期刊文献+
共找到417篇文章
< 1 2 21 >
每页显示 20 50 100
ICPS multi-target constrained comprehensive security control based on DoS attacks energy grading detection and compensation
1
作者 HAN Yinlong HAN Xiaowu 《Journal of Measurement Science and Instrumentation》 CAS CSCD 2024年第4期518-531,共14页
Aiming at the industry cyber-physical system(ICPS)where Denial-of-Service(DoS)attacks and actuator failure coexist,the integrated security control problem of ICPS under multi-objective constraints was studied.First,fr... Aiming at the industry cyber-physical system(ICPS)where Denial-of-Service(DoS)attacks and actuator failure coexist,the integrated security control problem of ICPS under multi-objective constraints was studied.First,from the perspective of the defender,according to the differential impact of the system under DoS attacks of different energies,the DoS attacks energy grading detection standard was formulated,and the ICPS comprehensive security control framework was constructed.Secondly,a security transmission strategy based on event triggering was designed.Under the DoS attack energy classification detection mechanism,for large-energy attacks,the method based on time series analysis was considered to predict and compensate for lost data.Therefore,on the basis of passive and elastic response to small energy attacks,the active defense capability against DoS attacks was increased.Then by introducing the conecomplement linearization algorithm,the calculation methods of the state and fault estimation observer and the integrated safety controller were deduced,the goal of DoS attack active and passive hybrid intrusion tolerance and actuator failure active fault tolerance were realized.Finally,a simulation example of a four-capacity water tank system was given to verify the validity of the obtained conclusions. 展开更多
关键词 industry cyber-physical system(ICPS) Denial-of-Service(dos)attacks energy grading detection security event triggering mechanism time series analysis methods cone complementary linearization
下载PDF
Adaptive Memory Event-Triggered Observer-Based Control for Nonlinear Multi-Agent Systems Under DoS Attacks 被引量:7
2
作者 Xianggui Guo Dongyu Zhang +1 位作者 Jianliang Wang Choon Ki Ahn 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第10期1644-1656,共13页
This paper investigates the event-triggered security consensus problem for nonlinear multi-agent systems(MASs)under denial-of-service(Do S)attacks over an undirected graph.A novel adaptive memory observer-based anti-d... This paper investigates the event-triggered security consensus problem for nonlinear multi-agent systems(MASs)under denial-of-service(Do S)attacks over an undirected graph.A novel adaptive memory observer-based anti-disturbance control scheme is presented to improve the observer accuracy by adding a buffer for the system output measurements.Meanwhile,this control scheme can also provide more reasonable control signals when Do S attacks occur.To save network resources,an adaptive memory event-triggered mechanism(AMETM)is also proposed and Zeno behavior is excluded.It is worth mentioning that the AMETM's updates do not require global information.Then,the observer and controller gains are obtained by using the linear matrix inequality(LMI)technique.Finally,simulation examples show the effectiveness of the proposed control scheme. 展开更多
关键词 Adaptive memory event-triggered mechanism(AMETM) compensation mechanism denial-of-service(dos)attacks nonlinear multi-agent systems(MASs) observer-based anti-disturbance control
下载PDF
Stochastic DoS Attack Allocation Against Collaborative Estimation in Sensor Networks 被引量:2
3
作者 Ya Zhang Lishuang Du Frank L.Lewis 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2020年第5期1225-1234,共10页
In this paper,denial of service(DoS)attack management for destroying the collaborative estimation in sensor networks and minimizing attack energy from the attacker perspective is studied.In the communication channels ... In this paper,denial of service(DoS)attack management for destroying the collaborative estimation in sensor networks and minimizing attack energy from the attacker perspective is studied.In the communication channels between sensors and a remote estimator,the attacker chooses some channels to randomly jam DoS attacks to make their packets randomly dropped.A stochastic power allocation approach composed of three steps is proposed.Firstly,the minimum number of channels and the channel set to be attacked are given.Secondly,a necessary condition and a sufficient condition on the packet loss probabilities of the channels in the attack set are provided for general and special systems,respectively.Finally,by converting the original coupling nonlinear programming problem to a linear programming problem,a method of searching attack probabilities and power to minimize the attack energy is proposed.The effectiveness of the proposed scheme is verified by simulation examples. 展开更多
