Observer-Based Event-Triggered Control for Networked Linear Systems Subject to Denial-of-Service Attacks

This paper is concerned with the observer-based event-triggered control for a continuous networked linear system subject to denial-of-service (DoS) attacks, where the attacks are launched periodically to block the data transmission in control channels. First, a new observer state-based resilient eve...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on cybernetics Vol. 50; no. 5; pp. 1952 - 1964
Main Authors Hu, Songlin, Yue, Dong, Han, Qing-Long, Xie, Xiangpeng, Chen, Xiaoli, Dou, Chunxia
Format Journal Article
LanguageEnglish
Published United States IEEE 01.05.2020
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:This paper is concerned with the observer-based event-triggered control for a continuous networked linear system subject to denial-of-service (DoS) attacks, where the attacks are launched periodically to block the data transmission in control channels. First, a new observer state-based resilient event-triggering scheme is developed in the presence of DoS attacks. Second, a novel event-based switched system model is established by considering the effect of the event-triggering scheme and DoS attacks simultaneously. By virtue of this new model combined with a piecewise Lyapunov-Krasovskii functional method, the sufficient conditions are derived to guarantee exponential stability of the resulting switched system. It is shown that the proposed results can establish a quantitative relationship among the launching/sleeping periods of the attacks, the event-triggering parameters, the sampling period, and the exponential decay rate. Third, criteria for designing a desired observer-based event-triggered controller are provided and expressed in terms of a set of linear matrix inequalities. Finally, an offshore structure model is presented to illustrate the efficiency of the developed control method.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
ISSN:2168-2267
2168-2275
2168-2275
DOI:10.1109/TCYB.2019.2903817