Safe and Secure Networked Control Systems under Denial-of-Service Attacks

From MaRDI portal
Publication:3624559

DOI10.1007/978-3-642-00602-9_3zbMath1237.90054OpenAlexW1571323288MaRDI QIDQ3624559

Saurabh Amin, Alvaro A. Cárdenas, Shankar S. Sastry

Publication date: 30 April 2009

Published in: Hybrid Systems: Computation and Control (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-00602-9_3




Related Items (60)

Recent advances in event-triggered security control of networked systems: a surveyA stochastic games framework for verification and control of discrete time stochastic hybrid systemsA nonlinear systems framework for cyberattack prevention for chemical process control systemsResilient quantized control under denial-of-service: variable bit rate quantizationReachable set estimation for switched linear systems with dwell-time switchingNetworked control of nonlinear systems under denial-of-serviceSecurity in \(H_2\)-sense for polytopic uncertain systems with attacks based on model predictive controlRecent advances on filtering and control for cyber-physical systems under security and resource constraintsResilient reinforcement learning and robust output regulation under denial-of-service attacksSecurity weakness of dynamic watermarking-based detection for generalised replay attacksA stochastic game approach to the security issue of networked control systems under jamming attacksState estimation and self-triggered control of CPSs against joint sensor and actuator attacksEvent-triggered control for stochastic networked control systems against denial-of-service attacksDelayed unknown input observers for discrete-time linear systems with guaranteed performanceThe Effect of Time-Varying Jamming Interference on Networked StabilizationResilient control under denial-of-service: robust designFinite horizon constrained control and bounded-error estimation in the presence of missing dataNetworked control systems under denial-of-service: co-located vs. remote architecturesDistributed set-membership filtering for time-varying systems under constrained measurements and replay attacksController-jammer game models of denial of service in control systems operating over packet-dropping linksSecure control for cyber-physical systems with positive constraint under DoS attackActive resilient control for two‐dimensional systems under denial‐of‐service attacksDesign of non-smooth consensus protocol for multi-agent systems under DoS attacksSwitched-type unknown input observer-based fault-tolerant control for cyber-physical systems in the presence of denial of service attackState estimation for 2-D uncertain systems with redundant channels and deception attacks: a set-membership methodPath-dependent controller and estimator synthesis with robustness to delayed and missing dataZeros of networked systems with time-invariant interconnectionsA dynamic encryption-decryption scheme for replay attack detection in cyber-physical systemsThe bottleneck and ceiling effects in quantized tracking control of heterogeneous multi-agent systems under DoS attacksHidden Markov model‐based ℋ control for singular Markov jump systems under denial of service attacksModel-based hybrid dynamic event-triggered control for systems subject to DoS attacks: a hybrid system approachCyber-Attacks on Remote State Estimation in Industrial Control System: A Game-Based FrameworkSecure Luenberger-like observers for cyber-physical systems under sparse actuator and sensor attacksSecurity concepts for the dynamics of autonomous vehicle networksEvent-triggered resilient control for cyber-physical system under denial-of-service attacksConsensus-based secondary frequency control under denial-of-service attacks of distributed generations for microgridsTimely detection and mitigation of IoT-based cyberattacks in the smart gridA co-design methodology for cyber-physical systems under actuator fault and cyber attackStrong \(\gamma_c\)-\(\gamma_{cl}H_\infty\) stabilization for networked control systems under denial of service attacksDetection of replay attacks in cyber-physical systems using a frequency-based signatureSecurity control for Markov jump system with adversarial attacks and unknown transition rates via adaptive sliding mode techniqueDetection of actuator faults for continuous-time systems with intermittent state feedbackAttack allocation on remote state estimation in multi-systems: structural results and asymptotic solutionMedium access scheduling for input reconstruction under deception attacksA Probabilistic Characterization of Random and Malicious Communication Failures in Multi-Hop Networked ControlSecurity-based resilient event-triggered control of networked control systems under denial of service attacksISS control synthesis of T-S fuzzy systems with multiple transmission channels under denial of serviceSecurity control for networked control systems with randomly occurring integrity check protection subject to randomly occurring zero-value attacksEvent-triggered quantized \(H_\infty\) control for networked control systems in the presence of denial-of-service jamming attacksState filtering for networked control systems subject to switching disturbancesOn co-design of filter and fault estimator against randomly occurring nonlinearities and randomly occurring deception attacksResilient observer-based control for cyber-physical systems under denial-of-service attacksEvent-triggered \(H_\infty\) control of networked switched systems subject to denial-of-service attacksOn Triggering Control of Single-Input Linear Systems Under Pulse-Width Modulated DoS SignalsImproved adaptive resilient control against sensor and actuator attacksData-driven modeling of the temporal evolution of breakers' states in the French electrical transmission gridA game theoretic approach to multi-channel transmission scheduling for multiple linear systems under DoS attacksA secure control framework for resource-limited adversariesFlow-based attack detection and accommodation for networked control systemsQuantized state feedback stabilization of nonlinear systems under denial-of-service


Uses Software


Cites Work




This page was built for publication: Safe and Secure Networked Control Systems under Denial-of-Service Attacks