首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 590 毫秒
1.
In this paper, a security consistent tracking control scheme with event-triggered strategy and sensor attacks is developed for a class of nonlinear multi-agent systems. For the sensor attacks on the system, a security measurement preselector and a state observer are introduced to combat the impact of the attacks and achieve secure state estimation. In addition, command filtering technology is introduced to overcome the “complexity explosion” caused by the use of the backstepping approach. Subsequently, a new dynamic event-triggered strategy is proposed, in which the triggering conditions are no longer constants but can be adjusted in real time according to the adaptive variables, so that the designed event-triggered mechanism has stronger online update ability. The measurement states are only transmitted through the network based on event-triggered conditions. The proposed adaptive backstepping algorithm not only ensures the security of the system under sensor attacks but also saves network resources and ensures the consistent tracking performance of multi-agent systems. The boundedness of all closed-loop signals is proved by Lyapunov stability analysis. Simulation examples show the effectiveness of the control scheme.  相似文献   

2.
This article aims at investigating the event-triggered (ET) distributed estimation problem for asynchronous sensor networks with randomly occurred unreliable measurements. We propose two ET mechanisms to schedule data transmissions in this paper. One ET mechanism based on dual-criterion is proposed to schedule the transmissions of measurements and avoid the interferences from unreliable measurements. The other ET mechanism is proposed to schedule the transmissions of local estimates. The connotative information in aforementioned ET mechanisms is exploited for taking full use of available information. Then, we provide the corresponding event-triggered asynchronous diffusion estimator based on the diffusion filtering scheme. In the proposed method, a sensor first generates a local estimate by utilizing available information of asynchronous measurements in each estimation period. Then it fuses available information of asynchronous local estimates to generate a fused estimate. Results of simulations in different cases and experiment in an optical-electronic detection network verify the validity and feasibility of the proposed method.  相似文献   

3.
A robust event-triggered distributed fusion algorithm is investigated in this paper for multi-sensor systems with unknown failure rates. A detection technique based on standard Gaussian distributed filtering innovation is designed and applied to judge whether the measurement is failed. This filtering innovation can also be used to construct the event-triggered condition. Specifically, the event condition is not triggered if the innovation is below the lower event-triggered threshold and the measurement is regarded as the failure measurement if the innovation exceeds the higher threshold. In the above two cases, the sensor measurement data is not transferred to the local estimator; otherwise, it will be transferred. Then, the sequential fast covariance intersection (SFCI) fusion algorithm is used for local estimation fusion. Besides, to analyze the estimation performance, sufficient conditions are given to demonstrate the boundness of the local estimation and fusion estimation covariance. Finally, a simulation example is given to show the usefulness of the presented algorithm.  相似文献   

4.
《Journal of The Franklin Institute》2022,359(18):11155-11185
Nowadays, cyber-physical systems (CPSs) have been widely used in various fields due to their powerful performance and low cost. The cyber attacks will cause security risks and even huge losses according to the universality and vulnerability of CPSs. As a typical network attack, deception attacks have the features of high concealment and strong destructiveness. Compared with the traditional deception attack models with a constant value, a deception attack with random characteristics is introduced in this paper, which is difficult to identify. In order to defend against such deception attacks and overcome energy constraints in CPSs, the secure state estimation and the event-triggered communication mechanism without feedback information are co-considered to reconcile accuracy of estimation and energy consumption. Firstly, an event-triggered augmented state estimator is proposed for secure state estimation and attack identification. Then, under the ideology of equivalence, the augmented state estimator is derived as a concise two-stage estimator with reduced order. The two-stage estimator can perform the secure state estimation and attack identification respectively. The estimators ensure the accuracy of attack identification well since not treating attack information as the trigger event. Afterward, the comparison of the computational complexity of these two algorithms is analyzed. Finally, an example of a target tracking system is supplied to prove the effectiveness and efficiency of the proposed algorithm.  相似文献   

