This article aims to analyze H stability of a class of networked control systems (NCSs) under random denial of service (DoS) attacks and design a sampled-data-based state feedback security controller to mitigate the influence of attacks. Different from the existing random attacks, the information about the maximum duration time of DoS attacks can be captured by introducing a predesigned logical processor. Then, based on the periodic sampling technique, the probability of attack occurrence and the resultant number of maximum allowable consecutive packet dropouts can be calculated, which is quite significant to investigating the security problem of NCSs. A DoS-dependent security controller which makes full use of the attack probability information and the number of attack-induced packet dropouts is designed. A novel networked sampled-data system model is first established that enables us to deal with the random DoS attacks phenomena and the time-varying delay induced by attacks under a uniform framework. By structuring a suitable Lyapunov-Krasovskii functional, the relationship between mean square asymptotic stability and attack characteristics is obtained. Finally, the reliability and applicability of the presented control strategy in eliminating the influence of DoS attacks are validated by two practical engineering applications.
Download full-text PDF |
Source |
---|---|
http://dx.doi.org/10.1109/TCYB.2024.3350331 | DOI Listing |
PLoS One
January 2025
Faculty of Informatics and Computing, University Sultan Zainal Abidin, Besut, Terengganu, Malaysia.
Software-Defined Networks (SDN) provides more control and network operation over a network infrastructure as an emerging and revolutionary paradigm in networking. Operating the many network applications and preserving the network services and functions, the SDN controller is regarded as the operating system of the SDN-based network architecture. The SDN has several security problems because of its intricate design, even with all its amazing features.
View Article and Find Full Text PDFSensors (Basel)
January 2025
Department of Electrical Engineering, Faculty of Engineering, Universitas Indonesia, Depok 16424, Indonesia.
The Internet of Things (IoT) has emerged as a crucial element in everyday life. The IoT environment is currently facing significant security concerns due to the numerous problems related to its architecture and supporting technology. In order to guarantee the complete security of the IoT, it is important to deal with these challenges.
View Article and Find Full Text PDFBiol Rev Camb Philos Soc
January 2025
Laboratório de Ecologia e Conservação, Departamento de Engenharia Ambiental, Universidade Federal do Paraná, Av. Cel. Francisco H. dos Santos 100, Curitiba, 81531-980, Brazil.
Non-native species can be major drivers of ecosystem alteration, especially through changes in trophic interactions. Successful non-native species have been predicted to have greater resource use efficiency relative to trophically analogous native species (the Resource Consumption Hypothesis), but rigorous evidence remains equivocal. Here, we tested this proposition quantitatively in a global meta-analysis of comparative functional response studies.
View Article and Find Full Text PDFHeliyon
January 2025
Department of Natural and Engineering Sciences, College of Applied Studies and Community Services, King Saud University, Riyadh, 11633, Saudi Arabia.
The rapid growth of Internet of Things (IoT) devices presents significant cybersecurity challenges due to their diverse and resource-constrained nature. Existing security solutions often fall short in addressing the dynamic and distributed environments of IoT systems. This study aims to propose a novel deep learning framework, SecEdge, designed to enhance real-time cybersecurity in mobile IoT environments.
View Article and Find Full Text PDFSensors (Basel)
January 2025
Department of Computer Science, College of Charleston, Charleston, SC 29424, USA.
As modern vehicles continue to evolve, advanced technologies are integrated to enhance the driving experience. A key enabler of this advancement is the Controller Area Network (CAN) bus, which facilitates seamless communication between vehicle components. Despite its widespread adoption, the CAN bus was not designed with security as a priority, making it vulnerable to various attacks.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!