期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
Distributed Fault Estimation for Nonlinear Systems With Sensor Saturation and Deception Attacks Using Stochastic Communication Protocols
1
作者 Weiwei Sun Xinci Gao +1 位作者 Lusong Ding Xiangyu Chen 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第8期1865-1876,共12页
This paper is aimed at the distributed fault estimation issue associated with the potential loss of actuator efficiency for a type of discrete-time nonlinear systems with sensor saturation.For the distributed estimati... This paper is aimed at the distributed fault estimation issue associated with the potential loss of actuator efficiency for a type of discrete-time nonlinear systems with sensor saturation.For the distributed estimation structure under consideration,an estimation center is not necessary,and the estimator derives its information from itself and neighboring nodes,which fuses the state vector and the measurement vector.In an effort to cut down data conflicts in communication networks,the stochastic communication protocol(SCP)is employed so that the output signals from sensors can be selected.Additionally,a recursive security estimator scheme is created since attackers randomly inject malicious signals into the selected data.On this basis,sufficient conditions for a fault estimator with less conservatism are presented which ensure an upper bound of the estimation error covariance and the mean-square exponential boundedness of the estimating error.Finally,a numerical example is used to show the reliability and effectiveness of the considered distributed estimation algorithm. 展开更多
关键词 Actuator fault deception attacks distributed estimation sensor saturation stochastic communication protocol(SCP).
下载PDF
Secure Impulsive Synchronization in Lipschitz-Type Multi-Agent Systems Subject to Deception Attacks 被引量:16
2
作者 Wangli He Zekun Mo +1 位作者 Qing-Long Han Feng Qian 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2020年第5期1326-1334,共9页
Cyber attacks pose severe threats on synchronization of multi-agent systems.Deception attack,as a typical type of cyber attack,can bypass the surveillance of the attack detection mechanism silently,resulting in a heav... Cyber attacks pose severe threats on synchronization of multi-agent systems.Deception attack,as a typical type of cyber attack,can bypass the surveillance of the attack detection mechanism silently,resulting in a heavy loss.Therefore,the problem of mean-square bounded synchronization in multi-agent systems subject to deception attacks is investigated in this paper.The control signals can be replaced with false data from controllerto-actuator channels or the controller.The success of the attack is measured through a stochastic variable.A distributed impulsive controller using a pinning strategy is redesigned,which ensures that mean-square bounded synchronization is achieved in the presence of deception attacks.Some sufficient conditions are derived,in which upper bounds of the synchronization error are given.Finally,two numerical simulations with symmetric and asymmetric network topologies are given to illustrate the theoretical results. 展开更多
关键词 deception attacks impulsive control multi-agent systems(MASs) SYNCHRONIZATION
下载PDF
Memory-based adaptive event-triggered secure control of Markovian jumping neural networks suffering from deception attacks 被引量:1
3
作者 YAO Lan HUANG Xia 《Science China(Technological Sciences)》 SCIE EI CAS CSCD 2023年第2期468-480,共13页
In this article,we study the secure control of the Markovian jumping neural networks(MJNNs)subject to deception attacks.Considering the limitation of the network bandwidth and the impact of the deception attacks,we pr... In this article,we study the secure control of the Markovian jumping neural networks(MJNNs)subject to deception attacks.Considering the limitation of the network bandwidth and the impact of the deception attacks,we propose two memory-based adaptive event-trigger mechanisms(AETMs).Different from the available event-trigger mechanisms,these two memory-based AETMs contain the historical triggered data not only in the triggering conditions,but also in the adaptive law.They can adjust the data transmission rate adaptively so as to alleviate the impact of deception attacks on the controlled system and to suppress the peak of the system response.In view of the proposed memory-based AETMs,a time-dependent Lyapunov functional is constructed to analyze the stability of the error system.Some sufficient conditions to ensure the asymptotical synchronization of master-slave MJNNs are obtained,and two easy-to-implement co-design algorithms for the feedback gain matrix and the trigger matrix are given.Finally,a numerical example is given to verify the feasibility and superiority of the two memory-based AETMs. 展开更多
关键词 secure control memory-based adaptive event-trigger mechanism globally asymptotical synchronization deception attacks
原文传递
Reconstruction of measurements in state estimation strategy against deception attacks for cyber physical systems 被引量:3
4
作者 Qinxue LI Bugong XU +2 位作者 Shanbin LI Yonggui LIU Delong CUI 《Control Theory and Technology》 EI CSCD 2018年第1期1-13,共13页