关键词 attack allocation denial of service(dos)attack packet loss remote estimation sensor networks
下载PDF
Intelligent DoS Attack Detection with Congestion Control Technique for VANETs 被引量:1
4
作者 R.Gopi Mahantesh Mathapati +4 位作者 B.Prasad Sultan Ahmad Fahd N.Al-Wesabi Manal Abdullah Alohali Anwer Mustafa Hilal 《Computers, Materials & Continua》 SCIE EI 2022年第7期141-156,共16页
VehicularAd hoc Network(VANET)has become an integral part of Intelligent Transportation Systems(ITS)in today’s life.VANET is a network that can be heavily scaled up with a number of vehicles and road side units that ... VehicularAd hoc Network(VANET)has become an integral part of Intelligent Transportation Systems(ITS)in today’s life.VANET is a network that can be heavily scaled up with a number of vehicles and road side units that keep fluctuating in real world.VANET is susceptible to security issues,particularly DoS attacks,owing to maximum unpredictability in location.So,effective identification and the classification of attacks have become the major requirements for secure data transmission in VANET.At the same time,congestion control is also one of the key research problems in VANET which aims at minimizing the time expended on roads and calculating travel time as well as waiting time at intersections,for a traveler.With this motivation,the current research paper presents an intelligent DoS attack detection with Congestion Control(IDoS-CC)technique for VANET.The presented IDoSCC technique involves two-stage processes namely,Teaching and Learning Based Optimization(TLBO)-based Congestion Control(TLBO-CC)and Gated Recurrent Unit(GRU)-based DoS detection(GRU-DoSD).The goal of IDoS-CC technique is to reduce the level of congestion and detect the attacks that exist in the network.TLBO algorithm is also involved in IDoS-CC technique for optimization of the routes taken by vehicles via traffic signals and to minimize the congestion on a particular route instantaneously so as to assure minimal fuel utilization.TLBO is applied to avoid congestion on roadways.Besides,GRU-DoSD model is employed as a classification model to effectively discriminate the compromised and genuine vehicles in the network.The outcomes from a series of simulation analyses highlight the supremacy of the proposed IDoS-CC technique as it reduced the congestion and successfully identified the DoS attacks in network. 展开更多
关键词 VANET intelligent transportation systems congestion control attack detection dos attack deep learning
下载PDF
Decentralized Resilient H_∞Load Frequency Control for Cyber-Physical Power Systems Under DoS Attacks 被引量:2
5
作者 Xin Zhao Suli Zou Zhongjing Ma 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第11期1737-1751,共15页
This paper designs a decentralized resilient H_(∞)load frequency control(LFC)scheme for multi-area cyber-physical power systems(CPPSs).Under the network-based control framework,the sampled measurements are transmitte... This paper designs a decentralized resilient H_(∞)load frequency control(LFC)scheme for multi-area cyber-physical power systems(CPPSs).Under the network-based control framework,the sampled measurements are transmitted through the communication networks,which may be attacked by energylimited denial-of-service(DoS)attacks with a characterization of the maximum count of continuous data losses(resilience index).Each area is controlled in a decentralized mode,and the impacts on one area from other areas via their interconnections are regarded as the additional load disturbance of this area.Then,the closed-loop LFC system of each area under DoS attacks is modeled as an aperiodic sampled-data control system with external disturbances.Under this modeling,a decentralized resilient H_(∞)scheme is presented to design the state-feedback controllers with guaranteed H∞performance and resilience index based on a novel transmission interval-dependent loop functional method.When given the controllers,the proposed scheme can obtain a less conservative H_(∞)performance and resilience index that the LFC system can tolerate.The effectiveness of the proposed LFC scheme is evaluated on a one-area CPPS and two three-area CPPSs under DoS attacks. 展开更多
关键词 Cyber-physical power systems(CPPSs) denial-of-service(dos)attacks load frequency control(LFC) sampled-data control
下载PDF
A Router Based Packet Filtering Scheme for Defending Against DoS Attacks 被引量:1
6
作者 LU Ning SU Sen +1 位作者 JING Maohua HAN Jian 《China Communications》 SCIE CSCD 2014年第10期136-146,共11页
