Category Ranking

98%

Total Visits

921

Avg Visit Duration

2 minutes

Citations

20

Article Abstract

This study proposes an active defense strategy against denial-of-service (DoS) attacks to address the secure event-triggered control of multiarea load frequency control (LFC) systems. A novel interval secure event-triggered mechanism (ISETM) is introduced, integrating event-triggered control with cybersecurity mechanisms under the software defined network (SDN) framework. ISETM generates not only a triggering instant but also a secure triggering interval (STI) simultaneously. The STI sent to the SDN control plane is an estimation time interval generated by the Taylor expansion and model-based prediction method. During this interval, the SDN control plane programs OpenFlow switches to filter attack traffics, ensuring delayed but secure triggering transmission. Under ISETM conditions represented by two systems of inequalities, a multiarea LFC system is modeled as a delay system incorporating a triggering error based on the Taylor expansion. To achieve performance of the established LFC system, a criterion is derived using the Lyapunov-Krasovskii functional method. A codesign approach is provided to solve the proposed ISETM control (ISETC) gains through linear matrix inequality (LMI) techniques. Finally, simulations validate the effectiveness and advantages of our proposed method.

Download full-text PDF

Source
http://dx.doi.org/10.1109/TCYB.2024.3488208DOI Listing

Publication Analysis

Top Keywords

secure event-triggered
12
interval secure
8
event-triggered mechanism
8
load frequency
8
frequency control
8
active defense
8
event-triggered control
8
secure triggering
8
sdn control
8
control plane
8

Similar Publications

This paper investigates the problem of the observer-based resilient event-triggered control for stochastic Markovian jump systems subject to probabilistic cyber attacks, actuator failures, and controller gain variations. The observer is modelled to estimate all state information of the system from measurement outputs, and then the controller is designed using observer states. Besides, probabilistic cyber attacks have a significant negative impact on communication security in networked control systems, potentially leading to a decrease in system stability and performance.

View Article and Find Full Text PDF

Secure set-membership formation of multi-agent systems via an anti-attack control strategy.

ISA Trans

July 2025

The School of Electrical and Mechanical Engineering, University of Adelaide, Adelaide, SA 5005, Australia; The Research and Innovation Centre, Obuda University, Budapest 1034, Hungary. Electronic address:

Secure leader-following formation for multi-agent systems subject to parameter perturbations and saturation constraints is investigated in this article. To capture the variation of attack behaviors across different stages, a more general DoS attack model is developed using a Markov process with time-varying transition probabilities. Then, a memory-based anti-attack scheme is presented for designing the secure observer-based controller, supplying an effective method to weaken the impact of DoS attacks on formation control.

View Article and Find Full Text PDF

This article investigates the discrete-time fuzzy complex networks (FCNs) event-triggered (ET) synchronization control problem by considering the coupling effect and cyber attacks. To prevent data conflicts caused by communication resource limitations, a round-robin (RR) protocol is introduced to regulate the communication transmission order among coupled nodes. To be more general and flexible against Denial-of-Service (DoS) attacks, the concept of average dwelling time ratio (ADTR) is proposed to evaluate DoS attack models.

View Article and Find Full Text PDF

In practical applications, not all nodes in networked swarm systems are cooperative. The noncooperative nodes are transformed from healthy ones because of cyber-attacks launched by malicious adversaries, hardware faults caused by low reliability individuals, or communication delay. In this article, an approximate fault detection method using residual threshold is shown to judge which agent is cooperative or not, and to reconstruct the communication topology.

View Article and Find Full Text PDF

This paper investigates a novel secure control scheme for a particular class of Takagi-Sugeno (TS) fuzzy singular systems susceptible to deception attacks. During these attacks, adversaries can randomly introduce erroneous data into the output and control signals. The proposed strategy addresses the impact of attacks and disturbances using an observer-based sliding mode control (SMC) approach.

View Article and Find Full Text PDF