MPC-based defense strategy for distributed networked control systems under DoS attacks
In this paper, a distributed stochastic model predictive controller is designed for a networked control system subject to stochastic disturbances and denial-of-service (DoS) attacks. Each subsystem is constrained by actuator saturation and all of them are coupled via probabilistic constraints. By us...
Saved in:
Published in | Systems & control letters Vol. 128; pp. 9 - 18 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Elsevier B.V
01.06.2019
|
Subjects | |
Online Access | Get full text |
ISSN | 0167-6911 1872-7956 |
DOI | 10.1016/j.sysconle.2019.04.001 |
Cover
Abstract | In this paper, a distributed stochastic model predictive controller is designed for a networked control system subject to stochastic disturbances and denial-of-service (DoS) attacks. Each subsystem is constrained by actuator saturation and all of them are coupled via probabilistic constraints. By using the information on stochastic disturbances and considering the loss of data packet resulting from DoS attacks explicitly, an observer is designed to reconstruct the states and coupling probabilistic constraints are transformed into coupled deterministic constraints. By adopting the update strategy that only one subsystem is optimized at each time step, while others are setting feasible solutions as their control inputs, the constraints are further transformed into local deterministic constraints. To mitigate performance degradation due to DoS attacks, a performance constraint is introduced such that the optimal performance is not much worse than when the networks work perfectly. Constraints satisfaction, recursive feasibility and quadratic stability can be ensured despite the presence of DoS attacks. A numerical simulation is given to demonstrate the efficiency of the proposed algorithm. |
---|---|
AbstractList | In this paper, a distributed stochastic model predictive controller is designed for a networked control system subject to stochastic disturbances and denial-of-service (DoS) attacks. Each subsystem is constrained by actuator saturation and all of them are coupled via probabilistic constraints. By using the information on stochastic disturbances and considering the loss of data packet resulting from DoS attacks explicitly, an observer is designed to reconstruct the states and coupling probabilistic constraints are transformed into coupled deterministic constraints. By adopting the update strategy that only one subsystem is optimized at each time step, while others are setting feasible solutions as their control inputs, the constraints are further transformed into local deterministic constraints. To mitigate performance degradation due to DoS attacks, a performance constraint is introduced such that the optimal performance is not much worse than when the networks work perfectly. Constraints satisfaction, recursive feasibility and quadratic stability can be ensured despite the presence of DoS attacks. A numerical simulation is given to demonstrate the efficiency of the proposed algorithm. |
Author | Xia, Yuanqing Yang, Hongjiu Li, Ying Dai, Li |
Author_xml | – sequence: 1 givenname: Hongjiu surname: Yang fullname: Yang, Hongjiu email: yanghongjiu@tju.edu.cn organization: Tianjin Key Laboratory of Process Measurement and Control, School of Electrical and Information Engineering, Tianjin University, Tianjin 300072, China – sequence: 2 givenname: Ying surname: Li fullname: Li, Ying email: liy920705@163.com organization: Department of Automation, Xiamen University, Xiamen 361102, China – sequence: 3 givenname: Li surname: Dai fullname: Dai, Li email: li.dai@bit.edu.cn organization: School of Automation, Beijing Institute of Technology, Beijing 100081, China – sequence: 4 givenname: Yuanqing surname: Xia fullname: Xia, Yuanqing email: xia_yuanqing@bit.edu.cn organization: School of Automation, Beijing Institute of Technology, Beijing 100081, China |
