Event-based security control for discrete-time stochastic systems
This study is concerned with the event-based security control problem for a class of discrete-time stochastic systems with multiplicative noises subject to both randomly occurring denial-of-service (DoS) attacks and randomly occurring deception attacks. An event-triggered mechanism is adopted with h...
Saved in:
Published in | IET control theory & applications Vol. 10; no. 15; pp. 1808 - 1815 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
The Institution of Engineering and Technology
10.10.2016
|
Subjects | |
Online Access | Get full text |
ISSN | 1751-8644 1751-8652 |
DOI | 10.1049/iet-cta.2016.0135 |
Cover
Loading…
Abstract | This study is concerned with the event-based security control problem for a class of discrete-time stochastic systems with multiplicative noises subject to both randomly occurring denial-of-service (DoS) attacks and randomly occurring deception attacks. An event-triggered mechanism is adopted with hope to reduce the communication burden, where the measurement signal is transmitted only when a certain triggering condition is violated. A novel attack model is proposed to reflect the randomly occurring behaviours of the DoS attacks as well as the deception attacks within a unified framework via two sets of Bernoulli distributed white sequences with known conditional probabilities. A new concept of mean-square security domain is put forward to quantify the security degree. The authors aim to design an output feedback controller such that the closed-loop system achieves the desired security. By using the stochastic analysis techniques, some sufficient conditions are established to guarantee the desired security requirement and the control gain is obtained by solving some linear matrix inequalities with non-linear constraints. A simulation example is utilised to illustrate the usefulness of the proposed controller design scheme. |
---|---|
AbstractList | This study is concerned with the event-based security control problem for a class of discrete-time stochastic systems with multiplicative noises subject to both randomly occurring denial-of-service (DoS) attacks and randomly occurring deception attacks. An event-triggered mechanism is adopted with hope to reduce the communication burden, where the measurement signal is transmitted only when a certain triggering condition is violated. A novel attack model is proposed to reflect the randomly occurring behaviours of the DoS attacks as well as the deception attacks within a unified framework via two sets of Bernoulli distributed white sequences with known conditional probabilities. A new concept of mean-square security domain is put forward to quantify the security degree. The authors aim to design an output feedback controller such that the closed-loop system achieves the desired security. By using the stochastic analysis techniques, some sufficient conditions are established to guarantee the desired security requirement and the control gain is obtained by solving some linear matrix inequalities with non-linear constraints. A simulation example is utilised to illustrate the usefulness of the proposed controller design scheme. |
Author | Alsaadi, Fuad E Ding, Derui Wei, Guoliang Wang, Zidong |
Author_xml | – sequence: 1 givenname: Derui surname: Ding fullname: Ding, Derui email: deruiding2010@usst.edu.cn organization: 1Shanghai Key Laboratory of Modern Optical System, Department of Control Science and Engineering, University of Shanghai for Science and Technology, Shanghai 200093, People's Republic of China – sequence: 2 givenname: Zidong surname: Wang fullname: Wang, Zidong organization: 3Faculty of Engineering, King Abdulaziz University, Jeddah 21589, Saudi Arabia – sequence: 3 givenname: Guoliang surname: Wei fullname: Wei, Guoliang organization: 1Shanghai Key Laboratory of Modern Optical System, Department of Control Science and Engineering, University of Shanghai for Science and Technology, Shanghai 200093, People's Republic of China – sequence: 4 givenname: Fuad E surname: Alsaadi fullname: Alsaadi, Fuad E organization: 3Faculty of Engineering, King Abdulaziz University, Jeddah 21589, Saudi Arabia |
BookMark | eNqFkE9PwjAYhxuDiYB-AG876mHYbu06vCEBISHxguem697FkrFiWzT79nbOGGMMnt738HveP88IDRrTAELXBE8IptM7DT5WXk4STLIJJik7Q0PCGYnzjCWD757SCzRybocxYxllQzRbvEHj40I6KCMH6mi1byNlGm9NHVXGRqV2yoKH2Os9RM4b9SKd1ypyrfOwd5fovJK1g6uvOkbPy8V2voo3T4_r-WwTKxruiXlZYlnkOSecy2kmaYKVpCRhecoxk7KcqiJTXBU5oyVkRcFCikKOMzVNCWPpGN30cw_WvB7BebEPl0FdywbM0QmSU5YTnn1GeR9V1jhnoRJKe-l195XUtSBYdNJEkCaCNNFJE520QJJf5MHqvbTtSea-Z951De3_gJhvV8nDEhPK0gDHPdzFduZom-Dw5LLbP_LrxTZMnf3YcSir9AMZSaHu |