The filter-based reactive packet filtering is a key technology in attack traffic filtering for defending against the Denial-of- Service (DOS) attacks. Two kinds of relevant schemes have been proposed as victim- end ... The filter-based reactive packet filtering is a key technology in attack traffic filtering for defending against the Denial-of- Service (DOS) attacks. Two kinds of relevant schemes have been proposed as victim- end filtering and source-end filtering. The first scheme prevents attack traffic from reaching the victim, but causes the huge loss of legitimate flows due to the scarce filters (termed as collateral damages); the other extreme scheme can obtain the sufficient filters, but severely degrades the network transmission performance due to the abused filtering routers. In this paper, we propose a router based packet filtering scheme, which provides relatively more filters while reducing the quantity of filtering touters. We implement this scheme on the emulated DoS scenarios based on the synthetic and real-world Internet topologies. Our evaluation results show that compared to the previous work, our scheme just uses 20% of its filtering routers, but only increasing less than 15 percent of its collateral damage. 展开更多
关键词 Internet security dos attacks filter-based reactive packet filtering
下载PDF
Security Control for Uncertain Networked Control Systems under DoS Attacks and Fading Channels 被引量:1
7
作者 Chengzhen Gao Cheng Tan +1 位作者 Hongtao Sun Mingyue Xiang 《Journal of Beijing Institute of Technology》 EI CAS 2022年第4期422-430,共9页
This paper characterizes the joint effects of plant uncertainty,Denial-of-Service(DoS)attacks,and fading channel on the stabilization problem of networked control systems(NCSs).It is assumed that the controller remote... This paper characterizes the joint effects of plant uncertainty,Denial-of-Service(DoS)attacks,and fading channel on the stabilization problem of networked control systems(NCSs).It is assumed that the controller remotely controls the plant and the control input is transmitted over a fading channel.Meanwhile,considering the sustained attack cycle and frequency of DoS attacks are random,the packet-loss caused by DoS attacks is modelled by a Markov process.The sampled-data NCS is transformed into a stochastic form with Markov jump and uncertain parameter.Then,based on Lyapunov functional method,linear matrix inequality(LMI)-based sufficient conditions are presented to ensure the stability of uncertain NCSs.The main contribution of this article lies in the construction of NCSs based on DoS attacks into Markov jump system(MJS)and the joint consideration of fading channel and plant uncertainty. 展开更多
关键词 networked control systems Denial-of-Service(dos)attacks UNCERTAINTY fading channels Markov jump system
下载PDF
Five Basic Types of Insider DoS Attacks of Code Dissemination in Wireless Sensor Networks
8
作者 Yu ZHANG Xing She ZHOU +2 位作者 Yi Ming JI Yee Wei LAW Marimuthu PALANISWAMI 《International Journal of Communications, Network and System Sciences》 2009年第1期64-72,共9页
Code dissemination is one of the important services of wireless sensor networks (WSNs). Securing the process of code dissemination is essential in some certain WSNs applications, state-of-the-art secure code dissemina... Code dissemination is one of the important services of wireless sensor networks (WSNs). Securing the process of code dissemination is essential in some certain WSNs applications, state-of-the-art secure code dissemination protocols for WSNs aim for the efficient source authentication and integrity verification of code image, however, due to the resource constrains of WSNs and the epidemic behavior of the code dissemination system, existing secure code dissemination protocols are vulnerable to Denial of Service (DoS) attacks when sensor nodes can be compromised (insider DoS attacks). In this paper, we identify five different basic types of DoS attacks exploiting the epidemic propagation strategies used by Deluge. They are (1) Higher-version Advertisement attack, (2) False Request attack, (3) Larger-numbered Page attack, (4) Lower-version Adv attack, and (5) Same-version Adv attack. Simulation shows these susceptibilities caused by above insider DoS attacks. Some simple models are also proposed which promote understanding the problem of insider DoS attacks and attempt to quantify the severity of these attacks in the course of code dissemination in WSNs. 展开更多
关键词 Sensor Networks Code DISSEMINATION Deluge Security dos attackS
下载PDF
Honeypot Game Theory against DoS Attack in UAV Cyber
9
作者 Shangting Miao Yang Li Quan Pan 《Computers, Materials & Continua》 SCIE EI 2023年第9期2745-2762,共18页
