-M., Han, Q.-L., al, X. Ge et: Resilient control design based on a sampled-data model for a class of networked control systems under denial-of-service attacks. IEEE Trans. Cybernet. (2019), 1-11.
[36] Zhang, X.-M., Han, Q.-L., Seuret, A., Gouaisbaut, F.: An improved reciprocally convex inequality and an augmented Lyapunov-Krasovskii functional for stability of linear systems with time-varying delay. Automatica 84 (2017), 221-226. | DOI | MR
Cité par Sources :