Multi‐loop networked control system design subject to interchange attack
This paper deals with the design problem of multiloop networked control system (NCS) under interchange attack. This is a new type of attack where the transmitted data are swapped between different control loops which can be more destructive than other types of attacks, such as denial‐of‐service (DoS...
        Saved in:
      
    
          | Published in | Asian journal of control Vol. 25; no. 3; pp. 1706 - 1714 | 
|---|---|
| Main Authors | , , | 
| Format | Journal Article | 
| Language | English | 
| Published | 
        Hoboken
          Wiley Subscription Services, Inc
    
        01.05.2023
     | 
| Subjects | |
| Online Access | Get full text | 
| ISSN | 1561-8625 1934-6093  | 
| DOI | 10.1002/asjc.2962 | 
Cover
| Abstract | This paper deals with the design problem of multiloop networked control system (NCS) under interchange attack. This is a new type of attack where the transmitted data are swapped between different control loops which can be more destructive than other types of attacks, such as denial‐of‐service (DoS) attack. In this context, multiple sampled‐data control loops are first considered that use a shared communication network for data transmission. Then, the overall closed‐loop systems with the proposed attack are formulated in a unified stochastic delay system. The proposed framework is also applicable to DoS attack. Based on Lyapunov–Krasovskii theory and stochastic analysis techniques, some conditions in terms of linear matrix inequalities (LMIs) are derived for the
H∞$$ {\mathcal{H}}_{\infty } $$ control design problem. Finally, two inverted pendula are utilized for simulation to show the effectiveness of the proposed method. Also, the effects of DoS attack and interchange attack are compared. | 
    
|---|---|
| AbstractList | This paper deals with the design problem of multiloop networked control system (NCS) under interchange attack. This is a new type of attack where the transmitted data are swapped between different control loops which can be more destructive than other types of attacks, such as denial‐of‐service (DoS) attack. In this context, multiple sampled‐data control loops are first considered that use a shared communication network for data transmission. Then, the overall closed‐loop systems with the proposed attack are formulated in a unified stochastic delay system. The proposed framework is also applicable to DoS attack. Based on Lyapunov–Krasovskii theory and stochastic analysis techniques, some conditions in terms of linear matrix inequalities (LMIs) are derived for the H∞$$ {\mathcal{H}}_{\infty } $$ control design problem. Finally, two inverted pendula are utilized for simulation to show the effectiveness of the proposed method. Also, the effects of DoS attack and interchange attack are compared. This paper deals with the design problem of multiloop networked control system (NCS) under interchange attack. This is a new type of attack where the transmitted data are swapped between different control loops which can be more destructive than other types of attacks, such as denial‐of‐service (DoS) attack. In this context, multiple sampled‐data control loops are first considered that use a shared communication network for data transmission. Then, the overall closed‐loop systems with the proposed attack are formulated in a unified stochastic delay system. The proposed framework is also applicable to DoS attack. Based on Lyapunov–Krasovskii theory and stochastic analysis techniques, some conditions in terms of linear matrix inequalities (LMIs) are derived for the H∞$$ {\mathcal{H}}_{\infty } $$ control design problem. Finally, two inverted pendula are utilized for simulation to show the effectiveness of the proposed method. Also, the effects of DoS attack and interchange attack are compared. This paper deals with the design problem of multiloop networked control system (NCS) under interchange attack. This is a new type of attack where the transmitted data are swapped between different control loops which can be more destructive than other types of attacks, such as denial‐of‐service (DoS) attack. In this context, multiple sampled‐data control loops are first considered that use a shared communication network for data transmission. Then, the overall closed‐loop systems with the proposed attack are formulated in a unified stochastic delay system. The proposed framework is also applicable to DoS attack. Based on Lyapunov–Krasovskii theory and stochastic analysis techniques, some conditions in terms of linear matrix inequalities (LMIs) are derived for the control design problem. Finally, two inverted pendula are utilized for simulation to show the effectiveness of the proposed method. Also, the effects of DoS attack and interchange attack are compared.  | 
    