A space called Unmanned Aerial Vehicle(UAV)cyber is a new environment where UAV,Ground Control Station(GCS)and business processes are integrated.Denial of service(DoS)attack is a standard network attack method,especia... A space called Unmanned Aerial Vehicle(UAV)cyber is a new environment where UAV,Ground Control Station(GCS)and business processes are integrated.Denial of service(DoS)attack is a standard network attack method,especially suitable for attacking the UAV cyber.It is a robust security risk for UAV cyber and has recently become an active research area.Game theory is typically used to simulate the existing offensive and defensive mechanisms for DoS attacks in a traditional network.In addition,the honeypot,an effective security vulnerability defense mechanism,has not been widely adopted or modeled for defense against DoS attack UAV cyber.With this motivation,the current research paper presents a honeypot game theorymodel that considersGCS andDoS attacks,which is used to study the interaction between attack and defense to optimize defense strategies.The GCS and honeypot act as defenses against DoS attacks in this model,and both players select their appropriate methods and build their benefit function models.On this basis,a hierarchical honeypot and G2A network delay reward strategy are introduced so that the defender and the attacker can adjust their respective strategies dynamically.Finally,by adjusting the degree of camouflage of the honeypot for UAV network services,the overall revenue of the defender can be effectively improved.The proposed method proves the existence of a mixed strategy Nash equilibrium and compares it with the existing research on no delay rewards and no honeypot defense scheme.In addition,this method realizes that the UAV cyber still guarantees a network delay of about ten milliseconds in the presence of a DoS attack.The results demonstrate that our methodology is superior to that of previous studies. 展开更多
关键词 UAV cyber security honeypot game-theoretical model dos attack
下载PDF
Measuring the Impact of DoS Attack on Availability: Empirical Study Based on Accessibility
10
作者 Suhail Qadir Uzair Bashir 《Journal of Information Security》 2022年第2期66-75,共10页
Information Security is determined by three well know security parameters i.e. Confidentiality, Integrity and Availability. Availability is an important pillar when it comes to security of an information system. It is... Information Security is determined by three well know security parameters i.e. Confidentiality, Integrity and Availability. Availability is an important pillar when it comes to security of an information system. It is dependent upon the reliability, timeliness and accessibility of the Information System. This paper presents an analytical view of the fact that when Accessibility is degraded during the presence of an ongoing attack, the other factors reliability and timeliness can also get affected, therefore creating a degrading impact on the overall Availability of the system, which eventually leads to the Denial of Service Attack and therefore affecting the security of the System. 展开更多
关键词 Security AVAILABILITY Reliability TIMELINESS ACCESSIBILITY dos attack
下载PDF
Whittle’s Index Based Sensor Scheduling for Multiprocess Systems Under DoS Attacks
11
作者 CAI Zai DING Kemi 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2024年第1期329-350,共22页
In this paper,the authors consider how to design defensive countermeasures against DoS attacks for remote state estimation of multiprocess systems.For each system,a sensor will measure its state and transmits the data... In this paper,the authors consider how to design defensive countermeasures against DoS attacks for remote state estimation of multiprocess systems.For each system,a sensor will measure its state and transmits the data packets through an unreliable channel which is vulnerable to be jammed by an attacker.Under limited communication bandwidth,only a subset of sensors are allowed for data transmission,and how to select the optimal one to maximize the accuracy of remote state estimation is the focus of the proposed work.The authors first formulate this problem as a Markov decision process and investigate the existence of optimal policy.Moreover,the authors demonstrate the piecewise monotonicity structure of optimal policy.Given the difficulty of obtaining an optimal policy of large-scale problems,the authors develop a suboptimal heuristic policy based on the aforementioned policy structure and Whittle’s index.Moreover,a closed form of the indices is derived in order to reduce implementation complexity of proposed scheduling policy and numerical examples are provided to illustrate the proposed developed results. 展开更多
关键词 dos attacks Kalman filter remote state estimation Whittle’s index.
