4.6 Article

Secure Adaptive-Event-Triggered Filter Design With Input Constraint and Hybrid Cyber Attack

Journal

IEEE TRANSACTIONS ON CYBERNETICS
Volume 51, Issue 8, Pages 4000-4010

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TCYB.2020.3003752

Keywords

Cyberattack; Adaptation models; Adaptive systems; Control systems; Symmetric matrices; Denial-of-service attack; Adaptive event-triggered scheme; deception attacks; denial-of-service (DoS) attacks; hybrid cyber attack; secure filtering

Funding

  1. National Natural Science Foundation of China [61973152, 61903182]
  2. Natural Science Foundation of Jiangsu Province of China [BK20171481]
  3. Natural Science Foundation of the Jiangsu Higher Education Institutions of China [19KJA510005]
  4. Qing Lan Project

Ask authors/readers for more resources

This article investigates the problem of secure adaptive-event-triggered filter design with input constraint and hybrid cyber attack. A new model of hybrid cyber attack is established for filter design, and an adaptive event-triggered scheme is applied to save communication resource. Moreover, a novel adaptive-event-triggered filtering error model is established and sufficient conditions for system stability are obtained through Lyapunov stability theory and linear matrix inequality technique.
The problem of secure adaptive-event-triggered filter design with input constraint and hybrid cyber attack is investigated in this article. First, a new model of hybrid cyber attack, which considers a deception attack, a replay attack, and a denial-of-service (DoS) attack, is established for filter design. Second, an adaptive event-triggered scheme is applied to the filter design to save the limited communication resource. In addition, a novel adaptive-event-triggered filtering error model is established with the consideration of hybrid cyber attack and input constraint. Moreover, based on the Lyapunov stability theory and linear matrix inequality technique, sufficient conditions are obtained to guarantee the augmented system stability, and the parameters of the designed filter are presented with explicit forms. Finally, the proposed method is validated by simulation examples.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available