Multi‐loop networked control system design subject to interchange attack

This paper deals with the design problem of multiloop networked control system (NCS) under interchange attack. This is a new type of attack where the transmitted data are swapped between different control loops which can be more destructive than other types of attacks, such as denial‐of‐service (DoS...

Full description

Saved in:
Bibliographic Details
Published inAsian journal of control Vol. 25; no. 3; pp. 1706 - 1714
Main Authors Kazemy, Ali, Liu, Jinrong, Lam, James
Format Journal Article
LanguageEnglish
Published Hoboken Wiley Subscription Services, Inc 01.05.2023
Subjects
Online AccessGet full text
ISSN1561-8625
1934-6093
DOI10.1002/asjc.2962

Cover

Abstract This paper deals with the design problem of multiloop networked control system (NCS) under interchange attack. This is a new type of attack where the transmitted data are swapped between different control loops which can be more destructive than other types of attacks, such as denial‐of‐service (DoS) attack. In this context, multiple sampled‐data control loops are first considered that use a shared communication network for data transmission. Then, the overall closed‐loop systems with the proposed attack are formulated in a unified stochastic delay system. The proposed framework is also applicable to DoS attack. Based on Lyapunov–Krasovskii theory and stochastic analysis techniques, some conditions in terms of linear matrix inequalities (LMIs) are derived for the H∞$$ {\mathcal{H}}_{\infty } $$ control design problem. Finally, two inverted pendula are utilized for simulation to show the effectiveness of the proposed method. Also, the effects of DoS attack and interchange attack are compared.
AbstractList This paper deals with the design problem of multiloop networked control system (NCS) under interchange attack. This is a new type of attack where the transmitted data are swapped between different control loops which can be more destructive than other types of attacks, such as denial‐of‐service (DoS) attack. In this context, multiple sampled‐data control loops are first considered that use a shared communication network for data transmission. Then, the overall closed‐loop systems with the proposed attack are formulated in a unified stochastic delay system. The proposed framework is also applicable to DoS attack. Based on Lyapunov–Krasovskii theory and stochastic analysis techniques, some conditions in terms of linear matrix inequalities (LMIs) are derived for the H∞$$ {\mathcal{H}}_{\infty } $$ control design problem. Finally, two inverted pendula are utilized for simulation to show the effectiveness of the proposed method. Also, the effects of DoS attack and interchange attack are compared.
This paper deals with the design problem of multiloop networked control system (NCS) under interchange attack. This is a new type of attack where the transmitted data are swapped between different control loops which can be more destructive than other types of attacks, such as denial‐of‐service (DoS) attack. In this context, multiple sampled‐data control loops are first considered that use a shared communication network for data transmission. Then, the overall closed‐loop systems with the proposed attack are formulated in a unified stochastic delay system. The proposed framework is also applicable to DoS attack. Based on Lyapunov–Krasovskii theory and stochastic analysis techniques, some conditions in terms of linear matrix inequalities (LMIs) are derived for the H∞$$ {\mathcal{H}}_{\infty } $$ control design problem. Finally, two inverted pendula are utilized for simulation to show the effectiveness of the proposed method. Also, the effects of DoS attack and interchange attack are compared.
This paper deals with the design problem of multiloop networked control system (NCS) under interchange attack. This is a new type of attack where the transmitted data are swapped between different control loops which can be more destructive than other types of attacks, such as denial‐of‐service (DoS) attack. In this context, multiple sampled‐data control loops are first considered that use a shared communication network for data transmission. Then, the overall closed‐loop systems with the proposed attack are formulated in a unified stochastic delay system. The proposed framework is also applicable to DoS attack. Based on Lyapunov–Krasovskii theory and stochastic analysis techniques, some conditions in terms of linear matrix inequalities (LMIs) are derived for the control design problem. Finally, two inverted pendula are utilized for simulation to show the effectiveness of the proposed method. Also, the effects of DoS attack and interchange attack are compared.
