Protocol-Based Control for Hidden Markov Jump Systems With Incomplete Transition Descriptions Against Injection Attacks

被引:3
作者
Wang, Yuan [1 ,2 ]
Yan, Huaicheng [2 ,3 ]
Park, Ju H. [4 ]
Zhang, Hao [5 ]
Shen, Hao [6 ]
机构
[1] Suzhou Univ Sci & Technol, Sch Elect & Informat Engn, Suzhou 215009, Peoples R China
[2] East China Univ Sci & Technol, Key Lab Smart Manufacturingin Energy Chem Proc Min, Shanghai 200237, Peoples R China
[3] Weifang Univ, Coll Machinery & Automat, Weifang 261061, Peoples R China
[4] Yeungnam Univ, Dept Elect Engn, Gyongsan 38541, South Korea
[5] Tongji Univ, Dept Control Sci & Engn, Shanghai 200092, Peoples R China
[6] Anhui Univ Technol, Sch Elect & Informat Engn, Maanshan 243002, Peoples R China
来源
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS | 2025年 / 12卷 / 01期
基金
新加坡国家研究基金会; 中国国家自然科学基金;
关键词
Hidden Markov models; Protocols; Network systems; Costs; Symmetric matrices; Stability analysis; Smart manufacturing; Dynamic event-triggered protocol (DETP); hidden Markov jump systems (HM[!text type='JS']JS[!/text]s); incomplete transition descriptions; injection attacks; SLIDING MODE CONTROL; LINEAR-SYSTEMS;
D O I
10.1109/TCNS.2024.3446696
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article aims to design the dynamic event-triggered protocol for hidden Markov jump systems subject to injection attacks. We initially introduce the hidden Markov model (HMM), which accommodates incomplete transition descriptions found in both the transition probability matrix and the observation probability matrix of the observation signal. Importantly, the underlying HMM demonstrates applicability to a broader range of scenarios than certain existing works. Furthermore, data are vulnerable to cyberattacks before being transmitted to the controller due to the open communication architecture, in which adversaries are assumed to inject false data that are capable of affecting data security. To effectively mitigate unnecessary utilization, we develop a novel dynamic event-based protocol involving dynamic threshold parameter and system modes in the feedback channel. Our methodology tackles the vulnerability of data to cyberattacks in open communication architectures, and the proposed protocol provides a feasible security solution for the hidden Markov jump systems. Eventually, the theoretical findings are demonstrated by two provided simulation examples.
引用
收藏
页码:165 / 176
页数:12
相关论文
共 39 条
[1]   Analysis of security in cyber-physical systems [J].
Chen, Jie ;
Zhang, Fan ;
Sun, Jian .
SCIENCE CHINA-TECHNOLOGICAL SCIENCES, 2017, 60 (12) :1975-1977
[2]   Nonstationary Filtering for Fuzzy Markov Switching Affine Systems With Quantization Effects and Deception Attacks [J].
Cheng, Jun ;
Wu, Yuyan ;
Wu, Zheng-Guang ;
Yan, Huaicheng .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2022, 52 (10) :6545-6554
[3]   Static Output Feedback Quantized Control for Fuzzy Markovian Switching Singularly Perturbed Systems With Deception Attacks [J].
Cheng, Jun ;
Wang, Yueying ;
Park, Ju H. ;
Cao, Jinde ;
Shi, Kaibo .
IEEE TRANSACTIONS ON FUZZY SYSTEMS, 2022, 30 (04) :1036-1047
[4]   Dynamic Event-Triggered H∞ Control for Networked Control Systems With Denial-of-Service Attacks [J].
Cheng, Lingli ;
Yan, Huaicheng ;
Tian, Yongxiao ;
Zhan, Xisheng ;
Chen, Chaoyang .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2024, 71 (02) :642-646
[5]  
Costa O.L. V., 2006, DISCRETE TIME MARKOV
[6]   A Detector-Based Approach for the H2 Control of Markov Jump Linear Systems With Partial Information [J].
do Valle Costa, Oswaldo Luiz ;
Fragoso, Marcelo D. ;
Todorov, Marcos Garcia .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2015, 60 (05) :1219-1234
[7]   Quantized Control of Markov Jump Nonlinear Systems Based on Fuzzy Hidden Markov Model [J].
Dong, Shanling ;
Wu, Zheng-Guang ;
Shi, Peng ;
Su, Hongye ;
Huang, Tingwen .
IEEE TRANSACTIONS ON CYBERNETICS, 2019, 49 (07) :2420-2430
[8]   Sliding Mode Control of Singular Stochastic Markov Jump Systems [J].
Feng, Zhiguang ;
Shi, Peng .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2017, 62 (08) :4266-4273
[9]   Event-Triggered Adaptive Fixed-Time Secure Control for Nonlinear Cyber-Physical System With False Data-Injection Attacks [J].
Gao, Yang ;
Ma, Jiali ;
Wang, Jiaqi ;
Wu, Yifei .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2023, 70 (01) :316-320
[10]   Observer-Based Event-Triggered Composite Anti-Disturbance Control for Multi-Agent Systems Under Multiple Disturbances and Stochastic FDIAs [J].
Guo, Xiang-Gui ;
Zhang, Dong-Yu ;
Wang, Jian-Liang ;
Park, Ju H. ;
Guo, Lei .
IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2023, 20 (01) :528-540