{"title":"Threshold-Dependent Secure Event-Triggered Control for Networked Systems Under Denial of Service Attacks","authors":"Hong-Tao Sun;Chen Peng;Xiaohua Ge","doi":"10.1109/TASE.2025.3531944","DOIUrl":null,"url":null,"abstract":"Event-triggered control addresses a communication resource constraint challenge for networked control systems (NCS) but it is vulnerable to denial of service (DoS) attacks. This paper is concerned with the secure event-triggered control problem for NCSs under DoS attacks. The novelty lies in the development of a novel threshold-dependent event-triggered transmission scheme and a co-design approach for the event-triggered scheme and the desired secure controller. First, two threshold concepts, namely the critical event-triggered threshold (CETT) and the secure event-triggered threshold (SETT), are proposed for the event-triggered scheme. More specifically, the CETT is defined by the maximum allowable event-triggered parameter which can guarantee stability of the NCS and the SETT is used to ensure timely transmissions when the NCS subject to DoS-resulted packet dropouts. Second, by virtue of the input delay approach, a comprehensive closed-loop system model is derived for the NCS, which accommodates simultaneously the event-based sporadic transmissions, packet delays, and DoS-resulted packet dropouts. Third, a co-design algorithm is presented to determine both the desired threshold parameter and secure state- and output-feedback secure controllers. Finally, numerical simulations on a CAN-based vehicle lateral control system are provided to demonstrate the efficacy of the proposed control method. Note to Practitioners—This paper was motivated by the secure control design problem of the NCSs subject to both limited communication resources and DoS attacks. Most existing works failed to establish the relation between event-triggered parameter and packet dropouts and thus lead to the difficulties in controller synthesis under DoS attacks. In this paper, we mathematically characterize the relation between event-triggered parameter and the number of DoS-resulted packet dropouts. The secure control and event-triggered communication co-design approach of the networked control systems under malicious attacks is carefully derived. To practitioners, this study provides a secure control design basis of the NCS subject to DoS attacks by analyzing the evolution of event-triggered threshold under DoS-resulted packet dropouts. However, such design method just mitigates the effects caused by DoS attacks but is less of ability to regulate the control actions during DoS attack intervals. In future research, the active and intelligent secure control compensation strategies will be addressed.","PeriodicalId":51060,"journal":{"name":"IEEE Transactions on Automation Science and Engineering","volume":"22 ","pages":"11139-11149"},"PeriodicalIF":6.4000,"publicationDate":"2025-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Automation Science and Engineering","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10854550/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Event-triggered control addresses a communication resource constraint challenge for networked control systems (NCS) but it is vulnerable to denial of service (DoS) attacks. This paper is concerned with the secure event-triggered control problem for NCSs under DoS attacks. The novelty lies in the development of a novel threshold-dependent event-triggered transmission scheme and a co-design approach for the event-triggered scheme and the desired secure controller. First, two threshold concepts, namely the critical event-triggered threshold (CETT) and the secure event-triggered threshold (SETT), are proposed for the event-triggered scheme. More specifically, the CETT is defined by the maximum allowable event-triggered parameter which can guarantee stability of the NCS and the SETT is used to ensure timely transmissions when the NCS subject to DoS-resulted packet dropouts. Second, by virtue of the input delay approach, a comprehensive closed-loop system model is derived for the NCS, which accommodates simultaneously the event-based sporadic transmissions, packet delays, and DoS-resulted packet dropouts. Third, a co-design algorithm is presented to determine both the desired threshold parameter and secure state- and output-feedback secure controllers. Finally, numerical simulations on a CAN-based vehicle lateral control system are provided to demonstrate the efficacy of the proposed control method. Note to Practitioners—This paper was motivated by the secure control design problem of the NCSs subject to both limited communication resources and DoS attacks. Most existing works failed to establish the relation between event-triggered parameter and packet dropouts and thus lead to the difficulties in controller synthesis under DoS attacks. In this paper, we mathematically characterize the relation between event-triggered parameter and the number of DoS-resulted packet dropouts. The secure control and event-triggered communication co-design approach of the networked control systems under malicious attacks is carefully derived. To practitioners, this study provides a secure control design basis of the NCS subject to DoS attacks by analyzing the evolution of event-triggered threshold under DoS-resulted packet dropouts. However, such design method just mitigates the effects caused by DoS attacks but is less of ability to regulate the control actions during DoS attack intervals. In future research, the active and intelligent secure control compensation strategies will be addressed.
期刊介绍:
The IEEE Transactions on Automation Science and Engineering (T-ASE) publishes fundamental papers on Automation, emphasizing scientific results that advance efficiency, quality, productivity, and reliability. T-ASE encourages interdisciplinary approaches from computer science, control systems, electrical engineering, mathematics, mechanical engineering, operations research, and other fields. T-ASE welcomes results relevant to industries such as agriculture, biotechnology, healthcare, home automation, maintenance, manufacturing, pharmaceuticals, retail, security, service, supply chains, and transportation. T-ASE addresses a research community willing to integrate knowledge across disciplines and industries. For this purpose, each paper includes a Note to Practitioners that summarizes how its results can be applied or how they might be extended to apply in practice.