CitedBy_id | crossref_primary_10_3390_en13071820 crossref_primary_10_1016_j_jfranklin_2018_08_033 crossref_primary_10_1049_iet_cta_2017_0561 crossref_primary_10_1016_j_ins_2020_05_098 crossref_primary_10_1016_j_jfranklin_2018_02_007 crossref_primary_10_1109_TCYB_2019_2912622 crossref_primary_10_1109_TSMC_2018_2794414 crossref_primary_10_3390_act11070193 crossref_primary_10_1109_TFUZZ_2022_3197312 crossref_primary_10_53941_ijndi_2025_100003 crossref_primary_10_1016_j_neucom_2018_01_075 crossref_primary_10_1109_TCYB_2018_2852290 crossref_primary_10_1016_j_ejcon_2019_01_003 crossref_primary_10_1109_JSEN_2017_2766077 crossref_primary_10_1016_j_neucom_2018_05_026 crossref_primary_10_1109_ACCESS_2020_2978174 crossref_primary_10_1109_TSMC_2021_3130614 crossref_primary_10_1109_TSMC_2017_2719960 crossref_primary_10_1049_iet_cta_2018_5970 crossref_primary_10_3233_JIFS_179096 crossref_primary_10_1016_j_neucom_2017_03_015 crossref_primary_10_1016_j_jfranklin_2019_08_029 crossref_primary_10_1088_1742_6596_1754_1_012089 crossref_primary_10_1016_j_neucom_2018_02_030 crossref_primary_10_1109_TSMC_2018_2856819 crossref_primary_10_1109_ACCESS_2021_3049228 crossref_primary_10_1109_TSMC_2019_2952539 crossref_primary_10_1109_TSMC_2017_2697450 crossref_primary_10_53941_ijndi_2023_100011 crossref_primary_10_1049_iet_cta_2019_0051 crossref_primary_10_1109_TSMC_2021_3049373 crossref_primary_10_1109_TTE_2022_3227086 crossref_primary_10_1002_rnc_3992 crossref_primary_10_1109_TNB_2018_2797124 crossref_primary_10_1049_cth2_12074 crossref_primary_10_1109_TSMC_2018_2884952 crossref_primary_10_1016_j_neunet_2018_02_003 crossref_primary_10_1049_iet_cta_2017_0629 crossref_primary_10_1049_iet_cta_2018_6171 crossref_primary_10_1049_iet_cta_2019_0796 crossref_primary_10_1049_iet_cta_2017_0868 crossref_primary_10_1109_TITS_2023_3348841 crossref_primary_10_1016_j_nahs_2017_07_005 crossref_primary_10_32604_cmc_2023_039466 crossref_primary_10_1016_j_amc_2022_126975 crossref_primary_10_1016_j_neucom_2017_04_039 crossref_primary_10_1016_j_neucom_2018_04_037 crossref_primary_10_1049_cth2_12353 crossref_primary_10_1049_iet_cta_2017_1163 crossref_primary_10_1080_03081079_2018_1462352 crossref_primary_10_1016_j_apenergy_2022_119540 crossref_primary_10_1016_j_ecoinf_2021_101290 crossref_primary_10_1016_j_isatra_2023_09_012 crossref_primary_10_1049_cth2_12359 crossref_primary_10_1109_TCYB_2017_2707590 crossref_primary_10_1109_TSMC_2022_3211322 crossref_primary_10_1016_j_arcontrol_2019_08_002 crossref_primary_10_1016_j_ins_2018_04_082 crossref_primary_10_1016_j_jss_2018_12_006 crossref_primary_10_1109_TNNLS_2018_2890119 crossref_primary_10_1155_2021_2730916 crossref_primary_10_1016_j_jfranklin_2018_04_001 crossref_primary_10_1016_j_neucom_2017_08_016 crossref_primary_10_1080_03081079_2018_1456535 crossref_primary_10_1109_TCYB_2022_3151880 crossref_primary_10_1016_j_neucom_2018_06_038 crossref_primary_10_1109_TAC_2020_3032598 crossref_primary_10_1016_j_isatra_2019_05_004 crossref_primary_10_1016_j_isatra_2019_05_008 crossref_primary_10_1109_TAC_2023_3321248 crossref_primary_10_1016_j_isatra_2021_04_027 crossref_primary_10_1016_j_neucom_2017_04_027 crossref_primary_10_1016_j_cnsns_2019_105043 crossref_primary_10_1049_cth2_12100 crossref_primary_10_1016_j_neucom_2017_02_086 crossref_primary_10_1109_TSMC_2017_2720121 crossref_primary_10_1016_j_sigpro_2018_01_015 crossref_primary_10_1109_TCNS_2022_3153873 crossref_primary_10_1016_j_ins_2020_03_045 crossref_primary_10_1109_TCYB_2019_2918402 crossref_primary_10_1109_TAC_2017_2774601 crossref_primary_10_1109_TR_2022_3215075 crossref_primary_10_1016_j_jfranklin_2017_11_010 crossref_primary_10_1016_j_neucom_2017_12_007 crossref_primary_10_1016_j_inffus_2017_11_001 crossref_primary_10_1007_s13042_017_0769_2 crossref_primary_10_1109_TNNLS_2017_2728639 crossref_primary_10_1016_j_isatra_2020_08_040 crossref_primary_10_1016_j_jfranklin_2017_05_016 crossref_primary_10_1016_j_neucom_2017_10_009 crossref_primary_10_1016_j_neucom_2017_11_041 crossref_primary_10_1016_j_sigpro_2017_11_011 crossref_primary_10_1049_iet_cta_2018_6469 crossref_primary_10_1016_j_neucom_2018_01_031 crossref_primary_10_1109_TCYB_2019_2901515 crossref_primary_10_1109_TCST_2018_2797920 crossref_primary_10_1109_TSMC_2018_2875250 crossref_primary_10_1016_j_isatra_2019_12_014 crossref_primary_10_1016_j_automatica_2022_110806 crossref_primary_10_1016_j_jfranklin_2021_08_015 crossref_primary_10_1080_00207721_2017_1406555 crossref_primary_10_1080_23335777_2019_1631889 crossref_primary_10_1109_TVT_2022_3169349 crossref_primary_10_1177_09596518221132364 crossref_primary_10_1016_j_amc_2016_11_014 crossref_primary_10_1088_1742_6596_1334_1_012006 crossref_primary_10_1016_j_jfranklin_2020_01_029 crossref_primary_10_1049_iet_cta_2017_0819 crossref_primary_10_1080_00207721_2020_1772402 crossref_primary_10_1016_j_neucom_2018_08_090 crossref_primary_10_1109_TSMC_2017_2704278 crossref_primary_10_1016_j_neucom_2018_05_062 crossref_primary_10_1016_j_ins_2018_04_052 crossref_primary_10_1016_j_neucom_2018_05_063 crossref_primary_10_1016_j_jfranklin_2017_06_001 crossref_primary_10_1016_j_jfranklin_2018_01_020 