首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
In this paper, we investigate the optimal denial-of-service attack scheduling problems in a multi-sensor case over interference channels. Multiple attackers aim to degrade the performance of remote state estimation under attackers’ energy constraints. The attack decision of one attacker may be affected by the others while all attackers find their own optimal strategies to degrade estimation performance. Consequently, the Markov decision process and Markov cooperative game in two different information scenarios are formulated to study the optimal attack strategies for multiple attackers. Because of the complex computations of the high-dimensional Markov decision process (Markov cooperative game) as well as the limited information for attackers, we propose a value iteration adaptive dynamic programming method to approximate the optimal solution. Moreover, the structural properties of the optimal solution are analyzed. In the Markov cooperative game, the optimal joint attack strategy which admits a Nash equilibrium is studied. Several numerical simulations are provided to illustrate the feasibility and effectiveness of the main results.  相似文献   

2.
This paper investigates the time optimal control and optimal infinite-horizon control for a switched Boolean network. First, the switched Boolean network can be converted into a discrete switched system by using the semi-tensor product of matrices. Second, algorithms for time optimal control and optimal infinite-horizon control of the switched Boolean network are presented. Moreover, constrained optimal infinite-horizon control is studied. Finally, illustrative examples are given to show the efficiency of the obtained results.  相似文献   

3.
To alleviate the restriction of system model on control design, data-driven model-free adaptive control (MFAC) is an excellent alternative to model-based control methods. This paper studies event-triggered data-driven control for switched systems over a vulnerable and resource-constrained network. The system is transformed into an equivalent switched data model through dynamic linearization. Resource constraints and denial of service (DoS) attacks in the network are concerned, and a novel joint anti-attack method including resilient event-triggering mechanism and prediction scheme is presented. Furthermore, new event-triggered MFAC algorithms are proposed. In this scenario, by constructing a Lyapunov functional on tracking error, sufficient conditions to ensure its boundedness are derived. This is the first time in the literature to give a complete solution to data-driven control of switched systems. At last, the validity of new algorithms and theoretical results is confirmed by simulations.  相似文献   

4.
In this paper, we investigate the optimal local sensor decision rule based on non-ideal transmission channels between local sensors and the fusion center for distributed target detection system. The optimality of a likelihood-ratio test (LRT)-based local decision rule at local sensor, which requires only the knowledge of channel statistics instead of instantaneous channel state information (CSI), is established. The coupled local decision rule at each sensor is derived in a closed-form for coherent BPSK and OOK and non-coherent OOK. The iterative person-by-person optimization (PBPO) algorithm is employed to solve the coupled local thresholds. Simulation analysis reveals that the derived thresholds according to the local decision rule are consistent to the exhaustive searching. Furthermore, the detection performance of the system with the proposed optimal local decision rule for different reception modes and modulations is analyzed and compared.  相似文献   

5.
This paper studies the fault-tolerant model-free adaptive control (FT-MFAC) problem for a class of single-input single-output (SISO) nonlinear networked control systems (NCSs) under denial-of-service (DoS) attacks. A novel FT-MFAC framework is established with the consideration of DoS attacks and the sensor fault, in which DoS attacks obeying the Bernoulli distribution randomly happen in the sensor-to-controller channel and the sensor fault is approximated by the radial basis function neural network (RBFNN). Based on the proposed framework, an FT-MFAC algorithm that uses only input/output data is proposed to guarantee that the output tracking error is bounded in the sense of mean square. Finally, the effectiveness of the proposed algorithm is illustrated by a simulation.  相似文献   

6.
Cooperative diversity has been widely used in wireless communication systems since they greatly improves and enhances the quality of service as being virtual antennas without physically placing multiple antennas at the transmitter or the receiver sides. In this paper, we consider the amplify and forward (AF) relay-based communication systems under the influence of Nakagami-m multipath fading channels in both channel links. Several performance metrics are considered in this study, including, the bit error rate (BER), the ergodic channel capacity, and the outage capacity. The obtained expressions are in closed-form and can reduce to the Rayleigh channel model, as a special case. Numerical results are also provided for the obtained expressions and some conclusions are drawn.  相似文献   

