2021
DOI: 10.1155/2021/6618105
|View full text |Cite
|
Sign up to set email alerts
|

Takagi–Sugeno Fuzzy Control for a Nonlinear Networked System Exposed to a Replay Attack

Abstract: This article investigates the stabilization problem of a nonlinear networked control system (NCS) exposed to a replay attack. A new mathematical model of the replay attack is proposed. The resulting closed-loop system is defined as a discrete-time Markovian jump linear system (MJLS). Employing the Lyapunov–Krasovskii functional, a sufficient condition for stochastic stability is given in the form of linear matrix inequalities (LMIs). The control law can be obtained by solving these LMIs. Finally, a simulation … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 23 publications
0
2
0
Order By: Relevance
“…Since the key stream is frequently combined with plain text using an invertible operation, this means that successive cipher texts can be combined to produce a combination of the plain text. [1] That makes an attack, such as a replay attack [4], a good candidate for attack because one could identify the commonality of a repeating stream using easy-to-obtain tools such Figure 2. English language letter frequency.…”
Section: Stream Cipher Word Frequencymentioning
confidence: 99%
See 1 more Smart Citation
“…Since the key stream is frequently combined with plain text using an invertible operation, this means that successive cipher texts can be combined to produce a combination of the plain text. [1] That makes an attack, such as a replay attack [4], a good candidate for attack because one could identify the commonality of a repeating stream using easy-to-obtain tools such Figure 2. English language letter frequency.…”
Section: Stream Cipher Word Frequencymentioning
confidence: 99%
“…Contrastingly, a common framework, while seemingly easy-to-decrypt and insecure, could be the use of a language for encryption. Most networking stream attacks, such as the commonly implemented replay attack [4], use the knowledge of the local language at hand to stage attacks; they normally do not consider the idea of another language being used as an extra layer of encryption.…”
Section: Introductionmentioning
confidence: 99%