2018
DOI: 10.1109/tcns.2017.2668901
|View full text |Cite
|
Sign up to set email alerts
|

A Jamming-Resilient Algorithm for Self-Triggered Network Coordination

Abstract: The issue of cyber-security has become ever more prevalent in the analysis and design of cyber-physical systems. In this paper, we investigate self-triggered consensus networks in the presence of communication failures caused by Denialof-Service (DoS) attacks. A general framework is considered in which the network links can fail independent of each other. By introducing a notion of Persistency-of-Communication (PoC), we provide an explicit characterization of DoS frequency and duration under which consensus ca… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
67
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 108 publications
(68 citation statements)
references
References 26 publications
0
67
0
Order By: Relevance
“…Wang consensus. It is also remarked that, as a different class of cyber attacks, the effects of jamming and DoS attacks on multi-agent consensus have recently been analyzed in [13], [28].…”
Section: Introductionmentioning
confidence: 99%
“…Wang consensus. It is also remarked that, as a different class of cyber attacks, the effects of jamming and DoS attacks on multi-agent consensus have recently been analyzed in [13], [28].…”
Section: Introductionmentioning
confidence: 99%
“…Security of CPS is no longer restricted to the cyber domain, and recent incidents such as the StuxNet malware [20] and the security flaws reported on modern cars [13,19] motivated the recent interest in security of CPS, (see for example, [1,6,26,41] and references therein). During the last decade, a number of security problems have been tackled by the control community, e.g., denial-of-service [8,14,34,45], replay attacks [27], man-in-the-middle attacks [40], false data injection [25], etc. This paper addresses the problem of state estimation when several sensors and actuators are under attack.…”
Section: Introductionmentioning
confidence: 99%
“…The works (Sundaram and Hadjicostis, 2011;Pasqualetti et al, 2012) proposed a different approach to detect and identify malicious agents, which is based on observability and reconstruction of the initial conditions. Other complementary approaches to the problem include adding trusted agents (Abbas et al, 2018) and designing self-triggered control strategies (Senejohnny et al, 2018).…”
Section: Introductionmentioning
confidence: 99%