Articles with "secure control" as a keyword



Photo by possessedphotography from unsplash

LQ Secure Control for Cyber-Physical Systems Against Sparse Sensor and Actuator Attacks

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Transactions on Control of Network Systems"

DOI: 10.1109/tcns.2018.2878507

Abstract: This paper investigates the problem of secure control for cyber-physical systems (CPSs) under sensor and actuator attacks. The attacks are assumed to be sparse but arbitrary. The strong detectability under the sparse attacks is characterized… read more here.

Keywords: physical systems; control; cyber physical; control cyber ... See more keywords
Photo from wikipedia

Secure Control for Cyber-Physical Systems under Malicious Attacks

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Transactions on Control of Network Systems"

DOI: 10.1109/tcns.2021.3094782

Abstract: This paper investigates the secure control problem for cyber-physical systems when the malicious data is injected into the cyber realm which is directly connecting to the actuators. Based on moving target defense and reinforcement learning,… read more here.

Keywords: defense; control; cyber physical; secure control ... See more keywords
Photo from wikipedia

Event-Triggered Adaptive Fixed-Time Secure Control for Nonlinear Cyber-Physical System With False Data-Injection Attacks

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Circuits and Systems II: Express Briefs"

DOI: 10.1109/tcsii.2022.3217823

Abstract: This brief investigates the event-triggered adaptive fixed-time secure control problem for nonlinear cyber-physical systems (CPSs) under false data-injection attacks. By employing adding a power integrator technique, an adaptive controller along with the triggering mechanism is… read more here.

Keywords: secure control; time; fixed time; event triggered ... See more keywords
Photo from wikipedia

Event-Based Adaptive Fuzzy Fixed-Time Secure Control for Nonlinear CPSs Against Unknown False Data Injection and Backlash-Like Hysteresis

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Transactions on Fuzzy Systems"

DOI: 10.1109/tfuzz.2021.3070700

Abstract: This paper investigates the event-triggered adaptive fuzzy fixed-time secure control problem for a class of nonlinear cyber-physical systems (CPSs) subject to unknown deception attacks and backlash-like hysteresis. Based on an improved fractional-order command filtered backstepping… read more here.

Keywords: time; control; secure control; fixed time ... See more keywords
Photo by lucabravo from unsplash

Blockchain Protocol-Based Predictive Secure Control for Networked Systems

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Industrial Electronics"

DOI: 10.1109/tie.2022.3148736

Abstract: Networked control systems (NCSs) are widely used in practical applications because of their flexibility in deployment. However, due to the dependence on the communication network, NCSs could be vulnerable to malicious cyberattacks. To address this… read more here.

Keywords: secure control; blockchain technology; control; based predictive ... See more keywords
Photo from wikipedia

ADP-Based Remote Secure Control for Networked Control Systems Under Unknown Nonlinear Attacks in Sensors and Actuators

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Industrial Informatics"

DOI: 10.1109/tii.2021.3137816

Abstract: In this article, we concentrate on a class of networked control systems (NCSs) under the unknown nonlinear attacks, which target the sensors and actuators with remote communication channels. To attenuate the attacks remotely, the remote… read more here.

Keywords: secure control; unknown nonlinear; sensors actuators; control ... See more keywords
Photo from wikipedia

Co-Design Secure Control Based on Image Attack Detection and Data Compensation for Networked Visual Control Systems

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Instrumentation and Measurement"

DOI: 10.1109/tim.2022.3206760

Abstract: The incomplete and untrue data caused by cyberattacks (e.g., image information leakage and tampering) will affect the control performance and even lead to system instability. To address this problem, a novel co-design secure control method… read more here.

Keywords: secure control; compensation; control; detection ... See more keywords
Photo by headwayio from unsplash

Blockchain Protocol-Based Secondary Predictive Secure Control for Voltage Restoration and Current Sharing of DC Microgrids

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Smart Grid"

DOI: 10.1109/tsg.2022.3217807

Abstract: DC microgrids with distributed architectures inevitably encounter the threats of communication constraints and cyber attacks, and there is little research to address these two communication irregularities simultaneously. To provide DC microgrids with maximum resistance to… read more here.

Keywords: secure control; communication; blockchain protocol; control ... See more keywords
Photo from wikipedia

An Observer With Cooperative Interaction Structure for Biasing Attack Detection and Secure Control

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Systems, Man, and Cybernetics: Systems"

DOI: 10.1109/tsmc.2022.3213516

Abstract: This article studies state estimation and attack reconstruction problems for sensor and actuator biasing attack detection and secure control in cyber–physical systems (CPSs) through the observer techniques. The considered unknown bounded biasing attacks are produced… read more here.

Keywords: secure control; detection secure; cooperative interaction; attack ... See more keywords
Photo by richardrschunemann from unsplash

Adaptive Secure Control for Leader-Follower Formation of Nonholonomic Mobile Robots in the Presence of Uncertainty and Deception Attacks

Sign Up to like & get
recommendations!
Published in 2021 at "Mathematics"

DOI: 10.3390/math9182190

Abstract: This paper addresses an adaptive secure control problem for the leader-follower formation of nonholonomic mobile robots in the presence of uncertainty and deception attacks. It is assumed that the false data of the leader robot’s… read more here.

Keywords: uncertainty; control; formation; leader ... See more keywords