Safe and Secure Networked Control Systems under Denial-of-Service Attacks
From MaRDI portal
Publication:3624559
DOI10.1007/978-3-642-00602-9_3zbMath1237.90054OpenAlexW1571323288MaRDI QIDQ3624559
Saurabh Amin, Alvaro A. Cárdenas, Shankar S. Sastry
Publication date: 30 April 2009
Published in: Hybrid Systems: Computation and Control (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-00602-9_3
Communication networks in operations research (90B18) Network design and communication in computer systems (68M10) Optimal stochastic control (93E20)
Related Items (60)
Recent advances in event-triggered security control of networked systems: a survey ⋮ A stochastic games framework for verification and control of discrete time stochastic hybrid systems ⋮ A nonlinear systems framework for cyberattack prevention for chemical process control systems ⋮ Resilient quantized control under denial-of-service: variable bit rate quantization ⋮ Reachable set estimation for switched linear systems with dwell-time switching ⋮ Networked control of nonlinear systems under denial-of-service ⋮ Security in \(H_2\)-sense for polytopic uncertain systems with attacks based on model predictive control ⋮ Recent advances on filtering and control for cyber-physical systems under security and resource constraints ⋮ Resilient reinforcement learning and robust output regulation under denial-of-service attacks ⋮ Security weakness of dynamic watermarking-based detection for generalised replay attacks ⋮ A stochastic game approach to the security issue of networked control systems under jamming attacks ⋮ State estimation and self-triggered control of CPSs against joint sensor and actuator attacks ⋮ Event-triggered control for stochastic networked control systems against denial-of-service attacks ⋮ Delayed unknown input observers for discrete-time linear systems with guaranteed performance ⋮ The Effect of Time-Varying Jamming Interference on Networked Stabilization ⋮ Resilient control under denial-of-service: robust design ⋮ Finite horizon constrained control and bounded-error estimation in the presence of missing data ⋮ Networked control systems under denial-of-service: co-located vs. remote architectures ⋮ Distributed set-membership filtering for time-varying systems under constrained measurements and replay attacks ⋮ Controller-jammer game models of denial of service in control systems operating over packet-dropping links ⋮ Secure control for cyber-physical systems with positive constraint under DoS attack ⋮ Active resilient control for two‐dimensional systems under denial‐of‐service attacks ⋮ Design of non-smooth consensus protocol for multi-agent systems under DoS attacks ⋮ Switched-type unknown input observer-based fault-tolerant control for cyber-physical systems in the presence of denial of service attack ⋮ State estimation for 2-D uncertain systems with redundant channels and deception attacks: a set-membership method ⋮ Path-dependent controller and estimator synthesis with robustness to delayed and missing data ⋮ Zeros of networked systems with time-invariant interconnections ⋮ A dynamic encryption-decryption scheme for replay attack detection in cyber-physical systems ⋮ The bottleneck and ceiling effects in quantized tracking control of heterogeneous multi-agent systems under DoS attacks ⋮ Hidden Markov model‐based ℋ∞ control for singular Markov jump systems under denial of service attacks ⋮ Model-based hybrid dynamic event-triggered control for systems subject to DoS attacks: a hybrid system approach ⋮ Cyber-Attacks on Remote State Estimation in Industrial Control System: A Game-Based Framework ⋮ Secure Luenberger-like observers for cyber-physical systems under sparse actuator and sensor attacks ⋮ Security concepts for the dynamics of autonomous vehicle networks ⋮ Event-triggered resilient control for cyber-physical system under denial-of-service attacks ⋮ Consensus-based secondary frequency control under denial-of-service attacks of distributed generations for microgrids ⋮ Timely detection and mitigation of IoT-based cyberattacks in the smart grid ⋮ A co-design methodology for cyber-physical systems under actuator fault and cyber attack ⋮ Strong \(\gamma_c\)-\(\gamma_{cl}H_\infty\) stabilization for networked control systems under denial of service attacks ⋮ Detection of replay attacks in cyber-physical systems using a frequency-based signature ⋮ Security control for Markov jump system with adversarial attacks and unknown transition rates via adaptive sliding mode technique ⋮ Detection of actuator faults for continuous-time systems with intermittent state feedback ⋮ Attack allocation on remote state estimation in multi-systems: structural results and asymptotic solution ⋮ Medium access scheduling for input reconstruction under deception attacks ⋮ A Probabilistic Characterization of Random and Malicious Communication Failures in Multi-Hop Networked Control ⋮ Security-based resilient event-triggered control of networked control systems under denial of service attacks ⋮ ISS control synthesis of T-S fuzzy systems with multiple transmission channels under denial of service ⋮ Security control for networked control systems with randomly occurring integrity check protection subject to randomly occurring zero-value attacks ⋮ Event-triggered quantized \(H_\infty\) control for networked control systems in the presence of denial-of-service jamming attacks ⋮ State filtering for networked control systems subject to switching disturbances ⋮ On co-design of filter and fault estimator against randomly occurring nonlinearities and randomly occurring deception attacks ⋮ Resilient observer-based control for cyber-physical systems under denial-of-service attacks ⋮ Event-triggered \(H_\infty\) control of networked switched systems subject to denial-of-service attacks ⋮ On Triggering Control of Single-Input Linear Systems Under Pulse-Width Modulated DoS Signals ⋮ Improved adaptive resilient control against sensor and actuator attacks ⋮ Data-driven modeling of the temporal evolution of breakers' states in the French electrical transmission grid ⋮ A game theoretic approach to multi-channel transmission scheduling for multiple linear systems under DoS attacks ⋮ A secure control framework for resource-limited adversaries ⋮ Flow-based attack detection and accommodation for networked control systems ⋮ Quantized state feedback stabilization of nonlinear systems under denial-of-service
Uses Software
Cites Work
- Optimization over state feedback policies for robust control with constraints
- Constrained model predictive control: Stability and optimality
- On distributionally robust chance-constrained linear programs
- Optimization Strategies for the Vulnerability Analysis of the Electric Power Grid
- Stochastic Receding Horizon Control of Constrained Linear Systems With State and Control Multiplicative Noise
- Design of Affine Controllers via Convex Optimization
- Hybrid Systems: Computation and Control
This page was built for publication: Safe and Secure Networked Control Systems under Denial-of-Service Attacks