5.
This study investigates the leader-following consensus issue of multi-agent systems subject to simultaneous connectivity-mixed attacks, actuator/sensor faults and disturbances. Connectivity-mixed attacks are remodeled into connectivity-maintained and connectivity-paralyzed topologies in a switched version, and actuator/sensor faults are established with unified incipient-type and abrupt-type characteristics. Then, unknown input observer-based decoupling and estimation are incorporated to achieve unknown state and fault observations with the normalized technique, and the leader-following consensus-based compensation to faults, resilience to attacks and robustness to disturbances are also realized with the neighboring output information and sensor fault estimation through the distributed framework. Criteria of achieving exponential leader-following consensus of multi-agent systems under cyber-physical threats are derived with dual attack frequency and activation rate indicators. Simulation example is conducted to exemplify the validation and merits of the proposed leader-following consensus algorithm.  相似文献   

6.
This paper investigates the controller design problem of cyber-physical systems (CPSs) to ensure the reliability and security when actuator faults in physical layers and attacks in cyber layers occur simultaneously. The actuator faults are time-varying, which cover bias fault, outage, loss of effectiveness and stuck. Besides that, some state-dependent cyber attacks are launched in control input commands and system measurement data channels, which may lead state information to the opposite direction. A novel co-design controller scheme is constructed by adopting a new Lyapunov function, Nussbaum-type function, and direct adaptive technique, which may further relax the requirements of actuator/sensor attacks information. It is proven that the states of the closed-loop system asymptotically converge to zero even if actuator faults, actuator attacks and sensor attack are time-varying and co-existing. Finally, simulation results are presented to show the effectiveness of the proposed control method.  相似文献   

7.
In this paper, the centralized security-guaranteed filtering problem is studied for linear time-invariant stochastic systems with multirate-sensor fusion under deception attacks. The underlying system includes a number of sensor nodes with a centralized filter, where each sensor is allowed to be sampled at different rate. A new measurement output model is proposed to characterize both the multiple rates and the deception attacks. By exploiting the lifting technique, the multi-rate sensor system is cast into a single-rate discrete-time system. With a new concept of security level, the aim of this paper is to design a filter such that the filtering error dynamics achieves the prescribed level of the security under deception attacks. By using the stochastic analysis techniques, sufficient conditions are first derived such that the filtering error system is guaranteed to have the desired security level, and then the filter gain is parameterized by using the semi-definite programme method with certain nonlinear constraints. Finally, a numerical simulation example is provided to demonstrate the feasibility of the proposed filtering scheme.  相似文献   

8.
In this paper, we investigate the optimal local sensor decision rule based on non-ideal transmission channels between local sensors and the fusion center for distributed target detection system. The optimality of a likelihood-ratio test (LRT)-based local decision rule at local sensor, which requires only the knowledge of channel statistics instead of instantaneous channel state information (CSI), is established. The coupled local decision rule at each sensor is derived in a closed-form for coherent BPSK and OOK and non-coherent OOK. The iterative person-by-person optimization (PBPO) algorithm is employed to solve the coupled local thresholds. Simulation analysis reveals that the derived thresholds according to the local decision rule are consistent to the exhaustive searching. Furthermore, the detection performance of the system with the proposed optimal local decision rule for different reception modes and modulations is analyzed and compared.  相似文献   

9.
In this paper, we focus on the false data injection attacks (FDIAs) on state estimation and corresponding countermeasures for data recovery in smart grid. Without the information about the topology and parameters of systems, two data-driven attacks (DDAs) with noisy measurements are constructed, which can escape the detection from the residue-based bad data detection (BDD) in state estimator. Moreover, in view of the limited energy of adversaries, the feasibility of proposed DDAs is improved, such as more sparse and low-cost DDAs than existing work. In addition, a new algorithm for measurement data recovery is introduced, which converts the data recovery problem against the DDAs into the problem of the low rank approximation with corrupted and noisy measurements. Especially, the online low rank approximate algorithm is employed to improve the real-time performance. Finally, the information on the 14-bus power system is employed to complete the simulation experiments. The results show that the constructed DDAs are stealthy under BBD but can be eliminated by the proposed data recovery algorithms, which improve the resilience of the state estimator against the attacks.  相似文献   