crossref_primary_10_1049_iet_cta_2018_5167 crossref_primary_10_1109_TCYB_2018_2805717 crossref_primary_10_1016_j_neucom_2017_08_043 crossref_primary_10_1016_j_neucom_2019_01_099 crossref_primary_10_1007_s13042_017_0703_7 crossref_primary_10_1016_j_ins_2020_06_073 crossref_primary_10_1109_TSMC_2019_2952467 crossref_primary_10_1109_TSMC_2019_2956945 crossref_primary_10_1155_2022_6732343 crossref_primary_10_1016_j_ins_2018_02_051 crossref_primary_10_1016_j_neucom_2018_05_031 crossref_primary_10_1002_asjc_2130 crossref_primary_10_1016_j_automatica_2024_111833 crossref_primary_10_1016_j_jfranklin_2021_04_049 crossref_primary_10_1155_2017_6290646 crossref_primary_10_12677_dsc_2024_132008 crossref_primary_10_1049_iet_cta_2016_1279 crossref_primary_10_1049_iet_cta_2020_0219 crossref_primary_10_1016_j_sysconle_2017_07_004 crossref_primary_10_1109_COMST_2022_3187531 crossref_primary_10_3390_s23062904 crossref_primary_10_1016_j_inffus_2016_12_005 crossref_primary_10_1016_j_ins_2023_119032 crossref_primary_10_1016_j_jfranklin_2019_09_006 crossref_primary_10_1080_23335777_2021_1916230 crossref_primary_10_1016_j_isatra_2018_07_018 crossref_primary_10_1109_TAC_2020_2989773 crossref_primary_10_1109_TSMC_2016_2629464 |
Cites_doi | 10.1016/j.automatica.2014.04.026 10.1109/TIE.2013.2281157 10.1109/TAC.2002.800668 10.1016/j.automatica.2013.10.005 10.1016/j.automatica.2014.10.026 10.1109/TIE.2011.2107720 10.1007/978-3-642-00602-9_3 10.1016/j.automatica.2014.03.015 10.1016/j.sysconle.2014.08.013 10.1016/S0005-1098(00)00164-3 10.1080/03081079.2014.973732 10.1080/00207721.2013.775390 10.1109/TAC.2013.2256015 10.1109/TW.2013.072313.122083 10.1109/TCST.2011.2160543 10.1049/iet-cta.2014.1087 10.1049/iet-cta.2014.1055 10.1016/j.automatica.2012.11.010 10.1080/00207721.2010.550402 10.1016/j.automatica.2013.03.002 10.1016/j.automatica.2015.09.037 10.1016/j.automatica.2012.08.042 10.1109/TAC.2014.2357113 10.1016/j.neucom.2015.10.019 10.1109/TAC.2011.2174696 10.1080/00207179.2012.756149 10.1109/TII.2005.844422 10.1109/TAC.2013.2279896 10.1016/j.dsp.2009.06.011 10.1109/TAC.2010.2042980 10.1109/TAC.2010.2041987 10.1109/TAC.2007.904277 |
ContentType | Journal Article |
Copyright | The Institution of Engineering and Technology 2021 The Authors. IET Control Theory & Applications published by John Wiley & Sons, Ltd. on behalf of The Institution of Engineering and Technology |
Copyright_xml | – notice: The Institution of Engineering and Technology – notice: 2021 The Authors. IET Control Theory & Applications published by John Wiley & Sons, Ltd. on behalf of The Institution of Engineering and Technology |
DBID | AAYXX CITATION 7SC 7SP 8FD F28 FR3 JQ2 L7M L~C L~D |
DOI | 10.1049/iet-cta.2016.0135 |
DatabaseName | CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ANTE: Abstracts in New Technology & Engineering Engineering Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Engineering Research Database Advanced Technologies Database with Aerospace ANTE: Abstracts in New Technology & Engineering Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Technology Research Database CrossRef |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1751-8652 |
EndPage | 1815 |
ExternalDocumentID | 10_1049_iet_cta_2016_0135 CTH2BF01453 |
Genre | article |
GrantInformation_xml | – fundername: Program for Capability Construction of Shanghai Provincial Universities funderid: 15550502500 – fundername: National Natural Science Foundation of China funderid: 61329301; 61573246; 61374039 – fundername: Alexander von Humboldt Foundation of Germany – fundername: Royal Society of the UK – fundername: Shanghai Rising‐Star Programme of China funderid: 16QA1403000 |
GroupedDBID | 0R 24P 29I 4IJ 5GY 6IK 8VB AAJGR ABPTK ACGFS ACIWK AENEX ALMA_UNASSIGNED_HOLDINGS BFFAM CS3 DU5 ESX HZ IFIPE IPLJI JAVBF LAI LOTEE LXI M43 MS NADUK NXXTH O9- OCL QWB RIE RNS RUI U5U UNMZH UNR ZL0 ZZ .DC 0R~ 0ZK 1OC 3V. 4.4 8FE 8FG 96U AAHHS AAHJG ABJCF ABQXS ABUWG ACCFJ ACCMX ACESK ACXQS ADEYR AEEZP AEGXH AEQDE AFAZI AFKRA AIWBW AJBDE ALUQN ARAPS AVUZU AZQEC BENPR BGLVJ BPHCQ CCPQU DWQXO EBS EJD F8P GNUQQ GOZPB GROUPED_DOAJ GRPMH HCIFZ HZ~ IAO ITC K1G K6V K7- L6V M0N M7S MCNEO MS~ OK1 P62 PQQKQ PROAC PTHSS ROL ~ZZ AAYXX CITATION IDLOA IGS PHGZM PHGZT 7SC 7SP 8FD AAMMB AEFGJ AGXDD AIDQK AIDYY F28 FR3 JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c4013-7dd0ab887177a96a420ca412583705aad9cb6c7cb854de6bb5a964e806c931553 |
IEDL.DBID | IDLOA |
ISSN | 1751-8644 |
IngestDate | Fri Jul 11 08:00:20 EDT 2025 Tue Jul 01 05:13:42 EDT 2025 Thu Apr 24 23:04:16 EDT 2025 Wed Jan 22 16:32:19 EST 2025 Tue Jan 05 21:46:02 EST 2021 Thu May 09 20:03:24 EDT 2019 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 15 |
