期刊文献+
共找到21篇文章
< 1 2 >
每页显示 20 50 100
Quasi-dynamic Interactions and Security Control of Integrated Electricity and Heating Systems in Normal Operations 被引量:7
1
作者 Zhaoguang Pan Jianzhong Wu +2 位作者 Hongbin Sun Qinglai Guo Muditha Abeysekera 《CSEE Journal of Power and Energy Systems》 SCIE CSCD 2019年第1期120-129,共10页
Coupling between electricity systems and heating systems are becoming stronger,leading to more flexible and more complex interactions between these systems.The operation of integrated energy systems is greatly affecte... Coupling between electricity systems and heating systems are becoming stronger,leading to more flexible and more complex interactions between these systems.The operation of integrated energy systems is greatly affected,especially when security is concerned.Steady-state analysis methods have been widely studied in recent research,which is far from enough when the slow thermal dynamics of heating networks are introduced.Therefore,an integrated quasi-dynamic model of integrated electricity and heating systems is developed.The model combines a heating network dynamic thermal model and the sequential steady-state models of electricity networks,coupling components,and heating network hydraulics.Based on this model,a simulation method is proposed and quasi-dynamic interactions between electricity systems and heating systems are quantified with the highlights of transport delay.Then the quasi-dynamic interactions were applied using security control to relieve congestion in electricity systems.Results show that both the transport delay and control strategies have significant influences on the quasi-dynamic interactions. 展开更多
关键词 Integrated electricity and heating integrated energy system INTERACTIONS QUASI-DYNAMIC security control transport delay
原文传递
Reliability and sensitivity analysis of loop-designed security and stability control system in interconnected power systems 被引量:2
2
作者 Shenghu Li Huimin Zhou +2 位作者 Yunsong Yan Wei Han Jianfeng Ren 《Global Energy Interconnection》 EI CAS CSCD 2022年第5期501-511,共11页
Security and stability control system(SSCS)in power systems involves collecting information and sending the decision from/to control stations at different layers;the tree structure of the SSCS requires more levels.Fai... Security and stability control system(SSCS)in power systems involves collecting information and sending the decision from/to control stations at different layers;the tree structure of the SSCS requires more levels.Failure of a station or channel can cause all the execution stations(EXs)to be out of control.The randomness of the controllable capacity of the EXs increases the difficulty of the reliability evaluation of the SSCS.In this study,the loop designed SSCS and reliability analysis are examined for the interconnected systems.The uncertainty analysis of the controllable capacity based on the evidence theory for the SSCS is proposed.The bidirectional and loop channels are introduced to reduce the layers and stations of the existing SSCS with tree configuration.The reliability evaluation and sensitivity analysis are proposed to quantify the controllability and vulnerable components for the SSCS in different configurations.By aiming at the randomness of the controllable capacity of the EXs,the uncertainty analysis of the controllable capacity of the SSCS based on the evidence theory is proposed to quantify the probability of the SSCS for balancing the active power deficiency of the grid. 展开更多
关键词 security and stability control system(SSCS) Loop design controlLABILITY VULNERABILITY Interconnected power systems Evidence theory Uncertainty controllable capacity.
