IEEE/CAA Journal of Automatica Sinica
Citation: | Kritika Bansal and Pankaj Mukhija, "Aperiodic Sampled-Data Control of Distributed Networked Control Systems Under Stochastic Cyber-Attacks," IEEE/CAA J. Autom. Sinica, vol. 7, no. 4, pp. 1064-1073, July 2020. doi: 10.1109/JAS.2020.1003249 |
[1] |
X. Ge, F. Yang, and Q.-L. Han, “Distributed networked control systems: A brief overview,” Information Sciences, vol. 380, pp. 117–131, 2017. doi: 10.1016/j.ins.2015.07.047
|
[2] |
X. Zhang, Q. Han, and X. Yu, “Survey on recent advances in networked control systems,” IEEE Trans. Industrial Informatics, vol. 12, no. 5, pp. 1740–1752, Oct. 2016. doi: 10.1109/TII.2015.2506545
|
[3] |
F. Pasqualetti, F. Dorfler, and F. Bullo, “Control-theoretic methods for cyberphysical security: Geometric principles for optimal cross-layer resilient control systems,” IEEE Control Systems Magazine, vol. 35, no. 1, pp. 110–127, Feb. 2015. doi: 10.1109/MCS.2014.2364725
|
[4] |
C. De Persis and P. Tesi, “Input-to-state stabilizing control under denialof-service,” IEEE Trans. Automatic Control, vol. 60, no. 11, pp. 2930–2944, Nov. 2015. doi: 10.1109/TAC.2015.2416924
|
[5] |
G. Wu, J. Sun, and J. Chen, “Optimal data injection attacks in cyberphysical systems,” IEEE Trans. Cybernetics, vol. 48, no. 12, pp. 3302–3312, Dec. 2018. doi: 10.1109/TCYB.2018.2846365
|
[6] |
Y. Chen, S. Kar, and J. M. F. Moura, “Cyber-physical systems: Dynamic sensor attacks and strong observability, ” in Proc. IEEE Int. Conf. Acoustics, Speech and Signal Processing, 2015, pp. 1752–1756.
|
[7] |
L. Wei and J. Liu, “Stabilization for networked control systems under stochastic cyber-attacks, ” in Proc. 36th Chinese Control Conf., 2017, pp. 8020–8025.
|
[8] |
M. Fattahi and A. Afshar, “Resilient sampled-data control of networked control systems against cyber attacks, ” Int. J. Dynamics and Control, 2018.
|
[9] |
X. Ge, Q.-L. Han, M. Zhong, and X.-M. Zhang, “Distributed krein space-based attack detection over sensor networks under deception attacks,” Automatica, vol. 109, pp. 108557, 2019. doi: 10.1016/j.automatica.2019.108557
|
[10] |
A. Teixeira, H. Sandberg, and K. H. Johansson, “Networked control systems under cyber attacks with applications to power networks, ” in Proc. 2010 American Control Conf., Jun. 2010, pp. 3690–3696.
|
[11] |
H. Zhang, P. Cheng, L. Shi, and J. Chen, “Optimal DoS attack scheduling in wireless networked control system,” IEEE Trans. Control Systems Technology, vol. 24, no. 3, pp. 843–852, May 2016. doi: 10.1109/TCST.2015.2462741
|
[12] |
Z. Feng, G. Hu, and G. Wen, “Distributed consensus tracking for multi-agent systems under two types of attacks,” Int. J. Robust and Nonlinear Control, vol. 26, no. 5, pp. 896–918, 2016. doi: 10.1002/rnc.3342
|
[13] |
M. Mazo and P. Tabuada, “On event-triggered and self-triggered control over sensor/actuator networks, ” in Proc. 47th IEEE Conf. Decision and Control, Dec. 2008, pp. 435–440.
|
[14] |
K.-E. Åarzén, “A simple event-based PID controller, ” in Proc. 14th IFAC World Congr., vol. 32, no. 2, pp. 8687–8692, Beijing, China, 1999.
