메뉴 건너뛰기




Volumn 12, Issue 5, 2016, Pages 1786-1794

Resilient Control of Networked Control System under DoS Attacks: A Unified Game Approach

Author keywords

Denial of service (DoS) attack; game theory; networked control system (NCS); resilient control

Indexed keywords

COMPUTER CRIME; CONTROL SYSTEMS; CONTROL THEORY; GAME THEORY; NETWORKED CONTROL SYSTEMS; STRUCTURAL OPTIMIZATION;

EID: 85012040188     PISSN: 15513203     EISSN: None     Source Type: Journal    
DOI: 10.1109/TII.2016.2542208     Document Type: Article
Times cited : (289)

References (24)
  • 1
    • 70049103826 scopus 로고    scopus 로고
    • Optimal stabilizing gain selection for networked control systems with time delays and packet losses
    • Sep.
    • H. Li, M. Y. Chow, and Z. Sun, "Optimal stabilizing gain selection for networked control systems with time delays and packet losses," IEEE Trans. Control Syst. Technol., vol. 17, no. 5, pp. 1154-1162, Sep. 2009.
    • (2009) IEEE Trans. Control Syst. Technol. , vol.17 , Issue.5 , pp. 1154-1162
    • Li, H.1    Chow, M.Y.2    Sun, Z.3
  • 2
    • 84910032560 scopus 로고    scopus 로고
    • Robust path diversity for network quality of service in cyber-physical systems
    • Nov.
    • K. J. Park, J. Kim, H. Lim, and Y. Eun, "Robust path diversity for network quality of service in cyber-physical systems," IEEE Trans. Ind. Informat., vol. 10, no. 4, pp. 2204-2215, Nov. 2014.
    • (2014) IEEE Trans. Ind. Informat. , vol.10 , Issue.4 , pp. 2204-2215
    • Park, K.J.1    Kim, J.2    Lim, H.3    Eun, Y.4
  • 3
    • 84921502597 scopus 로고    scopus 로고
    • Control-theoretic methods for cyberphysical security: Geometric principles for optimal cross-layer resilient control systems
    • Feb.
    • F. Pasqualetti and F. Dorfler, "Control-theoretic methods for cyberphysical security: Geometric principles for optimal cross-layer resilient control systems," IEEE Control Syst. Mag., vol. 35, no. 1, pp. 110-127, Feb. 2015.
    • (2015) IEEE Control Syst. Mag. , vol.35 , Issue.1 , pp. 110-127
    • Pasqualetti, F.1    Dorfler, F.2
  • 4
    • 84921500356 scopus 로고    scopus 로고
    • Covert misappropriation of networked control systems: Presenting a feedback structure
    • Feb.
    • R. S. Smith, "Covert misappropriation of networked control systems: Presenting a feedback structure," IEEE Control Syst. Mag., vol. 35, no. 1, pp. 82-92, Feb. 2015.
    • (2015) IEEE Control Syst. Mag. , vol.35 , Issue.1 , pp. 82-92
    • Smith, R.S.1
  • 5
    • 84919930769 scopus 로고    scopus 로고
    • Security games for risk minimization in automatic generation control
    • Jan.
    • Y. W. Law, T. Alpcan, and M. Palaniswami, "Security games for risk minimization in automatic generation control," IEEE Trans. Power Syst., vol. 30, no. 1, pp. 223-232, Jan. 2015.
    • (2015) IEEE Trans. Power Syst. , vol.30 , Issue.1 , pp. 223-232
    • Law, Y.W.1    Alpcan, T.2    Palaniswami, M.3
  • 6
    • 84920703223 scopus 로고    scopus 로고
    • A secure control framework for resource-limited adversaries
    • A. Teixeira, I. Shames, H. Sandberg, and K. H. Johansson, "A secure control framework for resource-limited adversaries," Automatica, vol. 51, pp. 135-148, 2015.
