Threshold-Dependent Secure Event-Triggered Control for Networked Systems Under Denial of Service Attacks

IF 6.4 2区 计算机科学 Q1 AUTOMATION & CONTROL SYSTEMS IEEE Transactions on Automation Science and Engineering Pub Date : 2025-01-27 DOI:10.1109/TASE.2025.3531944
Hong-Tao Sun;Chen Peng;Xiaohua Ge
{"title":"Threshold-Dependent Secure Event-Triggered Control for Networked Systems Under Denial of Service Attacks","authors":"Hong-Tao Sun;Chen Peng;Xiaohua Ge","doi":"10.1109/TASE.2025.3531944","DOIUrl":null,"url":null,"abstract":"Event-triggered control addresses a communication resource constraint challenge for networked control systems (NCS) but it is vulnerable to denial of service (DoS) attacks. This paper is concerned with the secure event-triggered control problem for NCSs under DoS attacks. The novelty lies in the development of a novel threshold-dependent event-triggered transmission scheme and a co-design approach for the event-triggered scheme and the desired secure controller. First, two threshold concepts, namely the critical event-triggered threshold (CETT) and the secure event-triggered threshold (SETT), are proposed for the event-triggered scheme. More specifically, the CETT is defined by the maximum allowable event-triggered parameter which can guarantee stability of the NCS and the SETT is used to ensure timely transmissions when the NCS subject to DoS-resulted packet dropouts. Second, by virtue of the input delay approach, a comprehensive closed-loop system model is derived for the NCS, which accommodates simultaneously the event-based sporadic transmissions, packet delays, and DoS-resulted packet dropouts. Third, a co-design algorithm is presented to determine both the desired threshold parameter and secure state- and output-feedback secure controllers. Finally, numerical simulations on a CAN-based vehicle lateral control system are provided to demonstrate the efficacy of the proposed control method. Note to Practitioners—This paper was motivated by the secure control design problem of the NCSs subject to both limited communication resources and DoS attacks. Most existing works failed to establish the relation between event-triggered parameter and packet dropouts and thus lead to the difficulties in controller synthesis under DoS attacks. In this paper, we mathematically characterize the relation between event-triggered parameter and the number of DoS-resulted packet dropouts. The secure control and event-triggered communication co-design approach of the networked control systems under malicious attacks is carefully derived. To practitioners, this study provides a secure control design basis of the NCS subject to DoS attacks by analyzing the evolution of event-triggered threshold under DoS-resulted packet dropouts. However, such design method just mitigates the effects caused by DoS attacks but is less of ability to regulate the control actions during DoS attack intervals. In future research, the active and intelligent secure control compensation strategies will be addressed.","PeriodicalId":51060,"journal":{"name":"IEEE Transactions on Automation Science and Engineering","volume":"22 ","pages":"11139-11149"},"PeriodicalIF":6.4000,"publicationDate":"2025-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Automation Science and Engineering","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10854550/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

Event-triggered control addresses a communication resource constraint challenge for networked control systems (NCS) but it is vulnerable to denial of service (DoS) attacks. This paper is concerned with the secure event-triggered control problem for NCSs under DoS attacks. The novelty lies in the development of a novel threshold-dependent event-triggered transmission scheme and a co-design approach for the event-triggered scheme and the desired secure controller. First, two threshold concepts, namely the critical event-triggered threshold (CETT) and the secure event-triggered threshold (SETT), are proposed for the event-triggered scheme. More specifically, the CETT is defined by the maximum allowable event-triggered parameter which can