Optimal Injection Attack for UCPS Under Vertical Depth-Keeping Task Via Game Approach

نویسندگان

چکیده

Dear Editor, This letter concerns about the security problem of underwater cyber-physical system (UCPS) for depth-keeping task in vertical plane. A dynamic parametric model UCPS with ocean currents and hydrostatic is considered. With intelligence controller, objective function a zero-sum game between attacker controller introduced. The destroys by injecting designed false data into system. Compared existing attack strategies, gets rid dependence on constructing virtual linear based input output (I/O) data, i.e., measurable depth pitch angle. Note that information such as pressure hydrodynamics force cannot be accessed attackers under environment. In addition, programming method adopted to solve mixed strategies framework. Finally, effectiveness this scheme verified simulation.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

a benchmarking approach to optimal asset allocation for insurers and pension funds

uncertainty in the financial market will be driven by underlying brownian motions, while the assets are assumed to be general stochastic processes adapted to the filtration of the brownian motions. the goal of this study is to calculate the accumulated wealth in order to optimize the expected terminal value using a suitable utility function. this thesis introduced the lim-wong’s benchmark fun...

15 صفحه اول

Optimal water quality for keeping ornamental fish in the aquarium

      Ornamental fish keeping is the second most popular hobby in the world, and its popularity is growing every day. The ornamental fish farming industry provides entrepreneurship and income generation opportunities, so it is important to focus on various aspects of ornamental fish farming. Several physical and chemical parameters of water are discussed in this study, including pH, hardness, a...

متن کامل

An Approach for Preventing SQL Injection Attack on Web Application

SQL injection attacks are one of the highest dangers for applications composed for the Web. These attacks are dispatched through uncommonly made client information on web applications that utilization low level string operations to build SQL queries.SQL injection weakness permits an assailant to stream summons straightforwardly to a web application's hidden database and annihilate usefulness or...

متن کامل

Wireless Networks under a Backoff Attack: A Game Theoretical Perspective

We study a wireless sensor network using CSMA/CA in the MAC layer under a backoff attack: some of the sensors of the network are malicious and deviate from the defined contention mechanism. We use Bianchi's network model to study the impact of the malicious sensors on the total network throughput, showing that it causes the throughput to be unfairly distributed among sensors. We model this conf...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE/CAA Journal of Automatica Sinica

سال: 2023

ISSN: ['2329-9274', '2329-9266']

DOI: https://doi.org/10.1109/jas.2023.123048