    • (2015) Automatica , vol.51 , pp. 135-148
    • Teixeira, A.1    Shames, I.2    Sandberg, H.3    Johansson, K.H.4
  • 7
    • 84922357776 scopus 로고    scopus 로고
    • Resilient control of cyber-physical systems against intelligent attacker: A hierarchal stackelberg game approach
    • Y. Yuan, F. Sun, and H. Liu, "Resilient control of cyber-physical systems against intelligent attacker: A hierarchal stackelberg game approach," Int. J. Syst. Sci., vol. 47, no. 9, pp. 2067-2077, 2015.
    • (2015) Int. J. Syst. Sci. , vol.47 , Issue.9 , pp. 2067-2077
    • Yuan, Y.1    Sun, F.2    Liu, H.3
  • 8
    • 20344364652 scopus 로고    scopus 로고
    • Denial-of-Service attacks on network-based control systems: Impact and mitigation
    • May
    • M. Long, C. H. J. Wu, and J. Y. Hung, "Denial-of-Service attacks on network-based control systems: Impact and mitigation," IEEE Trans. Ind. Informat., vol. 1, no. 2, pp. 85-96, May 2005.
    • (2005) IEEE Trans. Ind. Informat. , vol.1 , Issue.2 , pp. 85-96
    • Long, M.1    Wu, C.H.J.2    Hung, J.Y.3
  • 9
    • 84896803839 scopus 로고    scopus 로고
    • Consesus of discrete-time multiagent with adversaries and time delays
    • Y. Wu, X. He, S. Liu, and L. Xie, "Consesus of discrete-time multiagent with adversaries and time delays," Int. J. Gen. Syst., vol. 43, no. 3, pp. 402-411, 2014.
    • (2014) Int. J. Gen. Syst. , vol.43 , Issue.3 , pp. 402-411
    • Wu, Y.1    He, X.2    Liu, S.3    Xie, L.4
  • 10
    • 84921497384 scopus 로고    scopus 로고
    • Game-theoretic methods for robustness, security, and resilience of cyberphysical control systems: Games-in-games principle for optimal cross-layer resilient control systems
    • Feb.
    • Q. Zhu and T. Basar, "Game-theoretic methods for robustness, security, and resilience of cyberphysical control systems: Games-in-games principle for optimal cross-layer resilient control systems," IEEE Control Syst. Mag., vol. 35, no. 1, pp. 46-65, Feb. 2015.
    • (2015) IEEE Control Syst. Mag. , vol.35 , Issue.1 , pp. 46-65
    • Zhu, Q.1    Basar, T.2
  • 11
    • 84945315428 scopus 로고    scopus 로고
    • Optimal denial-of-service attack scheduling with energy constraint
    • Nov.
    • H. Zhang, P. Cheng. L. Shi, J. M. Chen, "Optimal denial-of-service attack scheduling with energy constraint," IEEE Trans. Autom. Control, vol. 60, no. 11, pp. 3023-3028, Nov. 2015.
    • (2015) IEEE Trans. Autom. Control , vol.60 , Issue.11 , pp. 3023-3028
    • Zhang, H.1    Cheng, P.2    Shi, L.3    Chen, J.M.4
  • 12
    • 84897727324 scopus 로고    scopus 로고
    • On the performance analysis of resilient networked control systems under replay attacks
    • Mar.
    • M. Zhu and S. Martinez, "On the performance analysis of resilient networked control systems under replay attacks," IEEE Trans. Autom. Control, vol. 59, no. 3, pp. 804-808, Mar. 2014.
    • (2014) IEEE Trans. Autom. Control , vol.59 , Issue.3 , pp. 804-808
    • Zhu, M.1    Martinez, S.2
  • 13
    • 84874238591 scopus 로고    scopus 로고
    • Resilient event triggered systems with limited communication
    • L. Li, B. Hu, and M. D. Lemmon, "Resilient event triggered systems with limited communication," in Proc. IEEE Conf. Decis. Control, 2012, pp. 6577-6582.