Author Kazemy, Ali
Liu, Jinrong
Lam, James
Author_xml – sequence: 1
  givenname: Ali
  orcidid: 0000-0001-7472-224X
  surname: Kazemy
  fullname: Kazemy, Ali
  email: Kazemy@tafreshu.ac.ir
  organization: Tafresh University
– sequence: 2
  givenname: Jinrong
  surname: Liu
  fullname: Liu, Jinrong
  organization: The University of Hong Kong
– sequence: 3
  givenname: James
  surname: Lam
  fullname: Lam, James
  organization: The University of Hong Kong
BookMark eNp1kE1OwzAQhS1UJNrCghtYYsUi7diOk3hZVfxVRSyAdeQ4TkmaxsV2VHXHETgjJyGhXSFYzYz0vTd6b4QGjWk0QpcEJgSATqWr1ISKiJ6gIREsDCIQbNDtPCJBElF-hkbOVQARYQkfosVjW_vy6-OzNmaLG-13xq51jpVpvDU1dnvn9Qbn2pWrBrs2q7Ty2BtcNl5b9SablcbSe6nW5-i0kLXTF8c5Rq-3Ny_z-2D5dPcwny0DRUVMgxCA8SKkQnQnQCgzSiSLGFOC8kiKkBQhEMY5ozlLkrwokizXmdLAIY_DmI3R1cF3a817q51PK9PapnuZ0gQiTmLCoaOmB0pZ45zVRapKL33Z55JlnRJI-8LSvrC0L6xTXP9SbG25kXb_J3t035W13v8PprPnxfxH8Q2SFH1f
CitedBy_id crossref_primary_10_1109_TCSI_2024_3503719
crossref_primary_10_1002_asjc_3547
crossref_primary_10_1016_j_ijepes_2024_109902
Cites_doi 10.1016/j.ins.2020.08.124
10.1109/ACCESS.2020.2977423
10.1109/JAS.2019.1911651
10.1016/j.ins.2021.01.063
10.1002/asjc.2604
10.1049/iet-cta.2020.0840
10.1109/TSMC.2017.2681702
10.1016/j.jfranklin.2018.04.001
10.1109/TCYB.2017.2671032
10.1016/j.jprocont.2018.02.010
10.1016/j.automatica.2016.12.026
10.1109/TAC.2020.2989773
10.1049/cth2.12261
10.1080/00207721.2020.1858205
10.1109/TCNS.2020.3030002
10.1109/MIE.2017.2649104
10.1201/b12977
10.1016/j.jfranklin.2021.01.027
10.1007/s00034-008-9092-1
10.1109/TCYB.2019.2956137
10.1109/ACCESS.2017.2731780
10.1007/978-3-642-17925-9
10.1109/TNNLS.2020.3030638
10.1049/iet-cta.2018.6121
10.1002/asjc.2506
10.1109/TCOMM.2020.3042792
10.1109/TSMC.2017.2773634
10.1016/j.nahs.2019.03.005
10.1016/j.jfranklin.2020.12.035
10.1016/j.neucom.2019.03.089
10.1016/j.jfranklin.2019.12.032
10.1002/asjc.2686
10.1109/TNNLS.2015.2425881
10.1109/TCYB.2018.2863689
10.1177/0142331216644497
10.1109/TSMC.2018.2833203
10.1109/TCYB.2019.2903817
10.1016/j.automatica.2013.01.038
ContentType Journal Article
Copyright 2022 Chinese Automatic Control Society and John Wiley & Sons Australia, Ltd.
2023 Chinese Automatic Control Society and John Wiley & Sons Australia, Ltd
Copyright_xml – notice: 2022 Chinese Automatic Control Society and John Wiley & Sons Australia, Ltd.
