Observed-Mode-Dependent Nonfragile Control of Networked Control Systems Under Hidden DoS Attacks
This article develops a methodology on observed-mode-dependent nonfragile control for networked control systems subject to denial-of-service (DoS) attacks, which takes the strong concealment of attack behavior into account. To describe complex switching phenomenon between different forms of attacks...
Saved in:
Published in | IEEE transactions on control of network systems Vol. 11; no. 1; pp. 139 - 149 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
Piscataway
IEEE
01.03.2024
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
ISSN | 2325-5870 2372-2533 |
DOI | 10.1109/TCNS.2023.3272824 |
Cover
Summary: | This article develops a methodology on observed-mode-dependent nonfragile control for networked control systems subject to denial-of-service (DoS) attacks, which takes the strong concealment of attack behavior into account. To describe complex switching phenomenon between different forms of attacks that the adversary may launch on communication channels, the semi-Markov chain (SMC) is introduced. DoS attacks with a stealth characteristic are analyzed from a hidden semi-Markov jump systems perspective by constructing a double-layer stochastic process consisting of an SMC and an observed mode sequence. With the aid of emission probability, an observed-mode-dependent nonfragile controller is designed, which can still stabilize the system even if actual attack modes are unavailable. By utilizing the Lyapunov function that depends on actual attack modes and observed ones, sufficient conditions to ensure the <inline-formula><tex-math notation="LaTeX">\delta</tex-math></inline-formula>-error mean square stability of the closed-loop system is deduced. Eventually, a simulation related to the mass-spring-damper system with a single channel and an example of the unmanned ground vehicle with two channels are studied, both of which demonstrate the feasibility and validity. |
---|---|
Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ISSN: | 2325-5870 2372-2533 |
DOI: | 10.1109/TCNS.2023.3272824 |