原文传递
A Novel Distributed LDoS Attack Scheme against Internet Routing 被引量:3
12
作者 ZHU Hongliangt XIN Yang +1 位作者 WU Qiuxin YOU Fucheng 《China Communications》 SCIE CSCD 2014年第A01期101-107,共7页
LDoS (Low-rate Denial of Service) attack, exploiting the flaws in the congestion avoidance mechanism of TCP protocol,is periodic, stealthy, and with high efficiency. Since BGP uses TCP as a transport protocol, it is... LDoS (Low-rate Denial of Service) attack, exploiting the flaws in the congestion avoidance mechanism of TCP protocol,is periodic, stealthy, and with high efficiency. Since BGP uses TCP as a transport protocol, it is subject to LDoS attacks as well. LDoS attacks can cause table reset, route flapping of BGP protocol. A deliberately constructed distributed low-rate DOS attacks can even generate surge of updates throughout the Internet. In this paper, we investigate the promotion of attack efficiency of this novel attack, and then propose an attack model to simulate the LDoS attack. Experiments prove that this attack model can exponentially lower the attack costs and improve the attack effect. 展开更多
关键词 distributed low-rate dos attacks attack efficiency BGP route flapping defense mechanisms
下载PDF
外部干扰和随机DoS攻击下的网联车安全H∞队列控制 被引量:2
13
作者 宋秀兰 李洋阳 何德峰 《自动化学报》 EI CAS CSCD 北大核心 2024年第2期348-355,共8页
针对网联车队列系统易受到干扰和拒绝服务(Denial of service, DoS)攻击问题,提出一种外部干扰和随机DoS攻击作用下的网联车安全H∞队列控制方法.首先,采用马尔科夫随机过程,将网联车随机DoS攻击特性建模为一个随机通信拓扑切换模型,据... 针对网联车队列系统易受到干扰和拒绝服务(Denial of service, DoS)攻击问题,提出一种外部干扰和随机DoS攻击作用下的网联车安全H∞队列控制方法.首先,采用马尔科夫随机过程,将网联车随机DoS攻击特性建模为一个随机通信拓扑切换模型,据此设计网联车安全队列控制协议.然后,采用线性矩阵不等式(Linear matrix inequality, LMI)技术计算安全队列控制器参数,并应用Lyapunov-Krasovskii稳定性理论,建立在外部扰动和随机DoS攻击下队列系统稳定性充分条件.在此基础上,分析得到该队列闭环系统的弦稳定性充分条件.最后,通过7辆车组成的队列系统对比仿真实验,验证该方法的优越性. 展开更多
关键词 网联自主车辆 队列控制 安全控制 随机dos攻击 稳定性
下载PDF
计及DoS攻击和通信时滞的电力系统负荷频率控制 被引量:1
14
作者 刘星月 田永强 +2 位作者 施开波 周坤 唐琳 《工程科学与技术》 EI CAS CSCD 北大核心 2024年第3期249-258,共10页
针对电力系统通信网络中存在的时滞和DoS攻击现象,本文提出了基于采样特性的电力系统离散负荷频率控制方案。首先,计及电力系统负荷波动的情况,在多区域电力系统负荷频率控制系统(LFC)模型的基础上,将通信网络中DoS攻击的危害量化为采... 针对电力系统通信网络中存在的时滞和DoS攻击现象,本文提出了基于采样特性的电力系统离散负荷频率控制方案。首先,计及电力系统负荷波动的情况,在多区域电力系统负荷频率控制系统(LFC)模型的基础上,将通信网络中DoS攻击的危害量化为采样信号连续丢失数,并分别考虑通信网络中通信时滞和输出信号采样特性,建立包含输出状态反馈控制器的电力系统LFC模型。其次,基于此模型,利用含有控制命令更新周期、DoS攻击导致的最大采样信号连续丢失数、通信时滞、H_(∞)稳定指标的双边闭环Lyapunov泛函、LMI技术,提出LFC系统满足一定H_(∞)指标的稳定准则,并给出离散状态输出反馈LFC控制器的设计及求解方法。最后,本文以单区域和双区域LFC系统为例进行了仿真验证。结果表明:与已有文献方法相比,本文方法在保持系统H_(∞)渐近稳定前提下,能够容忍更大的通信时滞,且结果的保守性更低;同时可以看出本文所设计的控制器在保证H_(∞)稳定性能的基础上,对一定能量限制的DoS攻击具有弹性的防御性能。因此本文方案的有效性和优越性得到了验证。 展开更多
关键词 时滞 dos攻击 负荷频率控制方案 采样特性 LYAPUNOV泛函
下载PDF
DoS攻击下抛物型多智能体系统的输出反馈领导-跟随一致性
15
作者 刘艳军 昝文广 唐丽 《沈阳工业大学学报》 CAS 北大核心 2024年第5期685-692,共8页
为了解决抛物型多智能体系统(MASs)在拒绝服务(DoS)攻击下的一致性问题,提出了一种基于输出反馈方法的MASs领导-跟随一致性控制协议来应对恶意攻击者发起的DoS攻击,从而实现智能体在无向通信拓扑图上的领导-跟随一致性。对DoS攻击的频... 为了解决抛物型多智能体系统(MASs)在拒绝服务(DoS)攻击下的一致性问题,提出了一种基于输出反馈方法的MASs领导-跟随一致性控制协议来应对恶意攻击者发起的DoS攻击,从而实现智能体在无向通信拓扑图上的领导-跟随一致性。对DoS攻击的频率和持续时间进行了分析,利用Lyapunov稳定性定理推导了抛物型偏微分系统的稳定条件,证明了触发时间间隔不为零,避免了芝诺行为的发生,并通过仿真算例验证了理论结果的有效性。 展开更多
关键词 多智能体系统 拒绝服务攻击 输出反馈方法 偏微分系统 攻击频率 攻击持续时间 LYAPUNOV稳定性定理
下载PDF
DoS攻击下多智能体ICPS的最优一致控制
16
作者 孙子文 翟润华 《哈尔滨工业大学学报》 EI CAS CSCD 北大核心 2024年第12期62-70,共9页
为解决由多个被控对象组成的工业信息物理系统(ICPS)在拒绝服务(DoS)攻击和不确定外界扰动下的一致性控制问题,将多智能体和ICPS相结合,并基于状态观测器和零和博弈方法,设计最优H_(∞)一致控制器。首先,针对多个被控对象组成的ICPS,根... 为解决由多个被控对象组成的工业信息物理系统(ICPS)在拒绝服务(DoS)攻击和不确定外界扰动下的一致性控制问题,将多智能体和ICPS相结合,并基于状态观测器和零和博弈方法,设计最优H_(∞)一致控制器。首先,针对多个被控对象组成的ICPS,根据智能体的信息交互特性,构建固定拓扑结构的多智能体ICPS模型。其次,考虑DoS攻击作用在传感器通道和执行器通道时系统通信信道堵塞的影响,采用状态观测器重构被堵塞的状态信息,并构建DoS攻击下基于状态观测器的多智能体ICPS模型。然后,引入干扰抑制水平,并将控制器和干扰者视为零和博弈中的参与者,根据干扰抑制水平的优化目标和H_(∞)性能条件,构建基于零和博弈的最优H_(∞)设计框架。最后,通过对干扰抑制水平的约束,并求解满足H_(∞)一致性的线性矩阵不等式,设计最优一致性控制器。采用4个不间断电源的控制问题作为仿真对象,Matlab仿真结果表明,相比于未对状态重构和未对参数约束的设计方法,本设计方案可使得多智能体ICPS在双通道DoS攻击下达到一致的时间更短,且具有良好的相对稳定性。 展开更多