BookMark | eNqFUNtKAzEQDVLBtvoLkh_YdZLN3sAHpV5BUfDyGrLJrKSXjSSp0r83pfriS5mHMwPnzJk5EzIa3ICEnDLIGbDqbJ6HTdBuWGLOgbU5iByAHZAxa2qe1W1Zjcg4Eeusahk7IpMQ5gDAoSjG5P3xeZZ1KqChBnscAtIQvYr4saG989TYNNpuHRNhwPjt_CJ1yS16t6TJOOIq0PVg0NMr90JVjEovwjE57NUy4MkvTsnbzfXr7C57eLq9n10-ZLpgPGYlMsCm6bEpVC1aZUzXpOKCI5R1K1gnOlUJXvASOlYXyFuFbZ9AdDVyXUzJ-W6v9i4Ej73UNqpot_cpu5QM5DYjOZd_GcltRhKETBklefVP_untSvnNfuHFTojpuS-LXgZtcdBorEcdpXF234of2bmJtg |
CitedBy_id | crossref_primary_10_1002_adc2_70003 crossref_primary_10_1080_23307706_2025_2458565 crossref_primary_10_1155_2023_6064024 crossref_primary_10_1109_TAC_2023_3317306 crossref_primary_10_1109_TICPS_2023_3283229 crossref_primary_10_1098_rsta_2020_0371 crossref_primary_10_1109_TAC_2022_3209399 crossref_primary_10_1016_j_sysconle_2020_104771 crossref_primary_10_1016_j_arcontrol_2021_10_005 crossref_primary_10_1016_j_conengprac_2021_104879 crossref_primary_10_1016_j_sysconle_2023_105590 crossref_primary_10_3390_en15155353 crossref_primary_10_1002_oca_2955 crossref_primary_10_1155_2022_4451304 crossref_primary_10_1007_s12555_020_0205_3 crossref_primary_10_1002_rnc_6831 crossref_primary_10_1109_TSMC_2019_2956945 crossref_primary_10_1109_TAES_2024_3422158 crossref_primary_10_1109_TCYB_2022_3159343 crossref_primary_10_1109_TSG_2020_3022094 crossref_primary_10_1002_rnc_7448 crossref_primary_10_1109_JSYST_2021_3118333 crossref_primary_10_1016_j_jfranklin_2023_06_018 crossref_primary_10_1080_00207721_2020_1797923 crossref_primary_10_1016_j_isatra_2023_06_039 crossref_primary_10_1016_j_ins_2022_08_093 crossref_primary_10_1016_j_robot_2025_104983 crossref_primary_10_1177_01423312221105141 crossref_primary_10_1016_j_oceaneng_2022_111868 |
Cites_doi | 10.1109/9.964698 10.1137/140994290 10.1016/j.automatica.2017.01.031 10.1016/S1874-1029(13)60013-0 10.1002/rnc.3525 10.1109/TSMC.2017.2704278 10.1016/j.automatica.2012.09.007 10.1109/TCNS.2016.2549640 10.1016/j.automatica.2014.10.128 10.1049/iet-cta.2016.1279 10.1016/j.sysconle.2015.08.011 10.1016/j.automatica.2011.04.015 10.1016/S0005-1098(01)00028-0 10.1007/s00521-016-2317-5 10.1016/j.sysconle.2016.07.007 10.1109/TAC.2016.2612822 10.1016/j.sysconle.2013.06.012 10.1109/TAC.2013.2279896 10.1002/rnc.3516 10.1016/j.automatica.2015.02.018 10.1109/TAC.2010.2086553 10.1109/TCST.2015.2462741 10.1109/TAC.2013.2264554 10.1016/j.automatica.2006.07.004 10.1109/TAC.2015.2416924 10.1109/MCS.2014.2364710 10.2498/cit.1001840 10.1016/j.automatica.2010.06.034 10.1109/TCST.2011.2160543 10.1016/j.automatica.2011.08.058 10.1016/j.automatica.2015.07.025 10.1016/j.neucom.2017.06.016 |
ContentType | Journal Article |
Copyright | 2019 Elsevier B.V. |
Copyright_xml | – notice: 2019 Elsevier B.V. |
DBID | AAYXX CITATION |
DOI | 10.1016/j.sysconle.2019.04.001 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1872-7956 |
EndPage | 18 |
ExternalDocumentID | 10_1016_j_sysconle_2019_04_001 S0167691119300507 |
GroupedDBID | --K --M -~X .DC .~1 0R~ 123 1B1 1RT 1~. 1~5 29Q 4.4 457 4G. 5VS 7-5 71M 8P~ 9JN 9JO AAAKF AAAKG AABNK AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AARIN AAXUO ABFNM ABJNI ABMAC ABTAH ABUCO ABXDB ABYKQ ACDAQ ACGFS ACNNM ACRLP ADBBV ADEZE ADIYS ADMUD ADTZH AEBSH AECPX AEKER AENEX AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHJVU AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ APLSM ASPBG AVWKF AXJTR AZFZN BJAXD BKOJK BLXMC CS3 DU5 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 FDB FEDTE FGOYB FIRID FNPLU FYGXN G-2 G-Q GBLVA HAMUX HVGLF HZ~ IHE J1W JJJVA KOM LY1 LY7 M41 MO0 N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. Q38 R2- RIG ROL RPZ SDF SDG SDP SDS SES SET SEW SPC SPCBC SSB SSD SST SSZ T5K TN5 WH7 WUQ XPP ZMT ZY4 ~G- AATTM AAXKI AAYWO AAYXX ABWVN ACRPL ACVFH ADCNI ADNMO AEIPS AEUPX AFJKZ AFPUW AFXIZ AGCQF AGQPQ AGRNS AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP BNPGV CITATION SSH |
ID | FETCH-LOGICAL-c312t-5e10e88fe83a749addb8b8b242e057941b4ba6423250b173e29ae9fe294b7e2c3 |
