Sampled-Data-Based Secure Synchronization Control for Chaotic Lur'e Systems Subject to Denial-of-Service Attacks

This article investigates the sampled-data-based secure synchronization control problem for chaotic Lur'e systems subject to power-constrained denial-of-service (DoS) attacks, which can block data packets' transmission in communication channels. To eliminate the adverse effects, a resilien...

Full description

Saved in:
Bibliographic Details
Published inIEEE transaction on neural networks and learning systems Vol. 35; no. 4; pp. 1 - 13
Main Authors Fan, Yingjie, Huang, Xia, Li, Yuxia, Shen, Hao
Format Journal Article
LanguageEnglish
Published United States IEEE 01.04.2024
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:This article investigates the sampled-data-based secure synchronization control problem for chaotic Lur'e systems subject to power-constrained denial-of-service (DoS) attacks, which can block data packets' transmission in communication channels. To eliminate the adverse effects, a resilient sampled data control scheme consisting of a secure controller and communication protocol is designed by considering the attack signals and periodic sampling mechanism simultaneously. Then, a novel index, i.e., the maximum anti-attack ratio, is proposed to measure the secure level. On this basis, a multi-interval-dependent functional is established for the resulting closed-loop system model. The main feature of the developed functional lies in that it can fully use the information of resilient sampling intervals and DoS attacks. In combination with the convex combination method, discrete-time Lyapunov theory, and some inequality estimate techniques, two sufficient conditions are, respectively, derived to achieve sampled-data-based secure synchronization of drive-response systems against DoS attacks. Compared with the existing Lyapunov functionals, the advantages of the proposed multi-interval-dependent functional are analyzed in detail. Finally, a synchronization example and an application to secure communication are provided to display the effectiveness and validity of the obtained results.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
ISSN:2162-237X
2162-2388
2162-2388
DOI:10.1109/TNNLS.2022.3203382