| Author | Kazemy, Ali Liu, Jinrong Lam, James  | 
    
| Author_xml | – sequence: 1 givenname: Ali orcidid: 0000-0001-7472-224X surname: Kazemy fullname: Kazemy, Ali email: Kazemy@tafreshu.ac.ir organization: Tafresh University – sequence: 2 givenname: Jinrong surname: Liu fullname: Liu, Jinrong organization: The University of Hong Kong – sequence: 3 givenname: James surname: Lam fullname: Lam, James organization: The University of Hong Kong  | 
    
| BookMark | eNp1kE1OwzAQhS1UJNrCghtYYsUi7diOk3hZVfxVRSyAdeQ4TkmaxsV2VHXHETgjJyGhXSFYzYz0vTd6b4QGjWk0QpcEJgSATqWr1ISKiJ6gIREsDCIQbNDtPCJBElF-hkbOVQARYQkfosVjW_vy6-OzNmaLG-13xq51jpVpvDU1dnvn9Qbn2pWrBrs2q7Ty2BtcNl5b9SablcbSe6nW5-i0kLXTF8c5Rq-3Ny_z-2D5dPcwny0DRUVMgxCA8SKkQnQnQCgzSiSLGFOC8kiKkBQhEMY5ozlLkrwokizXmdLAIY_DmI3R1cF3a817q51PK9PapnuZ0gQiTmLCoaOmB0pZ45zVRapKL33Z55JlnRJI-8LSvrC0L6xTXP9SbG25kXb_J3t035W13v8PprPnxfxH8Q2SFH1f | 
    
| CitedBy_id | crossref_primary_10_1109_TCSI_2024_3503719 crossref_primary_10_1002_asjc_3547 crossref_primary_10_1016_j_ijepes_2024_109902  | 
    
| Cites_doi | 10.1016/j.ins.2020.08.124 10.1109/ACCESS.2020.2977423 10.1109/JAS.2019.1911651 10.1016/j.ins.2021.01.063 10.1002/asjc.2604 10.1049/iet-cta.2020.0840 10.1109/TSMC.2017.2681702 10.1016/j.jfranklin.2018.04.001 10.1109/TCYB.2017.2671032 10.1016/j.jprocont.2018.02.010 10.1016/j.automatica.2016.12.026 10.1109/TAC.2020.2989773 10.1049/cth2.12261 10.1080/00207721.2020.1858205 10.1109/TCNS.2020.3030002 10.1109/MIE.2017.2649104 10.1201/b12977 10.1016/j.jfranklin.2021.01.027 10.1007/s00034-008-9092-1 10.1109/TCYB.2019.2956137 10.1109/ACCESS.2017.2731780 10.1007/978-3-642-17925-9 10.1109/TNNLS.2020.3030638 10.1049/iet-cta.2018.6121 10.1002/asjc.2506 10.1109/TCOMM.2020.3042792 10.1109/TSMC.2017.2773634 10.1016/j.nahs.2019.03.005 10.1016/j.jfranklin.2020.12.035 10.1016/j.neucom.2019.03.089 10.1016/j.jfranklin.2019.12.032 10.1002/asjc.2686 10.1109/TNNLS.2015.2425881 10.1109/TCYB.2018.2863689 10.1177/0142331216644497 10.1109/TSMC.2018.2833203 10.1109/TCYB.2019.2903817 10.1016/j.automatica.2013.01.038  | 
    
| ContentType | Journal Article | 
    
| Copyright | 2022 Chinese Automatic Control Society and John Wiley & Sons Australia, Ltd. 2023 Chinese Automatic Control Society and John Wiley & Sons Australia, Ltd  | 
    
| Copyright_xml | – notice: 2022 Chinese Automatic Control Society and John Wiley & Sons Australia, Ltd. – notice: 2023 Chinese Automatic Control Society and John Wiley & Sons Australia, Ltd  | 
    
| DBID | AAYXX CITATION JQ2  | 
    
| DOI | 10.1002/asjc.2962 | 
    
| DatabaseName | CrossRef ProQuest Computer Science Collection  | 
    
| DatabaseTitle | CrossRef ProQuest Computer Science Collection  | 
    
| DatabaseTitleList | ProQuest Computer Science Collection CrossRef  | 
    
| DeliveryMethod | fulltext_linktorsrc | 
    
| Discipline | Engineering | 
    
| EISSN | 1934-6093 | 
    
| EndPage | 1714 | 
    
| ExternalDocumentID | 10_1002_asjc_2962 ASJC2962  | 
    
| Genre | article | 
    
| GrantInformation_xml | – fundername: General Research Fund funderid: 17201219  | 
    