Keywords | stochastic analysis techniques multiplicative noises discrete time systems probability measurement signal Bernoulli distributed white sequences control system synthesis event-based security control problem deception attacks event-triggered mechanism nonlinear constraints feedback closed loop systems sufficient conditions attack model linear matrix inequalities output feedback controller design stochastic systems DoS attacks conditional probability discrete-time stochastic systems denial-of-service attacks closed-loop system mean-square security domain |
Language | English |
License | http://onlinelibrary.wiley.com/termsAndConditions#vor |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c4013-7dd0ab887177a96a420ca412583705aad9cb6c7cb854de6bb5a964e806c931553 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 |
PQID | 1845817655 |
PQPubID | 23500 |
PageCount | 8 |
ParticipantIDs | crossref_citationtrail_10_1049_iet_cta_2016_0135 wiley_primary_10_1049_iet_cta_2016_0135_CTH2BF01453 iet_journals_10_1049_iet_cta_2016_0135 crossref_primary_10_1049_iet_cta_2016_0135 proquest_miscellaneous_1845817655 |
ProviderPackageCode | RUI CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2016-10-10 |
PublicationDateYYYYMMDD | 2016-10-10 |
PublicationDate_xml | – month: 10 year: 2016 text: 2016-10-10 day: 10 |
PublicationDecade | 2010 |
PublicationTitle | IET control theory & applications |
PublicationYear | 2016 |
Publisher | The Institution of Engineering and Technology |
Publisher_xml | – name: The Institution of Engineering and Technology |
References | Yang, Z.; Shi, X.; Chen, J. (C6) 2014; 61 Chen, J.; Li, J.; Lai, T.H. (C27) 2013; 12 Peng, C.; Han, Q.-L. (C24) 2013; 58 Hu, J.; Wang, Z.; Shen, B. (C1) 2013; 86 Tabuada, P. (C20) 2007; 52 Wei, G.; Wang, L.; Liu, Y. (C22) 2015; 9 Hou, T.; Zhang, W.; Ma, H. (C2) 2010; 55 Caballero-Aguila, R.; Hermoso-Carazo, A.; Jimenez-Lopez, J.D. (C7) 2010; 20 Fan, Y.; Feng, G.; Wang, Y. (C15) 2013; 49 Chen, B.; Zhang, W.-A.; Yu, L. (C12) 2015; 60 Liu, S.; Wei, G.; Song, Y. (C11) 2016; 174 Meng, X.; Chen, T. (C17) 2013; 49 Gershon, E.; Shaked, U.; Yaesh, I. (C4) 2001; 37 Wen, S.; Zeng, Z.; Huang, T. (C3) 2015; 46 Pang, Z.-H.; Liu, G.-P. (C32) 2012; 20 Seyboth, G.S.; Dimarogonas, D.V.; Johansson, K.H. (C14) 2013; 49 Anta, A.; Tabuada, P. (C25) 2010; 55 Cao, M.; Xiao, F.; Wang, L. (C18) 2014; 74 Liang, J.; Shen, B.; Dong, H. (C13) 2011; 42 Donkers, M.C.F.; Heemels, W.P.M.H. (C19) 2012; 57 Zhang, J.; Feng, G. (C21) 2014; 50 Zhu, M.; Martinez, S. (C35) 2014; 59 Long, M.; Wu, C.-H.; Hung, J.Y. (C31) 2005; 1 Ding, D.; Wang, Z.; Shen, B. (C16) 2015; 62 Li, H.; Shi, Y. (C23) 2014; 50 Yang, F.; Wang, Z.; Hung, Y.S. (C5) 2002; 47 Dong, H.; Wang, Z.; Ding, S.X. (C10) 2014; 50 Ding, D.; Wang, Z.; Alsaadi, F.E. (C8) 2015; 44 Shi, D.; Chen, T.; Shi, L. (C26) 2014; 50 Zhang, H.; Shi, Y.; Mehr, A. (C37) 2011; 58 Ding, D.; Wang, Z.; Shen, B. (C9) 2015; 9 2010; 55 2013; 49 2013; 86 2009 2007; 52 2011; 58 2015; 9 2012; 57 2014; 61 2015; 46 2002; 47 2010; 20 2013; 58 2015; 60 2015; 62 2013; 12 2015; 44 2011; 42 2014; 59 2001; 37 2005; 1 2014; 74 2014; 50 2016; 174 2012; 20 e_1_2_7_6_1 e_1_2_7_5_1 e_1_2_7_4_1 e_1_2_7_3_1 e_1_2_7_9_1 e_1_2_7_8_1 e_1_2_7_7_1 e_1_2_7_19_1 e_1_2_7_18_1 e_1_2_7_17_1 e_1_2_7_16_1 e_1_2_7_2_1 e_1_2_7_15_1 e_1_2_7_14_1 e_1_2_7_13_1 Löfberg J. (e_1_2_7_39_1) e_1_2_7_12_1 e_1_2_7_11_1 e_1_2_7_10_1 e_1_2_7_26_1 e_1_2_7_27_1 e_1_2_7_28_1 Befekadu G.K. (e_1_2_7_31_1) Teixeira A. (e_1_2_7_34_1) Clark A. (e_1_2_7_29_1) e_1_2_7_25_1 Mo Y. (e_1_2_7_35_1) e_1_2_7_24_1 e_1_2_7_32_1 e_1_2_7_23_1 e_1_2_7_33_1 e_1_2_7_22_1 e_1_2_7_21_1 e_1_2_7_20_1 e_1_2_7_36_1 Foroush H. (e_1_2_7_30_1) e_1_2_7_37_1 e_1_2_7_38_1 |
References_xml | – volume: 60 start-page: 1398 issue: 5 year: 2015 end-page: 1403 ident: C12 article-title: Distributed fusion estimation with communication bandwidth constraints publication-title: IEEE Trans. Autom. Control – volume: 55 start-page: 1185 issue: 5 year: 2010 end-page: 1191 ident: C2 article-title: Finite horizon control for discrete-time stochastic systems with Markovian jumps and multiplicative noise publication-title: IEEE Trans. Autom. Control – volume: 12 start-page: 4742 issue: 9 year: 2013 end-page: 4755 ident: C27 article-title: Energy-efficient intrusion detection with a barrier of probabilistic sensors: global and local publication-title: IEEE Trans. Wirel. Commun. – volume: 20 start-page: 528 issue: 2 year: 2010 end-page: 540 ident: C7 article-title: Signal estimation with multiple delayed sensors using covariance information publication-title: Digit. Signal Process. – volume: 52 start-page: 1680 issue: 9 year: 2007 end-page: 1685 ident: C20 article-title: Event-triggered real-time scheduling of stabilizing control tasks publication-title: IEEE Trans. Autom. Control – volume: 49 start-page: 245 issue: 1 year: 2013 end-page: 252 ident: C14 article-title: Event-based broadcasting for multi-agent average consensus publication-title: Automatica – volume: 57 start-page: 1362 issue: 6 year: 2012 end-page: 1367 ident: C19 article-title: Output-based event-triggered