2020
DOI: 10.1080/00207721.2020.1772402
|View full text |Cite
|
Sign up to set email alerts
|

Secure control of cyber physical systems subject to stochastic distributed DoS and deception attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
23
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 40 publications
(23 citation statements)
references
References 32 publications
0
23
0
Order By: Relevance
“…0] and n = n x + n c , then the switched system (8) under aperiodic DoS attacks, resilient ETM, and quantization is exponentially stable with a decay rate ρ = 𝜌 2 .…”
Section: Exponential Stability Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…0] and n = n x + n c , then the switched system (8) under aperiodic DoS attacks, resilient ETM, and quantization is exponentially stable with a decay rate ρ = 𝜌 2 .…”
Section: Exponential Stability Analysismentioning
confidence: 99%
“…Some random DoS attacks can be modeled as Bernoulli distribution. For instance, considering DoS attacks obeying Bernoulli distribution, event‐triggered sliding mode control is studied for uncertain CPSs [6], event‐triggered control (ETC) is investigated for linear stochastic NCSs [7], and observer‐based controller is designed for CPSs with random delays [8] and random packet dropouts [9]. For CPSs with inherent stochastic packet dropouts under periodic DoS jamming attacks, the work [10] studies guaranteed cost control based on a passive attack‐tolerant mechanism.…”
Section: Introductionmentioning
confidence: 99%
“…where f n on = f n+1 − f n − f n of f is defined as the duration of the nth attack. Remark 1 Note that previous works dealing with deception attacks, such as [24,33], are inclined to model the attack as a stochastic process. Such approaches rely heavily on the intentions of attackers, which are sometimes hard to determine in advance.…”
Section: Modelling Of Deception Attacksmentioning
confidence: 99%
“…As explained above, the BTS could face instability or it is led to undesired operations by these attacks. Thence, it is essential to design controllers for BTSs while taking into accounts the security issues [122], [123].…”
Section: Introductionmentioning
confidence: 99%
“…Due to the aforementioned importance of controlling systems in the presence of cyber attacks, many literature consider this urgent and major problems. Many literature discussed the DoS attacks alone [125]- [130], deception attacks alone [131], [136], or two attacks [123], [124], [137]- [139]. of BTSs.…”
Section: Introductionmentioning
confidence: 99%