共查询到19条相似文献,搜索用时 78 毫秒
1.
本文研究了DoS攻击下网络化控制系统记忆型事件触发预测补偿控制问题. 首先, 由于网络带宽资源有限和系统状态不完全可观测性, 引入了记忆型事件触发函数, 为观测器提供离散事件触发传输方案. 然后, 分析了网络传输通道上发生的DoS攻击. 结合上述记忆型事件触发方案, 在控制节点设计一类新颖的预测控制算法, 节省网络带宽资源并主动补偿DoS攻击. 同时, 建立了基于观测器的记忆型事件触发预测控制的闭环系统, 并且分析稳定性.通过线性矩阵不等式(LMI)和Lyapunov稳定性理论, 建立了控制器、观测器和记忆型事件触发矩阵的联合设计方案,并验证了该方案的可行性. 仿真结果表明, 该方案结合记忆型事件触发机制可以有效补偿DoS攻击, 节约网络带宽资源. 相似文献
2.
针对非线性网络控制系统存在的拒绝服务(DoS)攻击设计一种具有动态事件触发策略的H∞安全控制器.首先,将DoS攻击引起的丢包影响作为触发条件的不确定性,针对这个不确定性以及在静态事件触发中引入一个内部动态参数,设计动态事件触发机制,在此基础上设计具有H∞性能的安全控制器.然后,考虑网络通道中网络诱导时延对系统的影响,建立能够体现时延上下界信息的Lyapunov-Krasovskii泛函,依据Lyapunov稳定性理论、Young’s不等式、Schur补引理、单边Lipschitz条件、二次内有界和动态事件触发条件推导出系统存在安全控制器的条件,继续利用一些特殊导数,将双线性矩阵不等式转化为一组线性矩阵不等式,从而实现触发参数与反馈增益的协同设计,同时保证存在DoS攻击的安全性能.最后,通过一个数值例子验证所提方法的有效性. 相似文献
3.
4.
针对拒绝服务(DoS)攻击下的时变多自主体系统,在有限域内研究事件触发安全一致性问题。在信息传输过程中,拒绝服务攻击同时存在于测量和控制通道中。将拒绝服务攻击看作是驻留时间切换机制,增广系统转化为包含一个稳定子系统和一个不稳定子系统的离散驻留时间切换系统。为提高通信资源利用率,采用状态依赖阈值的事件触发机制来更新控制输入信号。基于多Lyapunov函数方法,以线性矩阵不等式形式给出系统一致指数稳定且具有期望H∞性能的两个充分条件以及可行的控制器增益。仿真实例验证了发生拒绝服务攻击时,多自主体系统仍然可以实现安全一致性。 相似文献
5.
考虑DoS攻击对电力信息物理系统的影响,提出一种电力网络控制系统脆弱节点的检测方法和防御策略,采用分布式控制架构设计传感器和RTU的传输路径.通过求解最稀疏矩阵优化问题,提出一种识别并保护电力通信网脆弱节点和边的方法,保证系统实现安全稳定运行.进一步提出一种可以抵御DoS攻击的电力网络控制系统拓扑设计方法,研究系统遭受DoS攻击时能恢复稳定的电力网络控制系统拓扑连接方式. IEEE 9节点系统用于仿真验证,充分验证了算法的可行性和可靠性,并针对该9节点电力网络控制系统,给出了具体的网络攻击防御策略. 相似文献
6.
针对带宽资源有限、存在系统外部干扰以及参数不确定性的问题,提出了一种基于事件触发的网络化系统非脆弱耗散控制方案。首先,在网络化控制系统(NCS)模型的基础上,提出了一种非周期采样的事件触发方案,并建立一个时滞闭环系统模型;然后,利用锯齿波的结构特点构造新型双边李雅普诺夫泛函;最后,结合杰森不等式、自由权矩阵、凸组合等方法,导出保证系统稳定性的充分条件,并计算出反馈控制器的增益。数值仿真结果证明,所设计的双边泛函比用单边泛函具有更小的保守性,事件触发机制与普通采样机制相比能够节约带宽,且所设计出的控制器具有可行性。 相似文献
7.
针对网络控制系统受欺骗攻击问题,提出了事件触发器与安全控制器协同设计策略。提出了离散事件触发机制,克服了连续事件触发机制需要新增专用硬件且需要复杂计算避免芝诺现象局限。建立了有机融合欺骗攻击、事件触发机制、网络诱导延时及外部扰动多约束参数的闭环系统时滞模型,推导出了欺骗攻击下事件触发控制系统渐近稳定的充分条件,得到了事件触发器与安全控制器的协同设计条件。仿真验证了方法的有效性。 相似文献
8.
9.
网络攻击下信息物理融合电力系统的弹性事件触发控制 总被引:3,自引:0,他引:3
本文将电动汽车(Electric vehicles,EVs)引入到典型的信息物理系统(Cyber-physical systems,CPS)智能电网中,采用负荷频率控制(Load frequency control,LFC)方法,能够快速抑制系统扰动所引发的频率变化.在考虑拒绝服务(Denial-of-Service,DoS)攻击的情况下,提出了一种弹性事件触发机制,使系统能够容忍攻击所造成的数据丢失.与此同时,PI型静态输出反馈控制器的输入按需更新,减少了通信负担.对于建立的闭环时滞系统模型,构造新型李亚普诺夫泛函,对系统进行稳定性分析,推导出系统所能承受的最大DoS攻击持续时间,并对控制器增益和弹性事件触发矩阵进行协同设计.最后,通过多域电力系统仿真,验证了所提出方法的有效性. 相似文献
10.
11.
