Stability analysis of networked control systems with denial-of-service attacks

Jin Zhang, Chen Peng, Suhaib Masroor, Hongtao Sun, Lin Chai

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

This paper addresses stability problem for a class of networked control systems (NCSs) with network attacks. As a network attack to control systems, denial-of-service attacks are fully taken into account in the NCSs modelling. Under the scenario that there exist denial-of-service attacks in the communication channel, a closed-loop system with an error function is provided for the studied NCSs, where the denial-of-service attacks are well considered. Then based on the above constructed system model, one sufficient condition is derived for ensuring the uniformly ultimately boundedness of the derived system under consideration, and the upper bound of the maximum allowable number of denial-of-service attack is obtained. Moreover, the celebrated time-delay system technology method is introduced to improve the result of the upper bound of the maximum allowable number of denial-of-service attack. Finally, one numerical example is given to show the effectiveness of the proposed method.

Original languageEnglish
Title of host publication2016 UKACC International Conference on Control, UKACC Control 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781467398916
DOIs
StatePublished - 7 Nov 2016
Externally publishedYes
Event11th UKACC United Kingdom Automatic Control Council International Conference on Control, UKACC Control 2016 - Belfast, United Kingdom
Duration: 31 Aug 20162 Sep 2016

Publication series

Name2016 UKACC International Conference on Control, UKACC Control 2016

Conference

Conference11th UKACC United Kingdom Automatic Control Council International Conference on Control, UKACC Control 2016
Country/TerritoryUnited Kingdom
CityBelfast
Period31/08/162/09/16

Keywords

  • Networked control systems
  • denial-of-service
  • uniformly ultimately bounded

Fingerprint

Dive into the research topics of 'Stability analysis of networked control systems with denial-of-service attacks'. Together they form a unique fingerprint.

Cite this