...
首页> 外文期刊>Information Sciences: An International Journal >Stability analysis of token-based wireless networked control systems under deception attacks
【24h】

Stability analysis of token-based wireless networked control systems under deception attacks

机译:欺骗攻击下令牌的无线网络控制系统的稳定性分析

获取原文
获取原文并翻译 | 示例
           

摘要

Currently cyber-security has attracted a lot of attention, in particular in wireless industrial control networks (W1CNs). In this paper, the stability of wireless networked control systems (WNCSs) under deception attacks is studied with a token-based protocol applied to the data link layer (DLL) of WICNS. Since deception attacks cause the stability problem of WNCSs by changing the data transmitted over wireless network, it is important to detect deception attacks, discard the injected false data and compensate for the missing data (i.e., the discarded original data with the injected false data). The main contributions of this paper are: (1) With respect to the character of the token-based protocol, a switched system model is developed. Different from the traditional switched system where the number of subsystems is fixed, in our new model this number will be changed under deception attacks. (2) For this model, a new Kalman filter (KF) is developed for the purpose of attack detection and the missing data reconstruction. (3) For the given linear feedback WNCSs, when the noise level is below a threshold derived in this paper, the maximum allowable duration of deception attacks is obtained to maintain the exponential stability of the system. Finally, a numerical example based on a linearized model of an inverted pendulum is provided to demonstrate the proposed design. (C) 2018 Elsevier Inc. All rights reserved.
机译:目前网络安全引起了很多关注,特别是在无线工业控制网络(W1CNS)中。在本文中,利用应用于WiCNS的数据链路层(DLL)的基于基于令牌的协议来研究无线网络控制系统(WNCS)的稳定性。由于欺骗攻击使WNCSSS通过改变通过无线网络传输的数据来引起WNCS的稳定性问题,因此检测欺骗攻击是非常重要的,丢弃注入的假数据并补偿缺失的数据(即,带有注入的错误数据的丢弃的原始数据) 。本文的主要贡献是:(1)关于基于令牌的协议的特征,开发了一个交换系统模型。与传统的交换系统不同,其中子系统的数量是固定的,在我们的新型号中,此数字将在欺骗攻击下更改。 (2)对于该模型,为攻击检测和缺失的数据重建开发了新的卡尔曼滤波器(KF)。 (3)对于给定的线性反馈Wncss,当噪声水平低于本文导出的阈值时,获得了欺骗攻击的最大允许持续时间以维持系统的指数稳定性。最后,提供了一种基于倒立摆的线性化模型的数值示例以展示所提出的设计。 (c)2018年Elsevier Inc.保留所有权利。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号