恶意攻击和比特率限制下网络控制系统的稳定性

IF 3.7 3区 计算机科学 Q2 AUTOMATION & CONTROL SYSTEMS Journal of The Franklin Institute-engineering and Applied Mathematics Pub Date : 2024-10-16 DOI:10.1016/j.jfranklin.2024.107319
Wen-Hui Wang , Yan-Wu Wang , Meng-Jie Hu , Wu Yang
{"title":"恶意攻击和比特率限制下网络控制系统的稳定性","authors":"Wen-Hui Wang ,&nbsp;Yan-Wu Wang ,&nbsp;Meng-Jie Hu ,&nbsp;Wu Yang","doi":"10.1016/j.jfranklin.2024.107319","DOIUrl":null,"url":null,"abstract":"<div><div>This article investigates the stability of networked control systems under two types of malicious attacks and bit rate constraints. The malicious attacks may lead to parameter mismatches, including scaling variable mismatches between the encoder and decoder sides and discrepancies between the data sent by the encoder and received by the decoder, causing system instability. To address these issues, scaling variable update rules are proposed for the encoder and decoder sides separately to mitigate the adverse effects of malicious attacks. A control strategy featuring a compensation term is designed to counteract the detrimental impacts of the mismatch. A lower bound on the bit rate is established to prevent quantization saturation and achieve exponential stability of the system. Finally, confirmatory and comparative simulations showcase the effectiveness of the theoretical insights and the merits of the proposed strategies, respectively.</div></div>","PeriodicalId":17283,"journal":{"name":"Journal of The Franklin Institute-engineering and Applied Mathematics","volume":"361 18","pages":"Article 107319"},"PeriodicalIF":3.7000,"publicationDate":"2024-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Stability of networked control systems under malicious attacks and bit rate constraints\",\"authors\":\"Wen-Hui Wang ,&nbsp;Yan-Wu Wang ,&nbsp;Meng-Jie Hu ,&nbsp;Wu Yang\",\"doi\":\"10.1016/j.jfranklin.2024.107319\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>This article investigates the stability of networked control systems under two types of malicious attacks and bit rate constraints. The malicious attacks may lead to parameter mismatches, including scaling variable mismatches between the encoder and decoder sides and discrepancies between the data sent by the encoder and received by the decoder, causing system instability. To address these issues, scaling variable update rules are proposed for the encoder and decoder sides separately to mitigate the adverse effects of malicious attacks. A control strategy featuring a compensation term is designed to counteract the detrimental impacts of the mismatch. A lower bound on the bit rate is established to prevent quantization saturation and achieve exponential stability of the system. Finally, confirmatory and comparative simulations showcase the effectiveness of the theoretical insights and the merits of the proposed strategies, respectively.</div></div>\",\"PeriodicalId\":17283,\"journal\":{\"name\":\"Journal of The Franklin Institute-engineering and Applied Mathematics\",\"volume\":\"361 18\",\"pages\":\"Article 107319\"},\"PeriodicalIF\":3.7000,\"publicationDate\":\"2024-10-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of The Franklin Institute-engineering and Applied Mathematics\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0016003224007403\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of The Franklin Institute-engineering and Applied Mathematics","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0016003224007403","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

本文研究了两种恶意攻击和比特率限制下网络控制系统的稳定性。恶意攻击可能导致参数失配,包括编码器和解码器之间的缩放变量失配,以及编码器发送的数据和解码器接收的数据之间的差异,从而造成系统不稳定。为解决这些问题,提出了分别针对编码器和解码器的缩放变量更新规则,以减轻恶意攻击的不利影响。设计了一种具有补偿项的控制策略,以抵消不匹配带来的不利影响。建立了比特率下限,以防止量化饱和并实现系统的指数稳定性。最后,确认和比较模拟分别展示了理论见解的有效性和所提策略的优点。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Stability of networked control systems under malicious attacks and bit rate constraints
This article investigates the stability of networked control systems under two types of malicious attacks and bit rate constraints. The malicious attacks may lead to parameter mismatches, including scaling variable mismatches between the encoder and decoder sides and discrepancies between the data sent by the encoder and received by the decoder, causing system instability. To address these issues, scaling variable update rules are proposed for the encoder and decoder sides separately to mitigate the adverse effects of malicious attacks. A control strategy featuring a compensation term is designed to counteract the detrimental impacts of the mismatch. A lower bound on the bit rate is established to prevent quantization saturation and achieve exponential stability of the system. Finally, confirmatory and comparative simulations showcase the effectiveness of the theoretical insights and the merits of the proposed strategies, respectively.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
7.30
自引率
14.60%
发文量
586
审稿时长
6.9 months
期刊介绍: The Journal of The Franklin Institute has an established reputation for publishing high-quality papers in the field of engineering and applied mathematics. Its current focus is on control systems, complex networks and dynamic systems, signal processing and communications and their applications. All submitted papers are peer-reviewed. The Journal will publish original research papers and research review papers of substance. Papers and special focus issues are judged upon possible lasting value, which has been and continues to be the strength of the Journal of The Franklin Institute.
期刊最新文献
Prescribed-time event-triggered control of multi-agent systems based on continuous scaling function Movement control based on model predictive control using Kalman filter for known and unknown noise covariance matrices Linear convergence for distributed stochastic optimization with coupled inequality constraints Adaptive fixed-time fuzzy control for delayed recycling continuous stirred tank reactor with asymmetric time-varying full-state constraints Linear and nonlinear filters based on statistical similarity measure for sensor network systems
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1