guarantee stability of the NCS and the SETT is used to ensure timely transmissions when the NCS subject to DoS-resulted packet dropouts. Second, by virtue of the input delay approach, a comprehensive closed-loop system model is derived for the NCS, which accommodates simultaneously the event-based sporadic transmissions, packet delays, and DoS-resulted packet dropouts. Third, a co-design algorithm is presented to determine both the desired threshold parameter and secure state- and output-feedback secure controllers. Finally, numerical simulations on a CAN-based vehicle lateral control system are provided to demonstrate the efficacy of the proposed control method. Note to Practitioners—This paper was motivated by the secure control design problem of the NCSs subject to both limited communication resources and DoS attacks. Most existing works failed to establish the relation between event-triggered parameter and packet dropouts and thus lead to the difficulties in controller synthesis under DoS attacks. In this paper, we mathematically characterize the relation between event-triggered parameter and the number of DoS-resulted packet dropouts. The secure control and event-triggered communication co-design approach of the networked control systems under malicious attacks is carefully derived. To practitioners, this study provides a secure control design basis of the NCS subject to DoS attacks by analyzing the evolution of event-triggered threshold under DoS-resulted packet dropouts. However, such design method just mitigates the effects caused by DoS attacks but is less of ability to regulate the control actions during DoS attack intervals. In future research, the active and intelligent secure control compensation strategies will be addressed.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
拒绝服务攻击下网络系统的阈值依赖安全事件触发控制
事件触发控制解决了网络控制系统(NCS)的通信资源约束挑战,但它容易受到拒绝服务(DoS)攻击。研究了DoS攻击下ncs的安全事件触发控制问题。其新颖性在于开发了一种新的依赖阈值的事件触发传输方案,并为事件触发方案和所需的安全控制器提供了一种协同设计方法。首先,针对事件触发方案,提出了关键事件触发阈值(CETT)和安全事件触发阈值(SETT)两个阈值概念。更具体地说,CETT是由最大允许的事件触发参数来定义的,它可以保证NCS的稳定性,SETT是用来保证当NCS受到dos导致的丢包时及时传输。其次,利用输入延迟方法,导出了NCS的综合闭环系统模型,该模型同时适应基于事件的零星传输、数据包延迟和dos导致的数据包丢失。第三,提出了一种协同设计算法来确定所需的阈值参数以及安全状态和输出反馈安全控制器。最后,对基于can的车辆横向控制系统进行了数值仿真,验证了所提控制方法的有效性。从业人员注意事项-本文的动机是受有限通信资源和DoS攻击影响的ncs的安全控制设计问题。现有的工作大多没有建立事件触发参数与丢包之间的关系,导致DoS攻击下控制器合成困难。在本文中,我们用数学方法描述了事件触发参数与dos导致的丢包数之间的关系。详细推导了恶意攻击下网络控制系统的安全控制与事件触发通信协同设计方法。本研究通过分析DoS导致的丢包情况下事件触发阈值的演变,为网络控制系统在DoS攻击下的安全控制设计提供依据。然而,这种设计方法只是减轻了DoS攻击的影响,而缺乏对DoS攻击间隔期间控制动作的调节能力。在未来的研究中,将进一步研究主动和智能安全控制补偿策略。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IEEE Transactions on Automation Science and Engineering
IEEE Transactions on Automation Science and Engineering 工程技术-自动化与控制系统
CiteScore
12.50
自引率
14.30%
发文量
404
审稿时长
3.0 months
期刊介绍: The IEEE Transactions on Automation Science and Engineering (T-ASE) publishes fundamental papers on Automation, emphasizing scientific results that advance efficiency, quality, productivity, and reliability. T-ASE encourages interdisciplinary approaches from computer science, control systems, electrical engineering, mathematics, mechanical engineering, operations research, and other fields. T-ASE welcomes results relevant to industries such as agriculture, biotechnology, healthcare, home automation, maintenance, manufacturing, pharmaceuticals, retail, security, service, supply chains, and transportation. T-ASE addresses a research community willing to integrate knowledge across disciplines and industries. For this purpose, each paper includes a Note to Practitioners that summarizes how its results can be applied or how they might be extended to apply in practice.
期刊最新文献
Study on Optimization of Automatic Kidney Suture Strategies Based on Wound Conditions and Suture Paths Zero-Shot Sim-to-Real sEMG-Based Control of Elbow Exoskeletons Using Deep Reinforcement Learning Unbalanced and balanced competition strategy-assisted dual-swarm optimizer for constrained multi-objective optimization Multi-Scale Convolutional Attention Model for GNSS Jamming Recognition Game Theory-based Resilient Control of Time-varying Cyber-Physical Systems Under Hybrid Attacks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1