control with guaranteed -gain and improved and decentralized event triggering publication-title: IEEE Trans. Autom. Control – volume: 61 start-page: 3459 issue: 7 year: 2014 end-page: 3468 ident: C6 article-title: Optimal coordination of mobile sensors for target tracking under additive and multiplicative noises publication-title: IEEE Trans. Ind. Electron. – volume: 59 start-page: 804 issue: 3 year: 2014 end-page: 808 ident: C35 article-title: On the performance analysis of resilient networked control systems under replay attacks publication-title: IEEE Trans. Autom. Control – volume: 74 start-page: 90 year: 2014 end-page: 97 ident: C18 article-title: Second-order leader-following consensus based on time and event hybrid-driven control publication-title: Syst. Control Lett. – volume: 46 start-page: 159 issue: 1 year: 2015 end-page: 169 ident: C3 article-title: Observer-based fuzzy control for discrete-time Takagi–Sugeno fuzzy mixed delay systems with random packet losses and multiplicative noises publication-title: Int. J. Syst. Sci. – volume: 49 start-page: 2125 issue: 7 year: 2013 end-page: 2132 ident: C17 article-title: Event based agreement protocols for multi-agent networks publication-title: Automatica – volume: 9 start-page: 1948 issue: 13 year: 2015 end-page: 1955 ident: C9 article-title: Event-triggered distributed state estimation with packet dropouts through sensor networks publication-title: IET Control Theory Appl. – volume: 86 start-page: 650 issue: 4 year: 2013 end-page: 663 ident: C1 article-title: Quantised recursive filtering for a class of nonlinear systems with multiplicative noises and missing measurements publication-title: Int. J. Control – volume: 42 start-page: 1459 issue: 9 year: 2011 end-page: 1471 ident: C13 article-title: Robust distributed state estimation for sensor networks with multiple stochastic communication delays publication-title: Int. J. Syst. Sci. – volume: 62 start-page: 284 year: 2015 end-page: 291 ident: C16 article-title: Event-triggered consensus control for discrete-time stochastic multi-agent systems: The input-to-state stability in probability publication-title: Automatica – volume: 174 start-page: 897 year: 2016 end-page: 905 ident: C11 article-title: Error-constrained reliable tracking control for discrete time-varying systems subject to quantization effects publication-title: Neurocomputing – volume: 55 start-page: 2030 issue: 9 year: 2010 end-page: 2042 ident: C25 article-title: To sample or not to sample self-triggered control for nonlinear systems publication-title: IEEE Trans. Autom. Control – volume: 58 start-page: 2620 issue: 10 year: 2013 end-page: 2626 ident: C24 article-title: A novel event-triggered transmission scheme and control Co-design for sampled-data control systems publication-title: IEEE Trans. Autom. Control – volume: 58 start-page: 5396 issue: 12 year: 2011 end-page: 5405 ident: C37 article-title: Robust static output feedback control and remote PID design for networked motor systems publication-title: IEEE Trans. Ind. Electron. – volume: 47 start-page: 1179 issue: 7 year: 2002 end-page: 1183 ident: C5 article-title: Robust Kalman filtering for discrete time-varying uncertain systems with multiplicative noises publication-title: IEEE Transactions on Automatic Control – volume: 44 start-page: 198 issue: 2 year: 2015 end-page: 211 ident: C8 article-title: Receding horizon filtering for a class of discrete time-varying nonlinear systems with multiple missing measurements publication-title: Int. J. General Syst. – volume: 50 start-page: 247 issue: 1 year: 2014 end-page: 254 ident: C26 article-title: Event-triggered maximum likelihood state estimation publication-title: Automatica – volume: 49 start-page: 671 issue: 2 year: 2013 end-page: 675 ident: C15 article-title: Distributed event-triggered control of multi-agent systems with combinational measurements publication-title: Automatica – volume: 50 start-page: 1507 issue: 5 year: 2014 end-page: 1513 ident: C23 article-title: Event-triggered robust model predictive control of continuous-time nonlinear systems publication-title: Automatica – volume: 20 start-page: 1334 issue: 5 year: 2012 end-page: 1342 ident: C32 article-title: Design and implementation of secure networked predictive control systems under deception attacks publication-title: IEEE Trans. Control Syst. Technol. – volume: 37 start-page: 409 issue: 3 year: 2001 end-page: 417 ident: C4 article-title: control and filtering of discrete-time stochastic systems with multiplicative noise publication-title: Automatica – volume: 50 start-page: 1852 issue: 7 year: 2014 end-page: 1859 ident: C21 article-title: Event-driven observer-based output feedback control for linear systems publication-title: Automatica – volume: 9 start-page: 2057 issue: 14 year: 2015 end-page: 2065 ident: C22 article-title: control for a class of multi-agent systems via a