| GroupedDBID | .4S .DC 05W 0R~ 1L6 1OC 23N 31~ 33P 3SF 4.4 52U 5DZ 5GY 8-0 8-1 A00 AAESR AAEVG AAHHS AAHQN AAMNL AANHP AANLZ AAONW AASGY AAXRX AAYCA AAZKR ABCUV ABJNI ACAHQ ACBWZ ACCFJ ACCZN ACGFS ACIWK ACPOU ACRPL ACXBN ACXQS ACYXJ ADBBV ADEOM ADIZJ ADKYN ADMGS ADNMO ADOZA ADXAS ADZMN ADZOD AEEZP AEIGN AEIMD AENEX AEQDE AEUQT AEUYR AFBPY AFFPM AFGKR AFPWT AFWVQ AHBTC AITYG AIURR AIWBW AJBDE AJXKR ALMA_UNASSIGNED_HOLDINGS ALUQN ALVPJ AMBMR AMYDB ARCSS ASPBG ATUGU AUFTA AVWKF AZFZN AZVAB BDRZF BFHJK BHBCM BMNLL BMXJE BNHUX BOGZA BRXPI CS3 DCZOG DRFUL DRSTM EBS EJD F5P FEDTE G-S GODZA HGLYW HVGLF HZ~ I-F J9A LATKE LEEKS LH4 LITHE LOXES LUTES LW6 LYRES MEWTI MRFUL MRSTM MSFUL MSSTM MXFUL MXSTM MY. MY~ O9- OIG P2W P4E PQQKQ ROL RWI SUPJJ TUS WBKPD WIH WIK WOHZO WXSBR WYJ XV2 ZZTAW ~S- AAMMB AAYXX ADMLS AEFGJ AEYWJ AGHNM AGQPQ AGXDD AGYGG AIDQK AIDYY CITATION JQ2  | 
    
| ID | FETCH-LOGICAL-c2972-40035f4299297004ab21a3633c9256a941f40135532d388dff8bdebce050d7473 | 
    
| ISSN | 1561-8625 | 
    
| IngestDate | Fri Jul 25 12:20:01 EDT 2025 Thu Apr 24 22:51:15 EDT 2025 Wed Oct 01 03:23:15 EDT 2025 Wed Jan 22 16:23:19 EST 2025  | 
    
| IsPeerReviewed | true | 
    
| IsScholarly | true | 
    
| Issue | 3 | 
    
| Language | English | 
    
| LinkModel | OpenURL | 
    
| MergedId | FETCHMERGED-LOGICAL-c2972-40035f4299297004ab21a3633c9256a941f40135532d388dff8bdebce050d7473 | 
    
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14  | 
    
| ORCID | 0000-0001-7472-224X | 
    
| PQID | 2806517150 | 
    
| PQPubID | 866359 | 
    
| PageCount | 9 | 
    
| ParticipantIDs | proquest_journals_2806517150 crossref_citationtrail_10_1002_asjc_2962 crossref_primary_10_1002_asjc_2962 wiley_primary_10_1002_asjc_2962_ASJC2962  | 
    