|
[15] |
M. S. Mahmoud and M. Sabih, “Networked event-triggered control: an introduction and research trends,” Int. J. General Systems, vol. 43, no. 8, pp. 810–827, 2014. doi: 10.1080/03081079.2014.908190
|
[16] |
C. Peng and F. Li, “A survey on recent advances in event-triggered communication and control,” Information Sciences, vol. 457–458, pp. 113–125, 2018. doi: 10.1016/j.ins.2018.04.055
|
[17] |
X. Wang and M. D. Lemmon, “Event-triggering in distributed networked control systems,” IEEE Trans. Automatic Control, vol. 56, no. 3, pp. 586–601, Mar. 2011. doi: 10.1109/TAC.2010.2057951
|
[18] |
Z. Zhong, Y. Zhu, and H. Lam, “Asynchronous piecewise outputfeedback control for large-scale fuzzy systems via distributed eventtriggering schemes,” IEEE Trans. Fuzzy Systems, vol. 26, no. 3, pp. 1688–1703, Jun. 2018. doi: 10.1109/TFUZZ.2017.2744599
|
[19] |
J. Liu, E. Tian, X. Xie, and H. Lin, “Distributed event-triggered control for networked control systems with stochastic cyber-attacks,” J. Franklin Institute-Engineering and Applied Mathematics, vol. 356, no. 17, pp. 10260–10276, 2019. doi: 10.1016/j.jfranklin.2018.01.048
|
[20] |
J. Liu, L. Wei, X. Xie, E. Tian, and S. Fei, “Quantized stabilization for T-S fuzzy systems with hybrid-triggered mechanism and stochastic cyber-attacks,” IEEE Trans. Fuzzy Systems, vol. 26, no. 6, pp. 3820–3834, Dec. 2018. doi: 10.1109/TFUZZ.2018.2849702
|
[21] |
A.-Y. Lu and G.-H. Yang, “Event-triggered secure observer-based control for cyber-physical systems under adversarial attacks,” Information Sciences, vol. 420, pp. 96–109, 2017. doi: 10.1016/j.ins.2017.08.057
|
[22] |
X. Ge, Q. Han, X. Zhang, L. Ding, and F. Yang, “Distributed event-triggered estimation over sensor networks: A survey,” IEEE Trans. Cybernetics, vol. 50, no. 3, pp. 1306–1320, Mar. 2020. doi: 10.1109/TCYB.2019.2917179
|
[23] |
Y. Fan, L. Liu, G. Feng, and Y. Wang, “Self-triggered consensus for multi-agent systems with zeno-free triggers,” IEEE Trans. Automatic Control, vol. 60, no. 10, pp. 2779–2784, Oct. 2015. doi: 10.1109/TAC.2015.2405294
|
[24] |
X. Wang and M. D. Lemmon, “Self-triggered feedback control systems with finite-gain L 2 stability,” IEEE Trans. Automatic Control, vol. 54, no. 3, pp. 452–467, Mar. 2009. doi: 10.1109/TAC.2009.2012973
|
[25] |
U. Tiberi and K. Johansson, “A simple self-triggered sampler for nonlinear systems,” in Proc. 4th IFAC Conf. Analysis and Design of Hybrid Systems, vol. 45, no. 9, pp. 76–81, 2012,
|
[26] |
M. Xing, F. Deng, and X. Zhao, “Synchronization of stochastic complex dynamical networks under self-triggered control,” Int. J. Robust and Nonlinear Control, vol. 27, no. 16, pp. 2861–2878, 2017. doi: 10.1002/rnc.3716
|
[27] |
Y. Yan, M. Xia, A. Rahnama, and P. Antsaklis, “A passivity-based self-triggered strategy for cyber physical systems under denial-of-service attack, ” in Proc. 56th Annual Conf. Decision and Control, Dec. 2017, pp. 6082–6087.
|
[28] |
D. Senejohnny, P. Tesi, and C. De Persis, “A jamming-resilient algorithm for self-triggered network coordination,” IEEE Trans. Control of Network Systems, vol. 5, no. 3, pp. 981–990, Sep. 2018. doi: 10.1109/TCNS.2017.2668901
|
[29] |
M. Kishida, M. Kögel, and R. Findeisen, “Combined event- and self-triggered control approach with guaranteed finite-gain L2 stability for uncertain linear systems,” IET Control Theory Applications, vol. 11, no. 11, pp. 1674–1683, 2017. doi: 10.1049/iet-cta.2016.1263
|
[30] |
K. Bansal and P. Mukhija, “A hybrid aperiodic sampled-data strategy for distributed networked control system, ” in Proc. 2019 12th Asian Control Conf., Jun. 2019, pp. 1577–1582.
|
[31] |
Z. Zhan, M. Xu, and S. Xu, “Characterizing honeypot-captured cyber attacks: Statistical framework and case study,” IEEE Trans. Information Forensics and Security, vol. 8, no. 11, pp. 1775–1789, 2013. doi: 10.1109/TIFS.2013.2279800
|
[32] |
T. Li, X. Tang, H. Zhang, and S. Fei, “Improved event-triggered control for networked control systems under stochastic cyber-attacks,” Neurocomputing, vol. 350, pp. 33–43, 2019. doi: 10.1016/j.neucom.2019.03.058
|
[33] |
J. Liu, J. Xia, E. Tian, and S. Fei, “Hybrid-driven-based H1 filter design for neural networks subject to deception attacks,” Applied Mathematics and Computation, vol. 320, pp. 158–174, 2018. doi: 10.1016/j.amc.2017.09.007
|
[34] |
L. Wei and J. Liu, “Stabilization for networked control systems under stochastic cyber-attacks, ” in Proc. IEEE 2017 36th Chinese Control Conf., 2017, pp. 8020–8025.
|
[35] |
S. Boyd, L. El Ghaoui, E. Feron, and V. Balakrishnan, Linear Matrix Inequalities in System and Control Theory. Society for Industrial and Applied Mathematics, 1994.
|
[36] |
H. K. Khalil, Nonlinear Systems, 3rd ed. Upper Saddle River, NJ: Prentice-Hall, 2000.
|
[37] |
K. Tanaka and M. Sano, “A robust stabilization problem of fuzzy control systems and its application to backing up control of a truck-trailer,” IEEE Trans. Fuzzy Systems, vol. 2, no. 2, pp. 119–134, May 1994. doi: 10.1109/91.277961
|
[38] |
M. Guinaldo, D. V. Dimarogonas, K. H. Johansson, J. Sánchez, and S. Dormido, “Distributed event-based control for interconnected linear systems, ” in Proc. 50th IEEE Conf. Decision and Control and European Control Conf., Dec. 2011, pp. 2553–2558.
|