– notice: 2023 Chinese Automatic Control Society and John Wiley & Sons Australia, Ltd
DBID AAYXX
CITATION
JQ2
DOI 10.1002/asjc.2962
DatabaseName CrossRef
ProQuest Computer Science Collection
DatabaseTitle CrossRef
ProQuest Computer Science Collection
DatabaseTitleList ProQuest Computer Science Collection

CrossRef
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1934-6093
EndPage 1714
ExternalDocumentID 10_1002_asjc_2962
ASJC2962
Genre article
GrantInformation_xml – fundername: General Research Fund
  funderid: 17201219
GroupedDBID .4S
.DC
05W
0R~
1L6
1OC
23N
31~
33P
3SF
4.4
52U
5DZ
5GY
8-0
8-1
A00
AAESR
AAEVG
AAHHS
AAHQN
AAMNL
AANHP
AANLZ
AAONW
AASGY
AAXRX
AAYCA
AAZKR
ABCUV
ABJNI
ACAHQ
ACBWZ
ACCFJ
ACCZN
ACGFS
ACIWK
ACPOU
ACRPL
ACXBN
ACXQS
ACYXJ
ADBBV
ADEOM
ADIZJ
ADKYN
ADMGS
ADNMO
ADOZA
ADXAS
ADZMN
ADZOD
AEEZP
AEIGN
AEIMD
AENEX
AEQDE
AEUQT
AEUYR
AFBPY
AFFPM
AFGKR
AFPWT
AFWVQ
AHBTC
AITYG
AIURR
AIWBW
AJBDE
AJXKR
ALMA_UNASSIGNED_HOLDINGS
ALUQN
ALVPJ
AMBMR
AMYDB
ARCSS
ASPBG
ATUGU
AUFTA
AVWKF
AZFZN
AZVAB
BDRZF
BFHJK
BHBCM
BMNLL
BMXJE
BNHUX
BOGZA
BRXPI
CS3
DCZOG
DRFUL
DRSTM
EBS
EJD
F5P
FEDTE
G-S
GODZA
HGLYW
HVGLF
HZ~
I-F
J9A
LATKE
LEEKS
LH4
LITHE
LOXES
LUTES
LW6
LYRES
MEWTI
MRFUL
MRSTM
MSFUL
MSSTM
MXFUL
MXSTM
MY.
MY~
O9-
OIG
P2W
P4E
PQQKQ
ROL
RWI
SUPJJ
TUS
WBKPD
WIH
WIK
WOHZO
WXSBR
WYJ
XV2
ZZTAW
~S-
AAMMB
AAYXX
ADMLS
AEFGJ
AEYWJ
AGHNM
AGQPQ
AGXDD
AGYGG
AIDQK
AIDYY
CITATION
JQ2
ID FETCH-LOGICAL-c2972-40035f4299297004ab21a3633c9256a941f40135532d388dff8bdebce050d7473
ISSN 1561-8625
IngestDate Fri Jul 25 12:20:01 EDT 2025
Thu Apr 24 22:51:15 EDT 2025
Wed Oct 01 03:23:15 EDT 2025
Wed Jan 22 16:23:19 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 3
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c2972-40035f4299297004ab21a3633c9256a941f40135532d388dff8bdebce050d7473
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0001-7472-224X
PQID 2806517150
PQPubID 866359
PageCount 9
ParticipantIDs proquest_journals_2806517150
crossref_citationtrail_10_1002_asjc_2962
crossref_primary_10_1002_asjc_2962
wiley_primary_10_1002_asjc_2962_ASJC2962
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate May 2023
2023-05-00
20230501
PublicationDateYYYYMMDD 2023-05-01
PublicationDate_xml – month: 05
  year: 2023
  text: May 2023
PublicationDecade 2020
PublicationPlace Hoboken
PublicationPlace_xml – name: Hoboken
PublicationTitle Asian journal of control
PublicationYear 2023
Publisher Wiley Subscription Services, Inc
Publisher_xml – name: Wiley Subscription Services, Inc
References 2021; 69
2017; 5
2019; 7
2021; 8
2021; 22
2013; 49
2012
2017; 47
2019; 33
2019; 13
2021; 546
2022; 24
2007
2020; 14
2021; 560
2020; 400
2018; 66
2018; 48
2009; 28
2020; 8
2015; 26
2011; 409
2017; 39
2020; 50
2017; 11
2021; 358
2017; 78
2020; 357
2019; 356
2022; 33
2020; 65
2022; 16
e_1_2_9_30_1
e_1_2_9_31_1
e_1_2_9_11_1
e_1_2_9_34_1
e_1_2_9_10_1
e_1_2_9_35_1
e_1_2_9_13_1
e_1_2_9_32_1
e_1_2_9_12_1
e_1_2_9_33_1
e_1_2_9_15_1
e_1_2_9_38_1
e_1_2_9_14_1
e_1_2_9_39_1
e_1_2_9_17_1
e_1_2_9_16_1
e_1_2_9_37_1
e_1_2_9_19_1
e_1_2_9_18_1
e_1_2_9_20_1
e_1_2_9_40_1
e_1_2_9_22_1
e_1_2_9_21_1
e_1_2_9_24_1
e_1_2_9_23_1
e_1_2_9_8_1
e_1_2_9_7_1
e_1_2_9_6_1
Boukas E. K. (e_1_2_9_36_1) 2007
e_1_2_9_5_1
e_1_2_9_4_1
e_1_2_9_3_1
e_1_2_9_2_1
e_1_2_9_9_1
e_1_2_9_26_1
e_1_2_9_25_1
e_1_2_9_28_1
e_1_2_9_27_1
e_1_2_9_29_1
References_xml – volume: 7
  start-page: 1
  issue: 1
  year: 2019
  end-page: 17
  article-title: Networked control systems: a survey of trends and techniques
  publication-title: IEEE/CAA J. Autom. Sin.
