2019
DOI: 10.1002/rnc.4837
|View full text |Cite
|
Sign up to set email alerts
|

Resilient control of networked control systems under deception attacks: A memory‐event‐triggered communication scheme

Abstract: Summary This paper considers resilient event‐triggered control problem for a class of networked systems subject to randomly occurring deception attacks. First, a new memory event‐triggered scheme (METS) is proposed to reduce the utilization of communication resources while maintaining desired system performance. Different from some existing event‐triggered schemes, some recently released packets are firstly utilized in the proposed METS, which provides a better flexibility to improve the system dynamics. Secon… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
104
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 169 publications
(105 citation statements)
references
References 52 publications
0
104
0
Order By: Relevance
“…And if the condition (35) is feasible for the adjustable scalar > 0, it is easily to know from (44) that the nonnegative scalar i, p has the form of (38).…”
Section: An Estimation Methods For the Decay Rate And Decay Coefficientmentioning
confidence: 99%
See 1 more Smart Citation
“…And if the condition (35) is feasible for the adjustable scalar > 0, it is easily to know from (44) that the nonnegative scalar i, p has the form of (38).…”
Section: An Estimation Methods For the Decay Rate And Decay Coefficientmentioning
confidence: 99%
“…The representative protocols include the round-Robin (RR) protocol, 27 the TOD protocol, [28][29][30] the stochastic communication protocol, 31,32 and the event-triggered protocol. [33][34][35] To be specific, the TOD protocol is that only one sensor node could be granted the access right to transmit information according to certain prescribed principles. And the TOD protocol has attracted considerable attention since the priority of data has been accurately considered.…”
Section: Introductionmentioning
confidence: 99%
“…Then, (34) can be ensured by (32). This article has been accepted for publication in a future issue of this journal, but has not been fully edited.…”
Section: A Stability Analysis and Control Synthesismentioning
confidence: 99%
“…3,4 Therefore, how to curb cyber attacks has become an urgent issue. [5][6][7][8][9] As we all know, cyber attacks can be mainly classified into three categories: denial of service (DoS) attacks, 10,11 deception attacks, 12,13 and replay attacks. 14 For instance, a resilient dynamic event-triggered controller was designed to cope with the DoS attacks.…”
Section: Introductionmentioning
confidence: 99%