2015 54th IEEE Conference on Decision and Control (CDC) 2015
DOI: 10.1109/cdc.2015.7402756
|View full text |Cite
|
Sign up to set email alerts
|

Self-triggered coordination over a shared network under Denial-of-Service

Abstract: Abstract-The issue of security has become ever more prevalent in the analysis and design of cyber-physical systems. In this paper, we analyze a consensus network in the presence of Denial-of-Service (DoS) attacks, namely attacks that prevent communication among the network agents. By introducing a notion of Persistency-of-Communication (PoC), we provide a characterization of DoS frequency and duration such that consensus is not destroyed. An example is given to substantiate the analysis. I. INTRODUCTIONIn rece… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
50
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 29 publications
(50 citation statements)
references
References 23 publications
0
50
0
Order By: Relevance
“…The contribution is an explicit characterization of DoS frequency and duration for which stability can be preserved through state-feedback control. Extensions have been considered dealing with co-located robust controller design (Feng and Tesi, 2017), nonlinear (De Persis and Tesi, 2014a) and distributed (Senejohnny et al, 2015) systems, as well as with systems where jamming attacks and genuine packet losses coexist (Cetinkaya et al, 2016).…”
Section: Introductionmentioning
confidence: 99%
“…The contribution is an explicit characterization of DoS frequency and duration for which stability can be preserved through state-feedback control. Extensions have been considered dealing with co-located robust controller design (Feng and Tesi, 2017), nonlinear (De Persis and Tesi, 2014a) and distributed (Senejohnny et al, 2015) systems, as well as with systems where jamming attacks and genuine packet losses coexist (Cetinkaya et al, 2016).…”
Section: Introductionmentioning
confidence: 99%
“…Given the system dynamics (17), we consider the control law u(t) = K x(t), where K ∈ R 10×20 is the feedback gain matrix. The gain matrix K is designed based on the sparsity promoting algorithm (10). First, we start minimizing (10) for a small initial value of β.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…We initialize a small value of β ∈ R denoted as β initial . It results a centralized LQR gain K = K c ∈ R m×n , and starts minimizing (10). As stated earlier, the solution of (10) becomes sparser as β increases; hence we obtain different footprints of the sparsity pattern of K by varying β.…”
Section: Proposed Rerouting Algorithmmentioning
confidence: 86%
See 2 more Smart Citations