– volume: 78
  start-page: 231
  year: 2017
  end-page: 240
  article-title: Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks
  publication-title: Automatica
– volume: 5
  start-page: 15901
  year: 2017
  end-page: 15912
  article-title: Resilient design of networked control systems under time delay switch attacks, application in smart grid
  publication-title: IEEE Access
– volume: 24
  start-page: 2213
  issue: 5
  year: 2022
  end-page: 2223
  article-title: output quantized control for networked control systems under resilient event‐triggered mechanism and aperiodic denial‐of‐service attacks
  publication-title: Asian J. Control
– volume: 357
  start-page: 3419
  issue: 6
  year: 2020
  end-page: 3433
  article-title: Cooperative adaptive fault‐tolerant control for multi‐agent systems with deception attacks
  publication-title: J. Franklin Inst.
– volume: 33
  start-page: 952
  issue: 3
  year: 2022
  end-page: 961
  article-title: Event‐triggered output feedback synchronization of master‐slave neural networks under deception attacks
  publication-title: IEEE Trans. Neural Netw. Learn. Syst.
– volume: 546
  start-page: 943
  year: 2021
  end-page: 960
  article-title: Secure state estimation for systems under mixed cyber‐attacks: Security and performance analysis
  publication-title: Inf. Sci.
– volume: 16
  start-page: 925
  issue: 9
  year: 2022
  end-page: 934
  article-title: Secure LQG control for a Quadrotor under false data injection attacks
  publication-title: IET Control Theory Appl.
– volume: 24
  start-page: 517
  issue: 2
  year: 2022
  end-page: 525
  article-title: Deception attack monitoring in vulnerable hydroelectric generator system
  publication-title: Asian J. Control
– year: 2007
– volume: 49
  start-page: 1326
  issue: 5
  year: 2013
  end-page: 1332
  article-title: Event‐triggered communication and control co‐design for networked control systems
  publication-title: Automatica
– volume: 39
  start-page: 1703
  issue: 11
  year: 2017
  end-page: 1709
  article-title: Synchronization of chaotic Lur'e systems with state and transmission line time delay: a linear matrix inequality approach
  publication-title: Trans. Inst. Meas. Control
– volume: 28
  start-page: 505
  issue: 4
  year: 2009
  end-page: 522
  article-title: New stability criteria for neural networks with distributed and probabilistic delays
  publication-title: Circ., Syst. Signal Process.
– volume: 409
  year: 2011
– volume: 11
  start-page: 17
  issue: 1
  year: 2017
  end-page: 27
  article-title: The future of industrial communication: Automation networks in the era of the internet of things and industry 4.0
  publication-title: IEEE Ind. Electr. Mag.
– volume: 24
  start-page: 594
  year: 2022
  end-page: 604
  article-title: Distributed impulsive control for secure consensus of nonlinear dynamical networks with node delay under denial‐of‐service attacks
  publication-title: Asian J. Control
– volume: 22
  start-page: 1426
  issue: 7
  year: 2021
  end-page: 1439
  article-title: Adaptive event‐triggered mechanism for networked control systems under deception attacks with uncertain occurring probability
  publication-title: Int. J. Syst. Sci.