下载PDF
Security Risk Prevention and Control Deployment for 5G Private Industrial Networks 被引量:1
3
作者 Wenfa Yan Qin Shu Peng Gao 《China Communications》 SCIE CSCD 2021年第9期167-174,共8页
In this paper,we investigate and analyze the network security risks faced by 5G private industrial networks.Based on current network security architecture and 3GPP requirements and considering the actual application o... In this paper,we investigate and analyze the network security risks faced by 5G private industrial networks.Based on current network security architecture and 3GPP requirements and considering the actual application of 5G private industrial networks,a comparative analysis is used to plan and design a private network security construction scheme.The network security construction model,network organization,and key processes of 5G private industrial networks at the current stage are investigated.In addition,the key direction for the next stage of construction is discussed. 展开更多
关键词 5G private network network security security risk prevention and control
下载PDF
Security,Controllability,Manageability and Survivability in Trustworthy Network
4
作者 Wang Sheng, Yu Hongfang, Xu Du (School of Communication and Information Engineering ,University of Electronic Science and Technology of China, Chengdu, Sichuan 610054, China) 《ZTE Communications》 2008年第1期33-38,共6页
The Internet plays increasingly important roles in everyone's life; however, the existence of a mismatch between the basic architectural idea beneath the Internet and the emerging requirements for it is becoming m... The Internet plays increasingly important roles in everyone's life; however, the existence of a mismatch between the basic architectural idea beneath the Internet and the emerging requirements for it is becoming more and more obvious. Although the Internet community came up with a consensus that the future network should be trustworthy, the concept of 'trustworthy networks' and the ways leading us to a trustworthy network are not yet clear. This research insists that the security, controllability, manageability, and survivability should be basic properties of a trustworthy network. The key ideas and techniques involved in these properties are studied, and recent developments and progresses are surveyed. At the same time, the technical trends and challenges are briefly discussed. The network trustworthiness could and should be eventually achieved. 展开更多
关键词 security controllability Manageability and Survivability in Trustworthy Network NET
下载PDF
Networked Control Systems:A Survey of Trends and Techniques 被引量:32
5
作者 Xian-Ming Zhang Qing-Long Han +4 位作者 Xiaohua Ge Derui Ding Lei Ding Dong Yue Chen Peng 《IEEE/CAA Journal of Automatica Sinica》 EI CSCD 2020年第1期1-17,共17页
Networked control systems are spatially distributed systems in which the communication between sensors, actuators,and controllers occurs through a shared band-limited digital communication network. Several advantages ... Networked control systems are spatially distributed systems in which the communication between sensors, actuators,and controllers occurs through a shared band-limited digital communication network. Several advantages of the network architectures include reduced system wiring, plug and play devices,increased system agility, and ease of system diagnosis and maintenance. Consequently, networked control is the current trend for industrial automation and has ever-increasing applications in a wide range of areas, such as smart grids, manufacturing systems,process control, automobiles, automated highway systems, and unmanned aerial vehicles. The modelling, analysis, and control of networked control systems have received considerable attention in the last two decades. The ‘control over networks’ is one of the key research directions for networked control systems. This paper aims at presenting a survey of trends and techniques in networked control systems from the perspective of ‘control over networks’, providing a snapshot of five control issues: sampled-data control, quantization control, networked control, event-triggered control, and security control. Some challenging issues are suggested to direct the future research. 展开更多
关键词 Index Terms—Event-triggered control networked control systems quantization control sampled-data control security control
下载PDF
Secure Synchronization Control for a Class of Cyber-Physical Systems With Unknown Dynamics 被引量:2
6
作者 Ning Wang Xiaojian Li 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2020年第5期1215-1224,共10页
This paper investigates the secure synchronization control problem for a class of cyber-physical systems(CPSs)with unknown system matrices and intermittent denial-of-service(DoS)attacks.For the attack free case,an opt... This paper investigates the secure synchronization control problem for a class of cyber-physical systems(CPSs)with unknown system matrices and intermittent denial-of-service(DoS)attacks.For the attack free case,an optimal control law consisting of a feedback control and a compensated feedforward control is proposed to achieve the synchronization,and the feedback control gain matrix is learned by iteratively solving an algebraic Riccati equation(ARE).For considering the attack cases,it is difficult to perform the stability analysis of the synchronization errors by using the existing Lyapunov function method due to the presence of unknown system matrices.In order to overcome this difficulty,a matrix polynomial replacement method is given and it is shown that,the proposed optimal control law can still guarantee the asymptotical convergence of synchronization errors if two inequality conditions related with the DoS attacks hold.Finally,two examples are given to illustrate the effectiveness of the proposed approaches. 展开更多