| ProviderPackageCode | CITATION AAYXX  | 
    
| PublicationCentury | 2000 | 
    
| PublicationDate | May 2023 2023-05-00 20230501  | 
    
| PublicationDateYYYYMMDD | 2023-05-01 | 
    
| PublicationDate_xml | – month: 05 year: 2023 text: May 2023  | 
    
| PublicationDecade | 2020 | 
    
| PublicationPlace | Hoboken | 
    
| PublicationPlace_xml | – name: Hoboken | 
    
| PublicationTitle | Asian journal of control | 
    
| PublicationYear | 2023 | 
    
| Publisher | Wiley Subscription Services, Inc | 
    
| Publisher_xml | – name: Wiley Subscription Services, Inc | 
    
| References | 2021; 69 2017; 5 2019; 7 2021; 8 2021; 22 2013; 49 2012 2017; 47 2019; 33 2019; 13 2021; 546 2022; 24 2007 2020; 14 2021; 560 2020; 400 2018; 66 2018; 48 2009; 28 2020; 8 2015; 26 2011; 409 2017; 39 2020; 50 2017; 11 2021; 358 2017; 78 2020; 357 2019; 356 2022; 33 2020; 65 2022; 16 e_1_2_9_30_1 e_1_2_9_31_1 e_1_2_9_11_1 e_1_2_9_34_1 e_1_2_9_10_1 e_1_2_9_35_1 e_1_2_9_13_1 e_1_2_9_32_1 e_1_2_9_12_1 e_1_2_9_33_1 e_1_2_9_15_1 e_1_2_9_38_1 e_1_2_9_14_1 e_1_2_9_39_1 e_1_2_9_17_1 e_1_2_9_16_1 e_1_2_9_37_1 e_1_2_9_19_1 e_1_2_9_18_1 e_1_2_9_20_1 e_1_2_9_40_1 e_1_2_9_22_1 e_1_2_9_21_1 e_1_2_9_24_1 e_1_2_9_23_1 e_1_2_9_8_1 e_1_2_9_7_1 e_1_2_9_6_1 Boukas E. K. (e_1_2_9_36_1) 2007 e_1_2_9_5_1 e_1_2_9_4_1 e_1_2_9_3_1 e_1_2_9_2_1 e_1_2_9_9_1 e_1_2_9_26_1 e_1_2_9_25_1 e_1_2_9_28_1 e_1_2_9_27_1 e_1_2_9_29_1  | 
    