– volume: 358
  start-page: 2683
  issue: 5
  year: 2021
  end-page: 2702
  article-title: Dissipative output feedback control for semi‐Markovian jump systems under hybrid cyber‐attacks
  publication-title: J. Franklin Inst.
– year: 2012
– volume: 400
  start-page: 458
  year: 2020
  end-page: 466
  article-title: Distributed event‐triggered consensus of multi‐agent systems under periodic DoS jamming attacks
  publication-title: Neurocomputing
– volume: 50
  start-page: 3616
  issue: 8
  year: 2020
  end-page: 3626
  article-title: Resilient control design based on a sampled‐data model for a class of networked control systems under denial‐of‐service attacks
  publication-title: IEEE Trans. Cybern.
– volume: 358
  start-page: 2780
  issue: 5
  year: 2021
  end-page: 2800
  article-title: Resilient consensus of discrete‐time connected vehicle systems with interaction network against cyber‐attacks
  publication-title: J. Franklin Inst.
– volume: 50
  start-page: 48
  issue: 1
  year: 2020
  end-page: 60
  article-title: Resilient control of wireless networked control system under denial‐of‐service attacks: A cross‐layer design approach
  publication-title: IEEE Trans. Cybern.
– volume: 50
  start-page: 1952
  issue: 5
  year: 2020
  end-page: 1964
  article-title: Observer‐based event‐triggered control for networked linear systems subject to denial‐of‐service attacks
  publication-title: IEEE Trans. Cybern.
– volume: 50
  start-page: 3126
  issue: 9
  year: 2020
  end-page: 3135
  article-title: Guaranteed cost control of uncertain networked control systems with a hybrid communication scheme
  publication-title: IEEE Trans. Syst. Man. Cybern. Syst.
– volume: 8
  start-page: 2
  issue: 1
  year: 2021
  end-page: 14
  article-title: Optimal allocation of false data injection attacks for networked control systems with two communication channels
  publication-title: IEEE Trans. Control Netw. Syst.
– volume: 13
  start-page: 2775
  issue: 17
  year: 2019
  end-page: 2782
  article-title: Adaptation in network control systems with hierarchical scheduling
  publication-title: IET Control Theory Appl.
– volume: 8
  start-page: 44219
  year: 2020
  end-page: 44227
  article-title: A survey of network attacks on cyber‐physical systems
  publication-title: IEEE Access
– volume: 66
  start-page: 59
  year: 2018
  end-page: 67
  article-title: Economic model predictive control of boiler‐turbine system
  publication-title: J. Process Control
– volume: 48
  start-page: 1929
  issue: 11
  year: 2018
  end-page: 1938
  article-title: Event‐triggered pinning control for consensus of multiagent systems with quantized information
  publication-title: IEEE Trans. Syst. Man. Cybern. Syst.
– volume: 33
  start-page: 265
  year: 2019
  end-page: 281
  article-title: Event‐triggered quantized control for networked control systems in the presence of denial‐of‐service jamming attacks
  publication-title: Nonlinear Anal.: Hybrid Syst.
– volume: 47
  start-page: 1746
  issue: 7
  year: 2017
  end-page: 1757
  article-title: Distributed control of large‐scale networked control systems with communication constraints and topology switching
  publication-title: IEEE Trans. Syst. Man. Cybern. Syst.
– volume: 560
  start-page: 20
  year: 2021
  end-page: 34
  article-title: Master–slave synchronization of neural networks subject to mixed‐type communication attacks
  publication-title: Inf. Sci.
– volume: 48
  start-page: 1007
  issue: 3
  year: 2018
  end-page: 1017
  article-title: Event‐based variance‐constrained filtering for stochastic parameter systems over sensor networks with successive missing measurements
  publication-title: IEEE Trans. Cybern.
– volume: 69
  start-page: 1789
  issue: 3
  year: 2021
  end-page: 1801
  article-title: Optimal power control, scheduling and energy harvesting for wireless networked control systems
  publication-title: IEEE Trans. Commun.