IEDL.DBID | AIKHN |
ISSN | 0167-6911 |
IngestDate | Tue Jul 01 03:29:08 EDT 2025 Thu Apr 24 23:09:36 EDT 2025 Fri Feb 23 02:32:49 EST 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | Model predictive control Denial-of-service attacks Networked control systems Distributed systems Actuator saturation |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c312t-5e10e88fe83a749addb8b8b242e057941b4ba6423250b173e29ae9fe294b7e2c3 |
PageCount | 10 |
ParticipantIDs | crossref_citationtrail_10_1016_j_sysconle_2019_04_001 crossref_primary_10_1016_j_sysconle_2019_04_001 elsevier_sciencedirect_doi_10_1016_j_sysconle_2019_04_001 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | June 2019 2019-06-00 |
PublicationDateYYYYMMDD | 2019-06-01 |
PublicationDate_xml | – month: 06 year: 2019 text: June 2019 |
PublicationDecade | 2010 |
PublicationTitle | Systems & control letters |
PublicationYear | 2019 |
Publisher | Elsevier B.V |
Publisher_xml | – name: Elsevier B.V |
References | Hua (b13) 2011 Lee, Kouvaritakis (b6) 2006; 42 Zhou, Zheng, Duan (b25) 2011; 47 Zhang, Cheng, Shi, Chen (b15) 2016; 24 Dai, Xia, Gao (b5) 2015; 53 Pang, Liu (b16) 2012; 20 Yang, Xia, Yuan, Yan (b24) 2016; 26 Lee, Bhattacharya (b2) 2015; 85 Kouvaritakis, Cannon, Rakovic, Cheng (b35) 2010; 46 Wang, Hovakimyan (b3) 2013; 58 You, Xie (b1) 2013; 39 Yuan, Wang, Guo (b23) 2018; 48 Zhu, Basar (b21) 2015; 35 Dai, Xia, Gao, Kouvaritakis, Cannon (b30) 2015; 61 Gupta, Joshi, Misra (b37) 2012; 14 Xu, Krogh (b10) 2001; 46 Yang, Yan, Xia, Zhang (b26) 2016; 26 Franz, Tedesco, Famularo (b9) 2015; 54 Cannon, Kouvaritakis, Raković, Cheng (b11) 2011; 56 Gupta (b36) 2012; 20 Zhang, Liu, Wang (b8) 2009; 24 Zhu, Martinez (b17) 2013; 59 Feng, Tesi (b31) 2017; 79 Persis, Tesi (b33) 2015; 60 Mayne (b4) 2014; 50 Persis, Tesi (b22) 2016; 96 Zhou (b27) 2013; 62 Li, Quevedo, Dey, Shi (b32) 2017; 4 Jiang, Wang (b34) 2001; 37 Alomari, Manickam, Gupta, Karuppayah (b20) 2012; 49 Dai, Xia, Gao, Cannon (b7) 2017; 62 Amin, Schwartz, Sastry (b14) 2013; 49 Zhao, Xu, Yuan, Yang (b28) 2017; 267 Gupta, Joshi, ManojMisra (b18) 2009; 18 Yuan, Yuan, Wang, Guo, Yang (b29) 2017; 11 Cannon, Cheng, Kouvaritakis, Raković (b12) 2012; 48 Gupta, Badve (b19) 2017; 28 Yang (10.1016/j.sysconle.2019.04.001_b24) 2016; 26 You (10.1016/j.sysconle.2019.04.001_b1) 2013; 39 Wang (10.1016/j.sysconle.2019.04.001_b3) 2013; 58 Zhu (10.1016/j.sysconle.2019.04.001_b17) 2013; 59 Hua (10.1016/j.sysconle.2019.04.001_b13) 2011 Zhang (10.1016/j.sysconle.2019.04.001_b15) 2016; 24 Yang (10.1016/j.sysconle.2019.04.001_b26) 2016; 26 Zhou (10.1016/j.sysconle.2019.04.001_b25) 2011; 47 Yuan (10.1016/j.sysconle.2019.04.001_b23) 2018; 48 Feng (10.1016/j.sysconle.2019.04.001_b31) 2017; 79 Dai (10.1016/j.sysconle.2019.04.001_b5) 2015; 53 Gupta (10.1016/j.sysconle.2019.04.001_b37) 2012; 14 Mayne (10.1016/j.sysconle.2019.04.001_b4) 2014; 50 Zhu (10.1016/j.sysconle.2019.04.001_b21) 2015; 35 Alomari (10.1016/j.sysconle.2019.04.001_b20) 2012; 49 Xu (10.1016/j.sysconle.2019.04.001_b10) 2001; 46 Jiang (10.1016/j.sysconle.2019.04.001_b34) 2001; 37 Li (10.1016/j.sysconle.2019.04.001_b32) 2017; 4 Gupta (10.1016/j.sysconle.2019.04.001_b36) 2012; 20 Zhou (10.1016/j.sysconle.2019.04.001_b27) 2013; 62 Zhang (10.1016/j.sysconle.2019.04.001_b8) 2009; 24 Persis (10.1016/j.sysconle.2019.04.001_b33) 2015; 60 Pang (10.1016/j.sysconle.2019.04.001_b16) 2012; 20 Dai (10.1016/j.sysconle.2019.04.001_b7) 2017; 62 Cannon (10.1016/j.sysconle.2019.04.001_b12) 2012; 48 Zhao (10.1016/j.sysconle.2019.04.001_b28) 2017; 267 Franz (10.1016/j.sysconle.2019.04.001_b9) 2015; 54 Kouvaritakis (10.1016/j.sysconle.2019.04.001_b35) 2010; 46 Lee (10.1016/j.sysconle.2019.04.001_b6) 2006; 42 Gupta (10.1016/j.sysconle.2019.04.001_b18) 2009; 18 Lee (10.1016/j.sysconle.2019.04.001_b2) 2015; 85 Dai (10.1016/j.sysconle.2019.04.001_b30) 2015; 61 Persis (10.1016/j.sysconle.2019.04.001_b22) 2016; 96 Cannon (10.1016/j.sysconle.2019.04.001_b11) 2011; 56 Gupta (10.1016/j.sysconle.2019.04.001_b19) 2017; 28 Amin (10.1016/j.sysconle.2019.04.001_b14) 2013; 49 Yuan (10.1016/j.sysconle.2019.04.001_b29) 2017; 11 |