Without the known state equation, a new state estimation strategy is designed to be against malicious attacks for cyber physical systems. Inspired by the idea of data reconstruction, the compressive sensing (CS) is ... Without the known state equation, a new state estimation strategy is designed to be against malicious attacks for cyber physical systems. Inspired by the idea of data reconstruction, the compressive sensing (CS) is applied to reconstruction of residual measurements after the detection and identification scheme based on the Markov graph of the system state, which increases the resilience of state estimation strategy against deception attacks. First, the observability analysis is introduced to decide the triggering time of the measurement reconstruction and the damage level from attacks. In particular, the dictionary learning is proposed to form the over-completed dictionary by K-singular value decomposition (K-SVD), which is produced adaptively according to the characteristics of the measurement data. In addition, due to the irregularity of residual measurements, a sampling matrix is designed as the measurement matrix. Finally, the simulation experiments are performed on 6-bus power system. Results show that the reconstruction of measurements is completed well by the proposed reconstruction method, and the corresponding effects are better than reconstruction scheme based on the joint dictionary and the traditional Gauss or Bernoulli random matrix respectively. Especially, when only 29% available clean measurements are left, performance of the proposed strategy is still extraordinary, which reflects generality for five kinds of recovery algorithms. 展开更多
关键词 State estimation deception attacks cyber physical systems reconstruction of measurements compressivesensing
原文传递
CORMAND2--针对工业机器人的欺骗攻击
5
作者 Hongyi Pu Liang He +2 位作者 Peng Cheng Jiming Chen Youxian Sun 《Engineering》 SCIE EI CAS CSCD 2024年第1期186-201,共16页
Industrial robots are becoming increasingly vulnerable to cyber incidents and attacks,particularly with the dawn of the Industrial Internet-of-Things(IIoT).To gain a comprehensive understanding of these cyber risks,vu... Industrial robots are becoming increasingly vulnerable to cyber incidents and attacks,particularly with the dawn of the Industrial Internet-of-Things(IIoT).To gain a comprehensive understanding of these cyber risks,vulnerabilities of industrial robots were analyzed empirically,using more than three million communication packets collected with testbeds of two ABB IRB120 robots and five other robots from various original equipment manufacturers(OEMs).This analysis,guided by the confidentiality-integrity-availability(CIA)triad,uncovers robot vulnerabilities in three dimensions:confidentiality,integrity,and availability.These vulnerabilities were used to design Covering Robot Manipulation via Data Deception(CORMAND2),an automated cyber-physical attack against industrial robots.CORMAND2 manipulates robot operation while deceiving the Supervisory Control and Data Acquisition(SCADA)system that the robot is operating normally by modifying the robot’s movement data and data deception.CORMAND2 and its capability of degrading the manufacturing was validated experimentally using the aforementioned seven robots from six different OEMs.CORMAND2 unveils the limitations of existing anomaly detection systems,more specifically the assumption of the authenticity of SCADA-received movement data,to which we propose mitigations for. 展开更多
关键词 Industrial robots Vulnerability analysis deception attacks DEFENSES
下载PDF
H_(∞)/Passive Synchronization of Semi-Markov Jump Neural Networks Subject to Hybrid Attacks via an Activation Function Division Approach
6
作者 ZHANG Ziwei SHEN Hao SU Lei 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2024年第3期1023-1036,共14页
In this work,an H_(∞)/passive-based secure synchronization control problem is investigated for continuous-time semi-Markov neural networks subject to hybrid attacks,in which hybrid attacks are the combinations of den... In this work,an H_(∞)/passive-based secure synchronization control problem is investigated for continuous-time semi-Markov neural networks subject to hybrid attacks,in which hybrid attacks are the combinations of denial-of-service attacks and deception attacks,and they are described by two groups of independent Bernoulli distributions.On this foundation,via the Lyapunov stability theory and linear matrix inequality technology,the H_(∞)/passive-based performance criteria for semi-Markov jump neural networks are obtained.Additionally,an activation function division approach for neural networks is adopted to further reduce the conservatism of the criteria.Finally,a simulation example is provided to verify the validity and feasibility of the proposed method. 展开更多
关键词 Activation function division approach deception attacks denial-of-service attacks H_(∞)/passive synchronization semi-Markov jump neural networks
原文传递
Physical Safety and Cyber Security Analysis of Multi-Agent Systems:A Survey of Recent Advances 被引量:19
7
作者 Dan Zhang Gang Feng +1 位作者 Yang Shi Dipti Srinivasan 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第2期319-333,共15页
Multi-agent systems(MASs)are typically composed of multiple smart entities with independent sensing,communication,computing,and decision-making capabilities.Nowadays,MASs have a wide range of applications in smart gri... Multi-agent systems(MASs)are typically composed of multiple smart entities with independent sensing,communication,computing,and decision-making capabilities.Nowadays,MASs have a wide range of applications in smart grids,smart manufacturing,sensor networks,and intelligent transportation systems.Control of the MASs are often coordinated through information interaction among agents,which is one of the most important factors affecting coordination and cooperation performance.However,unexpected physical faults and cyber attacks on a single agent may spread to other agents via information interaction very quickly,and thus could lead to severe degradation of the whole system performance and even destruction of MASs.This paper is concerned with the safety/security analysis and synthesis of MASs arising from physical faults and cyber attacks,and our goal is to present a comprehensive survey on recent results on fault estimation,detection,diagnosis and fault-tolerant control of MASs,and cyber attack detection and secure control of MASs subject to two typical cyber attacks.Finally,the paper concludes with some potential future research topics on the security issues of MASs. 展开更多
关键词 CONSENSUS deception attack deny-of-service(DoS)attack fault detection fault estimation fault tolerant control multiagent systems
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部