4.6 Article

Secure Adaptive-Event-Triggered Filter Design With Input Constraint and Hybrid Cyber Attack

期刊

IEEE TRANSACTIONS ON CYBERNETICS
卷 51, 期 8, 页码 4000-4010

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TCYB.2020.3003752

关键词

Cyberattack; Adaptation models; Adaptive systems; Control systems; Symmetric matrices; Denial-of-service attack; Adaptive event-triggered scheme; deception attacks; denial-of-service (DoS) attacks; hybrid cyber attack; secure filtering

资金

  1. National Natural Science Foundation of China [61973152, 61903182]
  2. Natural Science Foundation of Jiangsu Province of China [BK20171481]
  3. Natural Science Foundation of the Jiangsu Higher Education Institutions of China [19KJA510005]
  4. Qing Lan Project

向作者/读者索取更多资源

This article investigates the problem of secure adaptive-event-triggered filter design with input constraint and hybrid cyber attack. A new model of hybrid cyber attack is established for filter design, and an adaptive event-triggered scheme is applied to save communication resource. Moreover, a novel adaptive-event-triggered filtering error model is established and sufficient conditions for system stability are obtained through Lyapunov stability theory and linear matrix inequality technique.
The problem of secure adaptive-event-triggered filter design with input constraint and hybrid cyber attack is investigated in this article. First, a new model of hybrid cyber attack, which considers a deception attack, a replay attack, and a denial-of-service (DoS) attack, is established for filter design. Second, an adaptive event-triggered scheme is applied to the filter design to save the limited communication resource. In addition, a novel adaptive-event-triggered filtering error model is established with the consideration of hybrid cyber attack and input constraint. Moreover, based on the Lyapunov stability theory and linear matrix inequality technique, sufficient conditions are obtained to guarantee the augmented system stability, and the parameters of the designed filter are presented with explicit forms. Finally, the proposed method is validated by simulation examples.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据