| References_xml | – volume: 7 start-page: 1 issue: 1 year: 2019 end-page: 17 article-title: Networked control systems: a survey of trends and techniques publication-title: IEEE/CAA J. Autom. Sin. – volume: 78 start-page: 231 year: 2017 end-page: 240 article-title: Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks publication-title: Automatica – volume: 5 start-page: 15901 year: 2017 end-page: 15912 article-title: Resilient design of networked control systems under time delay switch attacks, application in smart grid publication-title: IEEE Access – volume: 24 start-page: 2213 issue: 5 year: 2022 end-page: 2223 article-title: output quantized control for networked control systems under resilient event‐triggered mechanism and aperiodic denial‐of‐service attacks publication-title: Asian J. Control – volume: 357 start-page: 3419 issue: 6 year: 2020 end-page: 3433 article-title: Cooperative adaptive fault‐tolerant control for multi‐agent systems with deception attacks publication-title: J. Franklin Inst. – volume: 33 start-page: 952 issue: 3 year: 2022 end-page: 961 article-title: Event‐triggered output feedback synchronization of master‐slave neural networks under deception attacks publication-title: IEEE Trans. Neural Netw. Learn. Syst. – volume: 546 start-page: 943 year: 2021 end-page: 960 article-title: Secure state estimation for systems under mixed cyber‐attacks: Security and performance analysis publication-title: Inf. Sci. – volume: 16 start-page: 925 issue: 9 year: 2022 end-page: 934 article-title: Secure LQG control for a Quadrotor under false data injection attacks publication-title: IET Control Theory Appl. – volume: 24 start-page: 517 issue: 2 year: 2022 end-page: 525 article-title: Deception attack monitoring in vulnerable hydroelectric generator system publication-title: Asian J. Control – year: 2007 – volume: 49 start-page: 1326 issue: 5 year: 2013 end-page: 1332 article-title: Event‐triggered communication and control co‐design for networked control systems publication-title: Automatica – volume: 39 start-page: 1703 issue: 11 year: 2017 end-page: 1709 article-title: Synchronization of chaotic Lur'e systems with state and transmission line time delay: a linear matrix inequality approach publication-title: Trans. Inst. Meas. Control – volume: 28 start-page: 505 issue: 4 year: 2009 end-page: 522 article-title: New stability criteria for neural networks with distributed and probabilistic delays publication-title: Circ., Syst. Signal Process. – volume: 409 year: 2011 – volume: 11 start-page: 17 issue: 1 year: 2017 end-page: 27 article-title: The future of industrial communication: Automation networks in the era of the internet of things and industry 4.0 publication-title: IEEE Ind. Electr. Mag. – volume: 24 start-page: 594 year: 2022 end-page: 604 article-title: Distributed impulsive control for secure consensus of nonlinear dynamical networks with node delay under denial‐of‐service attacks publication-title: Asian J. Control – volume: 22 start-page: 1426 issue: 7 year: 2021 end-page: 1439 article-title: Adaptive event‐triggered mechanism for networked control systems under deception attacks with uncertain occurring probability publication-title: Int. J. Syst. Sci. – volume: 358 start-page: 2683 issue: 5 year: 2021 end-page: 2702 article-title: Dissipative output feedback control for semi‐Markovian jump systems under hybrid cyber‐attacks publication-title: J. Franklin Inst. – year: 2012 – volume: 400 start-page: 458 year: 2020 end-page: 466 article-title: Distributed event‐triggered consensus of multi‐agent systems under periodic DoS jamming attacks publication-title: Neurocomputing – volume: 50 start-page: 3616 issue: 8 year: 2020 end-page: 3626 article-title: Resilient control design based on a sampled‐data model for a class of networked control systems under denial‐of‐service attacks publication-title: IEEE Trans. Cybern. – volume: 358 start-page: 2780 issue: 5 year: 2021 end-page: 2800 article-title: Resilient consensus of discrete‐time connected vehicle systems with interaction network against cyber‐attacks publication-title: J. Franklin Inst. – volume: 50 start-page: 48 issue: 1 year: 2020 end-page: 60 article-title: Resilient control of wireless networked control system under denial‐of‐service attacks: A cross‐layer design approach publication-title: IEEE Trans. Cybern. – volume: 50 start-page: 1952 issue: 5 year: 2020 end-page: 1964 article-title: Observer‐based event‐triggered control for networked linear systems subject to denial‐of‐service attacks publication-title: IEEE Trans. Cybern. – volume: 50 start-page: 3126 issue: 9 year: 2020 end-page: 3135 article-title: Guaranteed cost control of uncertain networked control systems with a hybrid communication scheme publication-title: IEEE Trans. Syst. Man. Cybern. Syst. – volume: 8 start-page: 2 issue: 1 year: 2021 end-page: 14 article-title: Optimal allocation of false data injection attacks for networked control systems with two communication channels