Observer-Based Event-Triggered Predictive Control for Networked Control Systems under DoS Attacks.

Sensors (Basel)

The Faculty of Engineering and Environment, University of Northumbria at Newcastle, Newcastle upon Tyne NE1 8ST, UK.

Published: November 2020

This paper studies the problem of DoS attack defense based on static observer-based event-triggered predictive control in networked control systems (NCSs). First, under the conditions of limited network bandwidth resources and the incomplete observability of the state of the system, we introduce the event-triggered function to provide a discrete event-triggered transmission scheme for the observer. Then, we analyze denial-of-service (DoS) attacks that occur on the network transmission channel. Using the above-mentioned event-triggered scheme, a novel class of predictive control algorithms is designed on the control node to proactively save network bandwidth and compensate for DoS attacks, which ensures the stability of NCSs. Meanwhile, a closed-loop system with an observer-based event-triggered predictive control scheme for analysis is created. Through linear matrix inequality (LMI) and the Lyapunov function method, the design of the controller, observer and event-triggered matrices is established, and the stability of the scheme is analyzed. The results show that the proposed solution can effectively compensate DoS attacks and save network bandwidth resources by combining event-triggered mechanisms. Finally, a smart grid simulation example is employed to verify the feasibility and effectiveness of the scheme's defense against DoS attacks.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC7730070PMC
http://dx.doi.org/10.3390/s20236866DOI Listing

Publication Analysis

Top Keywords

dos attacks
20
predictive control
16
observer-based event-triggered
12
event-triggered predictive
12
network bandwidth
12
control networked
8
networked control
8
control systems
8
bandwidth resources
8
save network
8

Similar Publications

Intelligent Intrusion Detection System Against Various Attacks Based on a Hybrid Deep Learning Algorithm.

Sensors (Basel)

January 2025

Department of Electrical Engineering, Faculty of Engineering, Universitas Indonesia, Depok 16424, Indonesia.

The Internet of Things (IoT) has emerged as a crucial element in everyday life. The IoT environment is currently facing significant security concerns due to the numerous problems related to its architecture and supporting technology. In order to guarantee the complete security of the IoT, it is important to deal with these challenges.

View Article and Find Full Text PDF

Non-native species have higher consumption rates than their native counterparts.

Biol Rev Camb Philos Soc

January 2025

Laboratório de Ecologia e Conservação, Departamento de Engenharia Ambiental, Universidade Federal do Paraná, Av. Cel. Francisco H. dos Santos 100, Curitiba, 81531-980, Brazil.

Non-native species can be major drivers of ecosystem alteration, especially through changes in trophic interactions. Successful non-native species have been predicted to have greater resource use efficiency relative to trophically analogous native species (the Resource Consumption Hypothesis), but rigorous evidence remains equivocal. Here, we tested this proposition quantitatively in a global meta-analysis of comparative functional response studies.

View Article and Find Full Text PDF

SecEdge: A novel deep learning framework for real-time cybersecurity in mobile IoT environments.

Heliyon

January 2025

Department of Natural and Engineering Sciences, College of Applied Studies and Community Services, King Saud University, Riyadh, 11633, Saudi Arabia.

The rapid growth of Internet of Things (IoT) devices presents significant cybersecurity challenges due to their diverse and resource-constrained nature. Existing security solutions often fall short in addressing the dynamic and distributed environments of IoT systems. This study aims to propose a novel deep learning framework, SecEdge, designed to enhance real-time cybersecurity in mobile IoT environments.

View Article and Find Full Text PDF

As modern vehicles continue to evolve, advanced technologies are integrated to enhance the driving experience. A key enabler of this advancement is the Controller Area Network (CAN) bus, which facilitates seamless communication between vehicle components. Despite its widespread adoption, the CAN bus was not designed with security as a priority, making it vulnerable to various attacks.

View Article and Find Full Text PDF

Cybersecurity Solutions for Industrial Internet of Things-Edge Computing Integration: Challenges, Threats, and Future Directions.

Sensors (Basel)

January 2025

Department of Computer Science and Engineering, Yanbu Industrial College, Royal Commission for Jubail and Yanbu, Yanbu Industrial City 41912, Saudi Arabia.

This paper provides the complete details of current challenges and solutions in the cybersecurity of cyber-physical systems (CPS) within the context of the IIoT and its integration with edge computing (IIoT-edge computing). We systematically collected and analyzed the relevant literature from the past five years, applying a rigorous methodology to identify key sources. Our study highlights the prevalent IIoT layer attacks, common intrusion methods, and critical threats facing IIoT-edge computing environments.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!