关键词 Algebraic Riccati equation(ARE) complex dynamical networks(CDNs) denial-of-service(DoS) secure control
下载PDF
Analysis and Improvement of an Efficient Controlled Quantum Secure Direct Communication and Authentication Protocol 被引量:2
7
作者 Jifeng Zhong Zhihao Liu Juan Xu 《Computers, Materials & Continua》 SCIE EI 2018年第12期621-633,共13页
The controlled quantum secure direct communication(CQSDC)with authentication protocol based on four particle cluster states via quantum one-time pad and local unitary operations is cryptanalyzed.It is found that there... The controlled quantum secure direct communication(CQSDC)with authentication protocol based on four particle cluster states via quantum one-time pad and local unitary operations is cryptanalyzed.It is found that there are some serious security issues in this protocol.An eavesdropper(Eve)can eavesdrop on some information of the identity strings of the receiver and the controller without being detected by the selective-CNOT-operation(SCNO)attack.By the same attack,Eve can also steal some information of the secret message that the sender transmits.In addition,the receiver can take the same kind of attack to eavesdrop on some information of the secret message out of the control of the controller.This means that the requirements of CQSDC are not satisfied.At last,we improve the original CQSDC protocol to a secure one. 展开更多
关键词 Quantum cryptography controlled quantum secure direct communication selective-CNOT-operation attack
下载PDF
Controlled Secure Direct Communication Protocol via the Three-Qubit Partially Entangled Set of States 被引量:1
8
作者 Gang Xu Ke Xiao +2 位作者 Zongpeng Li Xin-Xin Niu Michael Ryan 《Computers, Materials & Continua》 SCIE EI 2019年第3期809-827,共19页
In this paper,we first re-examine the previous protocol of controlled quantum secure direct communication of Zhang et al.’s scheme,which was found insecure under two kinds of attacks,fake entangled particles attack a... In this paper,we first re-examine the previous protocol of controlled quantum secure direct communication of Zhang et al.’s scheme,which was found insecure under two kinds of attacks,fake entangled particles attack and disentanglement attack.Then,by changing the party of the preparation of cluster states and using unitary operations,we present an improved protocol which can avoid these two kinds of attacks.Moreover,the protocol is proposed using the three-qubit partially entangled set of states.It is more efficient by only using three particles rather than four or even more to transmit one bit secret information.Given our using state is much easier to prepare for multiqubit states and our protocol needs less measurement resource,it makes this protocol more convenient from an applied point of view. 展开更多
关键词 controlled secure direct communication cluster state three-qubit partially entangled state entanglement swapping.
下载PDF
A New Intrusion Detection Algorithm AE-3WD for Industrial Control Network
9
作者 Yongzhong Li Cong Li +1 位作者 Yuheng Li Shipeng Zhang 《Journal of New Media》 2022年第4期205-217,共13页
In this paper,we propose a intrusion detection algorithm based on auto-encoder and three-way decisions(AE-3WD)for industrial control networks,aiming at the security problem of industrial control network.The ideology o... In this paper,we propose a intrusion detection algorithm based on auto-encoder and three-way decisions(AE-3WD)for industrial control networks,aiming at the security problem of industrial control network.The ideology of deep learning is similar to the idea of intrusion detection.Deep learning is a kind of intelligent algorithm and has the ability of automatically learning.It uses self-learning to enhance the experience and dynamic classification capabilities.We use deep learning to improve the intrusion detection rate and reduce the false alarm rate through learning,a denoising AutoEncoder and three-way decisions intrusion detection method AE-3WD is proposed to improve intrusion detection accuracy.In the processing,deep learning AutoEncoder is used to extract the features of high-dimensional data by combining the coefficient penalty and reconstruction loss function of the encode layer during the training mode.A multi-feature space can be constructed by multiple feature extractions from AutoEncoder,and then a decision for intrusion behavior or normal behavior is made by three-way decisions.NSL-KDD data sets are used to the experiments.The experiment results prove that our proposed method can extract meaningful features and effectively improve the performance of intrusion detection. 展开更多
关键词 Industrial control network security intrusion detection deep learning AutoEncoder three-way decision
下载PDF
Radio Frequency Fingerprint-Based Satellite TT&C Ground Station Identification Method
10
作者 Xiaogang Tang Junhao Feng +1 位作者 Binquan Zhang Hao Huan 《Journal of Beijing Institute of Technology》 EI CAS 2023年第1期1-12,共12页
This study presents a radio frequency(RF)fingerprint identification method combining a convolutional neural network(CNN)and gated recurrent unit(GRU)network to identify measurement and control signals.The proposed alg... This study presents a radio frequency(RF)fingerprint identification method combining a convolutional neural network(CNN)and gated recurrent unit(GRU)network to identify measurement and control signals.The proposed algorithm(CNN-GRU)uses a convolutional layer to extract the IQ-related learning timing features.A GRU network extracts timing features at a deeper level before outputting the final identification results.The number of parameters and the algorithm’s complexity are reduced by optimizing the convolutional layer structure and replacing multiple fully-connected layers with gated cyclic units.Simulation experiments show that the algorithm achieves an average identification accuracy of 84.74% at a -10 dB to 20 dB signal-to-noise ratio(SNR)with fewer parameters and less computation than a network model with the same identification rate in a software radio dataset containing multiple USRP X310s from the same manufacturer,with fewer parameters and less computation than a network model with the same identification rate.The algorithm is used to identify measurement and control signals and ensure the security of the measurement and control link with theoretical and engineering applications. 展开更多