publication-title: IEEE Trans. Control Netw. Syst. – volume: 13 start-page: 2775 issue: 17 year: 2019 end-page: 2782 article-title: Adaptation in network control systems with hierarchical scheduling publication-title: IET Control Theory Appl. – volume: 8 start-page: 44219 year: 2020 end-page: 44227 article-title: A survey of network attacks on cyber‐physical systems publication-title: IEEE Access – volume: 66 start-page: 59 year: 2018 end-page: 67 article-title: Economic model predictive control of boiler‐turbine system publication-title: J. Process Control – volume: 48 start-page: 1929 issue: 11 year: 2018 end-page: 1938 article-title: Event‐triggered pinning control for consensus of multiagent systems with quantized information publication-title: IEEE Trans. Syst. Man. Cybern. Syst. – volume: 33 start-page: 265 year: 2019 end-page: 281 article-title: Event‐triggered quantized control for networked control systems in the presence of denial‐of‐service jamming attacks publication-title: Nonlinear Anal.: Hybrid Syst. – volume: 47 start-page: 1746 issue: 7 year: 2017 end-page: 1757 article-title: Distributed control of large‐scale networked control systems with communication constraints and topology switching publication-title: IEEE Trans. Syst. Man. Cybern. Syst. – volume: 560 start-page: 20 year: 2021 end-page: 34 article-title: Master–slave synchronization of neural networks subject to mixed‐type communication attacks publication-title: Inf. Sci. – volume: 48 start-page: 1007 issue: 3 year: 2018 end-page: 1017 article-title: Event‐based variance‐constrained filtering for stochastic parameter systems over sensor networks with successive missing measurements publication-title: IEEE Trans. Cybern. – volume: 69 start-page: 1789 issue: 3 year: 2021 end-page: 1801 article-title: Optimal power control, scheduling and energy harvesting for wireless networked control systems publication-title: IEEE Trans. Commun. – volume: 356 start-page: 10277 issue: 17 year: 2019 end-page: 10295 article-title: Security‐based resilient event‐triggered control of networked control systems under denial of service attacks publication-title: J. Franklin Inst. – volume: 14 start-page: 3009 issue: 19 year: 2020 end-page: 3019 article-title: Periodic event‐triggered and self‐triggered control of singular system under stochastic cyber‐attacks publication-title: IET Control Theory Appl. – volume: 26 start-page: 3215 issue: 12 year: 2015 end-page: 3226 article-title: Synchronization of neural networks with control packet loss and time‐varying delay via stochastic sampled‐data controller publication-title: IEEE Trans. Neural Netw. Learn. Syst. – volume: 65 start-page: 3943 issue: 9 year: 2020 end-page: 3949 article-title: Switching‐like event‐triggered control for networked control systems under malicious denial of service attacks publication-title: IEEE Trans. Autom. Control – ident: e_1_2_9_34_1 doi: 10.1016/j.ins.2020.08.124 – ident: e_1_2_9_12_1 doi: 10.1109/ACCESS.2020.2977423 – ident: e_1_2_9_2_1 doi: 10.1109/JAS.2019.1911651 – ident: e_1_2_9_25_1 doi: 10.1016/j.ins.2021.01.063 – ident: e_1_2_9_14_1 doi: 10.1002/asjc.2604 – ident: e_1_2_9_16_1 doi: 10.1049/iet-cta.2020.0840 – ident: e_1_2_9_10_1 doi: 10.1109/TSMC.2017.2681702 – ident: e_1_2_9_40_1 doi: 10.1016/j.jfranklin.2018.04.001 – ident: e_1_2_9_6_1 doi: 10.1109/TCYB.2017.2671032 – ident: e_1_2_9_31_1 doi: 10.1016/j.jprocont.2018.02.010 – ident: e_1_2_9_7_1 doi: 10.1016/j.automatica.2016.12.026 – ident: e_1_2_9_28_1 doi: 10.1109/TAC.2020.2989773 – ident: e_1_2_9_35_1 doi: 10.1049/cth2.12261 – ident: e_1_2_9_26_1 doi: 10.1080/00207721.2020.1858205 – ident: e_1_2_9_27_1 doi: 10.1109/TCNS.2020.3030002 – ident: e_1_2_9_30_1 doi: 10.1109/MIE.2017.2649104 – ident: e_1_2_9_32_1 doi: 10.1201/b12977 – ident: e_1_2_9_19_1 doi: 10.1016/j.jfranklin.2021.01.027 – ident: e_1_2_9_37_1 doi: 10.1007/s00034-008-9092-1 – ident: e_1_2_9_29_1 doi: 10.1109/TCYB.2019.2956137 – ident: e_1_2_9_4_1 doi: 10.1109/ACCESS.2017.2731780 – ident: e_1_2_9_9_1 doi: 10.1007/978-3-642-17925-9 – ident: e_1_2_9_20_1 doi: 10.1109/TNNLS.2020.3030638 – ident: e_1_2_9_18_1 doi: 10.1049/iet-cta.2018.6121 – volume-title: Stochastic switching systems: Analysis and design year: 2007 ident: e_1_2_9_36_1 – ident: e_1_2_9_24_1 doi: 10.1002/asjc.2506 – ident: e_1_2_9_3_1 doi: 10.1109/TCOMM.2020.3042792 – ident: e_1_2_9_8_1 doi: 10.1109/TSMC.2017.2773634 – ident: e_1_2_9_13_1 doi: 10.1016/j.nahs.2019.03.005 – ident: e_1_2_9_17_1 doi: 10.1016/j.jfranklin.2020.12.035 – ident: e_1_2_9_33_1 doi: 10.1016/j.neucom.2019.03.089 – ident: e_1_2_9_21_1 doi: 10.1016/j.jfranklin.2019.12.032 – ident: e_1_2_9_23_1 doi: 10.1002/asjc.2686 – ident: e_1_2_9_38_1 doi: 10.1109/TNNLS.2015.2425881 – ident: e_1_2_9_15_1 doi: 10.1109/TCYB.2018.2863689 – ident: e_1_2_9_5_1 doi: 10.1177/0142331216644497 – ident: e_1_2_9_11_1 doi: 10.1109/TSMC.2018.2833203 – ident: e_1_2_9_22_1 doi: 10.1109/TCYB.2019.2903817 – ident: e_1_2_9_39_1 doi: 10.1016/j.automatica.2013.01.038  | 
    
