2022
DOI: 10.1002/rnc.6144
|View full text |Cite
|
Sign up to set email alerts
|

Event‐based secure leader‐following consensus for cyber‐physical systems under denial‐of‐service attacks

Abstract: This article studies secure leader-following consensus for cyber-physical systems (CPSs) under energy-limited denial-of-service (DoS) attacks. First, an event-based data update strategy is designed to reduce the communication occupancy rate of limited bandwidth. In particular, both Zeno behavior and singular triggering are excluded. Second, the irregular topological combinations caused by DoS attacks are transformed into switching topologies subject to a Markov chain. On this basis, a novel distributed resilie… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(18 citation statements)
references
References 27 publications
0
18
0
Order By: Relevance
“…It is obvious that the observer exists when the conditions in Theorem 2 hold. The validity proof of observer (11) can be divided into two cases. First, we will prove that the state estimation errors are bounded when k ∈ [k 0 , k 0 + 𝜏).…”
Section: Matrixmentioning
confidence: 99%
See 2 more Smart Citations
“…It is obvious that the observer exists when the conditions in Theorem 2 hold. The validity proof of observer (11) can be divided into two cases. First, we will prove that the state estimation errors are bounded when k ∈ [k 0 , k 0 + 𝜏).…”
Section: Matrixmentioning
confidence: 99%
“…The necessary conditions for the existence of the finite time observer (11) are given below and its effectiveness can be proved.…”
Section: This Means Thatmentioning
confidence: 99%
See 1 more Smart Citation
“…Some robust control strategies have been developed against DoS attacks. [10][11][12][13] The other is deception attacks that modify useful data to compromise the data integrity. Compared with DoS attacks, deception attacks are more dangerous and bring more security problems.…”
Section: Introductionmentioning
confidence: 99%
“…One is the denial‐of‐service (DoS) attacks, which jam the communication channel and prevent the exchange of significant information between subsystem links by sending a large amount of useless data. Some robust control strategies have been developed against DoS attacks 10‐13 . The other is deception attacks that modify useful data to compromise the data integrity.…”
Section: Introductionmentioning
confidence: 99%