本 文 研 究 了 一 类 带 有 多 率 采 样 的 线 性 多 智 能 体 系 统(Multiagent Systems, MASs)在 拒 绝 服务(Denial-of-Service, DoS)攻击下的安全一致性控制问题, 其中DoS攻击通常阻断智能体之间的信息传输. 本文将多率采样在网络化控制系统中的结果推广到了多智能体系统, 并考虑了非理想通信网络环境. 首先, 通过引入一个匹配机制来同步由多率采样引起的智能体不同状态分量的采样数据. 然后, 在DoS攻击下, 针对带有多率采样的线性MAS提出了一个基于多率采样的安全一致性控制器. 通过使用李雅普诺夫稳定性理论和切换系统方法, 获得了包含DoS 攻击持续时间以及攻击频率的安全一致性充分条件. 最后, 给出了一个仿真例子来验证所提方法的有效性, 并给出了多率采样与单率采样机制的性能对比分析. 相似文献
12.
This paper investigates the sliding mode control (SMC) problem for a class of discrete-time nonlinear networked Markovian jump systems (MJSs) in the presence of probabilistic denial-of-service (DoS) attacks. The communication network via which the data is propagated is unsafe and the malicious adversary can attack the system during state feedback. By considering random Denial-of-Service attacks, a new sliding mode variable is designed, which takes into account the distribution information of the probabilistic attacks. Then, by resorting to Lyapunov theory and stochastic analysis methods, sufficient conditions are established for the existence of the desired sliding mode controller, guaranteeing both reachability of the designed sliding surface and stability of the resulting sliding motion. Finally, a simulation example is given to demonstrate the effectiveness of the proposed sliding mode control algorithm. 相似文献
13.
14.
Xianggui Guo Dongyu Zhang Jianliang Wang Choon Ki Ahn 《IEEE/CAA Journal of Automatica Sinica》2021,8(10):1644-1656
This paper investigates the event-triggered security consensus problem for nonlinear multi-agent systems (MASs) under denial-of-service (DoS) attacks over an undirected graph. A novel adaptive memory observer-based anti-disturbance control scheme is presented to improve the observer accuracy by adding a buffer for the system output measurements. Meanwhile, this control scheme can also provide more reasonable control signals when DoS attacks occur. To save network resources, an adaptive memory event-triggered mechanism (AMETM) is also proposed and Zeno behavior is excluded. It is worth mentioning that the AMETM’s updates do not require global information. Then, the observer and controller gains are obtained by using the linear matrix inequality (LMI) technique. Finally, simulation examples show the effectiveness of the proposed control scheme. 相似文献
15.
研究了一类具有有界丢包的网络控制系统(Networked control systems,NCSs)的保成本控制问题,提出了一种包含量化反馈的网络控制系统数学模型,该模型将系统的镇定问题转化为镇定一系列子系统的鲁棒控制问题.在对网络控制系统的分析中,区别于常用的二次型Lyapunov函数,本文采用了一种新的且能够降低保守性的量化依赖Lyapunov函数方法.基于本文的Lyapunov函数,得到了充分考虑丢包过程的保成本控制器的设计方法.仿真算例验证了所给出方法的有效性. 相似文献
16.
This paper provides a survey on modeling and theories of networked control systems (NCS). In the first part, modeling of the different types of imperfections that affect NCS is discussed. These imperfections are quantization errors, packet dropouts, variable sampling/transmission intervals, variable transmission delays, and communication constraints. Then follows in the second part a presentation of several theories that have been applied for controlling networked systems. These theories include: input delay system approach, Markovian system approach, switched system approach, stochastic system approach, impulsive system approach, and predictive control approach. In the last part, some advanced issues in NCS including decentralized and distributed NCS, cloud control system, and co-design of NCS are reviewed. 相似文献
17.
Yuanqing Xia 《IEEE/CAA Journal of Automatica Sinica》2015,2(2):134-142
The concept of cloud control systems is discussed in this paper, which is an extension of networked control systems (NCSs). With the development of internet of things (IOT), the technology of NCSs has played a key role in IOT. At the same time, cloud computing is developed rapidly, which provides a perfect platform for big data processing, controller design and performance assessment. The research on cloud control systems will give new contribution to the control theory and applications in the near future. 相似文献
18.
Secure Impulsive Synchronization in Lipschitz-Type Multi-Agent Systems Subject to Deception Attacks 下载免费PDF全文
Wangli He Zekun Mo Qing-Long Han Feng Qian 《IEEE/CAA Journal of Automatica Sinica》2020,7(5):1326-1334
Cyber attacks pose severe threats on synchronization of multi-agent systems. Deception attack, as a typical type of cyber attack, can bypass the surveillance of the attack detection mechanism silently, resulting in a heavy loss. Therefore, the problem of mean-square bounded synchronization in multi-agent systems subject to deception attacks is investigated in this paper. The control signals can be replaced with false data from controller-to-actuator channels or the controller. The success of the attack is measured through a stochastic variable. A distributed impulsive controller using a pinning strategy is redesigned, which ensures that mean-square bounded synchronization is achieved in the presence of deception attacks. Some sufficient conditions are derived, in which upper bounds of the synchronization error are given. Finally, two numerical simulations with symmetric and asymmetric network topologies are given to illustrate the theoretical results. 相似文献
19.
This paper proposes a novel event-driven encrypted control framework for linear networked control systems(NCSs),which relies on two modified uniform quantization policies, the Paillier cryptosystem, and an event-triggered strategy. Due to the fact that only integers can work in the Pailler cryptosystem, both the real-valued control gain and system state need to be first quantized before encryption. This is dramatically different from the existing quantized control methods, where only the quantiz... 相似文献