237
Views
1
CrossRef citations to date
0
Altmetric
Review Article

Sampled-data resilient control for stochastic nonlinear CPSs under DoS attacks

ORCID Icon, ORCID Icon, , &
Pages 1165-1171 | Received 26 Aug 2022, Accepted 04 Dec 2022, Published online: 20 Dec 2022

References

  • Chen, G., Fan, C., Sun, J., & Xia, J. (2021). Mean square exponential stability analysis for it stochastic systems with aperiodic sampling and multiple time-delays. IEEE Transactions on Automatic Control, 67(5), 2473–2480. https://doi.org/10.1109/TAC.2021.3074848
  • Feng, L., Zhang, W., & Wu, Z. (2022). Stabilization control for random nonlinear systems subject to deception attacks. International Journal of Robust and Nonlinear Control, 32(4), 2233–2250. https://doi.org/10.1002/rnc.v32.4
  • Feng, S., & Tesi, P. (2017). Resilient control under denial-of-service: Robust design. Automatica, 79, 42–51. https://doi.org/10.1016/j.automatica.2017.01.031
  • Gao, Y., Sun, X., Wen, C., & Wang, W. (2018). Event-triggered control for stochastic nonlinear systems. Automatica, 95, 534–538. https://doi.org/10.1016/j.automatica.2018.05.021
  • Geng, Q., & Liu, F. ( ). A self-triggered scheme for cyber-physical systems under denial-of-service attacks. Asian Journal of Control, 23(2), 697–707. https://doi.org/10.1002/asjc.v23.2
  • Hu, S., Yue, D., Cheng, Z., Tian, E., Xie, X., & Chen, X. (2020). Co-design of dynamic event-triggered communication scheme and resilient observer-based control under aperiodic DoS attacks. IEEE Transactions on Cybernetics, 51(9), 4591–4601. https://doi.org/10.1109/TCYB.2020.3001187
  • Hu, S., Yue, D., Xie, X., Chen, X., & Yin, X. (2019). Resilient event-triggered controller synthesis of networked control systems under periodic DoS jamming attacks. IEEE Transactions on Cybernetics, 49(12), 4271–4281. https://doi.org/10.1109/TCYB.6221036
  • Long, M., Wu, C. H., & Hung, J. Y. (2005). Denial of service attacks on networkbased control systems: Impact and mitigation. IEEE Transactions on Industrial Informatics, 1(2), 85–96. https://doi.org/10.1109/TII.2005.844422
  • Lu, A., & Yang, G. (2018). Input-to-state stabilizing control for cyber-physical systems with multiple transmission channels under denial of service. IEEE Transactions on Automatic Control, 63(6), 1813–1820. https://doi.org/10.1109/TAC.9
  • Mao, X. (2007). Stochastic differential equations and their applications. Horwood.
  • Marelli, D., Sui, T., & Fu, M. (2018). Statistical approach to detection of attacks for stochastic cyber-physical systems. IFAC-Papers On Line, 51(25), 178–183. https://doi.org/10.1016/j.ifacol.2018.11.101
  • Song, J., Ding, D., Liu, H., & Wang, X. (2020). Non-fragile distributed state estimation over sensor networks subject to DoS attacks: The almost sure stability. International Journal of Systems Science, 51(6), 1119–1132. https://doi.org/10.1080/00207721.2020.1752843
  • Tabuada, P. (2007). Event-triggered real-time scheduling of stabilizing control tasks. IEEE Transactions on Automatic Control, 52(9), 1680–1685. https://doi.org/10.1109/TAC.2007.904277
  • Wang, B., Meng, X., & Chen, T. (2014). Event based pulse-modulated control of linear stochastic systems. IEEE Transactions on Automatic Control, 59(8), 2144–2150. https://doi.org/10.1109/TAC.2014.2301564
  • Wang, L., Wang, Z., Han, Q., & Wei, G. (2018). Synchronization control for a class of discrete-time dynamical networks with packet dropouts: A coding-decoding-based approach. IEEE Transactions on Cybernetics, 48(8), 2437–2448. https://doi.org/10.1109/TCYB.2017.2740309
  • Wang, M., & Xu, B. (2020). Guaranteed cost control of cyber-physical systems with packet dropouts under dos jamming attacks. Asian Journal of Control, 22(4), 1659–1669. https://doi.org/10.1002/asjc.v22.4
  • Xia, J., Chen, G., Park, J. H., Shen, H., & Zhuang, G. (2021). Dissipativity-based sampled-data control for fuzzy switched Markovian jump systems. IEEE Transactions on Fuzzy Systems, 29(6), 1325–1339. https://doi.org/10.1109/TFUZZ.2020.2970856

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.