Event-triggered UIO-based security control for discrete-time systems under deception attacks

IF 6.8 1区 计算机科学 0 COMPUTER SCIENCE, INFORMATION SYSTEMS Information Sciences Pub Date : 2025-06-01 Epub Date: 2025-01-27 DOI:10.1016/j.ins.2025.121902
Suhuan Zhang , Fanglai Zhu , Xufeng Ling
{"title":"Event-triggered UIO-based security control for discrete-time systems under deception attacks","authors":"Suhuan Zhang ,&nbsp;Fanglai Zhu ,&nbsp;Xufeng Ling","doi":"10.1016/j.ins.2025.121902","DOIUrl":null,"url":null,"abstract":"<div><div>Deception attacks are regarded as the most typical cyber attacks, which may damage system performance or even cause system paralysis. Deception signals are well-designed by the attackers and may occur on any communication channel, which makes deception attacks relatively stealthy and difficult to detect. In this paper, for linear discrete-time systems that are vulnerable to deception attacks randomly occurring on the controller-to-actuator channel, a novel event-triggered unknown input observer (EUIO) is developed to suppress the impact of deception attacks and unknown inputs on the system and save communication resources. Firstly, different from existing results, the deception signal together with the system unknown input (UI) is modeled as a new multiple UI (MUI). Then, an algebraic expression of the MUI and the system state is established by designing an event-triggered interval observer (EIO). Subsequently, using the algebraic relationship, an EUIO is designed to asymptotically estimate the system state and the MUI simultaneously. Furthermore, an EUIO-based compensation controller is designed by incorporating both state estimation and MUI reconstruction (MUIR) to eliminate the influence of MUI on the system. Under the asymptotic convergence property of the estimations of the EUIO and the significant result of MUIR decoupling the control input, the stability of the closed-loop system can be ensured even if the system suffers from deception attacks, external disturbances, actuator faults, etc. Finally, the feasibility, effectiveness, and advantages of both the EUIO and EUIO-based controller are verified by two examples and comparisons.</div></div>","PeriodicalId":51063,"journal":{"name":"Information Sciences","volume":"702 ","pages":"Article 121902"},"PeriodicalIF":6.8000,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Information Sciences","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0020025525000349","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"2025/1/27 0:00:00","PubModel":"Epub","JCR":"0","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

Deception attacks are regarded as the most typical cyber attacks, which may damage system performance or even cause system paralysis. Deception signals are well-designed by the attackers and may occur on any communication channel, which makes deception attacks relatively stealthy and difficult to detect. In this paper, for linear discrete-time systems that are vulnerable to deception attacks randomly occurring on the controller-to-actuator channel, a novel event-triggered unknown input observer (EUIO) is developed to suppress the impact of deception attacks and unknown inputs on the system and save communication resources. Firstly, different from existing results, the deception signal together with the system unknown input (UI) is modeled as a new multiple UI (MUI). Then, an algebraic expression of the MUI and the system state is established by designing an event-triggered interval observer (EIO). Subsequently, using the algebraic relationship, an EUIO is designed to asymptotically estimate the system state and the MUI simultaneously. Furthermore, an EUIO-based compensation controller is designed by incorporating both state estimation and MUI reconstruction (MUIR) to eliminate the influence of MUI on the system. Under the asymptotic convergence property of the estimations of the EUIO and the significant result of MUIR decoupling the control input, the stability of the closed-loop system can be ensured even if the system suffers from deception attacks, external disturbances, actuator faults, etc. Finally, the feasibility, effectiveness, and advantages of both the EUIO and EUIO-based controller are verified by two examples and comparisons.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
在欺骗攻击下的离散时间系统的事件触发的基于ui的安全控制
欺骗攻击是最典型的网络攻击,它会破坏系统性能,甚至导致系统瘫痪。欺骗信号由攻击者精心设计,可以出现在任何通信信道上,这使得欺骗攻击相对隐蔽,难以被发现。针对线性离散系统在控制器到执行器信道上容易受到随机欺骗攻击的问题,提出了一种新的事件触发未知输入观测器(EUIO),以抑制欺骗攻击和未知输入对系统的影响,节省通信资源。首先,与已有结果不同,将欺骗信号与系统未知输入(UI)一起建模为一个新的多重UI (MUI)。然后,通过设计事件触发区间观测器(EIO),建立了MUI与系统状态的代数表达式。然后,利用该代数关系,设计了一个EUIO来同时渐近估计系统状态和MUI。在此基础上,设计了一种基于euio的补偿控制器,将状态估计和MUI重构(MUIR)相结合,消除MUI对系统的影响。在EUIO估计的渐近收敛性和对控制输入的MUIR解耦效果显著的情况下,即使系统遭受欺骗攻击、外部干扰、执行器故障等,也能保证闭环系统的稳定性。最后,通过两个实例和比较,验证了EUIO和基于EUIO的控制器的可行性、有效性和优越性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Information Sciences
Information Sciences 工程技术-计算机:信息系统
CiteScore
14.00
自引率
17.30%
发文量
1322
审稿时长
10.4 months
期刊介绍: Informatics and Computer Science Intelligent Systems Applications is an esteemed international journal that focuses on publishing original and creative research findings in the field of information sciences. We also feature a limited number of timely tutorial and surveying contributions. Our journal aims to cater to a diverse audience, including researchers, developers, managers, strategic planners, graduate students, and anyone interested in staying up-to-date with cutting-edge research in information science, knowledge engineering, and intelligent systems. While readers are expected to share a common interest in information science, they come from varying backgrounds such as engineering, mathematics, statistics, physics, computer science, cell biology, molecular biology, management science, cognitive science, neurobiology, behavioral sciences, and biochemistry.
期刊最新文献
Matrix-based incremental reduction in neighborhood covering decision information systems Cross-chain identity privacy protection scheme based on oblivious transfer protocol and key agreement The subgraph eigenvector centrality of graphs Collaborative neurodynamic approach on multi-objective optimization of wind power systems Research on pricing Asian carbon options for an uncertain exponential Ornstein-Uhlenbeck model
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1