Static output feedback predictive control for cyber-physical system under denial of service attacks (Q2007341): Difference between revisions

From MaRDI portal
RedirectionBot (talk | contribs)
Removed claims
Set OpenAlex properties.
(2 intermediate revisions by 2 users not shown)
Property / author
 
Property / author: Zhi-wen Wang / rank
 
Normal rank
Property / author
 
Property / author: Xiao-Ping Wang / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1155/2020/5412170 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W3082147284 / rank
 
Normal rank

Revision as of 19:57, 19 March 2024

scientific article
Language Label Description Also known as
English
Static output feedback predictive control for cyber-physical system under denial of service attacks
scientific article

    Statements

    Static output feedback predictive control for cyber-physical system under denial of service attacks (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    13 October 2020
    0 references
    Summary: This paper addresses the static output feedback predictive (SOFP) control problem with cyber-physical system (CPS) subject to Denial-of-Service (DoS) attacks. The effects of DoS attacks are reasonably assumed to the bounded consecutive packet dropouts by considering the energy constraints of an attacker. Then, a novel predictive control sequence, in which only the latest successfully received output is employed, is designed to compensate such packet dropouts caused by DoS attacks. Furthermore, the stability criterion and predictive control design are carefully derived by using the switching Lyapunov functional approach and linear matrix inequality. Compared with the previous works, the proposed predictive control strategy can compensate arbitrary packet dropouts under DoS attacks while only the latest successfully received output is available. At last, a simulation example illustrates the effectiveness of the SOFP control strategy.
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references