关键词 measurement and control security radio frequency(RF)fingerprinting identity identification deep learning
下载PDF
Integrated Wide Area Protection and Control for Power Grid Security 被引量:2
11
作者 Qingping Wang Zhiqian Bo +4 位作者 Yingke Zhao Xiaowei Ma Ming Zhang Hao Zheng Lin Wang 《CSEE Journal of Power and Energy Systems》 SCIE CSCD 2019年第2期206-214,共9页
The traditional“three defense lines”for power systems are based on local information and static protection&control strategy,which are not suitable to modern large-scale power systems.In order to improve the secu... The traditional“three defense lines”for power systems are based on local information and static protection&control strategy,which are not suitable to modern large-scale power systems.In order to improve the security of UHV hybrid power grids,the Integrated Wide Area Protection&Control(IWAPC)is proposed in this paper by applying the new technologies of synchronized high-speed communication,which integrates“three defense lines”and promotes existing wide area protection only for security control.The IWAPC is the hierarchical protection and control system which provides the protection and control for wide area power networks to improve their reliability and security.It is divided into three levels,the local bay level,the substation integrated protection level and the wide area protection level.The wide area real-time protection and control information platform is the most important part of the IWAPC,which is based on a synchronized wide area communication network.The key technologies and new development trends include network topology analysis,wide area backup protection,wide area intelligent reclosing,wide area load shedding,wide area auto-switching,overload cutoff and transfer,transmission section protection,intelligent system splitting and dynamic stability control.It cannot only integrate three lines of defense for power system protection and control,but also improve security of the power grid. 展开更多
关键词 Digital substation power grid security control system protection wide area protection&control
原文传递
A Survey of Cyber Attacks on Cyber Physical Systems:Recent Advances and Challenges 被引量:8
12
作者 Wenli Duo MengChu Zhou Abdullah Abusorrah 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2022年第5期784-800,共17页
A cyber physical system(CPS)is a complex system that integrates sensing,computation,control and networking into physical processes and objects over Internet.It plays a key role in modern industry since it connects phy... A cyber physical system(CPS)is a complex system that integrates sensing,computation,control and networking into physical processes and objects over Internet.It plays a key role in modern industry since it connects physical and cyber worlds.In order to meet ever-changing industrial requirements,its structures and functions are constantly improved.Meanwhile,new security issues have arisen.A ubiquitous problem is the fact that cyber attacks can cause significant damage to industrial systems,and thus has gained increasing attention from researchers and practitioners.This paper presents a survey of state-of-the-art results of cyber attacks on cyber physical systems.First,as typical system models are employed to study these systems,time-driven and event-driven systems are reviewed.Then,recent advances on three types of attacks,i.e.,those on availability,integrity,and confidentiality are discussed.In particular,the detailed studies on availability and integrity attacks are introduced from the perspective of attackers and defenders.Namely,both attack and defense strategies are discussed based on different system models.Some challenges and open issues are indicated to guide future research and inspire the further exploration of this increasingly important area. 展开更多
关键词 Attack detection attack strategy cyber attack cyber physical system(CPS) secure control
下载PDF
Security for cyber-physical systems: Secure control against known-plaintext attack 被引量:1
13
作者 YUAN Ye MO YiLin 《Science China(Technological Sciences)》 SCIE EI CAS CSCD 2020年第9期1637-1646,共10页
There has been a surge of interests in the security of cyber-physical systems(CPSs), yet it is commonly assumed that the adversary has a full knowledge of physical system models. This paper argues that such an unreali... There has been a surge of interests in the security of cyber-physical systems(CPSs), yet it is commonly assumed that the adversary has a full knowledge of physical system models. This paper argues that such an unrealistic assumption can be relaxed: the adversary might still be able to identify the system model by passively observing the control input and sensory data. In such a setup, the attack with knowledge of input-output data can be categorized as a Known-Plaintext Attack. A necessary and sufficient condition has been provided, under which the adversary can uniquely obtain the knowledge of the underlying physical system.From the defender's perspective, a secure controller design—which exhibits a low rank structure—is proposed which renders the system unidentifiable to the adversary, while trading off the control system's performance. Finally, a numerical example has been provided to demonstrate the effectiveness of the proposed secure controller design. 展开更多