10.
11.
This paper is concerned with the event-based fusion estimation problem for a class of multi-rate systems (MRSs) subject to sensor degradations. The MRSs under consideration include several sensor nodes with different sampling rates. To facilitate the filter design, the MRSs are transformed into a single-rate system (SRS) by using an augmentation approach. A set of random variables obeying known probability distributions are used to characterize the phenomenon of the sensor degradations. For the purpose of saving the limited communication resources, the event-triggering mechanism (ETM) is adopted to regulate the transmission frequency of the measurements. For the addressed MRSs, we aim to design a set of event-based local filters for each sensor node such that the upper bound of each local filtering error covariance (FEC) is guaranteed and minimized by designing the filter parameter appropriately. Subsequently, the local estimates are fused with the aid of covariance intersection (CI) fusion approach. Finally, a numerical experiment is exploited to demonstrate the usefulness of the developed fusion estimation algorithm.  相似文献   

12.
This article investigates the rendezvous problem of heterogeneous multi-agent systems against Denial-of-Service attacks with preserving initial connectivity under a dynamic communication topology. The algorithm of resisting Denial-of-Service attack is first introduced to connectivity-preserving rendezvous problem of heterogeneous multi-agent systems. First of all, in order to observe the information of the leader, the distributed observers are designed to estimate the state of the leader with the communication network in the presence of Denial-of-Service attack by adaptive algorithm. Then, a switching system model is constructed by taking into account the influence of Denial-of-Service attacks. By means of the obtained model combined with a artificial potential function technique, the proposed distributed control algorithm allows all agents to accomplish rendezvous assignment with connectivity preservation as well as resisting Denial-of-Service attacks. Finally, detailed simulation validates the effectiveness of the proposed distributed observer and controller algorithm.  相似文献   

13.
董坤祥  谢宗晓  甄杰 《科研管理》2006,40(11):164-174
网络空间安全是国家安全和经济安全的基础。本文基于恶意软件的两种攻击方式和三种用户防治策略,构建网络空间安全视阈下恶意软件攻防的系统动力学模型,对攻防组合策略进行了交叉分析,并用调研数据验证了模型的有效性。研究发现:在恶意软件的预防、应对阶段,安全教育和安全工具投资可抑制恶意软件传播,减少系统安全脆弱性;恢复阶段的成本投入可减少用户损失;针对不同的防治目标,用户应采取不同的组合防治策略。最后提出的对策建议为用户实施有效的恶意软件防治提供理论与实践指导。  相似文献   

14.
董坤祥  谢宗晓  甄杰 《科研管理》2019,40(11):164-174
网络空间安全是国家安全和经济安全的基础。本文基于恶意软件的两种攻击方式和三种用户防治策略,构建网络空间安全视阈下恶意软件攻防的系统动力学模型,对攻防组合策略进行了交叉分析,并用调研数据验证了模型的有效性。研究发现:在恶意软件的预防、应对阶段,安全教育和安全工具投资可抑制恶意软件传播,减少系统安全脆弱性;恢复阶段的成本投入可减少用户损失;针对不同的防治目标,用户应采取不同的组合防治策略。最后提出的对策建议为用户实施有效的恶意软件防治提供理论与实践指导。  相似文献   

15.
云计算的特点是具有强大的计算能力和存储能力。入侵检测技术在网络安全技术中占有重要地位,但目前的入侵检测技术仍存在许多尚未解决的问题,如无法应对分布式大规模数据流攻击等。移动代理技术可给入侵检测系统带来更好的灵活性和可扩展性,结合移动代理的优势,构造了云环境下基于移动代理的入侵检测系统框架。采用NS2软件分别模拟一般网络条件与云环境下基于移动代理框架的DDoS节点攻击的两种场景,实验结果表明,云环境下基于移动代理框架的检测效果更佳。  相似文献   