    • (2012) Proc. IEEE Conf. Decis. Control , pp. 6577-6582
    • Li, L.1    Hu, B.2    Lemmon, M.D.3
  • 15
    • 84930091988 scopus 로고    scopus 로고
    • Data fusion-based resilient control system under DoS attacks: A game theoretic approach
    • Y. Yuan and F. Sun, "Data fusion-based resilient control system under DoS attacks: A game theoretic approach," Int. J. Control Autom. Syst., vol. 13, no. 3, pp. 513-520, 2015.
    • (2015) Int. J. Control Autom. Syst. , vol.13 , Issue.3 , pp. 513-520
    • Yuan, Y.1    Sun, F.2
  • 17
    • 84871258626 scopus 로고    scopus 로고
    • Security of interdependent and identical networked control systems
    • S. Amin, S. A. Galina, and S. S. Galina, "Security of interdependent and identical networked control systems," Automatica, vol. 49, no. 1, pp. 186-192, 2013.
    • (2013) Automatica , vol.49 , Issue.1 , pp. 186-192
    • Amin, S.1    Galina, S.A.2    Galina, S.S.3
  • 18
    • 84864458629 scopus 로고    scopus 로고
    • Low frequency positive real control for delta operator systems
    • H. Yang and Y. Xia, "Low frequency positive real control for delta operator systems," Automatica, vol. 48, no. 8, pp. 1791-1795, 2012.
    • (2012) Automatica , vol.48 , Issue.8 , pp. 1791-1795
    • Yang, H.1    Xia, Y.2
  • 19
    • 69349104256 scopus 로고    scopus 로고
    • Robust sliding-mode control for uncertain time-delay systems based on delta operator
    • Sep.
    • Y. Xia, M. Fu, H. Yang, and G. P. Liu, "Robust sliding-mode control for uncertain time-delay systems based on delta operator," IEEE Trans. Ind. Electron., vol. 56, no. 9, pp. 3646-3655, Sep. 2009.
    • (2009) IEEE Trans. Ind. Electron. , vol.56 , Issue.9 , pp. 3646-3655
    • Xia, Y.1    Fu, M.2    Yang, H.3    Liu, G.P.4
  • 20
    • 85027957809 scopus 로고    scopus 로고
    • Solutions to the inverse LQR problem with application to biologucal systems analysis
    • Mar.
    • M. C. Priess, R. Conway, J. Choi, J. M. Popovich, and C. Radcliffe, "Solutions to the inverse LQR problem with application to biologucal systems analysis," IEEE Trans. Control Syst. Technol., vol. 23, no. 2, pp. 770-777, Mar. 2015.
    • (2015) IEEE Trans. Control Syst. Technol. , vol.23 , Issue.2 , pp. 770-777
    • Priess, M.C.1    Conway, R.2    Choi, J.3    Popovich, J.M.4    Radcliffe, C.5
  • 23
    • 0036779278 scopus 로고    scopus 로고
    • A J-lossless coprime factorisation approach to H8 control in delta domain
    • P. Suchomski, "A J-lossless coprime factorisation approach to H8 control in delta domain," Automatica, vol. 38, no. 10, pp. 1807-1814, 2002.
    • (2002) Automatica , vol.38 , Issue.10 , pp. 1807-1814
    • Suchomski, P.1
  • 24
    • 84856477768 scopus 로고    scopus 로고
    • LQG control for MIMO systems over multiple erasure channels with perfect acknowledgment
    • Feb.
    • E. Garone, B. Sinopoli, A. Goldsmith, and A. Casavola, "LQG control for MIMO systems over multiple erasure channels with perfect acknowledgment," IEEE Trans. Autom. Control, vol. 57, no. 2, pp. 450-456, Feb. 2012.
    • (2012) IEEE Trans. Autom. Control , vol.57 , Issue.2 , pp. 450-456
    • Garone, E.1    Sinopoli, B.2    Goldsmith, A.3    Casavola, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.