– volume: 356
  start-page: 10277
  issue: 17
  year: 2019
  end-page: 10295
  article-title: Security‐based resilient event‐triggered control of networked control systems under denial of service attacks
  publication-title: J. Franklin Inst.
– volume: 14
  start-page: 3009
  issue: 19
  year: 2020
  end-page: 3019
  article-title: Periodic event‐triggered and self‐triggered control of singular system under stochastic cyber‐attacks
  publication-title: IET Control Theory Appl.
– volume: 26
  start-page: 3215
  issue: 12
  year: 2015
  end-page: 3226
  article-title: Synchronization of neural networks with control packet loss and time‐varying delay via stochastic sampled‐data controller
  publication-title: IEEE Trans. Neural Netw. Learn. Syst.
– volume: 65
  start-page: 3943
  issue: 9
  year: 2020
  end-page: 3949
  article-title: Switching‐like event‐triggered control for networked control systems under malicious denial of service attacks
  publication-title: IEEE Trans. Autom. Control
– ident: e_1_2_9_34_1
  doi: 10.1016/j.ins.2020.08.124
– ident: e_1_2_9_12_1
  doi: 10.1109/ACCESS.2020.2977423
– ident: e_1_2_9_2_1
  doi: 10.1109/JAS.2019.1911651
– ident: e_1_2_9_25_1
  doi: 10.1016/j.ins.2021.01.063
– ident: e_1_2_9_14_1
  doi: 10.1002/asjc.2604
– ident: e_1_2_9_16_1
  doi: 10.1049/iet-cta.2020.0840
– ident: e_1_2_9_10_1
  doi: 10.1109/TSMC.2017.2681702
– ident: e_1_2_9_40_1
  doi: 10.1016/j.jfranklin.2018.04.001
– ident: e_1_2_9_6_1
  doi: 10.1109/TCYB.2017.2671032
– ident: e_1_2_9_31_1
  doi: 10.1016/j.jprocont.2018.02.010
– ident: e_1_2_9_7_1
  doi: 10.1016/j.automatica.2016.12.026
– ident: e_1_2_9_28_1
  doi: 10.1109/TAC.2020.2989773
– ident: e_1_2_9_35_1
  doi: 10.1049/cth2.12261
– ident: e_1_2_9_26_1
  doi: 10.1080/00207721.2020.1858205
– ident: e_1_2_9_27_1
  doi: 10.1109/TCNS.2020.3030002
– ident: e_1_2_9_30_1
  doi: 10.1109/MIE.2017.2649104
– ident: e_1_2_9_32_1
  doi: 10.1201/b12977
– ident: e_1_2_9_19_1
  doi: 10.1016/j.jfranklin.2021.01.027
– ident: e_1_2_9_37_1
  doi: 10.1007/s00034-008-9092-1
– ident: e_1_2_9_29_1
  doi: 10.1109/TCYB.2019.2956137
– ident: e_1_2_9_4_1
  doi: 10.1109/ACCESS.2017.2731780
– ident: e_1_2_9_9_1
  doi: 10.1007/978-3-642-17925-9
– ident: e_1_2_9_20_1
  doi: 10.1109/TNNLS.2020.3030638
– ident: e_1_2_9_18_1
  doi: 10.1049/iet-cta.2018.6121
– volume-title: Stochastic switching systems: Analysis and design
  year: 2007
  ident: e_1_2_9_36_1
– ident: e_1_2_9_24_1
  doi: 10.1002/asjc.2506
– ident: e_1_2_9_3_1
  doi: 10.1109/TCOMM.2020.3042792
– ident: e_1_2_9_8_1
  doi: 10.1109/TSMC.2017.2773634
– ident: e_1_2_9_13_1
  doi: 10.1016/j.nahs.2019.03.005
– ident: e_1_2_9_17_1
  doi: 10.1016/j.jfranklin.2020.12.035
– ident: e_1_2_9_33_1
  doi: 10.1016/j.neucom.2019.03.089
– ident: e_1_2_9_21_1
  doi: 10.1016/j.jfranklin.2019.12.032
– ident: e_1_2_9_23_1
  doi: 10.1002/asjc.2686
– ident: e_1_2_9_38_1
  doi: 10.1109/TNNLS.2015.2425881
– ident: e_1_2_9_15_1
  doi: 10.1109/TCYB.2018.2863689
– ident: e_1_2_9_5_1
  doi: 10.1177/0142331216644497
– ident: e_1_2_9_11_1
  doi: 10.1109/TSMC.2018.2833203
– ident: e_1_2_9_22_1
  doi: 10.1109/TCYB.2019.2903817
– ident: e_1_2_9_39_1
  doi: 10.1016/j.automatica.2013.01.038
SSID ssj0061385
Score 2.3415718
Snippet This paper deals with the design problem of multiloop networked control system (NCS) under interchange attack. This is a new type of attack where the...
