2017
DOI: 10.1016/j.ifacol.2017.08.139
|View full text |Cite
|
Sign up to set email alerts
|

Networked Systems under Denial-of-Service: Co-located vs. Remote Control Architectures

Abstract: In this paper, we study networked systems in the presence of Denial-of-Service (DoS) attacks, namely attacks that prevent transmissions over the communication network. Previous studies have shown that co-located architectures (control unit co-located with the actuators and networked sensor channel) can ensure a high level of robustness against DoS. However, co-location requires a wired or dedicated actuator channel, which could not meet flexibility and cost requirements. In this paper we consider a control arc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
38
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 12 publications
(39 citation statements)
references
References 24 publications
1
38
0
Order By: Relevance
“…Then, it can be obtained that righte(t)lefteμA(tzriδ)e(t+iδ)+λg(tzriδ)wt+v(t)+xi|trightrightleftε1ε2wt+λg(δ)(wt+v(t)+e(t)+x(t)), where ε2=maxfalse{eμAδ,1false} and λ=maxfalse{‖‖normalΦ,‖‖B,1false}. Notice that sans-serifgfalse(0false)=0 and sans-serifgfalse(·false) is monotonically increasing with t , following the same argument as in theorem 1 in the work of De Persis and Tesi and lemma 2 in the work of Feng and Tesi in which the parameter σ is selected such that λsans-seri...…”
Section: Resultsmentioning
confidence: 99%
See 4 more Smart Citations
“…Then, it can be obtained that righte(t)lefteμA(tzriδ)e(t+iδ)+λg(tzriδ)wt+v(t)+xi|trightrightleftε1ε2wt+λg(δ)(wt+v(t)+e(t)+x(t)), where ε2=maxfalse{eμAδ,1false} and λ=maxfalse{‖‖normalΦ,‖‖B,1false}. Notice that sans-serifgfalse(0false)=0 and sans-serifgfalse(·false) is monotonically increasing with t , following the same argument as in theorem 1 in the work of De Persis and Tesi and lemma 2 in the work of Feng and Tesi in which the parameter σ is selected such that λsans-seri...…”
Section: Resultsmentioning
confidence: 99%
“…Remark Compared with the strategies proposed in the works of De Persis and Tesi and Feng and Tesi, where the system constraints are not concerned, the difficulties are the analysis of the event‐triggered control and how to deal with the predicted input error v ( t ). Based on the ISpS framework, not only the relationship between the stabilization criteria and the time characteristics of the tolerable DoS attacks is obtained but also v ( t ) can be regarded as an additional input to prove the stability of the closed‐loop system.…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations