4.6 Article

Event-based security control for discrete-time stochastic systems

期刊

IET CONTROL THEORY AND APPLICATIONS
卷 10, 期 15, 页码 1808-1815

出版社

INST ENGINEERING TECHNOLOGY-IET
DOI: 10.1049/iet-cta.2016.0135

关键词

discrete time systems; stochastic systems; probability; control system synthesis; feedback; closed loop systems; discrete-time stochastic systems; event-based security control problem; multiplicative noises; denial-of-service attacks; DoS attacks; deception attacks; event-triggered mechanism; measurement signal; attack model; conditional probability; Bernoulli distributed white sequences; mean-square security domain; output feedback controller design; closed-loop system; stochastic analysis techniques; sufficient conditions; linear matrix inequalities; nonlinear constraints

资金

  1. Royal Society of the UK
  2. National Natural Science Foundation of China [61329301, 61573246, 61374039]
  3. Shanghai Rising-Star Programme of China [16QA1403000]
  4. Program for Capability Construction of Shanghai Provincial Universities [15550502500]
  5. Alexander von Humboldt Foundation of Germany

向作者/读者索取更多资源

This study is concerned with the event-based security control problem for a class of discrete-time stochastic systems with multiplicative noises subject to both randomly occurring denial-of-service (DoS) attacks and randomly occurring deception attacks. An event-triggered mechanism is adopted with hope to reduce the communication burden, where the measurement signal is transmitted only when a certain triggering condition is violated. A novel attack model is proposed to reflect the randomly occurring behaviours of the DoS attacks as well as the deception attacks within a unified framework via two sets of Bernoulli distributed white sequences with known conditional probabilities. A new concept of mean-square security domain is put forward to quantify the security degree. The authors aim to design an output feedback controller such that the closed-loop system achieves the desired security. By using the stochastic analysis techniques, some sufficient conditions are established to guarantee the desired security requirement and the control gain is obtained by solving some linear matrix inequalities with non-linear constraints. A simulation example is utilised to illustrate the usefulness of the proposed controller design scheme.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据