Redundancy design of networked control systems under denial-of-service attacks

Penghui Wen, Shenyu Liu*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In this paper, we propose a stability assessment method for networked control systems (NCSs) with redundancy design under denial-of-service (DoS) attacks. By modeling the NCS under DoS attacks as a randomly switched system with two modes, we first argue that when redundancy design is considered, assuming gamma distribution for the sojourn time of online mode better reveals the interactions between attacks, auto-correction and offline repairing. To analyze stability of such systems, we appeal to a more general class of randomly impulsive switched systems, whose moment of state is related to the output of an auxiliary linear time-invariant system. We therefore propose criteria for asymptotic moment stability, based on Hurwitzness of the auxiliary system matrix. Finally, we validate the results for an NCS under DoS attacks through numerical simulations, confirming that assuming sojourn times to obey a gamma distribution rather than an exponential distribution leads to less conservative redundancy design.

Original languageEnglish
Title of host publicationProceedings of the 43rd Chinese Control Conference, CCC 2024
EditorsJing Na, Jian Sun
PublisherIEEE Computer Society
Pages1515-1520
Number of pages6
ISBN (Electronic)9789887581581
DOIs
Publication statusPublished - 2024
Event43rd Chinese Control Conference, CCC 2024 - Kunming, China
Duration: 28 Jul 202431 Jul 2024

Publication series

NameChinese Control Conference, CCC
ISSN (Print)1934-1768
ISSN (Electronic)2161-2927

Conference

Conference43rd Chinese Control Conference, CCC 2024
Country/TerritoryChina
CityKunming
Period28/07/2431/07/24

Keywords

  • asymptotic moment stability
  • DoS attacks
  • Networked control system
  • randomly impulsive switched system
  • redundancy design

Fingerprint

Dive into the research topics of 'Redundancy design of networked control systems under denial-of-service attacks'. Together they form a unique fingerprint.

Cite this