2016
DOI: 10.1109/tii.2016.2542208
|View full text |Cite
|
Sign up to set email alerts
|

Resilient Control of Networked Control System Under DoS Attacks: A Unified Game Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
91
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
9

Relationship

2
7

Authors

Journals

citations
Cited by 283 publications
(96 citation statements)
references
References 22 publications
0
91
0
Order By: Relevance
“…Remark In the works of Li et al and Yuan et al, the authors described the DoS attacks with packet‐losses rate obtained by a game theoretic approach. In the work of Persis and Tesi, the authors described the DoS attacks with two parameters, ie, DoS frequency and duration.…”
Section: Modeling and Problem Formulationmentioning
confidence: 99%
“…Remark In the works of Li et al and Yuan et al, the authors described the DoS attacks with packet‐losses rate obtained by a game theoretic approach. In the work of Persis and Tesi, the authors described the DoS attacks with two parameters, ie, DoS frequency and duration.…”
Section: Modeling and Problem Formulationmentioning
confidence: 99%
“…System (Σ e ) is said to be the nominal system (Σ n ) if w ( t k ) ≡ 0. In the situation where the central coordination is infeasible , it is more practical that each controller only optimized its individual objective function. The individual cost function of system (Σ n ) yields Ji=double-struckE2.03emzT(tK)scriptQδiKz(tK)+k=0K1monospaceTk1.19emzT(tk)scriptQδiz(tk)+normalΦ(tk)1.19em2.03em,1emiboldS, where normalΦ(tk)=αtkiuiT(tk)scriptRδiiui(tk)+j=1,jiSϵjujT(tk)scriptRδijuj(tk).…”
Section: Problem Formulationmentioning
confidence: 99%
“…Furthermore, in a unified framework, the finite‐horizon tracking control for stochastic systems simultaneously subjected to denial‐of‐service (DoS) and deception attacks was studied in the work of Zhao et al, and the corresponding countermeasure scheme was proposed. By exploiting the game theory, the resilience of networked control systems and wireless networked control systems subject to DoS attacks was analyzed in the works of Yuan et al Moreover, in the work of Zhao et al, the design, implementation, and impact evaluation of undetectable attacks were discussed via a geometric approach. For linear system under the false data injection attacks, an observer‐based control strategy with an attack‐resilient performance was presented in the work of Xie and Yang .…”
Section: Introductionmentioning
confidence: 99%