2020
DOI: 10.1109/access.2020.3032717
|View full text |Cite
|
Sign up to set email alerts
|

Event-Triggered H Filtering for Networked Systems Under Hybrid Probability Deception Attacks

Abstract: In this paper, the deception attacks are the research object, which are widely concerned in cyber attacks, and the feasibility of H ∞ filtering for networked system based on event-triggered mechanism (ETM) is discussed. Firstly, in order to avoid waste of limited bandwidth, the ETM are introduced. At the same time, considering the impact of two types of different deception attacks, we introduce respectively two sets of random variables satisfying the Bernoulli distribution to depict the probability of the data… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(10 citation statements)
references
References 34 publications
0
10
0
Order By: Relevance
“…Therefore, based on Definition (2.4), the over all closed loop system ( 16) is mean-square asymptotically stable. Furthermore, it follows from (41) that…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Therefore, based on Definition (2.4), the over all closed loop system ( 16) is mean-square asymptotically stable. Furthermore, it follows from (41) that…”
Section: Resultsmentioning
confidence: 99%
“…40 Simultaneously, the notion of hybrid cyber attacks, which combine several different cyber attack, was proposed. [41][42][43] Furthermore, many results have been presented to examine cyber-attacks when an event-triggered strategy is used to solve the stabilization problem of a networked control system. [42][43][44] So far as our author knows, no one has proposed an adaptive event-triggered filter method for complex dynamical networks that could be attacked by hybrid cyber attacks.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…With the advancement of networks and modern technology, cyber security has recently become more essential. As a result, 36 there has been a strong interest in investigating the impact of various cyber‐attacks on CNs. In particular, cyber‐attacks have been considered a leading challenge to network security, with the goal of disrupting control performance and degrading stability by destroying critical data transmitted across a network 37 .…”
Section: Introductionmentioning
confidence: 99%
“…DoS attacks could randomly occur and can be modeled by the Bernoulli distribution process or Markov process with known statistical information [23]. Furthermore, for the case with unknown statistical information, the resulting DoS attacks are that CPSs (Cyber-Physical Systems) are, in essence, a class of switched systems consisting of a closed-loop subsystem in attack free and an open-loop subsystem in attack present [5], [34]. As such, the indicator of average dwell time can be employed to reflect the permitted duration [29].…”
Section: Introductionmentioning
confidence: 99%