94 research outputs found

    Performance analysis with network-enhanced complexities: On fading measurements, event-triggered mechanisms, and cyber attacks

    Get PDF
    Copyright © 2014 Derui Ding et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.Nowadays, the real-world systems are usually subject to various complexities such as parameter uncertainties, time-delays, and nonlinear disturbances. For networked systems, especially large-scale systems such as multiagent systems and systems over sensor networks, the complexities are inevitably enhanced in terms of their degrees or intensities because of the usage of the communication networks. Therefore, it would be interesting to (1) examine how this kind of network-enhanced complexities affects the control or filtering performance; and (2) develop some suitable approaches for controller/filter design problems. In this paper, we aim to survey some recent advances on the performance analysis and synthesis with three sorts of fashionable network-enhanced complexities, namely, fading measurements, event-triggered mechanisms, and attack behaviors of adversaries. First, these three kinds of complexities are introduced in detail according to their engineering backgrounds, dynamical characteristic, and modelling techniques. Then, the developments of the performance analysis and synthesis issues for various networked systems are systematically reviewed. Furthermore, some challenges are illustrated by using a thorough literature review and some possible future research directions are highlighted.This work was supported in part by the National Natural Science Foundation of China under Grants 61134009, 61329301, 61203139, 61374127, and 61374010, the Royal Society of the UK, and the Alexander von Humboldt Foundation of Germany

    On Resilient Control of Nonlinear Systems under Denial-of-Service

    Full text link
    We analyze and design a control strategy for nonlinear systems under Denial-of-Service attacks. Based on an ISS-Lyapunov function analysis, we provide a characterization of the maximal percentage of time during which feedback information can be lost without resulting in the instability of the system. Motivated by the presence of a digital channel we consider event-based controllers for which a minimal inter-sampling time is explicitly characterized.Comment: 7 pages, 1 figur

    Event-triggered control systems under denial-of-service attacks

    Get PDF
    In this paper, we propose a systematic design framework for output-based dynamic event-triggered control (ETC) systems under Denial-of-Service (DoS) attacks. These malicious DoS attacks are intended to interfere with the communication channel causing periods in time at which transmission of measurement data is impossible. We show that the proposed ETC scheme, if well designed, can tolerate a class of DoS signals characterized by frequency and duration properties without jeopardizing the stability, performance and Zeno-freeness of the ETC system. In fact, the design procedure of the ETC condition allows trade-offs between performance, robustness to DoS attacks and utilization of communication resources. The main results will be illustrated by means of a numerical example

    Event-triggered control of cyber-physical systems under asynchronous denial of service attacks

    Get PDF
    summary:This paper addresses event-triggered control cyber-physical systems under asynchronous denial of service attacks. First, a general attack model is given, which allows us to conveniently model the asynchronous denial of service attacks within measurement and control channels in a unified framework. Then, under a delicate event triggered communication mechanism, a refined switching control mechanism is proposed to account for various attack intervals and non-attack intervals. Furthermore, sufficient conditions are derived for guaranteing the input to state stability (ISS) of the resulting closed-loop system. Finally, a simulation example of unmanned ground vehicle (UGV) is given to demonstrate the validity of the proposed main results

    Communication security of autonomous ground vehicles based on networked control systems: The optimized LMI approach

    Get PDF
    The paper presents a study of networked control systems (NCSs) that are subjected to periodic denial-of-service (DoS) attacks of varying intensity. The use of appropriate Lyapunov–Krasovskii functionals (LKFs) help to reduce the constraints of the basic conditions and lower the conservatism of the criteria. An optimization problem with constraints is formulated to select the trigger threshold, which is solved using the gradient descent algorithm (GDA) to improve resource utilization. An intelligent secure event-triggered controller (ISETC) is designed to ensure the safe operation of the system under DoS attacks. The approach is validated through experiments with an autonomous ground vehicle (AGV) system based on the Simulink platform. The proposed method offers the potential for developing effective defense mechanisms against DoS attacks in NCSs
    • …
    corecore