References_xml | – volume: 26 start-page: 3481 year: 2016 end-page: 3506 ident: b26 article-title: Stabilization on null controllable region of delta operator systems subject to actuator saturation publication-title: Internat. J. Robust Nonlinear Control – volume: 96 start-page: 124 year: 2016 end-page: 131 ident: b22 article-title: Networked control of nonlinear systems under denial-of-service publication-title: Systems Control Lett. – volume: 62 start-page: 3474 year: 2017 end-page: 3481 ident: b7 article-title: Distributed stochastic MPC of linear systems with additive uncertainty and coupled probabilistic constraints publication-title: IEEE Trans. Automat. Control – volume: 267 start-page: 354 year: 2017 end-page: 361 ident: b28 article-title: Stabilization for networked control systems subject to actuator saturation and network-induced delays publication-title: Neurocomputing – volume: 24 start-page: 843 year: 2016 end-page: 852 ident: b15 article-title: Optimal DoS attack scheduling in wireless networked control system publication-title: IEEE Trans. Control Syst. Technol. – volume: 28 start-page: 3655 year: 2017 end-page: 3682 ident: b19 article-title: Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a cloud computing environment publication-title: Neural Comput. Appl. – volume: 58 start-page: 2536 year: 2013 end-page: 2549 ident: b3 article-title: Distributed control of uncertain networked systems: A decoupled design publication-title: IEEE Trans. Automat. Control – volume: 53 start-page: 3411 year: 2015 end-page: 3431 ident: b5 article-title: Distributed model predictive control of linear systems with stochastic parametric uncertainties and coupled probabilistic constraints publication-title: SIAM J. Control Opt. – volume: 14 start-page: 36 year: 2012 end-page: 45 ident: b37 article-title: ANN Based scheme to predict number of zombies in a ddos attack publication-title: Int. J. Netw. Secur. – volume: 60 start-page: 2930 year: 2015 end-page: 2944 ident: b33 article-title: Input-to-state stabilizing control under denial-of-service publication-title: IEEE Trans. Automat. Control – volume: 11 start-page: 1325 year: 2017 end-page: 1332 ident: b29 article-title: Optimal control for networked control systems with disturbances: A delta operator approach publication-title: IET Control Theory Appl. – volume: 49 start-page: 24 year: 2012 end-page: 32 ident: b20 article-title: Botnet-based distributed denial of service (DDoS) attacks on web servers: Classification and art publication-title: Int. J. Comput. Appl. – volume: 50 start-page: 2967 year: 2014 end-page: 2986 ident: b4 article-title: Model predictive control: Recent developments and future promise publication-title: Automatica – volume: 20 start-page: 1 year: 2012 end-page: 8 ident: b36 article-title: Predicting number of zombies in ddos attacks using pace regression model publication-title: J. Comput. Inf. Technol. – volume: 20 start-page: 1334 year: 2012 end-page: 1342 ident: b16 article-title: Design and implementation of secure networked predictive control systems under deception attacks publication-title: IEEE Trans. Control Syst. Technol. – volume: 48 start-page: 536 year: 2012 end-page: 541 ident: b12 article-title: Stochastic tube MPC with state estimation publication-title: Automatica – start-page: 30 year: 2011 end-page: 34 ident: b13 article-title: Stuxnet rings an alarming bell to industiral control system publication-title: Inst. Stand. Metrol. – volume: 59 start-page: 804 year: 2013 end-page: 808 ident: b17 article-title: On the performance analysis of resilient networked control systems under replay attacks publication-title: IEEE Trans. Automat. Control – volume: 46 start-page: 1816 year: 2001 end-page: 1820 ident: b10 article-title: Stability-constrained