2018
DOI: 10.1016/j.jfranklin.2018.06.009
|View full text |Cite
|
Sign up to set email alerts
|

Periodic event-triggered resilient control for cyber-physical systems under denial-of-service attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
28
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 94 publications
(28 citation statements)
references
References 26 publications
0
28
0
Order By: Relevance
“…Thus, it is sensitive for the controller to the perturbation of the parameters. In this paper, we define the recursive sliding surfaces (25), (31) and (37) for building error relationship among all subsystems to expand the range of control parameters.…”
Section: Adaptive Secure Control Strategymentioning
confidence: 99%
See 1 more Smart Citation
“…Thus, it is sensitive for the controller to the perturbation of the parameters. In this paper, we define the recursive sliding surfaces (25), (31) and (37) for building error relationship among all subsystems to expand the range of control parameters.…”
Section: Adaptive Secure Control Strategymentioning
confidence: 99%
“…According to (42), θ i , ρ i and h i are ultimately bounded. From(31)(33) and(36),x i , α i and z i are also bounded. In addition, due to the bound of ρ i and ρ i , it follows thatρ i is bounded.…”
mentioning
confidence: 99%
“…Based on the general DoS model, several studies have been presented for linear systems, 14,15 nonlinear systems, 16 CPSs with multiple transmission channels, 17 and CPSs with event-triggered control strategy. 18,19 However, the resilient control methods of the aforementioned works mainly focus on the transmission times scheduling and input-to-state stability (ISS) framework. There have been few theoretical studies appeared on control methodology to guarantee the control performance under DoS attacks, especially when the state and input of the physical plant are subject to hard constraints.…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, from the recent situation of growing communication technology, it can be understandably expected that the importance of security against cyber-attack has been emphasized [33][34][35][36][37][38][39][40][41][42]. Adversaries maliciously modified the data by exploiting the vulnerabilities of networks, which has degraded or destroyed the stability and performance of the system.…”
Section: Introductionmentioning
confidence: 99%
“…Thus, to develop criteria with prevention measure against cyber-attacks is a major concern of scholars [38,39]. In [40], H ∞ observer-based periodic event-triggered controller for the control of a class of cyber-physical systems was designed under consideration of DoS attacks where the designed controller maximized the frequency and duration of the DoS attacks. In [41], distributed event-triggered H ∞ filters were designed on sensor networks in the presence of sensor saturations and randomly occurring cyber-attacks.…”
Section: Introductionmentioning
confidence: 99%