7.
This paper investigates the problem of resilient control for cyber-physical systems (CPSs) described by T-S fuzzy models. In the presence of denial-of-service (DoS) attacks, information transmission over the communication network is prevented. Under this circumstance, the traditional control schemes which are proposed based on perfect measurements will be infeasible. To overcome this difficulty, with the utilization of an equivalent switching control method, a novel gain-switched observer-based resilient control scheme is proposed. According to whether the DoS attack is activated, two different controller synthesis conditions are given by combining the information of the tolerable DoS attacks. In addition, a quantitative relationship between the resilience against DoS attacks and the obtained disturbance attenuation level is revealed, which is helpful for balancing the tradeoff between the abilities to tolerate DoS attacks and attenuate the influence of external disturbance. Finally, simulation results are provided to verify the effectiveness of the proposed switching control scheme.  相似文献   

8.
In this study, a dynamic event-triggered control problem is addressed for nonlinear networked control systems (NCSs) subject to denial-of-service (DoS) attacks. Assume that data from the plant to the controller is transmitted via a wireless transmission channel under malicious DoS attacks characterized by frequency and duration properties. On the premise of ensuring the stability and minimum inter-event time (MIET) of the systems, dynamic event-triggered mechanisms (DETMs) are proposed for the hybrid dynamic system to withstand a certain degree of DoS attacks. Three event-triggered schemes are designed for the most existing state-based control systems which further enlarge the inter-event times, and the stabilization conditions of hybrid dynamic system are given. Finally, illustrative examples are provided to verify the effectiveness of the presented theoretical results.  相似文献   

9.
10.
11.
This paper addresses the issue of resilient control in the presence of denial-of-service (DoS) attacks for a class of cyber-physical systems. The primary objective is to design a static output feedback controller and event-triggered condition simultaneously such that the globally exponential stability of the closed-loop system is ensured. Compared with stepwise techniques, the co-design achieves the trade-off between control performance and communication cost. The control co-design process is formulated as a bilinear matrix inequality (BMI) problem, which involves nonlinear terms. A successive convex optimization approach is proposed to solve the BMI problem. Further, we develop a self-triggered communication scheme to reduce the cost caused by continuous event detection. It is shown that the proposed event/self-triggered strategy is Zeno-free and excludes singular triggering. Finally, a numerical example is presented to demonstrate the validity of the proposed method.  相似文献   

12.
利用红外处理芯片BISS0001对红外信号进行处理,并根据节能灯内部电子镇流器工作原理,应用此红外信号实现对灯的工作状态的控制。工作内容主要包括对红外信号接收和处理系统,低压供电和转化控制系统,电子镇流器系统的设计及构建。其中信号处理系统、低压供电和转化控制系统是整个系统的关键。  相似文献   

13.
The distributed event-triggered secure consensus control is discussed for multi-agent systems (MASs) subject to DoS attacks and controller gain variation. In order to reduce unnecessary network traffic in communication channel, a resilient distributed event-triggered scheme is adopted at each agent to decide whether the sampled signal should be transmitted or not. The event-triggered scheme in this paper can be applicable to MASs under denial-of-service (DoS) attacks. We assume the information of DoS attacks, such as the attack period and the consecutive attack duration, can be detected. Under the introduced communication scheme and the occurrence of DoS attacks, a new sufficient condition is achieved which can guarantee the security consensus performance of the established system model. Moreover, the explicit expressions of the triggering matrices and the controller gain are presented. Finally, simulation results are provided to verify the effectiveness of the obtained theoretical results.  相似文献   

14.
This paper studies the event-triggered control for discrete-time switched systems under the influence of denial-of-service (DoS) attacks and output quantization. Firstly, the switching is assumed to be slow enough in the sense of average dwell time, and DoS attacks are assumed to be energy-limited by constraining DoS frequency and DoS duration. Secondly, by designing an event-triggered mechanism which integrates switching, DoS attacks and transmission error, the initial state bound is obtained at a finite time. Then, a novel quantization coding method is designed by introducing a monotonically increasing sequence, which guarantees the unsaturation of the quantizer. On the basis of this, the exponential convergence and Lyapounov stability of the closed-loop system are established. Finally, two-tanks system is illustrated to demonstrate the effectiveness of the theoretical analysis.  相似文献   

