Stability analysis of token-based wireless networked control systems under deception attacks
DOI10.1016/j.ins.2018.04.085zbMath1448.93270OpenAlexW2801815112WikidataQ58487154 ScholiaQ58487154MaRDI QIDQ2198105
Huosheng Hu, Xue Li, Haikuan Wang, Dajun Du, Changda Zhang, Tai Cheng Yang
Publication date: 9 September 2020
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: http://repository.essex.ac.uk/21955/1/1-s2.0-S0020025518303554-main.pdf
Kalman filterswitched systemsdeception attackswireless networked control systemstoken-based protocol
Filtering in stochastic control theory (93E11) Control/observation systems involving computers (process control, etc.) (93C83) Control/observation systems governed by functional relations other than differential equations (such as hybrid and switching systems) (93C30) Exponential stability (93D23) Networked control (93B70)
Related Items (17)
Cites Work
- Decentralized networked control of systems with local networks: a time-delay approach
- Network-based \(H_\infty\) filtering using a logic jumping-like trigger
- Distributed event-triggered \(H_\infty\) filtering over sensor networks with communication delays
- State estimation under false data injection attacks: security analysis and system protection
- Multiple event-triggered \(H_{2}/H_{\infty}\) filtering for hybrid wired-wireless networked systems with random network-induced delays
- Quantized control of distributed event-triggered networked control systems with hybrid wired-wireless networks communication constraints
- Network-based leader-following consensus for distributed multi-agent systems
- On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks
- Input-to-State Stabilizing Control Under Denial-of-Service
- On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds
- Optimal Linear Cyber-Attack on Remote State Estimation
This page was built for publication: Stability analysis of token-based wireless networked control systems under deception attacks