Observed-Mode-Dependent Nonfragile Control of Networked Control Systems Under Hidden DoS Attacks

This article develops a methodology on observed-mode-dependent nonfragile control for networked control systems subject to denial-of-service (DoS) attacks, which takes the strong concealment of attack behavior into account. To describe complex switching phenomenon between different forms of attacks...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on control of network systems Vol. 11; no. 1; pp. 139 - 149
Main Authors Jiao, Shiyu, Xu, Shengyuan
Format Journal Article
LanguageEnglish
Published Piscataway IEEE 01.03.2024
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text
ISSN2325-5870
2372-2533
DOI10.1109/TCNS.2023.3272824

Cover

More Information
Summary:This article develops a methodology on observed-mode-dependent nonfragile control for networked control systems subject to denial-of-service (DoS) attacks, which takes the strong concealment of attack behavior into account. To describe complex switching phenomenon between different forms of attacks that the adversary may launch on communication channels, the semi-Markov chain (SMC) is introduced. DoS attacks with a stealth characteristic are analyzed from a hidden semi-Markov jump systems perspective by constructing a double-layer stochastic process consisting of an SMC and an observed mode sequence. With the aid of emission probability, an observed-mode-dependent nonfragile controller is designed, which can still stabilize the system even if actual attack modes are unavailable. By utilizing the Lyapunov function that depends on actual attack modes and observed ones, sufficient conditions to ensure the <inline-formula><tex-math notation="LaTeX">\delta</tex-math></inline-formula>-error mean square stability of the closed-loop system is deduced. Eventually, a simulation related to the mass-spring-damper system with a single channel and an example of the unmanned ground vehicle with two channels are studied, both of which demonstrate the feasibility and validity.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:2325-5870
2372-2533
DOI:10.1109/TCNS.2023.3272824