Important-Data-Based DoS Attack Mechanism and Resilient H8 Filter Design for Networked T-S Fuzzy Systems

被引:45
作者
Wang, Xun [1 ,2 ]
Tian, Engang [1 ]
Zheng, Wei Xing [3 ]
Xie, Xiangpeng [4 ]
机构
[1] Univ Shanghai Sci & Technol, Sch Opt Elect & Comp Engn, Shanghai 200093, Peoples R China
[2] Tongji Univ, Shanghai Res Inst Intelligent Autonomous Syst, Shanghai 200092, Peoples R China
[3] Western Sydney Univ, Sch Comp Data & Math Sci, Sydney, NSW, Australia
[4] Nanjing Univ Posts & Telecommun, Inst Adv Technol, Nanjing 210023, Peoples R China
基金
上海市自然科学基金; 中国国家自然科学基金;
关键词
Important-data-based (IDB) denial-of-service (DoS) attack mechanism; networked Takagi-Sugeno (T-S) fuzzy systems; resilient Hop fuzzy filter; STATE ESTIMATION; UNCERTAINTIES;
D O I
10.1109/TCYB.2023.3285526
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article is concerned with the security problems for networked Takagi-Sugeno (T-S) fuzzy systems with asyn-chronous premise constraints. The primary objective of this article is twofold. First, a novel important-data-based (IDB) denial-of-service (DoS) attack mechanism is proposed from the perspective of the adversary for the first time to reinforce the destructive effect of the DoS attacks. Different from most existing DoS attack models, the proposed attack mechanism can utilize the information of packets, evaluate the importance degree of packets, and only attack the most "important" ones. As such, a larger system performance degradation can be expected. Second, corresponding to the proposed IDB DoS mechanism, a resilient Hop fuzzy filter is designed from the defender's point of view to alleviate the negative effect of the attack. Furthermore, since the defender does not know the attack parameter, an algorithm is designed to estimate it. In a word, a unified attack-defense framework is developed in this article for networked T-S fuzzy systems with asynchronous premise constraints. With the help of the Lyapunov functional method, sufficient conditions are suc-cessfully established to compute the desired filtering gains and ensure the Hop performance of the filtering error system. Finally, two examples are exploited to demonstrate the destructiveness of the proposed IDB DoS attack and the usefulness of the developed resilient Hop filter.
引用
收藏
页码:3352 / 3362
页数:11
相关论文
共 42 条
[41]   Adaptive Event-Triggered Fuzzy H∞ Filter Design for Nonlinear Networked Systems [J].
Zhao, Xin ;
Lin, Chong ;
Chen, Bing ;
Wang, Qing-Guo ;
Ma, Zhongjing .
IEEE TRANSACTIONS ON FUZZY SYSTEMS, 2020, 28 (12) :3302-3314
[42]   An adaptive torus-event-based Script capital H∞ controller design for networked T-S fuzzy systems under deception attacks [J].
Zhu, Shuangxin ;
Tian, Engang ;
Xu, Donghui ;
Liu, Jinliang .
INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2022, 32 (06) :3425-3441