2019
DOI: 10.1016/j.neucom.2019.06.050
|View full text |Cite
|
Sign up to set email alerts
|

A virtual actuator approach for the secure control of networked LPV systems under pulse-width modulated DoS attacks

Abstract: In this paper, we formulate and analyze the problem of secure control in the context of networked linear parameter varying (LPV) systems. We consider an energy-constrained, pulse-width modulated (PWM) jammer, which corrupts the control communication channel by performing a denial-of-service (DoS) attack. In particular, the malicious attacker is able to erase the data sent to one or more actuators. In order to achieve secure control, we propose a virtual actuator technique under the assumption that the behavior… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
21
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3

Relationship

3
5

Authors

Journals

citations
Cited by 25 publications
(21 citation statements)
references
References 68 publications
0
21
0
Order By: Relevance
“…In this paper, the forward channel between controller and actuator is attacked by cyber attacker and the feedback channel between observer and controller is assumed as a secured and reliable network channel [12]. For εk, given that right left right left right left right left right left right left0.278em 2em 0.278em 2em 0.278em 2em 0.278em 2em 0.278em 2em 0.278em3ptPr(εk=0)=ε¯,Pr(εk=1)=1ε¯=ε, where εfalse¯false[0,1false] indicates the packet dropout rate.…”
Section: Problem Statement and Preliminariesmentioning
confidence: 99%
See 2 more Smart Citations
“…In this paper, the forward channel between controller and actuator is attacked by cyber attacker and the feedback channel between observer and controller is assumed as a secured and reliable network channel [12]. For εk, given that right left right left right left right left right left right left0.278em 2em 0.278em 2em 0.278em 2em 0.278em 2em 0.278em 2em 0.278em3ptPr(εk=0)=ε¯,Pr(εk=1)=1ε¯=ε, where εfalse¯false[0,1false] indicates the packet dropout rate.…”
Section: Problem Statement and Preliminariesmentioning
confidence: 99%
“…Specially, there exist many threats in wireless communication networks for the NCSs due to channel fading, interference, scattering, cyber attacks and so on. Cyber attacks are major threats to NCSs and can be classified into deception attacks [6–8] and denial of service (DoS) attacks [9–12]. Deception attacks are to destroy the integrity of data by injecting false information.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…and physical processes has led to the introduction of a new class of systems, known as cyber-physical systems (CPSs) [1]. CPSs are characterized by a higher efficiency, but also by bigger vulnerabilities, which can be exploited by a malicious agent in order to perform a cyber attacks, resulting in some kind of damage or economical loss [2], [3].…”
Section: Introductionmentioning
confidence: 99%
“…Cyber attacks are different from faults due to the fact that they do not affect only the physical layer of the CPS, but the cyber one as well. In order to make a control system resilient in face of such attacks, attack detection and secure control techniques must be developed [5], [6].…”
Section: Introductionmentioning
confidence: 99%