model predictive control publication-title: IEEE Trans. Automat. Control – volume: 85 start-page: 77 year: 2015 end-page: 83 ident: b2 article-title: Stability analysis of large-scale distributed networked control systems with random communication delays: A switched system approach publication-title: Systems Control Lett. – volume: 48 start-page: 1885 year: 2018 end-page: 1896 ident: b23 article-title: Event-triggered strategy design for discrete-time nonlinear quadratic games with disturbance compensations: The noncooperative case publication-title: IEEE Trans. Syst., Man, Cybern. Syst. – volume: 47 start-page: 1813 year: 2011 end-page: 1820 ident: b25 article-title: Stability and stabilization of discrete-time periodic linear systems with actuator saturation publication-title: Automatica – volume: 26 start-page: 3595 year: 2016 end-page: 3610 ident: b24 article-title: Quantized stabilization of networked control systems with actuator saturation publication-title: Internat. J. Robust Nonlinear Control – volume: 37 start-page: 857 year: 2001 end-page: 869 ident: b34 article-title: Input-to-state stability for discrete-time nonlinear systems publication-title: Automatica – volume: 49 start-page: 186 year: 2013 end-page: 192 ident: b14 article-title: Security of interdependent and identical networked control systems publication-title: Automatica – volume: 62 start-page: 871 year: 2013 end-page: 879 ident: b27 article-title: Analysis and design of discrete-time linear systems with nested actuator saturations publication-title: Systems Control Lett. – volume: 79 start-page: 42 year: 2017 end-page: 51 ident: b31 article-title: Resilient control under denial-of-service: Robust design publication-title: Automatica – volume: 4 start-page: 632 year: 2017 end-page: 642 ident: b32 article-title: SINR-based dos attack on remote state estimation: A game-theoretic approach publication-title: IEEE Trans. Control Netw. Syst. – volume: 39 start-page: 101 year: 2013 end-page: 118 ident: b1 article-title: Survey of recent progress in networked control systems publication-title: Acta Automat. Sinica – volume: 24 start-page: 217 year: 2009 end-page: 220 ident: b8 article-title: Design of model predictive controller for uncertain systems with actuator saturation publication-title: Control Decis. – volume: 46 start-page: 1719 year: 2010 end-page: 1724 ident: b35 article-title: Explicit use of probabilistic distributions in linear predictive control publication-title: Automatica – volume: 61 start-page: 89 year: 2015 end-page: 96 ident: b30 article-title: Cooperative distributed stochastic MPC of linear systems with state estimation and coupled probabilistic constraints publication-title: Automatica – volume: 18 start-page: 224 year: 2009 end-page: 247 ident: b18 article-title: Defending against distributed denial of service attacks: Issues and challenges publication-title: Inform. Secur. J. – volume: 56 start-page: 194 year: 2011 end-page: 200 ident: b11 article-title: Stochastic tubes in model predictive control with probabilistic constraints publication-title: IEEE Trans. Automat. Control – volume: 54 start-page: 272 year: 2015 end-page: 278 ident: b9 article-title: Model predictive control for constrained networked systems subject to data losses publication-title: Automatica – volume: 35 start-page: 46 year: 2015 end-page: 65 ident: b21 article-title: Game-theoretic methods for robustness, security, and resilience of cyberphysical control systems: Games-in-games principle for optimal cross-layer resilient control systems publication-title: IEEE Control Syst. – volume: 42 start-page: 2175 year: 2006 end-page: 2181 ident: b6 article-title: Constrained robust model predictive control based on periodic invariance publication-title: Automatica – volume: 46 start-page: 1816 issue: 11 year: 2001 ident: 10.1016/j.sysconle.2019.04.001_b10 article-title: Stability-constrained model predictive control publication-title: IEEE Trans. Automat. Control doi: 10.1109/9.964698 – volume: 53 start-page: 3411 issue: 6 year: 2015 ident: 10.1016/j.sysconle.2019.04.001_b5 article-title: Distributed model predictive control of linear systems with stochastic parametric uncertainties and coupled probabilistic constraints publication-title: SIAM J. Control Opt. doi: 10.1137/140994290 – volume: 79 start-page: 42 year: 2017 ident: 10.1016/j.sysconle.2019.04.001_b31 article-title: Resilient control under denial-of-service: Robust design publication-title: Automatica doi: 10.1016/j.automatica.2017.01.031 – volume: 49 start-page: 24 issue: 7 year: 2012 ident: 10.1016/j.sysconle.2019.04.001_b20 article-title: Botnet-based distributed denial of service (DDoS) attacks on web servers: Classification and art publication-title: Int. J. Comput. Appl. – volume: 39 start-page: 101 issue: 2 year: 2013 ident: 10.1016/j.sysconle.2019.04.001_b1 article-title: Survey of recent progress in networked control systems publication-title: Acta Automat. Sinica doi: 10.1016/S1874-1029(13)60013-0 – volume: 26 start-page: 3595 issue: 16 year: 2016 ident: 10.1016/j.sysconle.2019.04.001_b24 article-title: Quantized stabilization of networked control systems with actuator saturation publication-title: Internat. J. Robust Nonlinear Control doi: 10.1002/rnc.3525 – volume: 48 start-page: 1885 issue: 11 year: 2018 ident: 10.1016/j.sysconle.2019.04.001_b23 article-title: Event-triggered strategy design for discrete-time nonlinear quadratic games with disturbance compensations: The noncooperative case publication-title: IEEE Trans. Syst., Man, Cybern. Syst. doi: 10.1109/TSMC.2017.2704278 – volume: 49 start-page: 186 issue: 1 year: 2013 ident: 10.1016/j.sysconle.2019.04.001_b14 article-title: Security of interdependent and identical networked control systems publication-title: Automatica doi: 10.1016/j.automatica.2012.09.007 – volume: 4 start-page: 632 issue: 3 year: 2017 ident: 10.1016/j.sysconle.2019.04.001_b32 article-title: SINR-based dos attack on remote state estimation: A game-theoretic approach publication-title: IEEE Trans. Control Netw. Syst. doi: 10.1109/TCNS.2016.2549640 – volume: 50 start-page: 2967 issue: 12 year: 2014 ident: 10.1016/j.sysconle.2019.04.001_b4 article-title: Model predictive control: Recent developments and future promise publication-title: Automatica doi: 10.1016/j.automatica.2014.10.128 – volume: 11 start-page: 1325 issue: 9 year: 2017 ident: 10.1016/j.sysconle.2019.04.001_b29 article-title: Optimal control for networked control systems with disturbances: A delta operator approach publication-title: IET Control Theory Appl. doi: 10.1049/iet-cta.2016.1279 – volume: 85 start-page: 77 year: 2015 ident: 10.1016/j.sysconle.2019.04.001_b2 article-title: Stability analysis of large-scale distributed networked control systems with random communication delays: A switched system approach publication-title: Systems Control Lett. doi: 10.1016/j.sysconle.2015.08.011 – volume: 47 start-page: 1813 issue: 8 year: 2011 ident: 10.1016/j.sysconle.2019.04.001_b25 article-title: Stability and stabilization of discrete-time periodic linear systems with actuator saturation publication-title: Automatica doi: 10.1016/j.automatica.2011.04.015 – volume: 37 start-page: 857 issue: 6 year: 2001 ident: 10.1016/j.sysconle.2019.04.001_b34 article-title: Input-to-state stability for discrete-time nonlinear systems publication-title: Automatica doi: 10.1016/S0005-1098(01)00028-0 – volume: 28 start-page: 3655 issue: 12 year: 2017 ident: 10.1016/j.sysconle.2019.04.001_b19 article-title: Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a cloud computing environment publication-title: Neural Comput. Appl. doi: 10.1007/s00521-016-2317-5 – volume: 96 start-page: 124 year: 2016 ident: 10.1016/j.sysconle.2019.04.001_b22 article-title: Networked control of nonlinear systems under denial-of-service publication-title: Systems Control Lett. doi: 10.1016/j.sysconle.2016.07.007 – volume: 62 start-page: 3474 issue: 7 year: 2017 ident: 10.1016/j.sysconle.2019.04.001_b7 article-title: Distributed stochastic MPC of linear systems with additive uncertainty and coupled probabilistic constraints publication-title: IEEE Trans. Automat. Control doi: 10.1109/TAC.2016.2612822 – volume: 24 start-page: 217 issue: 2 year: 2009 ident: 10.1016/j.sysconle.2019.04.001_b8 article-title: Design of model predictive controller for uncertain systems with actuator saturation publication-title: Control Decis. – start-page: 30 year: 2011 ident: 10.1016/j.sysconle.2019.04.001_b13 article-title: Stuxnet rings an alarming bell to industiral control system publication-title: Inst. Stand. Metrol. – volume: 62 start-page: 871 issue: 10 year: 2013 ident: 10.1016/j.sysconle.2019.04.001_b27 article-title: Analysis and design of discrete-time linear systems with nested actuator saturations publication-title: Systems Control Lett. doi: 10.1016/j.sysconle.2013.06.012 – volume: 59 start-page: 804 issue: 3 year: 2013 ident: 10.1016/j.sysconle.2019.04.001_b17 article-title: On the performance analysis of resilient networked control systems under replay attacks publication-title: IEEE Trans. Automat. Control doi: 10.1109/TAC.2013.2279896 – volume: 26 start-page: 3481 issue: 16 year: 2016 ident: 10.1016/j.sysconle.2019.04.001_b26 article-title: Stabilization on null controllable region of delta operator systems subject to actuator saturation publication-title: Internat. J. Robust Nonlinear Control doi: 10.1002/rnc.3516 – volume: 54 start-page: 272 year: 2015 ident: 10.1016/j.sysconle.2019.04.001_b9 article-title: Model predictive control for constrained networked systems subject to data losses publication-title: Automatica doi: 10.1016/j.automatica.2015.02.018 – volume: 56 start-page: 194 issue: 1 year: 2011 ident: 10.1016/j.sysconle.2019.04.001_b11 article-title: Stochastic tubes in model predictive control with probabilistic constraints publication-title: IEEE Trans. Automat. Control doi: 10.1109/TAC.2010.2086553 – volume: 18 start-page: 224 issue: 5 year: 2009 ident: 10.1016/j.sysconle.2019.04.001_b18 article-title: Defending against distributed denial of service attacks: Issues and challenges publication-title: Inform. Secur. J. – volume: 24 start-page: 843 issue: 3 year: 2016 ident: 10.1016/j.sysconle.2019.04.001_b15 article-title: Optimal DoS attack scheduling in wireless networked control system publication-title: IEEE Trans. Control Syst. Technol. doi: 10.1109/TCST.2015.2462741 – volume: 58 start-page: 2536 issue: 10 year: 2013 ident: 10.1016/j.sysconle.2019.04.001_b3 article-title: Distributed control of uncertain networked systems: A decoupled design publication-title: IEEE Trans. Automat. Control doi: 10.1109/TAC.2013.2264554 – volume: 42 start-page: 2175 issue: 12 year: 2006 ident: 10.1016/j.sysconle.2019.04.001_b6 article-title: Constrained robust model predictive control based on periodic invariance publication-title: Automatica doi: 10.1016/j.automatica.2006.07.004 – volume: 60 start-page: 2930 issue: 11 year: 2015 ident: 10.1016/j.sysconle.2019.04.001_b33 article-title: Input-to-state stabilizing control under denial-of-service publication-title: IEEE Trans. Automat. Control doi: 10.1109/TAC.2015.2416924 – volume: 14 start-page: 36 issue: 1 year: 2012 ident: 10.1016/j.sysconle.2019.04.001_b37 article-title: ANN Based scheme to predict number of zombies in a ddos attack publication-title: Int. J. Netw. Secur. – volume: 35 start-page: 46 issue: 1 year: 2015 ident: 10.1016/j.sysconle.2019.04.001_b21 article-title: Game-theoretic methods for robustness, security, and resilience of cyberphysical control systems: Games-in-games principle for optimal cross-layer resilient control systems publication-title: IEEE Control Syst. doi: 10.1109/MCS.2014.2364710 – volume: 20 start-page: 1 issue: 1 year: 2012 ident: 10.1016/j.sysconle.2019.04.001_b36 article-title: Predicting number of