scholarly journals Output Feedback NCS of DoS Attacks Triggered by Double-Ended Events

2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Xinzhi Feng ◽  
Yang Yang ◽  
Xiaozhong Qi ◽  
Chunming Xu ◽  
Ze Ji

In recent years, the research of the network control system under the event triggering mechanism subjected to network attacks has attracted foreign and domestic scholars’ wide attention. Among all kinds of network attacks, denial-of-service (DoS) attack is considered the most likely to impact the performance of NCS significantly. The existing results on event triggering do not assess the occurrence of DoS attacks and controller changes, which will reduce the control performance of the addressed system. Aiming at the network control system attacked by DoS, this paper combines double-ended elastic event trigger control, DoS attack, and quantitative feedback control to study the stability of NCS with quantitative feedback of DoS attack triggered by a double-ended elastic event. Simulation examples show that this method can meet the requirements of control performance and counteract the known periodic DoS attacks, which save limited resources and improve the system’s antijamming ability.

2015 ◽  
Vol 24 (2) ◽  
pp. 199-213
Author(s):  
Zouheir Trabelsi ◽  
Mohamed Al Hemairy ◽  
Mohammad M. Masud

AbstractBiometrics readers are deployed in many public sites and are used for user identification and verification. Nowadays, most biometrics readers can be connected to local area networks, and consequently, they are potential targets for network attacks. This article investigates the robustness of several fingerprint and iris readers against common denial of service (DoS) attacks. This investigation has been conducted using a set of laboratory experiments and DoS attack generator tools. The experiments show clearly that the tested biometric readers are very vulnerable to common DoS attacks, and their recognition performances deteriorate significantly once they are under DoS attacks. Finally, the article lists some security consideration that should be taken into consideration when designing secure biometrics readers.


2013 ◽  
Vol 457-458 ◽  
pp. 788-792
Author(s):  
Guo Qing Qiu ◽  
Ming Li ◽  
Yi Long ◽  
Yong Can Yu

Automatic grouting is a very important part in the well drilling process. The stability of grouting system is one of the factors affecting the drilling accident. This paper presents a automatic grouting method based on network control system. In order to find out the influence on the control performance after using network in the system, paper sets up the system model with the simulation toolbox TrueTime-2.0 of MATLAB and separately studies the influence on the control effect by network delay and data packet loss according to the simulation result. The results prove that both the network delay and data packet loss all make great differences on the control performance of system, so we need to take appropriate strategies to reduce the influence in the actual designs.


Author(s):  
A. K. Kanaev ◽  
◽  
A. N. Gorbach ◽  
E. V. Oparin, ◽  
◽  
...  

2013 ◽  
Vol 846-847 ◽  
pp. 795-798
Author(s):  
Jiao Meng ◽  
Qi Hua Xu ◽  
Xiao Xiao

Improving network control system---NCS reliability and safety has important practical significance because NCS is a hot research subject in these years. Fault diagnosis methods are researched in this paper according to NCS with long-time delay and data packet loss. Firstly, given a NCS with long-time delay, a state observer is structured. Secondly, make the state estimation error equation equivalent to an asynchronous dynamical system having event incidence constraint according to whether the system having data packets loss. The problem of fault diagnosis is converted to filtering problem through structuring filtering residual system based on the observer, then giving a corresponding filter designing algorithm. The designed fault diagnosis filter system not only make sure the stability of the closed loop system but also make the residual systems norm less than given reduction level. Finally, the simulation results prove that the algorithm can diagnose faults effectively.


Sign in / Sign up

Export Citation Format

Share Document