Stabilization of distributed cyber physical systems subject to denial-of-service attack

被引:13
|
作者
Mahmoud, Magdi S. [1 ]
Hamdan, Mutaz M. [1 ]
机构
[1] King Fahd Univ Petr & Minerals, Syst Engn Dept, POB 5067, Dhahran 31261, Saudi Arabia
关键词
Stability; stability analysis; distributed systems; control design; NETWORKS;
D O I
10.1080/00207179.2020.1813908
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber Physical Systems (CPS) are defined over the integrations of computation, communication, and control to achieve the desired performance of modern physical processes. It turns out that security threats have a high possibility of affecting CPS and can be affected by several cyber attacks without providing any indication about failure. In this paper, we examine the stabilisation of distributed CPS affected by a denial of service (DoS) attack. First, a static output feedback controller will be designed to achieve the stability of a nominal distributed system. Then, a simple and typical scenario where communication sequence is purely Round-robin is considered and a bound of attack frequency and duration is calculated to ensure the stability of the distributed CPS. Finally, a numerical example is provided to demonstrate the feasibility of the proposed system.
引用
收藏
页码:692 / 702
页数:11
相关论文
共 50 条
  • [21] Impact of Distributed Denial-of-Service Attack on Advanced Metering Infrastructure
    Satin Asri
    Bernardi Pranggono
    Wireless Personal Communications, 2015, 83 : 2211 - 2223
  • [22] Filter Assignment Policy Against Distributed Denial-of-Service Attack
    Biswas, Rajorshi
    Wu, Jie
    2018 IEEE 24TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS 2018), 2018, : 537 - 544
  • [23] A survey of distributed denial-of-service attack, prevention, and mitigation techniques
    Mahjabin, Tasnuva
    Xiao, Yang
    Sun, Guang
    Jiang, Wangdong
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2017, 13 (12):
  • [24] Impact of Distributed Denial-of-Service Attack on Advanced Metering Infrastructure
    Asri, Satin
    Pranggono, Bernardi
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 83 (03) : 2211 - 2223
  • [25] A detection scheme against Distributed Reflector Denial-of-Service attack
    Kim, YS
    Jeon, JC
    Jeon, JW
    Yoo, KY
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL IX, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING: I, 2004, : 44 - 48
  • [26] Detecting Distributed Denial-of-Service Attack Traffic by Statistical Test
    Chen, Chin-Ling
    2008 THIRD INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1-3, 2008, : 1190 - 1194
  • [27] Response to distributed denial-of-service attack using active technology
    Kim, HJ
    Na, JC
    Sohn, SW
    Proceedings of the Eighth IASTED International Conference on Internet and Multimedia Systems and Applications, 2004, : 244 - 248
  • [28] A Low-Cost Distributed Denial-of-Service Attack Architecture
    Huang, Kaifan
    Yang, Lu-Xing
    Yang, Xiaofan
    Xiang, Yong
    Tang, Yuan Yan
    IEEE ACCESS, 2020, 8 : 42111 - 42119
  • [29] A Forensic Mechanism to Trace the Master of Distributed Denial-of-Service Attack
    Thiruvaazhi, Uloli
    Alex, M. Edington
    INFORMATION SECURITY JOURNAL, 2012, 21 (01): : 36 - 46
  • [30] Experts Detect Biggest Distributed Denial-of-Service Attack Ever
    不详
    COMPUTER, 2014, 47 (04) : 15 - 15