关键词 工业信息物理系统 多智能体 dos攻击 零和博弈 干扰抑制水平 H_(∞)一致性
下载PDF
Resilient distributed economic dispatch of a cyber-power system under DoS attack 被引量:6
17
作者 Feisheng YANG Xuhui LIANG Xiaohong GUAN 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2021年第1期40-50,共11页
The economic dispatch problem of a smart grid under vicious denial of service(DoS)is the main focus of this paper.Taking the actual situation of power generation as a starting point,a new distributed optimization mode... The economic dispatch problem of a smart grid under vicious denial of service(DoS)is the main focus of this paper.Taking the actual situation of power generation as a starting point,a new distributed optimization model is established which takes the environmentai pollution penalty into account.For saving the limited bandwidth,a novel distributed event-triggered scheme is proposed to keep the resilience and economy of a class of cyber-power syst ems when the communication net work is subject to malicious DoS attack.Then an improved multi-agent consensus protocol based on the gradient descent idea is designed to solve the minimization problem,and the prerequisites to minimize the system power generation cost are analyzed from the aspects of optimality and stability.Finally,the theoretical results are verified through a single-area 10-generat or unit simulation. 展开更多
关键词 Economic dispatch Denial of service(dos)attack Resilient event-triggered scheme Distributed optimization
原文传递
Event-triggered bipartite consensus over cooperation-competition networks under DoS attacks 被引量:3
18
作者 HU AiHua PARK J H +2 位作者 CAO JinDe HU ManFeng LUO YiPing 《Science China(Technological Sciences)》 SCIE EI CAS CSCD 2021年第1期157-168,共12页
This paper addresses the bipartite consensus over cooperation-competition networks affected by denial-of-service(DoS) attacks.Consider that a network consists of multiple interactive agents, and the relationship betwe... This paper addresses the bipartite consensus over cooperation-competition networks affected by denial-of-service(DoS) attacks.Consider that a network consists of multiple interactive agents, and the relationship between neighboring agents is cooperative or competitive. Meanwhile, information transmission among the agents is unavailable during the intervals of attacks. In order to save communication resources and exclude the Zeno behavior, an event-triggered scheme depending on the sampled-data information from neighboring agents is proposed, and efficient defense strategies in response to the attacks are put forward.Suppose that the frequency and duration of DoS attacks meet certain requirements, then according to the signed graph theory,the La Salle’s invariance principle, and the convergence of monotone sequences, the results of bipartite consensus via the eventtriggered protocol are provided, which are mainly related to the communication topology of the network, the sampling period,and the threshold parameters in the event-triggered scheme. It is shown that the bipartite consensus is realized even though the DoS attacks take place frequently. Furthermore, this paper discusses the bipartite consensus in the presence of DoS attacks with a random unsuccessful rate. Finally, numerical simulations illustrate the theoretical results. 展开更多
