6 research outputs found

    Dual-terminal event triggered control for cyber-physical systems under false data injection attacks

    Get PDF
    summary:This paper deals with the problem of security-based dynamic output feedback control of cyber-physical systems (CPSs) with the dual-terminal event triggered mechanisms (DT-ETM) under false data injection (FDI) attacks. Considering the limited attack energy, FDI attacks taking place in transmission channels are modeled as extra bounded disturbances for the resulting closed-loop system, thus enabling HH_{\infty} performance analysis with a suitable ϱ\varrho attenuation level. Then two buffers at the controller and actuator sides are skillfully introduced to cope with the different transmission delays in such a way to facilitate the subsequent security analysis. Next, a dynamic output feedback security control (DOFSC) model based on the DT-ETM schemes under FDI attacks is well constructed. Furthermore, novel criteria for stability analysis and robust stabilization are carefully derived by exploiting Lyapunov-Krasovskii theory and LMIs technique. Finally, an illustrative example is provided to show the effectiveness of the proposed method

    Finite-time decentralized event-triggered feedback control for generalized neural networks with mixed interval time-varying delays and cyber-attacks

    Get PDF
    This article investigates the finite-time decentralized event-triggered feedback control problem for generalized neural networks (GNNs) with mixed interval time-varying delays and cyber-attacks. A decentralized event-triggered method reduces the network transmission load and decides whether sensor measurements should be sent out. The cyber-attacks that occur at random are described employing Bernoulli distributed variables. By the Lyapunov-Krasovskii stability theory, we apply an integral inequality with an exponential function to estimate the derivative of the Lyapunov-Krasovskii functionals (LKFs). We present new sufficient conditions in the form of linear matrix inequalities. The main objective of this research is to investigate the stochastic finite-time boundedness of GNNs with mixed interval time-varying delays and cyber-attacks by providing a decentralized event-triggered method and feedback controller. Finally, a numerical example is constructed to demonstrate the effectiveness and advantages of the provided control scheme

    Estado de arte de publicaciones sobre ciberataques a dispositivos de ciudades inteligentes.

    Get PDF
    El término “ciudad inteligente” existe desde hace un tiempo, pero ha llegado a ser más habitual últimamente . La idea es que al utilizar la tecnología en dispositivos para hacer que las ciudades sean más habitables, sostenibles y eficientes, ofreciendo mejores servicios a sus residentes y convertirse en mejores lugares para trabajar. Pero a medida que más ciudades invierten en estos proyectos, también se exponen a ataques cibernéticos que podrían destruir sistemas de infraestructura críticos, como redes eléctricas, tráfico, salud inteligente y seguridad ciudadana. Para ejecutar este estado de arte se va a realizar (SMap) mapeo sistemático y (SLRev) revisión de lectura sistemática sobre los ciberataques que constan en publicaciones científicas contra las ciudades inteligentes en su privacidad de los datos. SLRev nos ayudó para conseguir la taxonomía de ciberataques que vulneran a los dispositivos los cuales se dividen en CÍA, dando como fruto los ataques más relevantes para cada clasificación. En primer lugar, el ciberataque que vulnera la confidencialidad es Spoofing con un porcentaje de 16.22%, en segundo lugar, el ciberataque que vulnera la Integridad es: Inyección de datos con un porcentaje de 42.31% y en tercer lugar el ciberataque que vulnera la disponibilidad es DDoS con un porcentaje de 42.86%. Con esto se llega a la conclusión que un ciberataque es una acción deliberada para interrumpir, negar, degradar o destruir datos y/o información, puede estar dirigido a cualquier tipo de organización y se los puede detectar mediante diversas técnicas de Inteligencia Artificial.The term “smart city” is means that by using technology and devices transform the cities making more liveable, sustainable and efficient; to give better services to their residents and become better places to live and work. However, when more cities invest in these projects, they expose themselves to critical infrastructure cyberattacks, such as power systems, traffic, health services, etc. This investigation executed a state of the art using: (SMap) systematic mapping and (SLRev) systematic reading review about cyberattacks that appear in scientific publications against smart cities or their data privacy. SLRev helped to obtain the taxonomy of cyberattacks that compromise their confidentiality, integrity or availability. The research results show the most relevant attacks for each classification, first is revealed that cyberattack that violates confidentiality is spoofing with a 16.22%; second is the cyber-attack againts the Integrity that is data injection with a 42.31%; and third is the attack to violate availability is DDoS with a 42.86%. Finally, a cyberattack is a deliberate action to interrupt, deny, degrade or destroy data and/or the information that it can directed at any organization but it may detected through various Artificial Intelligence Techniques
    corecore