首页 | 官方网站   微博 | 高级检索  
     

欺骗攻击下网络化系统事件触发安全控制
引用本文:李富强,郜丽赛,郑宝周,谷小青.欺骗攻击下网络化系统事件触发安全控制[J].计算机工程与应用,2021,57(5):264-270.
作者姓名:李富强  郜丽赛  郑宝周  谷小青
作者单位:1.河南农业大学 理学院,郑州 450002 2.上海大学 机电工程与自动化学院,上海市电站自动化技术重点实验室,上海 200444
基金项目:河南农业大学科技创新项目;河南省教育厅重点科研项目;河南省高等学校青年骨干教师项目;国家自然科学基金;河南省科技攻关项目
摘    要:针对网络控制系统受欺骗攻击问题,提出了事件触发器与安全控制器协同设计策略。提出了离散事件触发机制,克服了连续事件触发机制需要新增专用硬件且需要复杂计算避免芝诺现象局限。建立了有机融合欺骗攻击、事件触发机制、网络诱导延时及外部扰动多约束参数的闭环系统时滞模型,推导出了欺骗攻击下事件触发控制系统渐近稳定的充分条件,得到了事件触发器与安全控制器的协同设计条件。仿真验证了方法的有效性。

关 键 词:网络控制系统  欺骗攻击  事件触发机制  渐近稳定  协同设计  

Event-Triggered Secure Control for Networked Systems Under Deception Attacks
LI Fuqiang,GAO Lisai,ZHENG Baozhou,GU Xiaoqing.Event-Triggered Secure Control for Networked Systems Under Deception Attacks[J].Computer Engineering and Applications,2021,57(5):264-270.
Authors:LI Fuqiang  GAO Lisai  ZHENG Baozhou  GU Xiaoqing
Affiliation:1.College of Science, Henan Agricultural University, Zhengzhou 450002, China 2.School of Mechatronics Engineering and Automation, Shanghai Key Laboratory of Power Station Automation Technology, Shanghai University, Shanghai 200444, China
Abstract:As for networked control systems under deception attacks, a co-design strategy of event-triggered mechanism and secure controller is proposed. Firstly, a discrete-time event-triggered mechanism is introduced, which overcomes limits of continuous-time event-triggered mechanism requiring dedicated hardware and complex Zeno-avoidance computation. Secondly, a time-delay closed-loop system model is built, which integrates parameters of deception attacks, event-triggered mechanism, network-induced delays and external disturbances in a unified framework. Then, sufficient conditions for asymptotic stability of the attacked event-triggered systems are derived, and the co-design scheme of event-triggered mechanism and secure controller is presented. Finally, simulation confirms the proposed methods.
Keywords:networked control system  deception attack  event-triggered mechanism  asymptotic stability  co-design  
本文献已被 万方数据 等数据库收录!
点击此处可从《计算机工程与应用》浏览原始摘要信息
点击此处可从《计算机工程与应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号