z-logo
open-access-imgOpen Access
Event‐based security control for discrete‐time stochastic systems
Author(s) -
Ding Derui,
Wang Zidong,
Wei Guoliang,
Alsaadi Fuad E.
Publication year - 2016
Publication title -
iet control theory and applications
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 1.059
H-Index - 108
eISSN - 1751-8652
pISSN - 1751-8644
DOI - 10.1049/iet-cta.2016.0135
Subject(s) - computer science , security domain , control theory (sociology) , controller (irrigation) , security controls , denial of service attack , multiplicative function , event (particle physics) , conditional probability , bernoulli's principle , time domain , multiplicative noise , bernoulli distribution , control (management) , mathematics , transmission (telecommunications) , computer security , random variable , engineering , artificial intelligence , statistics , quantum mechanics , physics , signal transfer function , analog signal , aerospace engineering , mathematical analysis , world wide web , biology , telecommunications , the internet , agronomy , computer vision
This study is concerned with the event‐based security control problem for a class of discrete‐time stochastic systems with multiplicative noises subject to both randomly occurring denial‐of‐service (DoS) attacks and randomly occurring deception attacks. An event‐triggered mechanism is adopted with hope to reduce the communication burden, where the measurement signal is transmitted only when a certain triggering condition is violated. A novel attack model is proposed to reflect the randomly occurring behaviours of the DoS attacks as well as the deception attacks within a unified framework via two sets of Bernoulli distributed white sequences with known conditional probabilities. A new concept of mean‐square security domain is put forward to quantify the security degree. The authors aim to design an output feedback controller such that the closed‐loop system achieves the desired security. By using the stochastic analysis techniques, some sufficient conditions are established to guarantee the desired security requirement and the control gain is obtained by solving some linear matrix inequalities with non‐linear constraints. A simulation example is utilised to illustrate the usefulness of the proposed controller design scheme.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here