4.7 Article

Finite-time covert attacks on reference tracking systems with unknown-but-bounded noises

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Automation & Control Systems

Security tracking control for discrete-time stochastic systems subject to cyber attacks

Yi Yu et al.

Summary: This paper addresses the security tracking problem for a class of discrete-time stochastic linear networked control systems subject to cyber attacks. The attacks considered include false data injection attacks and a class of DoS attacks. A probabilistic definition of secure trackability is proposed to describe the transient trajectory of the systems under random attacks. An observer-based dynamic output feedback controller is designed to achieve the specified probabilistic secure trackability. The problem is transformed into an input-to-state stability problem in the probabilistic sense, and matrix inequalities are solved to determine the controller parameters and the upper bound of the quadratic cost function.

ISA TRANSACTIONS (2022)

Article Automation & Control Systems

Security analysis and defense strategy of distributed filtering under false data injection attacks

Jiayu Zhou et al.

Summary: This paper investigates the distributed state estimation for multi-sensor networks under false data injection attacks. It first considers the chi(2) detector for detecting the authenticity of transmitted data and derives a necessary and sufficient condition for the insecurity of the distributed estimation system. It then proposes an algorithm for generating false data and a new protection strategy to ensure the security of the distributed estimator.

AUTOMATICA (2022)

Article Computer Science, Information Systems

Networked Security Observer-Based Reference Tracking Control of Stochastic Quadrotor UAV System Under Cyber-Attack:T-S Fuzzy Approach

Min-Yen Lee et al.

Summary: This study proposes a robust H-infinity networked security observer-based reference tracking control scheme for a stochastic quadrotor UAV system. By using a novel discrete smoothed model, the attack signals can be embedded in the UAV system state and estimated through a conventional Luenberger observer. Furthermore, a robust H-infinity networked security observer-based reference tracking control scheme is introduced to eliminate the effect of external disturbance and intrinsic fluctuation during the control process.

IEEE ACCESS (2022)

Article Engineering, Electrical & Electronic

Secure multitarget tracking over decentralized sensor networks with malicious cyber attacks

Yihua Yu et al.

Summary: This paper presents a decentralized multitarget tracking algorithm against hybrid cyber attacks, including DoS, FDI, and EPI attacks, in decentralized sensor networks. The algorithm consists of three phases: prediction, adaptation, and combination, aiming to reduce the adverse effects of cyber attacks and provide reliable tracking performance. Numerical experiments demonstrate the effectiveness of the proposed algorithm.

DIGITAL SIGNAL PROCESSING (2021)

Article Automation & Control Systems

Adaptive event-based tracking control of unmanned marine vehicle systems with DoS attack

Zehua Ye et al.

Summary: This paper investigates the tracking control problem of a network-based unmanned marine vehicle system, introducing an adaptive event-triggering mechanism to reduce communication burden and considering the impact of DoS attacks. By constructing a Lyapunov function, a Dynamic Output Feedback Control algorithm is designed to achieve the desired global exponential stability.

JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS (2021)

Article Automation & Control Systems

A zonotopic set-invariance analysis of replay attacks affecting the supervisory layer

Carlos Trapiello et al.

Summary: This paper presents a zonotopic set-invariance analysis of replay attacks targeting the communication network serving the supervisory layer of complex control systems, using an observer-based detection scheme. Two scenarios are considered based on the attacker's access to system resources, with analytical expressions derived for attack detectability under bounded uncertainties. The validity of the analysis is demonstrated through simulations on a quadruple-tank process.

SYSTEMS & CONTROL LETTERS (2021)

Article Automation & Control Systems

Active Security Control Approach Against DoS Attacks in Cyber-Physical Systems

Tongxiang Li et al.

Summary: An active security control approach is proposed for CPSs under DoS attacks, utilizing a strategy and controller to ensure timely control input updates, maintaining asymptotic stability of the system under two-channel DoS attacks. Simulations and experiments demonstrate the effectiveness of the approach.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2021)

Article Engineering, Electrical & Electronic

Robust Reset Speed Synchronization Control for an Integrated Motor-Transmission Powertrain System of a Connected Vehicle Under a Replay Attack

Xiangyang Xu et al.