16.
The distributed event-triggered secure consensus control is discussed for multi-agent systems (MASs) subject to DoS attacks and controller gain variation. In order to reduce unnecessary network traffic in communication channel, a resilient distributed event-triggered scheme is adopted at each agent to decide whether the sampled signal should be transmitted or not. The event-triggered scheme in this paper can be applicable to MASs under denial-of-service (DoS) attacks. We assume the information of DoS attacks, such as the attack period and the consecutive attack duration, can be detected. Under the introduced communication scheme and the occurrence of DoS attacks, a new sufficient condition is achieved which can guarantee the security consensus performance of the established system model. Moreover, the explicit expressions of the triggering matrices and the controller gain are presented. Finally, simulation results are provided to verify the effectiveness of the obtained theoretical results.  相似文献   

17.
With the development of information technology and economic growth, the Internet of Things (IoT) industry has also entered the fast lane of development. The IoT industry system has also gradually improved, forming a complete industrial foundation, including chips, electronic components, equipment, software, integrated systems, IoT services, and telecom operators. In the event of selective forwarding attacks, virus damage, malicious virus intrusion, etc., the losses caused by such security problems are more serious than those of traditional networks, which are not only network information materials, but also physical objects. The limitations of sensor node resources in the Internet of Things, the complexity of networking, and the open wireless broadcast communication characteristics make it vulnerable to attacks. Intrusion Detection System (IDS) helps identify anomalies in the network and takes the necessary countermeasures to ensure the safe and reliable operation of IoT applications. This paper proposes an IoT feature extraction and intrusion detection algorithm for intelligent city based on deep migration learning model, which combines deep learning model with intrusion detection technology. According to the existing literature and algorithms, this paper introduces the modeling scheme of migration learning model and data feature extraction. In the experimental part, KDD CUP 99 was selected as the experimental data set, and 10% of the data was used as training data. At the same time, the proposed algorithm is compared with the existing algorithms. The experimental results show that the proposed algorithm has shorter detection time and higher detection efficiency.  相似文献   

18.
This paper is concerned with a security problem about malicious integrity attacks in state estimation system, in which multiple smart sensors locally measure information and transmit it to a remote fusion estimator though wireless channels. A joint constraint is considered for the attacker behaviour in each channel to keep stealthiness under a residual-based detector on the remote side. In order to degrade the estimator performance, the attacker will maximize the trace of the remote state estimation error covariance which is derived based on Kalman filter theory. It is proved that the optimal linear attack strategy design problem is convex and finally turned into a semi-definite programming problem. In addition, the tendency of attack behaviour on recursive and fixed Kalman filter system is analyzed. Several examples are given to illustrate the theoretical results.  相似文献   

19.
This paper investigates the distributed state estimation problem for a linear time-invariant system characterized by fading measurements and random link failures. We assume that the fading effect of the measurements occurs slowly. Additionally, communication failures between sensors can affect the state estimation performance. To this end, we propose a Kalman filtering algorithm composed of a structural data fusion stage and a signal date fusion stage. The number of communications can be decreased by executing signal data fusion when a global estimate is required. Then, we investigate the stability conditions for the proposed distributed approach. Furthermore, we analyze the mismatch between the estimation generated by the proposed distributed algorithm and that obtained by the centralized Kalman filter. Lastly, numerical results verify the feasibility of the proposed distributed method.  相似文献   

20.
In cyber-physical systems (CPS), cyber threats emerge in many ways which can cause significant destruction to the system operation. In wireless CPS, adversaries can block the communications of useful information by channel jamming, incurring the so-called denial of service (DoS) attacks. In this paper, we investigate the problem of optimal jamming attack scheduling against remote state estimation wireless network. Specifically, we consider that two wireless sensors report data to a remote estimator through two wireless communication channels lying in two unoverlapping frequency bands, respectively. Meanwhile, an adversary can select one and only one channel at a time to execute jamming attack. We prove that the optimal attack schedule is continuously launching attack on one channel determined based on the system dynamics matrix. The theoretical results are validated by numerical simulations.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号