关键词 bipartite consensus denial-of-service(dos)attack event-triggered scheme structural balance multiagent system
原文传递
A W-EAP Algorithm for IEC 61850 Protocol against DoS/Replay Attack
19
作者 Minmin Xie Yong Wang +2 位作者 Chunming Zou Yingjie Tian Naiwang Guo 《Journal of Computer and Communications》 2020年第11期88-101,共14页
Substation automation system uses IEC 61850 protocol for the data transmission between different equipment manufacturers. However, the IEC 61850 protocol lacks an authentication security mechanism, which will make the... Substation automation system uses IEC 61850 protocol for the data transmission between different equipment manufacturers. However, the IEC 61850 protocol lacks an authentication security mechanism, which will make the communication face four threats: eavesdropping, interception, forgery, and alteration. In order to verify the IEC 61850 protocol communication problems, we used the simulation software to build the main operating equipment in the IEC 61850 network environment of the communication system. We verified IEC 61850 transmission protocol security defects, under DoS attack and Reply attack. In order to enhance security agreement, an improved algorithm was proposed based on identity authentication (W-EAP, Whitelist Based ECC & AES Protocol). Experimental results showed that the method can enhance the ability to resist attacks. 展开更多
关键词 IEC 61850 dos attack Replay attack W-EAP Identity Authentication
下载PDF
Observer‑Based Resilient Control of CACC Vehicle Platoon Against DoS Attack
20
作者 Xiao Tan Bin Liu +1 位作者 Jingzhao Chen Zheng Jiang 《Automotive Innovation》 EI CSCD 2023年第2期176-189,共14页
Cooperative adaptive cruise control(CACC)is an important technology for improving road utilization and energy efficiency in the automotive industry.In CACC systems,connected vehicles can receive information from adjac... Cooperative adaptive cruise control(CACC)is an important technology for improving road utilization and energy efficiency in the automotive industry.In CACC systems,connected vehicles can receive information from adjacent ones through com-munication networks.However,the networks are vulnerable to cyber-attacks,so the states of vehicles cannot be received promptly and accurately.This paper studies the security resilience control for a CACC system subject to denial of service(DoS)attack.The core of the proposed resilient control strategy is to estimate the delay caused by DoS attack and then compensate for it in the controller.Specifically,a CACC system is modeled by considering the impacts of DoS attack on the transmitted data.Then,a high-gain observer is presented to estimate the vehicle states including the time delay.The conver-gence of the observer is proved in a theorem based on the Lyapunov stability theory,and the high-gain-velocity observer is modified so that the estimation error of the velocity can converge to zero in a finite time.A resilient controller is designed by proposing a time delay compensation algorithm to mitigate the impacts of DoS attack.The effectiveness of the estimation and control methods is illustrated by a ten-vehicle simulation system operating at the FTP75 driving cycle conditions.And the relative estimation errors are less than 6%. 展开更多
关键词 Connected vehicle Resilient control dos attack High-gain observer Time delay compensation
原文传递
上一页 1 2 21 下一页 到第
使用帮助 返回顶部