关键词 cyber-physical systems security secure control known-plaintext attack
原文传递
Adaptive cooperative secure control of networked multiple unmanned systems under FDI attacks 被引量:1
14
作者 Yanhui Zhang Di Mei +1 位作者 Yong Xu Lihua Dou 《Security and Safety》 2023年第4期102-117,共16页
With the expanding applications of multiple unmanned systems in various fields,more and more research attention has been paid to their security.The aim is to enhance the anti-interference ability,ensure their reliabil... With the expanding applications of multiple unmanned systems in various fields,more and more research attention has been paid to their security.The aim is to enhance the anti-interference ability,ensure their reliability and stability,and better serve human society.This article conducts adaptive cooperative secure tracking consensus of networked multiple unmanned systems subjected to false data injection attacks.From a practical perspective,each unmanned system is modeled using high-order unknown nonlinear discrete-time systems.To reduce the communication bandwidth between agents,a quantizer-based codec mechanism is constructed.This quantizer uses a uniform logarithmic quantizer,combining the advantages of both quantizers.Because the transmission information attached to the false data can affect the accuracy of the decoder,a new adaptive law is added to the decoder to overcome this difficulty.A distributed controller is devised in the backstepping framework.Rigorous mathematical analysis shows that our proposed control algorithms ensure that all signals of the resultant systems remain bounded.Finally,simulation examples reveal the practical utility of the theoretical analysis. 展开更多
关键词 Secure cooperative control networked multiple unmanned systems false data injection attacks encoding-decoding strategy
原文传递
Memory-based adaptive event-triggered secure control of Markovian jumping neural networks suffering from deception attacks
15
作者 YAO Lan HUANG Xia 《Science China(Technological Sciences)》 SCIE EI CAS CSCD 2023年第2期468-480,共13页
In this article,we study the secure control of the Markovian jumping neural networks(MJNNs)subject to deception attacks.Considering the limitation of the network bandwidth and the impact of the deception attacks,we pr... In this article,we study the secure control of the Markovian jumping neural networks(MJNNs)subject to deception attacks.Considering the limitation of the network bandwidth and the impact of the deception attacks,we propose two memory-based adaptive event-trigger mechanisms(AETMs).Different from the available event-trigger mechanisms,these two memory-based AETMs contain the historical triggered data not only in the triggering conditions,but also in the adaptive law.They can adjust the data transmission rate adaptively so as to alleviate the impact of deception attacks on the controlled system and to suppress the peak of the system response.In view of the proposed memory-based AETMs,a time-dependent Lyapunov functional is constructed to analyze the stability of the error system.Some sufficient conditions to ensure the asymptotical synchronization of master-slave MJNNs are obtained,and two easy-to-implement co-design algorithms for the feedback gain matrix and the trigger matrix are given.Finally,a numerical example is given to verify the feasibility and superiority of the two memory-based AETMs. 展开更多
关键词 secure control memory-based adaptive event-trigger mechanism globally asymptotical synchronization deception attacks
原文传递
Decision Support System for Adaptive Restoration Control of Distribution System
16
作者 Lili Hao Yusheng Xue +2 位作者 Ze Li Haohao Wang Qun Xu 《Journal of Modern Power Systems and Clean Energy》 SCIE EI CSCD 2022年第5期1256-1273,共18页
Aiming at the high-dimensional uncertainties of restoration process, an optimization model for distribution system restoration control is proposed considering expected restoration benefits, expected restoration costs,... Aiming at the high-dimensional uncertainties of restoration process, an optimization model for distribution system restoration control is proposed considering expected restoration benefits, expected restoration costs, and security risks of the overall restoration scheme. In the proposed model, the effect of security control on restoration process is actively analyzed considering the security control costs of preventive, emergency, and correction controls. A two-layer decision support framework for distribution system restoration decision support system(DRDSS) is also designed. The upper layer of the proposed framework generates the pre-adjustment schemes of operation mode for energized power grid by load transfer and selects the optimal pre-adjustment scheme and the corresponding partitioning scheme based on the partition adjustment results of each pre-adjustment scheme. In addition, it optimizes the spatial-temporal decision-making of the inter-partition connectivity. For each partition, the lower layer of the proposed framework pre-selects the units and loads to be restored according to the pre-evaluated restoration income, generates the table of alternative restoration scheme for coping with uncertain events through simulation and deduction, and evaluates the risk and benefit of each scheme.For the uncertain events in the actual restoration process, the current restoration scheme can be adaptively switched to a sub-optimal scheme or re-optimized if necessary. Meanwhile, the proposed framework provides an information interaction interface for collaborative restoration with the related transmission system. A 123-node test system is built to evaluate the effectiveness and adaptability of the proposed model and framework. 展开更多
