2019
DOI: 10.1109/lcsys.2019.2920507
|View full text |Cite
|
Sign up to set email alerts
|

Resilient Control for Cyber-Physical Systems Subject to Replay Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
24
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 65 publications
(24 citation statements)
references
References 8 publications
0
24
0
Order By: Relevance
“…9 For linear systems, MPC designs have been explored that can guarantee exponential stability of the origin in the presence of sufficiently short denial of service attacks, 10 guarantee boundedness of the closed-loop state in an invariant set under random cyberattacks on the sensor measurements, 11 and handle replay attacks. 12 For nonlinear systems, Chen et al 13 combined a neural network-based attack detection technique developed in 3 with a two-layer control architecture, where the upper layer is a Lyapunov-based MPC, to guarantee closed-loop stability after attacks are detected. Durand 14 explored several MPC techniques with economics-based objective functions (known as economic MPC's [EMPC's] 15,16 ) in the presence of false sensor measurements to explore cyberattacks in a nonlinear systems context.…”
Section: Introductionmentioning
confidence: 99%
“…9 For linear systems, MPC designs have been explored that can guarantee exponential stability of the origin in the presence of sufficiently short denial of service attacks, 10 guarantee boundedness of the closed-loop state in an invariant set under random cyberattacks on the sensor measurements, 11 and handle replay attacks. 12 For nonlinear systems, Chen et al 13 combined a neural network-based attack detection technique developed in 3 with a two-layer control architecture, where the upper layer is a Lyapunov-based MPC, to guarantee closed-loop stability after attacks are detected. Durand 14 explored several MPC techniques with economics-based objective functions (known as economic MPC's [EMPC's] 15,16 ) in the presence of false sensor measurements to explore cyberattacks in a nonlinear systems context.…”
Section: Introductionmentioning
confidence: 99%
“…where ξ (k) also satisfies Assumption 1. Then the following theorem is given to show the boundary and stabilization properties of systems (31). Theorem 3: Consider the interactive CVSs subject to cyber-attacks in the overall systems (31).…”
Section: Robustness Analysis With Cyber-attacks In the Overall Sysmentioning
confidence: 99%
“…Then the following theorem is given to show the boundary and stabilization properties of systems (31). Theorem 3: Consider the interactive CVSs subject to cyber-attacks in the overall systems (31). The systems are bounded for any injection ξ and ξ satisfying (7) if the conditions (i), (iii) and (iv) in Lemma 3 hold and σ( √ 2D) ⊂ B(0, 1).…”
Section: Robustness Analysis With Cyber-attacks In the Overall Sysmentioning
confidence: 99%
See 2 more Smart Citations