This article studies the optimized fuzzy prescribed performance control problem for nonlinear nonstrict-feedback systems under denial-of-service (DoS) attacks. A fuzzy estimator is delicately designed to model the immeasurable system states in the presence of DoS attacks. To achieve the preset tracking performance, a simper prescribed performance error transformation is constructed considering the characteristics of DoS attacks, which helps obtain a novel Hamilton-Jacobi-Bellman equation to derive the optimized prescribed performance controller. Furthermore, the fuzzy-logic system, combined with the reinforcement learning (RL) technique, is employed to approximate the unknown nonlinearity existing in the prescribed performance controller design process. An optimized adaptive fuzzy security control law is then proposed for the considered nonlinear nonstrict-feedback systems subject to DoS attacks. Through the Lyapunov stability analysis, the tracking error is proved to approach the predefined region by the preset finite time, even in the presence of DoS attacks. Meanwhile, the consumed control resources are minimized due to the RL-based optimized algorithm. Finally, an actual example with comparisons verifies the effectiveness of the proposed control algorithm.

Download full-text PDF

Source
http://dx.doi.org/10.1109/TCYB.2023.3234295DOI Listing

Publication Analysis

Top Keywords

dos attacks
20
prescribed performance
16
optimized adaptive
8
adaptive fuzzy
8
fuzzy security
8
security control
8
tracking performance
8
nonlinear nonstrict-feedback
8
nonstrict-feedback systems
8
presence dos
8

Similar Publications

Software-Defined Networks (SDN) provides more control and network operation over a network infrastructure as an emerging and revolutionary paradigm in networking. Operating the many network applications and preserving the network services and functions, the SDN controller is regarded as the operating system of the SDN-based network architecture. The SDN has several security problems because of its intricate design, even with all its amazing features.

View Article and Find Full Text PDF

Intelligent Intrusion Detection System Against Various Attacks Based on a Hybrid Deep Learning Algorithm.

Sensors (Basel)

January 2025

Department of Electrical Engineering, Faculty of Engineering, Universitas Indonesia, Depok 16424, Indonesia.

The Internet of Things (IoT) has emerged as a crucial element in everyday life. The IoT environment is currently facing significant security concerns due to the numerous problems related to its architecture and supporting technology. In order to guarantee the complete security of the IoT, it is important to deal with these challenges.

View Article and Find Full Text PDF

Non-native species have higher consumption rates than their native counterparts.

Biol Rev Camb Philos Soc

January 2025

Laboratório de Ecologia e Conservação, Departamento de Engenharia Ambiental, Universidade Federal do Paraná, Av. Cel. Francisco H. dos Santos 100, Curitiba, 81531-980, Brazil.

Non-native species can be major drivers of ecosystem alteration, especially through changes in trophic interactions. Successful non-native species have been predicted to have greater resource use efficiency relative to trophically analogous native species (the Resource Consumption Hypothesis), but rigorous evidence remains equivocal. Here, we tested this proposition quantitatively in a global meta-analysis of comparative functional response studies.

View Article and Find Full Text PDF

SecEdge: A novel deep learning framework for real-time cybersecurity in mobile IoT environments.

Heliyon

January 2025

Department of Natural and Engineering Sciences, College of Applied Studies and Community Services, King Saud University, Riyadh, 11633, Saudi Arabia.

The rapid growth of Internet of Things (IoT) devices presents significant cybersecurity challenges due to their diverse and resource-constrained nature. Existing security solutions often fall short in addressing the dynamic and distributed environments of IoT systems. This study aims to propose a novel deep learning framework, SecEdge, designed to enhance real-time cybersecurity in mobile IoT environments.

View Article and Find Full Text PDF

As modern vehicles continue to evolve, advanced technologies are integrated to enhance the driving experience. A key enabler of this advancement is the Controller Area Network (CAN) bus, which facilitates seamless communication between vehicle components. Despite its widespread adoption, the CAN bus was not designed with security as a priority, making it vulnerable to various attacks.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!