| SSID | ssj0061385 | 
    
| Score | 2.3415718 | 
    
| Snippet | This paper deals with the design problem of multiloop networked control system (NCS) under interchange attack. This is a new type of attack where the... | 
    
| SourceID | proquest crossref wiley  | 
    
| SourceType | Aggregation Database Enrichment Source Index Database Publisher  | 
    
| StartPage | 1706 | 
    
| SubjectTerms | Control systems design cyber attack Data transmission H-infinity control Linear matrix inequalities Lyapunov–Krasovskii theory Mathematical analysis Network control networked control system sampled‐data control time‐delay  | 
    
| Title | Multi‐loop networked control system design subject to interchange attack | 
    
| URI | https://onlinelibrary.wiley.com/doi/abs/10.1002%2Fasjc.2962 https://www.proquest.com/docview/2806517150  | 
    
| Volume | 25 | 
    
| hasFullText | 1 | 
    
| inHoldings | 1 | 
    
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVEBS databaseName: Inspec with Full Text customDbUrl: eissn: 1934-6093 dateEnd: 20241102 omitProxy: false ssIdentifier: ssj0061385 issn: 1561-8625 databaseCode: ADMLS dateStart: 20110501 isFulltext: true titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text providerName: EBSCOhost  | 
    
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1La9tAEF5a59IeSvqiaZOylB4KZtPV7kq2jiFJCabtJQnkJvYlcEmkYMuH5JSf0N_YX9LZh9YKOJD2IuTVsMYzn2dntDPfIvS5oKLOtTFE1IITMZlkpCzklGiIbbVmNmPWs33-LE7Oxewiv1jXz_vukk7t69uNfSX_Y1UYA7u6Ltl_sGyaFAbgHuwLV7AwXB9lY989m8oVLtv2etyEsm5rUhF64GoeG1-qMV6ulHvz4kJOxxSxCI2_Y9l1MtLj95S0vrtyQCwR50seWt7aq5vQIzNPZT3zlYfFvFm0cUkMpI6pIHf4loENavp6x1hkBLKfsANtw1jJBSloOOGw96ZRYj5Mtr1rdDw9g2XWHby-0YUHSli5_KX3WRk99T2a7CSUPygWCH1PZ4fu0VO0xcDl0xHaOjj68f20X6ghkPEntqaf1hNPUfY1zXs_XFnnIMNMxociZ9voRcwh8EEAxEv0xDav0PMBs-RrNPPQ-HP324ECJ1DgaEQcQIEDKHAEBe5aPAAFDqB4g86_HZ8dnpB4bAbRrJwwItzucO3iDPgI_xapWCZ5wbkuIb6Vpchql1TnOWeGT6emrqfKWKUtzamB7JK_RaOmbew7hDktlaW8ltzWwhihWC4M1TZTthTa8h30pddOpSOnvDva5LIKbNiscoqsnCJ30Kckeh2IVDYJ7fYqriLAl5Xf-we45BS-zqv94Qmq3ujvHy_6AT1bI34XjbrFyu5BpNmpjxExfwF00H2f | 
    
| linkProvider | EBSCOhost | 
    
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Multi%E2%80%90loop+networked+control+system+design+subject+to+interchange+attack&rft.jtitle=Asian+journal+of+control&rft.au=Kazemy%2C+Ali&rft.au=Liu%2C+Jinrong&rft.au=Lam%2C+James&rft.date=2023-05-01&rft.issn=1561-8625&rft.eissn=1934-6093&rft.volume=25&rft.issue=3&rft.spage=1706&rft.epage=1714&rft_id=info:doi/10.1002%2Fasjc.2962&rft.externalDBID=10.1002%252Fasjc.2962&rft.externalDocID=ASJC2962 | 
    
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1561-8625&client=summon | 
    
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1561-8625&client=summon | 
    
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1561-8625&client=summon |