A Novel Memory-Based Scheduling Protocol for Networked Control Systems Under Stochastic Attacks and Bandwidth Constraint
نویسندگان
چکیده
Dear Editor, In this letter, a novel memory-based scheduling protocol (MBSP) is investigated for networked control systems (NCSs) under bandwidth constraint and stochastic denial-of-service (DoS) attacks. First, considering the that multiple sensors' channels may be attacked, proposed to alleviate pressure of signal transmission, which can dynamically allocate network sources according different intensities DoS Second, MBSP, impulse system model established with consideration network-induced delay packet loss. Then, sufficient conditions existence desired controller gain MBSP parameters are given ensure mean-square stability studied closed-loop subject Finally, simulation example provided verify effectiveness method.
منابع مشابه
Hybrid Bandwidth Scheduling for CAN-based Networked Control Systems
A hybrid bandwidth scheduling scheme is proposed to improve the quality of service and the bandwidth utilization for the CAN-based networked control systems. It combines rate monotonic and improved round-robin scheme for both the realtime and non-real-time data. Moreover, considering the constraints of control performance and network schedulability, a heuristic branch and bound & genetic algori...
متن کاملSecure Networked Control Systems under Denial of Service Attacks
This paper addresses the security issue of networked control systems (NCSs) under DoS attacks. According to the level of attacks, DoS attacks are classified into two types: weak attacks and strong attacks. A recursive networked predictive control (RNPC) method based on round-trip time delay is proposed to compensate for the adverse effects introduced by the weak DoS attacks as well as the netwo...
متن کاملAnalysis of Stochastic Switched Systems with Application to Networked Control Under Jamming Attacks
We investigate the stability problem for discretetime stochastic switched linear systems under the specific scenarios where information about the switching patterns and the probability of switches are not available. Our analysis focuses on the average number of times each mode becomes active in the long run and, in particular, utilizes their lowerand upperbounds. This setup is motivated by cybe...
متن کاملHMAC-Based Authentication Protocol: Attacks and Improvements
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
متن کاملMarkovian Delay Prediction-Based Control of Networked Systems
A new Markov-based method for real time prediction of network transmission time delays is introduced. The method considers a Multi-Layer Perceptron (MLP) neural model for the transmission network, where the number of neurons in the input layer is minimized so that the required calculations are reduced and the method can be implemented in the real-time. For this purpose, the Markov process order...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE/CAA Journal of Automatica Sinica
سال: 2023
ISSN: ['2329-9274', '2329-9266']
DOI: https://doi.org/10.1109/jas.2023.123162