Important-Data-Based DoS Attack Mechanism and Resilient H8 Filter Design for Networked T-S Fuzzy Systems

被引:45
作者
Wang, Xun [1 ,2 ]
Tian, Engang [1 ]
Zheng, Wei Xing [3 ]
Xie, Xiangpeng [4 ]
机构
[1] Univ Shanghai Sci & Technol, Sch Opt Elect & Comp Engn, Shanghai 200093, Peoples R China
[2] Tongji Univ, Shanghai Res Inst Intelligent Autonomous Syst, Shanghai 200092, Peoples R China
[3] Western Sydney Univ, Sch Comp Data & Math Sci, Sydney, NSW, Australia
[4] Nanjing Univ Posts & Telecommun, Inst Adv Technol, Nanjing 210023, Peoples R China
基金
上海市自然科学基金; 中国国家自然科学基金;
关键词
Important-data-based (IDB) denial-of-service (DoS) attack mechanism; networked Takagi-Sugeno (T-S) fuzzy systems; resilient Hop fuzzy filter; STATE ESTIMATION; UNCERTAINTIES;
D O I
10.1109/TCYB.2023.3285526
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article is concerned with the security problems for networked Takagi-Sugeno (T-S) fuzzy systems with asyn-chronous premise constraints. The primary objective of this article is twofold. First, a novel important-data-based (IDB) denial-of-service (DoS) attack mechanism is proposed from the perspective of the adversary for the first time to reinforce the destructive effect of the DoS attacks. Different from most existing DoS attack models, the proposed attack mechanism can utilize the information of packets, evaluate the importance degree of packets, and only attack the most "important" ones. As such, a larger system performance degradation can be expected. Second, corresponding to the proposed IDB DoS mechanism, a resilient Hop fuzzy filter is designed from the defender's point of view to alleviate the negative effect of the attack. Furthermore, since the defender does not know the attack parameter, an algorithm is designed to estimate it. In a word, a unified attack-defense framework is developed in this article for networked T-S fuzzy systems with asynchronous premise constraints. With the help of the Lyapunov functional method, sufficient conditions are suc-cessfully established to compute the desired filtering gains and ensure the Hop performance of the filtering error system. Finally, two examples are exploited to demonstrate the destructiveness of the proposed IDB DoS attack and the usefulness of the developed resilient Hop filter.
引用
收藏
页码:3352 / 3362
页数:11
相关论文
共 42 条
[1]   Decentralized Adaptive Fuzzy Secure Control for Nonlinear Uncertain Interconnected Systems Against Intermittent DoS Attacks [J].
An, Liwei ;
Yang, Guang-Hong .
IEEE TRANSACTIONS ON CYBERNETICS, 2019, 49 (03) :827-838
[2]   Hybrid-triggered-based security controller design for networked control system under multiple cyber attacks [J].
Cao, Jie ;
Ding, Da ;
Liu, Jinliang ;
Tian, Engang ;
Hu, Songlin ;
Xie, Xiangpeng .
INFORMATION SCIENCES, 2021, 548 :69-84
[3]   Input-to-State Stabilizing Control Under Denial-of-Service [J].
De Persis, Claudio ;
Tesi, Pietro .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2015, 60 (11) :2930-2944
[4]   Remote State Estimation in the Presence of an Active Eavesdropper [J].
Ding, Kemi ;
Ren, Xiaoqiang ;
Leong, Alex S. ;
Quevedo, Daniel E. ;
Shi, Ling .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (01) :229-244
[5]   Optimizing Attack Schedules Based on Energy Dispatch Over Two-Hop Relay Networks [J].
Gan, Ruimeng ;
Shao, Jinliang ;
Xiao, Yue ;
Zhang, Heng ;
Zheng, Wei Xing .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2020, 65 (09) :3832-3846
[6]   Event-Triggered H∞ Filtering for T-S Fuzzy-Model-Based Nonlinear Networked Systems With Multisensors Against DoS Attacks [J].
Gu, Zhou ;
Ahn, Choon Ki ;
Yue, Dong ;
Xie, Xiangpeng .
IEEE TRANSACTIONS ON CYBERNETICS, 2022, 52 (06) :5311-5321
[7]   Resilient H∞ Filtering for Event-Triggered Networked Systems Under Nonperiodic DoS Jamming Attacks [J].
Hu, Songlin ;
Yue, Dong ;
Chen, Xiaoli ;
Cheng, Zihao ;
Xie, Xiangpeng .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2021, 51 (03) :1392-1403
[8]   Resilient Distributed Fuzzy Load Frequency Regulation for Power Systems Under Cross-Layer Random Denial-of-Service Attacks [J].
Hu, Zhijian ;
Liu, Shichao ;
Luo, Wensheng ;
Wu, Ligang .
IEEE TRANSACTIONS ON CYBERNETICS, 2022, 52 (04) :2396-2406
[9]   Adaptive Fuzzy Control for Coordinated Multiple Robots With Constraint Using Impedance Learning [J].
Kong, Linghuan ;
He, Wei ;
Yang, Chenguang ;
Li, Zhijun ;
Sun, Changyin .
IEEE TRANSACTIONS ON CYBERNETICS, 2019, 49 (08) :3052-3063
[10]   Fuzzy-Model-Based Lateral Control for Networked Autonomous Vehicle Systems Under Hybrid Cyber-Attacks [J].
Lian, Zhi ;
Shi, Peng ;
Lim, Cheng-Chew ;
Yuan, Xin .
IEEE TRANSACTIONS ON CYBERNETICS, 2023, 53 (04) :2600-2609