Event-triggered control of networked switched systems under network attacks

Author(s):  
Yuchen Han ◽  
Jie Lian

This paper is concerned with the event-triggered control (ETC) problem for switched systems in networked environments, which are suffered from denial-of-service (DoS) attack and deception attack. Considering that the packet in networked switched systems contains the sampled state and switching signal, DoS attack prevents the packet transmission to cause the zero input, while deception attack falsifies the packet to cause the asynchronous control input with nonlinear disturbance. First, the probabilistic characterization of invalid packet transmissions caused by two different attack models is constructed, namely the ratio of the number of packet transmissions suffering from network attacks to the total number of packet transmissions. Second, a suitable ETC scheme is designed to determine the next triggering instant, which guarantees that the value of Lyapunov function cannot exceed a given restriction and updates the control input at switching instant. After that, the average dwell time and control gains are designed to guarantee the almost sure asymptotic stability of such systems. Finally, a numerical simulation is given to verify the effectiveness of the theoretical results.

Author(s):  
Yilin Shang ◽  
Leipo Liu ◽  
Yifan Di ◽  
Zhumu Fu ◽  
Bo Fan

This paper considers the problem of guaranteed cost and finite-time event-triggered control of fractional-order switched systems. Firstly, an event-triggered scheme including both the information of current state and an exponential decay function is proposed, and a novel cost function that adopts the characteristics of fractional-order integration is presented. Secondly, some sufficient conditions are derived to guarantee that the corresponding closed-loop system is finite-time stable with a certain cost upper bound, using multiple Lyapunov functions and average dwell time approach. Meanwhile, the event-triggered parameters and state feedback gains are simultaneously obtained via solving linear matrix inequalities. Moreover, Zeno behavior does not exist by finding a positive lower bound of the triggered interval. Finally, an example about fractional-order switched electrical circuit is provided to show the effectiveness of the proposed method.


2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Xinzhi Feng ◽  
Yang Yang ◽  
Xiaozhong Qi ◽  
Chunming Xu ◽  
Ze Ji

In recent years, the research of the network control system under the event triggering mechanism subjected to network attacks has attracted foreign and domestic scholars’ wide attention. Among all kinds of network attacks, denial-of-service (DoS) attack is considered the most likely to impact the performance of NCS significantly. The existing results on event triggering do not assess the occurrence of DoS attacks and controller changes, which will reduce the control performance of the addressed system. Aiming at the network control system attacked by DoS, this paper combines double-ended elastic event trigger control, DoS attack, and quantitative feedback control to study the stability of NCS with quantitative feedback of DoS attack triggered by a double-ended elastic event. Simulation examples show that this method can meet the requirements of control performance and counteract the known periodic DoS attacks, which save limited resources and improve the system’s antijamming ability.


2015 ◽  
Vol 24 (2) ◽  
pp. 199-213
Author(s):  
Zouheir Trabelsi ◽  
Mohamed Al Hemairy ◽  
Mohammad M. Masud

AbstractBiometrics readers are deployed in many public sites and are used for user identification and verification. Nowadays, most biometrics readers can be connected to local area networks, and consequently, they are potential targets for network attacks. This article investigates the robustness of several fingerprint and iris readers against common denial of service (DoS) attacks. This investigation has been conducted using a set of laboratory experiments and DoS attack generator tools. The experiments show clearly that the tested biometric readers are very vulnerable to common DoS attacks, and their recognition performances deteriorate significantly once they are under DoS attacks. Finally, the article lists some security consideration that should be taken into consideration when designing secure biometrics readers.


2020 ◽  
Vol 2020 ◽  
pp. 1-11
Author(s):  
Lvhang Wang ◽  
Yongheng Pang ◽  
Bowen Zhou ◽  
Shuowei Jin

A cloud-fog computing-based event-triggered distributed energy optimization management method based on predictive attack compensation is proposed to address the problem of denial of service (DoS) attack, the complexity of computation, and the bandwidth constraint on the communication network in microgrids. Firstly, in order to optimize the energy supply of microgrid and maximize the profit, the minimum cost function of maintaining the balance of supply and demand is given considering the power loss of microgrid. Secondly, considering the problem of bandwidth-constrained communication, a distributed event-triggered consensus algorithm is proposed based on fog computing. Thirdly, a model predictive compensation algorithm based on cloud computing is proposed, which uses the mismatched power between supply and demand at the historical time before the attack to predict and compensate the missing data of the agent power at the current time and many times after attack. Finally, the effectiveness of the proposed method is verified by simulation results.


2014 ◽  
Vol 2014 ◽  
pp. 1-8 ◽  
Author(s):  
Changgeng Luo ◽  
Xinsheng Wang ◽  
Yu Ren

Considering the constrained communication data rate and compute capability that commonly exists in multiagent systems, this paper modifies a current consensus strategy by introducing a kind of dynamic quantizer in both state feedback and control input and updates dynamic quantizers by employing event-triggered strategies, thus forming a new quantitative consensus strategy. The numerical simulation example is built for state quantization and the results show the consistency with expectation.


Sign in / Sign up

Export Citation Format

Share Document