Observer-based synchronization of memristive neural networks under DoS attacks and actuator saturation and its application to image encryption

被引:53
作者
Zhou, Chao [1 ]
Wang, Chunhua [1 ]
Yao, Wei [1 ]
Lin, Hairong [1 ]
机构
[1] Hunan Univ, Coll Informat Sci & Engn, Changsha 410082, Peoples R China
基金
中国国家自然科学基金;
关键词
Synchronization; Memristive neural networks; DoS attacks; Actuator saturation; Image encryption; TIME-VARYING DELAYS; REACTION-DIFFUSION TERMS; EXPONENTIAL SYNCHRONIZATION; QUASI-SYNCHRONIZATION; MIXED DELAYS; SAMPLED-DATA; SYSTEMS; STABILITY;
D O I
10.1016/j.amc.2022.127080
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In this article, the synchronization issue of memristive neural networks (MNNs) under denial-of-service (DoS) attacks and actuator saturation is investigated via an observer based controller. Due to actual physical constraint, the effect of actuator saturation is taken into account in the controller design. Unlike the existing works where the communication environment is secure, DoS attacks are explored in the communication channel connecting master and slave MNNs. Based on the above considerations, an observer-based control approach is developed to estimate the MNNs states and guarantee the MNNs synchronization in the presences of DoS attacks and actuator saturation. By using the Lyapunov method and stochastic analysis technique, the sufficient synchronization conditions are derived via a set of linear matrix inequalities (LMIs). Meanwhile, the attraction domain of error system is estimated to satisfy the demand of actuator saturation. Then, numerical simulation is used to manifest the validity of our theoretical results. Finally, the proposed synchronization theory is applied to image encryption. The experimental results demonstrate that the presented image encryption scheme has a reliable performance.(c) 2022 Elsevier Inc. All rights reserved.
引用
收藏
页数:18
相关论文
共 61 条
  • [1] Some basic cryptographic requirements for chaos-based cryptosystems
    Alvarez, Gonzalo
    Li, Shujun
    [J]. INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2006, 16 (08): : 2129 - 2151
  • [2] Aubin J.-P., 1986, DIFFERENTIAL INCLUSI, V6, P215
  • [3] Chowdhury Arjun Pal, 2018, Journal of Low Power Electronics and Applications, V8, DOI 10.3390/jlpea8040038
  • [4] Absolute stability theory and the synchronization problem
    Curran, PF
    Chua, LO
    [J]. INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 1997, 7 (06): : 1375 - 1382
  • [5] Event-triggered predictive control for networked control systems with DoS attacks
    Deng, Yurou
    Yin, Xiuxia
    Hu, Songlin
    [J]. INFORMATION SCIENCES, 2021, 542 : 71 - 91
  • [6] Stochastic game in remote estimation under DoS attacks
    Ding K.
    Dey S.
    Quevedo D.E.
    Shi L.
    [J]. IEEE Control Systems Letters, 2017, 1 (01): : 146 - 151
  • [7] Doyal Alex, 2013, International Journal of Information Privacy, Security and Integrity, V1, P299, DOI 10.1504/IJIPSI.2013.058206
  • [8] A new upper bound for the norm of interval matrices with application to robust stability analysis of delayed neural networks
    Faydasicok, Ozlem
    Arik, Sabri
    [J]. NEURAL NETWORKS, 2013, 44 : 64 - 71
  • [9] Synchronization of memristive neural networks with mixed delays via quantized intermittent control
    Feng, Yuming
    Yang, Xinsong
    Song, Qiang
    Cao, Jinde
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2018, 339 : 874 - 887
  • [10] Filippov AF., 1967, SIAM J CONTROL, V5, P609, DOI DOI 10.1137/0305040