SourceID proquest
crossref
wiley
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1706
SubjectTerms Control systems design
cyber attack
Data transmission
H-infinity control
Linear matrix inequalities
Lyapunov–Krasovskii theory
Mathematical analysis
Network control
networked control system
sampled‐data control
time‐delay
Title Multi‐loop networked control system design subject to interchange attack
URI https://onlinelibrary.wiley.com/doi/abs/10.1002%2Fasjc.2962
https://www.proquest.com/docview/2806517150
Volume 25
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVEBS
  databaseName: Inspec with Full Text
  customDbUrl:
  eissn: 1934-6093
  dateEnd: 20241102
  omitProxy: false
  ssIdentifier: ssj0061385
  issn: 1561-8625
  databaseCode: ADMLS
  dateStart: 20110501
  isFulltext: true
  titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text
  providerName: EBSCOhost
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1La9tAEF5a59IeSvqiaZOylB4KZtPV7kq2jiFJCabtJQnkJvYlcEmkYMuH5JSf0N_YX9LZh9YKOJD2IuTVsMYzn2dntDPfIvS5oKLOtTFE1IITMZlkpCzklGiIbbVmNmPWs33-LE7Oxewiv1jXz_vukk7t69uNfSX_Y1UYA7u6Ltl_sGyaFAbgHuwLV7AwXB9lY989m8oVLtv2etyEsm5rUhF64GoeG1-qMV6ulHvz4kJOxxSxCI2_Y9l1MtLj95S0vrtyQCwR50seWt7aq5vQIzNPZT3zlYfFvFm0cUkMpI6pIHf4loENavp6x1hkBLKfsANtw1jJBSloOOGw96ZRYj5Mtr1rdDw9g2XWHby-0YUHSli5_KX3WRk99T2a7CSUPygWCH1PZ4fu0VO0xcDl0xHaOjj68f20X6ghkPEntqaf1hNPUfY1zXs_XFnnIMNMxociZ9voRcwh8EEAxEv0xDav0PMBs-RrNPPQ-HP324ECJ1DgaEQcQIEDKHAEBe5aPAAFDqB4g86_HZ8dnpB4bAbRrJwwItzucO3iDPgI_xapWCZ5wbkuIb6Vpchql1TnOWeGT6emrqfKWKUtzamB7JK_RaOmbew7hDktlaW8ltzWwhihWC4M1TZTthTa8h30pddOpSOnvDva5LIKbNiscoqsnCJ30Kckeh2IVDYJ7fYqriLAl5Xf-we45BS-zqv94Qmq3ujvHy_6AT1bI34XjbrFyu5BpNmpjxExfwF00H2f
linkProvider EBSCOhost
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Multi%E2%80%90loop+networked+control+system+design+subject+to+interchange+attack&rft.jtitle=Asian+journal+of+control&rft.au=Kazemy%2C+Ali&rft.au=Liu%2C+Jinrong&rft.au=Lam%2C+James&rft.date=2023-05-01&rft.issn=1561-8625&rft.eissn=1934-6093&rft.volume=25&rft.issue=3&rft.spage=1706&rft.epage=1714&rft_id=info:doi/10.1002%2Fasjc.2962&rft.externalDBID=10.1002%252Fasjc.2962&rft.externalDocID=ASJC2962
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1561-8625&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1561-8625&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1561-8625&client=summon