An adaptive control scheme against state‐dependent sensor attacks and input‐dependent actuator attacks in cyber‐physical systems
نویسندگان
چکیده
The application of cyber-physical systems (CPSs) in many areas is threatened by its embedded structure. This paper considers the design an adaptive controller for linear CPSs against deception attacks. Specifically, a corrective signal designed to suppress or offset impact sensor and actuator attacks, especially when correction are also attacked. First, developed time-invariant attacks further extended time-varying In each case, state-independent input-independent as well state-dependent input-dependent discussed. For considered closed-loop system with authors ensures asymptotic stability systems. other three cases corresponding system, controllers designed, which uniform ultimate boundedness. Finally, several numerical examples given explain availability our control scheme.
منابع مشابه
A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
We present a digital signature scheme based on the computational difficulty of integer factorization. The scheme possesses the novel property of being robust against an adaptive chosen-message attack: an adversary who receives signatures for messages of his choice (where each message may be chosen in a way that depends on the signatures of previously chosen messages) cannot later forge the sign...
متن کاملAn effective defensive node against jamming attacks in sensor networks
Jamming is defined as the act of intentionally directing electromagnetic energy towards a communication system to disrupt or prevent signal transmission. In the context of wireless sensor networks (WSNs), jamming is the type of attack which interferes with the radio frequencies used by sensor nodes and may be viewed as a special case of denial of service (DoS) attacks. Herein, we outline the po...
متن کاملRobust Watermarking Scheme against Geometerical Attacks
In the age of e-media where everything is accessed through the internet it becomes very important to protect the privacy and the copyright of the data and the information which is shared through the internet. This digital way of communicating had raised the issue of protection of the rights of owners of the content that is distributed in electronic form. One of the ways to deal with this issue ...
متن کاملSource-Based Filtering Scheme against DDOS Attacks
IP address spoofing is employed by a lot of DDoS attack tools. Most of the current research on DDoS attack packet filtering depends on cooperation among routers, which is hard to achieve in real campaigns. Therefore, in the paper, we propose a novel filtering scheme based on source information in this paper to defend against various source IP address spoofing. The proposed method works independ...
متن کاملRobust Watermarking Scheme Against Multiple Attacks
A good watermarking technique helps in protecting the copy right of the image which is the motivational factor in developing new encryption techniques .The present paper found a novel fact that by inserting the watermark using Least Significant Bit (LSB into three components of the image namely RED GREEN and BLUE. The watermark is a binary image ,embedded into host image by altering LSB values ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Iet Control Theory and Applications
سال: 2023
ISSN: ['1751-8644', '1751-8652']
DOI: https://doi.org/10.1049/cth2.12443