Throughput analysis for cyber-physical systems under the slotted ALOHA protocol

被引:0
|
作者
Li, Zhihui [1 ]
Liu, Zhongchang [2 ,3 ]
Guo, Ge [2 ]
Wang, Yuhuai [4 ]
机构
[1] Dalian Univ Technol, Sch Control Sci & Engn, Dalian 116024, Peoples R China
[2] Dalian Maritime Univ, Coll Marine Elect Engn, Dalian 116026, Peoples R China
[3] Chinese Univ Hong Kong, Dept Informat Engn, Shatin, Hong Kong, Peoples R China
[4] Jiangsu Automat Res Inst, Lianyungang 222006, Peoples R China
来源
2018 15TH INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION, ROBOTICS AND VISION (ICARCV) | 2018年
基金
中国国家自然科学基金;
关键词
cyber-physical systems; slotted ALOHA; throughput; OUTPUT-FEEDBACK; COMMUNICATION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper investigates the effect of network throughput on the stability of a collection of cyber-physical systems (CPSs) which transmit their measurement information via a single communication channel. The slotted ALOHA access protocol is used for scheduling all CPSs, where time is divided into time slots and only one plant can access the channel at any time slot. By formulating the collection of cyber-physical systems into a switch system, we derive the relationship between the throughput and the attenuation rate using the average dwell time technique. Finally, a co-design algorithm is given to compute the controller gains. A numerical example illustrates the effectiveness of the proposed co-design procedure.
引用
收藏
页码:774 / 778
页数:5
相关论文
共 50 条
  • [31] A Security Analysis of Cyber-Physical Systems Architecture for Healthcare
    Seifert, Darren
    Reza, Hassan
    COMPUTERS, 2016, 5 (04)
  • [32] An Assessment of Security Analysis Tools for Cyber-Physical Systems
    Lemaire, Laurens
    Vossaert, Jan
    De Decker, Bart
    Naessens, Vincent
    RISK ASSESSMENT AND RISK-DRIVEN QUALITY ASSURANCE, RISK 2016, 2017, 10224 : 66 - 81
  • [33] Analysis of Security Threats and Vulnerability for Cyber-physical Systems
    Gao, Yang
    Peng, Yong
    Xie, Feng
    Zhao, Wei
    Wang, Dejin
    Han, Xuefeng
    Lug, Tianbo
    Lie, Zhao
    2013 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), 2013, : 50 - 55
  • [34] NONDEDUCIBILITY-BASED ANALYSIS OF CYBER-PHYSICAL SYSTEMS
    Gamage, Thoshitha
    McMillin, Bruce
    CRITICAL INFRASTRUCTURE PROTECTION III, 2009, 311 : 169 - 183
  • [35] Trustworthiness Modeling and Analysis of Cyber-physical Manufacturing Systems
    Yu, Zhenhua
    Zhou, Lijun
    Ma, Zhiqiang
    El-Meligy, Mohammed A.
    IEEE ACCESS, 2017, 5 : 26076 - 26085
  • [36] A survey on security of cyber-physical systems under network attacks
    Ye D.
    Jin K.-J.
    Zhang T.-Y.
    Kongzhi yu Juece/Control and Decision, 2023, 38 (08): : 2243 - 2252
  • [37] On the Performance Analysis of Reset Attack in Cyber-Physical Systems
    Ni, Yuqing
    Guo, Ziyang
    Mo, Yilin
    Shi, Ling
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2020, 65 (01) : 419 - 425
  • [38] Research on secure control and communication for cyber-physical systems under cyber-attacks
    Li, Wei
    Shi, Yahong
    Li, Yajie
    TRANSACTIONS OF THE INSTITUTE OF MEASUREMENT AND CONTROL, 2019, 41 (12) : 3421 - 3437
  • [39] Process execution in Cyber-Physical Systems using cloud and Cyber-Physical Internet services
    Bordel, Borja
    Alcarria, Ramon
    Sanchez de Rivera, Diego
    Robles, Tomas
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (08): : 4127 - 4169
  • [40] Seamless validation of cyber-physical systems under real-time conditions by using a cyber-physical laboratory test field
    Jacobitz, Sven
    Gollner, Marian
    Zhang, Jie
    Yarom, Or Aviv
    Liu-Henke, Xiaobo
    IEEE INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN SYSTEMS SCIENCE AND ENGINEERING (IEEE RASSE 2021), 2021,