zombies in ddos attacks using pace regression model publication-title: J. Comput. Inf. Technol. doi: 10.2498/cit.1001840 – volume: 46 start-page: 1719 issue: 10 year: 2010 ident: 10.1016/j.sysconle.2019.04.001_b35 article-title: Explicit use of probabilistic distributions in linear predictive control publication-title: Automatica doi: 10.1016/j.automatica.2010.06.034 – volume: 20 start-page: 1334 issue: 5 year: 2012 ident: 10.1016/j.sysconle.2019.04.001_b16 article-title: Design and implementation of secure networked predictive control systems under deception attacks publication-title: IEEE Trans. Control Syst. Technol. doi: 10.1109/TCST.2011.2160543 – volume: 48 start-page: 536 issue: 3 year: 2012 ident: 10.1016/j.sysconle.2019.04.001_b12 article-title: Stochastic tube MPC with state estimation publication-title: Automatica doi: 10.1016/j.automatica.2011.08.058 – volume: 61 start-page: 89 year: 2015 ident: 10.1016/j.sysconle.2019.04.001_b30 article-title: Cooperative distributed stochastic MPC of linear systems with state estimation and coupled probabilistic constraints publication-title: Automatica doi: 10.1016/j.automatica.2015.07.025 – volume: 267 start-page: 354 year: 2017 ident: 10.1016/j.sysconle.2019.04.001_b28 article-title: Stabilization for networked control systems subject to actuator saturation and network-induced delays publication-title: Neurocomputing doi: 10.1016/j.neucom.2017.06.016 |
SSID | ssj0002033 |
Score | 2.4387438 |
Snippet | In this paper, a distributed stochastic model predictive controller is designed for a networked control system subject to stochastic disturbances and... |
SourceID | crossref elsevier |
SourceType | Enrichment Source Index Database Publisher |
StartPage | 9 |
SubjectTerms | Actuator saturation Denial-of-service attacks Distributed systems Model predictive control Networked control systems |
Title | MPC-based defense strategy for distributed networked control systems under DoS attacks |
URI | https://dx.doi.org/10.1016/j.sysconle.2019.04.001 |
Volume | 128 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1La8JAEF6sXtpD6ZPah-yh15jXbkyOklbsQ5Fai7eQzU6gIlFMevDS394dsxFLDx5KDnmQgTCZzMyS7_uGkHsvAZxHDkbCkJJjp54RA1erFJYyjzsWlwmykQdDrz9hz1M-rZGw4sIgrFLn_jKnb7K1vmJqb5rLz09zjAB6D7_VACXXkVHecNzA43XS6D699IfbhOxY5UR5lPhGgx2i8Kydr3O18JyjYqYdbFRP9XyYPzVqp-70Tsixbhhpt3ymU1KD7Iwc7cgInpOPwSg0sBxJKiFV61KgeSk6u6aqJ6USxXFxrpW6ISth3-pIg9RpqeWcU2STrejDYkzjokDm_QWZ9B7fw76h5yUYiWs7hcHBtsD3U_DduMMClbmErzZVhAEpp8wWTMQe_pnllrA7LjiozJ2qHRMdcBL3ktSzRQZXhFrCEk4qgIlEMsZ9wQBY0pEy5qnty7RJeOWhKNFi4jjTYh5VqLFZVHk2Qs9GFkP4XJOYW7tlKaex1yKoXkD0KzAilfP32F7_w_aGHOJZiQq7JfVi9QV3qv8oRIsctL_tloqy8O111NLR9gO8Fd7j |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV07T8MwELYqGIAB8RTl6YE1bR52HiMqVAXaCqkt6mbFyUVqVaVVE4Yu_HZ8tQNFDB1QhkSJT4ouzp1P_r7vCLn3E8B-5GAlDCk5TuZbMXBVpbCM-dy1eZogG7nX9zsj9jLm4xppVVwYhFWa2K9j-jpamztN483mYjJpDhBA7-O_GqHkOjLKdxn3AsT1NT5_cB6urfvJo8A3Dt-gCU8bxapQZecM9TKdaK15arrD_MlQG1mnfUQOzXKRPug3OiY1yE_IwYaI4Cl57721LExGKU0hU1Up0EJLzq6oWpHSFKVxsauVGpBr0Le6MhB1qpWcC4pcsiV9nA9oXJbIuz8jo_bTsNWxTLcEK_Ect7Q4ODaEYQahFwcsUnFLhupQKRiQcMocyWTs474st6UTeOCiLnemTkwG4CbeOdnJ5zlcEGpLW7qZBCaTlDEeSgbAkiBNY545YZrVCa88JBIjJY4dLWaiwoxNReVZgZ4VNkPwXJ00v-0WWkxjq0VUfQDxa1oIFfG32F7-w_aO7HWGva7oPvdfr8g-PtH4sGuyUy4_4EatREp5u55pX62-3hk |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=MPC-based+defense+strategy+for+distributed+networked+control+systems+under+DoS+attacks&rft.jtitle=Systems+%26+control+letters&rft.au=Yang%2C+Hongjiu&rft.au=Li%2C+Ying&rft.au=Dai%2C+Li&rft.au=Xia%2C+Yuanqing&rft.date=2019-06-01&rft.issn=0167-6911&rft.volume=128&rft.spage=9&rft.epage=18&rft_id=info:doi/10.1016%2Fj.sysconle.2019.04.001&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_sysconle_2019_04_001 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0167-6911&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0167-6911&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0167-6911&client=summon |