6 research outputs found
Dual-terminal event triggered control for cyber-physical systems under false data injection attacks
summary:This paper deals with the problem of security-based dynamic output feedback control of cyber-physical systems (CPSs) with the dual-terminal event triggered mechanisms (DT-ETM) under false data injection (FDI) attacks. Considering the limited attack energy, FDI attacks taking place in transmission channels are modeled as extra bounded disturbances for the resulting closed-loop system, thus enabling performance analysis with a suitable attenuation level. Then two buffers at the controller and actuator sides are skillfully introduced to cope with the different transmission delays in such a way to facilitate the subsequent security analysis. Next, a dynamic output feedback security control (DOFSC) model based on the DT-ETM schemes under FDI attacks is well constructed. Furthermore, novel criteria for stability analysis and robust stabilization are carefully derived by exploiting Lyapunov-Krasovskii theory and LMIs technique. Finally, an illustrative example is provided to show the effectiveness of the proposed method
Recommended from our members
Distributed Proportional–Integral Fuzzy State Estimation Over Sensor Networks Under Energy-Constrained Denial-of-Service Attacks
10.13039/501100001809-National Natural Science Foundation of China (Grant Number: 61933007, 62273087, 61973102, U22A2044 and 62233012);
Shanghai Pujiang Program of China (Grant Number: 22PJ1400400);
Royal Society of the U (Grant Number: 0000DONOTUSETHIS0000.K);
Alexander von Humboldt Foundation of Germany
Finite-time decentralized event-triggered feedback control for generalized neural networks with mixed interval time-varying delays and cyber-attacks
This article investigates the finite-time decentralized event-triggered feedback control problem for generalized neural networks (GNNs) with mixed interval time-varying delays and cyber-attacks. A decentralized event-triggered method reduces the network transmission load and decides whether sensor measurements should be sent out. The cyber-attacks that occur at random are described employing Bernoulli distributed variables. By the Lyapunov-Krasovskii stability theory, we apply an integral inequality with an exponential function to estimate the derivative of the Lyapunov-Krasovskii functionals (LKFs). We present new sufficient conditions in the form of linear matrix inequalities. The main objective of this research is to investigate the stochastic finite-time boundedness of GNNs with mixed interval time-varying delays and cyber-attacks by providing a decentralized event-triggered method and feedback controller. Finally, a numerical example is constructed to demonstrate the effectiveness and advantages of the provided control scheme
Recommended from our members
Ultimately Bounded PID Control For T-S Fuzzy Systems Under FlexRay Communication Protocol
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to
final publication. Citation information: DOI10.1109/TFUZZ.2023.3282044, IEEE Transactions on Fuzzy SystemsNational Natural Science Foundation of China (Grant Number: 61933007, 62273087, 62273180, U21A2019 and 62233012);
Shanghai Pujiang Program of China (Grant Number: 22PJ1400400);
Hainan Province Science and Technology Special Fund of China (Grant Number: ZDYF2022SHFZ105);
Royal Society of the UK;
Alexander von Humboldt Foundation of Germany
Estado de arte de publicaciones sobre ciberataques a dispositivos de ciudades inteligentes.
El término “ciudad inteligente” existe desde hace
un tiempo, pero ha llegado a ser más habitual últimamente . La
idea es que al utilizar la tecnología en dispositivos para hacer que
las ciudades sean más habitables, sostenibles y eficientes, ofreciendo
mejores servicios a sus residentes y convertirse en mejores
lugares para trabajar. Pero a medida que más ciudades invierten
en estos proyectos, también se exponen a ataques cibernéticos
que podrían destruir sistemas de infraestructura críticos, como
redes eléctricas, tráfico, salud inteligente y seguridad ciudadana.
Para ejecutar este estado de arte se va a realizar (SMap) mapeo
sistemático y (SLRev) revisión de lectura sistemática sobre los
ciberataques que constan en publicaciones científicas contra las
ciudades inteligentes en su privacidad de los datos. SLRev nos
ayudó para conseguir la taxonomía de ciberataques que vulneran
a los dispositivos los cuales se dividen en CÍA, dando como
fruto los ataques más relevantes para cada clasificación. En
primer lugar, el ciberataque que vulnera la confidencialidad es
Spoofing con un porcentaje de 16.22%, en segundo lugar, el
ciberataque que vulnera la Integridad es: Inyección de datos
con un porcentaje de 42.31% y en tercer lugar el ciberataque
que vulnera la disponibilidad es DDoS con un porcentaje de
42.86%. Con esto se llega a la conclusión que un ciberataque
es una acción deliberada para interrumpir, negar, degradar o
destruir datos y/o información, puede estar dirigido a cualquier
tipo de organización y se los puede detectar mediante diversas
técnicas de Inteligencia Artificial.The term “smart city” is means that by using
technology and devices transform the cities making more liveable,
sustainable and efficient; to give better services to their residents
and become better places to live and work. However, when more
cities invest in these projects, they expose themselves to critical
infrastructure cyberattacks, such as power systems, traffic, health
services, etc. This investigation executed a state of the art using:
(SMap) systematic mapping and (SLRev) systematic reading
review about cyberattacks that appear in scientific publications
against smart cities or their data privacy. SLRev helped to
obtain the taxonomy of cyberattacks that compromise their
confidentiality, integrity or availability. The research results show
the most relevant attacks for each classification, first is revealed
that cyberattack that violates confidentiality is spoofing with a
16.22%; second is the cyber-attack againts the Integrity that is
data injection with a 42.31%; and third is the attack to violate
availability is DDoS with a 42.86%. Finally, a cyberattack is a deliberate
action to interrupt, deny, degrade or destroy data and/or
the information that it can directed at any organization but it
may detected through various Artificial Intelligence Techniques