Event-triggered stabilization of linear plants subject to periodic Denial-of-Service attacks and disturbances

Meiqi Jiang, Hao Yu, Fei Hao

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)

Abstract

This paper focuses on the stability problem of networked control systems under Denial-of-Service attacks. It is assumed that the sensor-to-controller and the controller-to-actuator channels are independent and would not be attacked simultaneously due to the limited energy of attackers. The improved event-mggering mechanisms with Acknowledge signals are proposed. By using a time-varying piecewise Lyapunov functional, some sufficient conditions of the stability of the closed-loop systems are derived based on the event-triggering conditions and system parameters. Meanwhile, the relationships among the jammer period, the convergence rate and the divergence rate of the closed-loop systems are established. Finally, several examples are given to illustrate the feasibility and efficiency of the proposed results.

Original languageEnglish
Title of host publicationProceedings of the 38th Chinese Control Conference, CCC 2019
EditorsMinyue Fu, Jian Sun
PublisherIEEE Computer Society
Pages8870-8875
Number of pages6
ISBN (Electronic)9789881563972
DOIs
Publication statusPublished - Jul 2019
Externally publishedYes
Event38th Chinese Control Conference, CCC 2019 - Guangzhou, China
Duration: 27 Jul 201930 Jul 2019

Publication series

NameChinese Control Conference, CCC
Volume2019-July
ISSN (Print)1934-1768
ISSN (Electronic)2161-2927

Conference

Conference38th Chinese Control Conference, CCC 2019
Country/TerritoryChina
CityGuangzhou
Period27/07/1930/07/19

Keywords

  • Denial-of-Service attacks
  • Energy-limited
  • Event-mggered communication scheme
  • Networked control systems

Fingerprint

Dive into the research topics of 'Event-triggered stabilization of linear plants subject to periodic Denial-of-Service attacks and disturbances'. Together they form a unique fingerprint.

Cite this