2021 40th Chinese Control Conference (CCC) 2021
DOI: 10.23919/ccc52363.2021.9550730
|View full text |Cite
|
Sign up to set email alerts
|

Secure Control of Networked Switched Systems with Random DoS Attacks via Event-triggered Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 20 publications
0
5
0
Order By: Relevance
“…Next, to display the influences of the DoS parameters T and T min off , and to show the effect of T on system performance. We use the values of đ›Œ i , 𝜙 i , h, 𝜎, and đ›Ÿ in (43) and deal with the optimization problem for given distinct T: 25), subjects to LMIs (34), (38), and (39). (44) Table 1 gives the minimum values of T min off , the maximum allowable J ≜ (T − T min off )∕T × 100% called DoS attack rate, and 𝔏 2 − 𝔏 ∞ performance index đ›Ÿ.…”
Section: Numerical Examplementioning
confidence: 99%
See 2 more Smart Citations
“…Next, to display the influences of the DoS parameters T and T min off , and to show the effect of T on system performance. We use the values of đ›Œ i , 𝜙 i , h, 𝜎, and đ›Ÿ in (43) and deal with the optimization problem for given distinct T: 25), subjects to LMIs (34), (38), and (39). (44) Table 1 gives the minimum values of T min off , the maximum allowable J ≜ (T − T min off )∕T × 100% called DoS attack rate, and 𝔏 2 − 𝔏 ∞ performance index đ›Ÿ.…”
Section: Numerical Examplementioning
confidence: 99%
“…Notably, denial‐of‐service (DoS) attacks whose aim is to prevent signals transmission from arriving at their destination are the most probable type owing to they are easily implemented 36 . In order to eliminate the effect of DoS attacks, many efforts have been taken 37‐44 . In Reference 40, by integrating periodic DoS attacks, ETM, and sensor saturation, a new quantized state estimator for cyber‐physical systems was built.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The results of cyber attacks on the switched systems can be seen in References 22‐28. Literature 22 studies the effect of jamming attacks on the stochastic switched systems.…”
Section: Introductionmentioning
confidence: 99%
“…Hence, networked security control subject to DoS attacks has drawn considerable attention. Assume that DoS attacks randomly occur obeying to the Bernoulli distribution, security control methods are designed in References 25 and 26. By proposing multiple quadratic Lyapunov functions with the merged switching signal, an event‐triggered H∞ controller is designed in Reference 27.…”
Section: Introductionmentioning
confidence: 99%