Summary: This paper addresses the speed synchronization control of a connected vehicle under a replay attack, proposing a robust reset controller and delay-robust speed synchronization controller to ensure the performance of the IMT system.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2021)

Article Automation & Control Systems

Covert Attacks Through Adversarial Learning: Study of Lane Keeping Attacks on the Safety of Autonomous Vehicles

Faezeh Farivar et al.

Summary: The article discusses the improvement of road management systems through the use of artificial intelligence and IoT services, as well as the potential safety risks of covert attacks on autonomous vehicles. The design of virus attacks and intrusion detection systems is presented as a case study, with simulation tests confirming the validity and effectiveness of the proposed models.

IEEE-ASME TRANSACTIONS ON MECHATRONICS (2021)

Article Automation & Control Systems

Optimal periodic watermarking schedule for replay attack detection in cyber-physical systems

Chongrong Fang et al.

AUTOMATICA (2020)

Article Automation & Control Systems

Neutralizing zero dynamics attack on sampled-data systems via generalized holds

Jihan Kim et al.

AUTOMATICA (2020)

Article Automation & Control Systems

Security Against False Data-Injection Attack in Cyber-Physical Systems

Arpan Chattopadhyay et al.

IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS (2020)

Article Mathematics, Applied

Event-triggering-based leader-following bounded consensus of multi-agent systems under DoS attacks

Hao Liu

COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION (2020)

Article Automation & Control Systems

Switching-Like Event-Triggered Control for Networked Control Systems Under Malicious Denial of Service Attacks

Chen Peng et al.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2020)

Article Automation & Control Systems

Event-Based Tracking Control of Mobile Robot With Denial-of-Service Attacks

Yang Tang et al.

IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS (2020)

Article Automation & Control Systems

Secure remote state estimation against linear man-in-the-middle attacks using watermarking

Jiahao Huang et al.

AUTOMATICA (2020)

Article Automation & Control Systems

Two-Loop Covert Attacks Against Constant Value Control of Industrial Control Systems

Weize Li et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2019)

Article Automation & Control Systems

Attack-tolerant control and observer-based trajectory tracking for Cyber-Physical Systems

Souad Bezzaoucha Rebai et al.

EUROPEAN JOURNAL OF CONTROL (2019)

Review Automation & Control Systems

A systems and control perspective of CPS security

Seyed Mehran Dibaji et al.

ANNUAL REVIEWS IN CONTROL (2019)

Article Automation & Control Systems

Practical trajectory tracking of random. Lagrange systems

Zhaojing Wu et al.

AUTOMATICA (2019)

Article Automation & Control Systems

Stealthy Adversaries Against Uncertain Cyber-Physical Systems: Threat of Robust Zero-Dynamics Attack

Gyunghoon Park et al.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2019)

Article Automation & Control Systems

Trajectory tracking control of thrust-vectoring UAVs

Davide Invernizzi et al.

AUTOMATICA (2018)

Review Computer Science, Interdisciplinary Applications

Cyber-physical systems and their security issues

Rasim Alguliyev et al.

COMPUTERS IN INDUSTRY (2018)

Article Computer Science, Artificial Intelligence

A survey on security control and attack detection for industrial cyber-physical systems

Derui Ding et al.

NEUROCOMPUTING (2018)

Article Automation & Control Systems

Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs

Cheng-Zong Bai et al.

AUTOMATICA (2017)

Article Automation & Control Systems

Finite-time trajectory tracking control in a task space of robotic manipulators

Miroslaw Galicki

AUTOMATICA (2016)

Article Automation & Control Systems

Constrained zonotopes: A new tool for set-based estimation and fault detection

Joseph K. Scott et al.

AUTOMATICA (2016)

Article Automation & Control Systems

Ellipsoidal state-bounding-based set-membership estimation for linear system with unknown-but-bounded disturbances

Yushuang Liu et al.

IET CONTROL THEORY AND APPLICATIONS (2016)

Article Automation & Control Systems

Positive invariant sets for fault tolerant multisensor control schemes

S. Olaru et al.

INTERNATIONAL JOURNAL OF CONTROL (2010)

Article Automation & Control Systems

Tracking control for sampled-data systems with uncertain time-varying sampling intervals and delays

N. van de Wouw et al.

INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL (2010)