stochastic sampled-data method publication-title: IET Control Theory Appl. – volume: 1 start-page: 85 issue: 2 year: 2005 end-page: 96 ident: C31 article-title: Denial of service attacks on network-based control systems: impact and mitigation publication-title: IEEE Trans. Ind. Inf. – volume: 50 start-page: 3182 issue: 12 year: 2014 end-page: 3189 ident: C10 article-title: Finite-horizon estimation of randomly occurring faults for a class of nonlinear time-varying systems publication-title: Automatica – volume: 58 start-page: 5396 issue: 12 year: 2011 end-page: 5405 article-title: Robust static output feedback control and remote PID design for networked motor systems publication-title: IEEE Trans. Ind. Electron. – volume: 9 start-page: 1948 issue: 13 year: 2015 end-page: 1955 article-title: Event‐triggered distributed state estimation with packet dropouts through sensor networks publication-title: IET Control Theory Appl. – volume: 60 start-page: 1398 issue: 5 year: 2015 end-page: 1403 article-title: Distributed fusion estimation with communication bandwidth constraints publication-title: IEEE Trans. Autom. Control – start-page: 2551 end-page: 2256 – volume: 49 start-page: 671 issue: 2 year: 2013 end-page: 675 article-title: Distributed event‐triggered control of multi‐agent systems with combinational measurements publication-title: Automatica – volume: 50 start-page: 247 issue: 1 year: 2014 end-page: 254 article-title: Event‐triggered maximum likelihood state estimation publication-title: Automatica – volume: 12 start-page: 4742 issue: 9 year: 2013 end-page: 4755 article-title: Energy‐efficient intrusion detection with a barrier of probabilistic sensors: global and local publication-title: IEEE Trans. Wirel. Commun. – volume: 55 start-page: 1185 issue: 5 year: 2010 end-page: 1191 article-title: Finite horizon control for discrete‐time stochastic systems with Markovian jumps and multiplicative noise publication-title: IEEE Trans. Autom. Control – start-page: 1814 end-page: 1821 – volume: 20 start-page: 1334 issue: 5 year: 2012 end-page: 1342 article-title: Design and implementation of secure networked predictive control systems under deception attacks publication-title: IEEE Trans. Control Syst. Technol. – volume: 52 start-page: 1680 issue: 9 year: 2007 end-page: 1685 article-title: Event‐triggered real‐time scheduling of stabilizing control tasks publication-title: IEEE Trans. Autom. Control – volume: 62 start-page: 284 year: 2015 end-page: 291 article-title: Event‐triggered consensus control for discrete‐time stochastic multi‐agent systems: The input‐to‐state stability in probability publication-title: Automatica – volume: 46 start-page: 159 issue: 1 year: 2015 end-page: 169 article-title: Observer‐based fuzzy control for discrete‐time Takagi–Sugeno fuzzy mixed delay systems with random packet losses and multiplicative noises publication-title: Int. J. Syst. Sci. – volume: 37 start-page: 409 issue: 3 year: 2001 end-page: 417 article-title: control and filtering of discrete‐time stochastic systems with multiplicative noise publication-title: Automatica – volume: 59 start-page: 804 issue: 3 year: 2014 end-page: 808 article-title: On the performance analysis of resilient networked control systems under replay attacks publication-title: IEEE Trans. Autom. Control – start-page: 911 end-page: 918 – volume: 74 start-page: 90 year: 2014 end-page: 97 article-title: Second‐order leader‐following consensus based on time and event hybrid‐driven control publication-title: Syst. Control Lett. – volume: 47 start-page: 1179 issue: 7 year: 2002 end-page: 1183 article-title: Robust Kalman filtering for discrete time‐varying uncertain systems with multiplicative noises publication-title: IEEE Transactions on Automatic Control – volume: 49 start-page: 245 issue: 1 year: 2013 end-page: 252 article-title: Event‐based broadcasting for multi‐agent average consensus publication-title: Automatica – volume: 1 start-page: 85 issue: 2 year: 2005 end-page: 96 article-title: Denial of service attacks on network‐based control systems: impact and mitigation publication-title: IEEE Trans. Ind. Inf. – volume: 50 start-page: 3182 issue: 12 year: 2014 end-page: 3189 article-title: Finite‐horizon estimation of randomly occurring faults for a class of nonlinear time‐varying systems publication-title: Automatica – volume: 42 start-page: 1459 issue: 9 year: 2011 end-page: 1471 article-title: Robust distributed state estimation for sensor networks with multiple stochastic communication delays publication-title: Int. J. Syst. Sci. – volume: 49 start-page: 2125 issue: 7 year: 2013 end-page: 2132 article-title: Event based agreement protocols for multi‐agent networks publication-title: Automatica – start-page: 643 end-page: 648 – start-page: 3690 end-page: 3696 – volume: 86 start-page: 650 issue: 4 year: 2013 end-page: 663 article-title: Quantised recursive filtering