15.
This article investigates the defense control problem for sampled-data Takagi-Sugeno (T-S) fuzzy systems with multiple transmission channels against asynchronous denial-of-service (DoS) attacks. Firstly, a new switching security control method is proposed to tolerate the asynchronous DoS attacks that act independently on each channel. Then, based on switching strategy, the resulting augmented sampled-data system can be converted into new switched systems including several stable subsystems and one open-loop subsystem. Besides, by applying the piecewise Lyapunov-Krasovskii (L-K) function method, membership functions (MFs) dependent sufficient conditions are derived to ensure the exponential stability of newly constructed switching systems. Moreover, quantitative relations among the sampling period, the exponential decay rate, and the rate of all channels being fully attacked and not being completely attacked are established. Finally, simulation examples show the effectiveness of the developed defense control approach.  相似文献   

16.
空间通信网中音视频传输的应用层QoS控制与测试方法   总被引:1,自引:0,他引:1  
分析了无线局域网、因特网和Ku频段卫星通信网的互联互通及服务质量(QoS)性能参数,采用视频帧率、分辨率自适应算法,提出了一种空间通信网中音视频传输的应用层QoS控制与测试方法.仿真实验结果表明,该方法提高了网络利用率,并具有良好的QoS自适应帧率调整能力.  相似文献   

17.
In this paper, a theoretical analysis of diversity incorporated Variable Energy Adaptation (VEA) in an Asynchronous Code Division Multiple Access (A-CDMA) system is discussed for Rayleigh, Rician and Nakagami slow fading channels. The adaptation is accomplished by providing the receiver with the capability of measuring the signal energy-to-noise ratio, and controlling the transmitted signal energy by means of a noise-free feedback loop. System parameters such as fading margin, maximum signal-to-noise ratio, and mean transmitter energy gain are derived and plotted for fading channels as a function of the probability of error specification and the probability of unsatisfactory operation. The mean and median probabilities of error are plotted as a function of energy-to-noise ratios for different fading channels. Error probability distribution and density functions are derived and plotted for various signal-fading distributions.  相似文献   

18.
This paper investigates the event-triggered H control problem for network-based Markov jump systems subject to denial-of-service (DoS) attacks. In order to reduce the amount of signal transmission, the event-triggering scheme (ETS) is adopted between sensor and controller. Due to DoS attacks invalidating data over networks, a new switched time-delay Markov jump model with unstable subsystems is developed based on state feedback controller. Then with the help of piecewise Lyapunov-Krasovskii functional method, a set of sufficient conditions incorporating constraints of DoS attacks are provided, which guarantees that the resulting switched time-delay Markov jump system is stochastically stable with a certain H performance. Subsequently, we present criterions to obtain the parameters of state feedback gain and ETS. Finally, an example is provided to show the effectiveness of the proposed method.  相似文献   

19.
Novel closed-form expressions for the probability density function and the average output signal-to-noise ratio at the output of a selection combiner in Weibull fading are derived. Using these expressions, the spectral efficiency of a direct sequence code division multiple access system is analytically obtained and performance evaluation results are presented.  相似文献   

20.
In cyber-physical systems (CPS), cyber threats emerge in many ways which can cause significant destruction to the system operation. In wireless CPS, adversaries can block the communications of useful information by channel jamming, incurring the so-called denial of service (DoS) attacks. In this paper, we investigate the problem of optimal jamming attack scheduling against remote state estimation wireless network. Specifically, we consider that two wireless sensors report data to a remote estimator through two wireless communication channels lying in two unoverlapping frequency bands, respectively. Meanwhile, an adversary can select one and only one channel at a time to execute jamming attack. We prove that the optimal attack schedule is continuously launching attack on one channel determined based on the system dynamics matrix. The theoretical results are validated by numerical simulations.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号