A game theoretic approach to multi-channel transmission scheduling for multiple linear systems under DoS attacks
From MaRDI portal
Publication:2338198
DOI10.1016/j.sysconle.2019.104546zbMath1427.91017OpenAlexW2979722390WikidataQ127108821 ScholiaQ127108821MaRDI QIDQ2338198
Publication date: 21 November 2019
Published in: Systems \& Control Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.sysconle.2019.104546
Noncooperative games (91A10) Applications of game theory (91A80) Control/observation systems involving computers (process control, etc.) (93C83) Linear systems in control theory (93C05) Authentication, digital signatures and secret sharing (94A62)
Related Items
Nash equilibrium seeking for individual linear dynamics subject to limited communication resources, Optimal cooperative multiple-attackers scheduling against remote state estimation of cyber-physical systems, Self-triggered model predictive control for nonlinear continuous-time networked system via ensured performance control samples selection, Optimal DoS attack schedules on remote state estimation under multi-sensor round-robin protocol, Nonfragile security control for time‐varying cyber‐physical systems operating over multipath networks, Leader-following event-triggered consensus control of MASs under false data injection attacks, Resilient quantized control for asynchronous sampled-data networked control systems under DoS attacks, Neural network-based control for RRP-based networked systems under DoS attacks with power interval
Cites Work
- Networked control of nonlinear systems under denial-of-service
- Control of cyber-physical systems. Invited papers based on the presentations at the workshop at Johns Hopkins University, Baltimore, MD, USA, March 20--21, 2013.
- On Kalman filtering over fading wireless channels with controlled transmission powers
- A multi-channel transmission schedule for remote state estimation under DoS attacks
- Sensor data scheduling for optimal state estimation with communication energy constraint
- Networked control systems under denial-of-service: co-located vs. remote architectures
- Security of interdependent and identical networked control systems
- Optimal sensor scheduling for multiple linear dynamical systems
- Step-size sequence design for finite-time average consensus in secure wireless sensor networks
- Optimal Denial-of-Service Attack Scheduling With Energy Constraint
- An Online Sensor Power Schedule for Remote State Estimation With Communication Energy Constraint
- On the Performance Analysis of Resilient Networked Control Systems Under Replay Attacks
- Secure Control Systems: A Quantitative Risk Management Approach
- Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilient Control Systems
- Safe and Secure Networked Control Systems under Denial-of-Service Attacks
- SINR-Based DoS Attack on Remote State Estimation: A Game-Theoretic Approach
- Scheduling Two Gauss–Markov Systems: An Optimal Solution for Remote State Estimation Under Bandwidth Constraint
- Ergodic Theorems for Discrete Time Stochastic Systems Using a Stochastic Lyapunov Function
- Optimal Pruning for Multi-Step Sensor Scheduling
- Optimal Linear Cyber-Attack on Remote State Estimation