for a class of nonlinear systems with multiplicative noises and missing measurements publication-title: Int. J. Control – volume: 58 start-page: 2620 issue: 10 year: 2013 end-page: 2626 article-title: A novel event‐triggered transmission scheme and control Co‐design for sampled‐data control systems publication-title: IEEE Trans. Autom. Control – volume: 9 start-page: 2057 issue: 14 year: 2015 end-page: 2065 article-title: control for a class of multi‐agent systems via a stochastic sampled‐data method publication-title: IET Control Theory Appl. – volume: 44 start-page: 198 issue: 2 year: 2015 end-page: 211 article-title: Receding horizon filtering for a class of discrete time‐varying nonlinear systems with multiple missing measurements publication-title: Int. J. General Syst. – start-page: 31 year: 2009 end-page: 45 article-title: Safe and secure networked control systems under denial‐of‐service attacks – volume: 20 start-page: 528 issue: 2 year: 2010 end-page: 540 article-title: Signal estimation with multiple delayed sensors using covariance information publication-title: Digit. Signal Process. – volume: 50 start-page: 1507 issue: 5 year: 2014 end-page: 1513 article-title: Event‐triggered robust model predictive control of continuous‐time nonlinear systems publication-title: Automatica – start-page: 284 end-page: 289 – volume: 55 start-page: 2030 issue: 9 year: 2010 end-page: 2042 article-title: To sample or not to sample self‐triggered control for nonlinear systems publication-title: IEEE Trans. Autom. Control – volume: 174 start-page: 897 year: 2016 end-page: 905 article-title: Error‐constrained reliable tracking control for discrete time‐varying systems subject to quantization effects publication-title: Neurocomputing – volume: 57 start-page: 1362 issue: 6 year: 2012 end-page: 1367 article-title: Output‐based event‐triggered control with guaranteed ‐gain and improved and decentralized event triggering publication-title: IEEE Trans. Autom. Control – volume: 50 start-page: 1852 issue: 7 year: 2014 end-page: 1859 article-title: Event‐driven observer‐based output feedback control for linear systems publication-title: Automatica – volume: 61 start-page: 3459 issue: 7 year: 2014 end-page: 3468 article-title: Optimal coordination of mobile sensors for target tracking under additive and multiplicative noises publication-title: IEEE Trans. Ind. Electron. – ident: e_1_2_7_22_1 doi: 10.1016/j.automatica.2014.04.026 – ident: e_1_2_7_7_1 doi: 10.1109/TIE.2013.2281157 – ident: e_1_2_7_6_1 doi: 10.1109/TAC.2002.800668 – ident: e_1_2_7_27_1 doi: 10.1016/j.automatica.2013.10.005 – ident: e_1_2_7_11_1 doi: 10.1016/j.automatica.2014.10.026 – ident: e_1_2_7_38_1 doi: 10.1109/TIE.2011.2107720 – start-page: 2551 volume-title: IEEE 51st Annual Conf. on Decision and Control (CDC) ident: e_1_2_7_30_1 – ident: e_1_2_7_37_1 doi: 10.1007/978-3-642-00602-9_3 – ident: e_1_2_7_24_1 doi: 10.1016/j.automatica.2014.03.015 – ident: e_1_2_7_19_1 doi: 10.1016/j.sysconle.2014.08.013 – ident: e_1_2_7_5_1 doi: 10.1016/S0005-1098(00)00164-3 – ident: e_1_2_7_9_1 doi: 10.1080/03081079.2014.973732 – start-page: 3690 volume-title: American Control Conf. (ACC) ident: e_1_2_7_34_1 – ident: e_1_2_7_4_1 doi: 10.1080/00207721.2013.775390 – start-page: 643 volume-title: American Control Conf. (ACC) ident: e_1_2_7_31_1 – ident: e_1_2_7_25_1 doi: 10.1109/TAC.2013.2256015 – ident: e_1_2_7_28_1 doi: 10.1109/TW.2013.072313.122083 – ident: e_1_2_7_33_1 doi: 10.1109/TCST.2011.2160543 – ident: e_1_2_7_23_1 doi: 10.1049/iet-cta.2014.1087 – ident: e_1_2_7_10_1 doi: 10.1049/iet-cta.2014.1055 – ident: e_1_2_7_16_1 doi: 10.1016/j.automatica.2012.11.010 – start-page: 1814 volume-title: Proc. 50th Annual Allerton Conf. on Communication, Control, and Computing ident: e_1_2_7_29_1 – ident: e_1_2_7_14_1 doi: 10.1080/00207721.2010.550402 – ident: e_1_2_7_18_1 doi: 10.1016/j.automatica.2013.03.002 – ident: e_1_2_7_17_1 doi: 10.1016/j.automatica.2015.09.037 – ident: e_1_2_7_15_1 doi: 10.1016/j.automatica.2012.08.042 – ident: e_1_2_7_13_1 doi: 10.1109/TAC.2014.2357113 – ident: e_1_2_7_12_1 doi: 10.1016/j.neucom.2015.10.019 – ident: e_1_2_7_20_1 doi: 10.1109/TAC.2011.2174696 – ident: e_1_2_7_2_1 doi: 10.1080/00207179.2012.756149 – ident: e_1_2_7_32_1 doi: 10.1109/TII.2005.844422 – ident: e_1_2_7_36_1 doi: 10.1109/TAC.2013.2279896 – start-page: 911 volume-title: Proc. 47th Annual Allerton Conf. on Communication, Control, and Computing ident: e_1_2_7_35_1 – ident: e_1_2_7_8_1 doi: 10.1016/j.dsp.2009.06.011 – ident: e_1_2_7_26_1 doi: 10.1109/TAC.2010.2042980 – ident: e_1_2_7_3_1 doi: 10.1109/TAC.2010.2041987 – start-page: 284 volume-title: IEEE Int. Symp. on Computer Aided Control Systems Design ident: e_1_2_7_39_1 – ident: e_1_2_7_21_1 doi: 10.1109/TAC.2007.904277 |
SSID | ssj0055645 |
Score | 2.551537 |