关键词 Distribution system RESTORATION pre-adjustment of operation mode load transfer dynamic partitioning risk and benefit security control
原文传递
A High-Assurance Trust Model for Digital Community Control System Based on Internet of Things 被引量:4
17
作者 LI Hongtao XING Jinsheng MA Jianfeng 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2016年第1期29-36,共8页
Security issues and lnternet of Things (loT) become indispensable part in digital community as loT develops with the pervasive introduction of additional "smart" sensors and devices over the last decades, and it n... Security issues and lnternet of Things (loT) become indispensable part in digital community as loT develops with the pervasive introduction of additional "smart" sensors and devices over the last decades, and it necessitates the implementation of information security principle in digital community system. A three-level criticality model to determine the potential impact is proposed in digital community system when various devices lost in this paper. Combining the actual security requirement of digital community and characteristics of loT, a hierarchical security architecture including defense-in-deep cybersecurity and distribute secure control is proposed. A high-assurance trust model, which assumes insider compromise, which exists in the digital community, is finally proposed according to the security issues analysis. 展开更多
关键词 digital community Intemet of Things(IoT) information security security architecture secure control
原文传递
A survey on the security of cyber-physical systems 被引量:8
18
作者 Guangyu WU Jian SUN Jie CHEN 《Control Theory and Technology》 EI CSCD 2016年第1期2-10,共9页
Cyber-physical systems (CPSs) are integrations of computation, communication, control and physical processes. Typical examples where CPSs are deployed include smart grids, civil infrastructure, medical devices and m... Cyber-physical systems (CPSs) are integrations of computation, communication, control and physical processes. Typical examples where CPSs are deployed include smart grids, civil infrastructure, medical devices and manufacturing. Security is one of the most important issues that should be investigated in CPSs and hence has received much attention in recent years. This paper surveys recent results in this area and mainly focusses on three important categories: attack detection, attack design and secure estimation and control. We also discuss several future research directions including risk assessment, modeling of attacks and attacks design, counter-attack strategy and testbed and validation. 展开更多
关键词 security cyber-physical systems attack detection secure estimation and control
原文传递
Privacy Preserving and Delegated Access Control for Cloud Applications 被引量:2
19
作者 Xinfeng Ye 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2016年第1期40-54,共15页
In cloud computing applications, users' data and applications are hosted by cloud providers. This paper proposed an access control scheme that uses a combination of discretionary access control and cryptographic tech... In cloud computing applications, users' data and applications are hosted by cloud providers. This paper proposed an access control scheme that uses a combination of discretionary access control and cryptographic techniques to secure users' data and applications hosted by cloud providers. Many cloud applications require users to share their data and applications hosted by cloud providers. To facilitate resource sharing, the proposed scheme allows cloud users to delegate their access permissions to other users easily. Using the access control policies that guard the access to resources and the credentials submitted by users, a third party can infer information about the cloud users. The proposed scheme uses cryptographic techniques to obscure the access control policies and users' credentials to ensure the privacy of the cloud users. Data encryption is used to guarantee the confidentiality of data. Compared with existing schemes, the proposed scheme is more flexible and easy to use. Experiments showed that the proposed scheme is also efficient. 展开更多
关键词 cloud computing access control security
原文传递
Secure H_(∞) control against time-delay attacks in cyber-physical systems
20
作者 Dan Jin Mingnan Hu +1 位作者 Bo Chen Li Yu 《Journal of Control and Decision》 EI 2022年第4期420-430,共11页
This paper is concerned with the secure H_(∞) control problem for cyber-physical systems(CPSs)under time-delay attacks,which cause the systems’information to be received with delays.Through transforming the H_(∞) c... This paper is concerned with the secure H_(∞) control problem for cyber-physical systems(CPSs)under time-delay attacks,which cause the systems’information to be received with delays.Through transforming the H_(∞) control problem to a two-player zero-sum game problem,the H_(∞) controller can be obtained by solving the saddle point for the game.Due to the unknown system parameters,a model-free reinforcement learning(RL)method is applied,and the measurement feedback controller is designed based on the historical inputs and the tracking errors.To obviate the requirement of the initial admissible policy,the value iteration(VI)of the adaptive dynamic program(ADP)algorithm is proposed to solve the approximate saddle point.Moreover,the con-vergence of the proposed algorithm is proved.Finally,a networked circuit system is employed to show the effectiveness of the proposed methods. 展开更多
关键词 Secure H_(∞)control time-delay attacks cyber-physical systems game theory
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部