Snippet | This study is concerned with the event-based security control problem for a class of discrete-time stochastic systems with multiplicative noises subject to... This study is concerned with the event‐based security control problem for a class of discrete‐time stochastic systems with multiplicative noises subject to... |
SourceID | proquest crossref wiley iet |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 1808 |
SubjectTerms | attack model Bernoulli distributed white sequences closed loop systems closed‐loop system conditional probability control system synthesis Control systems Controllers Deception deception attacks Denial of service attacks Design analysis Design engineering discrete time systems discrete‐time stochastic systems DoS attacks event‐based security control problem event‐triggered mechanism feedback linear matrix inequalities mean‐square security domain measurement signal multiplicative noises nonlinear constraints output feedback controller design probability Research Article Security stochastic analysis techniques Stochastic systems sufficient conditions |
SummonAdditionalLinks | – databaseName: Wiley Online Library Open Access dbid: 24P link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8NAEF7aetGD-MT6Iop4EKKbZDebHGtpqYLioYXeln0VBUlLH3d_gr_RX-JMktYWoYLXzewQZnZ2vmR3viHkKlGQRqgwEEiU-cwkyleRCHxNAw0LKoliix-KT89xp8ce-7xfIc15LUzBD7H44YaRke_XGOBKF11IANSCE9_c1DdTpA4K4lsAMrxKNrDEFtsYhOxlvh1zpEvJqyJ54CeQ_RdHm-ndLxUryakKj1dw5zJ6zdNPe4dsl7jRaxSO3iUVl-2RrSU2wX3SauHdxa-PT8xM1puUnem88ja6B_DUwyLcMeBkkMKu8h5AP_OqkKvZKzidJwek1251mx2_7JLgG_w28oW1VGnYKwIhVBorFlKjGOAWpLXhStnU6NgIoxPOrIu15iDFXEJjk0bYNeiQ1LJh5o6I5ywdWGEspQ6SVihSCFZI4CwaWBWZ0NYJnZtHmpJCHDtZvMv8KJulEkwmwaISLSrRonVys5gyKvgz1glf41gZRZN1gpcrgg-trmx2Gz8CcmQHdXIx952EmMGDEJW54Qz0JowngYg5KIpyp_79bqC_E95juQSPjv8164Rs4jgmvoCektp0PHNngGim-jxfsd_riu5q priority: 102 providerName: Wiley-Blackwell |
Title | Event-based security control for discrete-time stochastic systems |
URI | http://digital-library.theiet.org/content/journals/10.1049/iet-cta.2016.0135 https://onlinelibrary.wiley.com/doi/abs/10.1049%2Fiet-cta.2016.0135 https://www.proquest.com/docview/1845817655 |
Volume | 10 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3dS8MwED_cfNEH8RPnx6giPghxaZs07eOckykqPkzYW0iTTAXZxG3_v3dr5xzI9K201yPcJblfPu53AGepwTDClcWBxAUTNjXMxCpkOQ9z7FBpnDhaKD48Jp1ncdeTvXl6tHt7oVoZbLbjRrvlvsg8oKvbOA83ShsXBUkQ3zZQgNkxcQiFySUiGlmB1UipMKrC6u31PS2xiplZEnPKNEFShixFIPB9yvmLkoU4VcHPCxD0J5CdRqKbTdgoIWTQLHy-BSt-sA3rP4gFd6DZpmuMjEKUC0ZlibqgvJYeIE4NKBv3EwEzo-LyASJA-2qIsjkoqJ1Hu_B80-62OqwslsAsLZGYco6bHKeMUCmTJUZE3BqB8IXYbaQxLrN5YpXNUymcT_JcopTwKU9sFlPxoD2oDoYDvw-Bd7zvlHWce4xdkcpwzGIcF3HfmdhGrgZ8ZhptSyZxKmjxrqcn2iLTaC6N1tRkTU3WrMHF9y8fBY3GMuFzejdz9DLB0wXB23ZXt7rNuYD-cP0anMz8pnHo0HmIGfjhBPWmQqahSiQqiqcO_bttqL8TXVHWhIwP_tvOQ1ijZwp5IT-C6vhz4o8Ry4zzOlQi8VQvO-oXQkHtqQ |
linkProvider | Institution of Engineering and Technology |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3JTsMwEB1BOQAHxCrKGhDigBRwEjtOjiytWqAVhyJxsxzbFUioRbS98wl8I1_CTJIWKiSQuCZjKxp7_J5jzxuAo0QjjDBpMJAY97lJtK8jGfgZCzKcUEkUW9oottpx455fP4iHGbga58IU-hCTH24UGfl6TQFOP6SLDScnkcwnN_TNkLSDgvgUmYyYhTmO_JzmdsjvxuuxIL2UPC1SBH6C8D8520zPfnQxhU6z-HqKeH6nrzn-1JdhqSSO3nkx0isw43qrsPhNTnANajW6vPjx9k7QZL1BWZrOK6-je8hPPcrCfUWijFZUVt5D7mceNYk1e4Wo82Ad7uu1zmXDL8sk-IY2R760lukMF4tASp3GmofMaI7EhXRthNY2NVlspMkSwa2Ls0ygFXcJi00aUdmgDaj0-j23CZ6zrGulsYw5RK1QphitiOA86lodmdBWgY3do0ypIU6lLJ5VfpbNU4UuU-hRRR5V5NEqnEyavBQCGr8ZH9OzMowGvxkeThk2ax112Tn_MlAvtluFg_HYKQwaOgnRPdcfYb8JF0kgY4EdRfmg_v1t2H8jvKB8CRFt_avVPsw3Oq1bddts32zDAtkQCgZsByrD15HbRXozzPby2fsJ6fTx3w |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8NAEB58gOhBfGJ9RhEPQnST7GaTo9aW1kfxUMHbstndoiBtaevdn-Bv9Jc4k6TVIih4TWaHMDuz821m9xuA40RjGmHSYCAx7nOTaF9HMvAzFmToUEkUW9oo3rXixgO_fhSPM1Ad34Up-CEmP9woMvL1mgK8bzvFfpMTR-azG_lmRNRBQXyGQEbMwjwV_ehcX8jvx8uxILqU_FakCPwEs_-ktJme_1AxlZxm8fUU7vyOXvP0U1-B5RI3ehfFRK_CjOuuwdI3NsF1qNXo7OLH2ztlJusNy850Xnka3UN46tEl3AHiZJSirvIeQj_zpImr2Ss4nYcb8FCvtasNv-yS4BvaG_nSWqYzXCsCKXUaax4yozniFqK1EVrb1GSxkSZLBLcuzjKBUtwlLDZpRF2DNmGu2-u6LfCcZR0rjWXMYdIKZYrBigmcRx2rIxPaCrCxeZQpKcSpk8WLykvZPFVoMoUWVWRRRRatwOlkSL_gz_hN-ISelVE0_E3waEqwWWuravviS0Chr1TgcDx3CmOGCiG663qvqBe9JAlkLFBRlE_q39-G-hvhJV2XENH2v0YdwML9VV3dNls3O7BIIpQDA7YLc6PBq9tDcDPK9nPn_QRyEfEI |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Event-based+security+control+for+discrete-time+stochastic+systems&rft.jtitle=IET+control+theory+%26+applications&rft.au=Ding%2C+Derui&rft.au=Wang%2C+Zidong&rft.au=Wei%2C+Guoliang&rft.au=Alsaadi%2C+Fuad+E&rft.date=2016-10-10&rft.pub=The+Institution+of+Engineering+and+Technology&rft.issn=1751-8644&rft.eissn=1751-8652&rft.volume=10&rft.issue=15&rft.spage=1808&rft.epage=1815&rft_id=info:doi/10.1049%2Fiet-cta.2016.0135&rft.externalDocID=10_1049_iet_cta_2016_0135 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1751-8644&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1751-8644&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1751-8644&client=summon |