Wen-Hui Wang , Yan-Wu Wang , Meng-Jie Hu , Wu Yang
{"title":"恶意攻击和比特率限制下网络控制系统的稳定性","authors":"Wen-Hui Wang , Yan-Wu Wang , Meng-Jie Hu , Wu Yang","doi":"10.1016/j.jfranklin.2024.107319","DOIUrl":null,"url":null,"abstract":"<div><div>This article investigates the stability of networked control systems under two types of malicious attacks and bit rate constraints. The malicious attacks may lead to parameter mismatches, including scaling variable mismatches between the encoder and decoder sides and discrepancies between the data sent by the encoder and received by the decoder, causing system instability. To address these issues, scaling variable update rules are proposed for the encoder and decoder sides separately to mitigate the adverse effects of malicious attacks. A control strategy featuring a compensation term is designed to counteract the detrimental impacts of the mismatch. A lower bound on the bit rate is established to prevent quantization saturation and achieve exponential stability of the system. Finally, confirmatory and comparative simulations showcase the effectiveness of the theoretical insights and the merits of the proposed strategies, respectively.</div></div>","PeriodicalId":17283,"journal":{"name":"Journal of The Franklin Institute-engineering and Applied Mathematics","volume":"361 18","pages":"Article 107319"},"PeriodicalIF":3.7000,"publicationDate":"2024-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Stability of networked control systems under malicious attacks and bit rate constraints\",\"authors\":\"Wen-Hui Wang , Yan-Wu Wang , Meng-Jie Hu , Wu Yang\",\"doi\":\"10.1016/j.jfranklin.2024.107319\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>This article investigates the stability of networked control systems under two types of malicious attacks and bit rate constraints. The malicious attacks may lead to parameter mismatches, including scaling variable mismatches between the encoder and decoder sides and discrepancies between the data sent by the encoder and received by the decoder, causing system instability. To address these issues, scaling variable update rules are proposed for the encoder and decoder sides separately to mitigate the adverse effects of malicious attacks. A control strategy featuring a compensation term is designed to counteract the detrimental impacts of the mismatch. A lower bound on the bit rate is established to prevent quantization saturation and achieve exponential stability of the system. Finally, confirmatory and comparative simulations showcase the effectiveness of the theoretical insights and the merits of the proposed strategies, respectively.</div></div>\",\"PeriodicalId\":17283,\"journal\":{\"name\":\"Journal of The Franklin Institute-engineering and Applied Mathematics\",\"volume\":\"361 18\",\"pages\":\"Article 107319\"},\"PeriodicalIF\":3.7000,\"publicationDate\":\"2024-10-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of The Franklin Institute-engineering and Applied Mathematics\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0016003224007403\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of The Franklin Institute-engineering and Applied Mathematics","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0016003224007403","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
Stability of networked control systems under malicious attacks and bit rate constraints
This article investigates the stability of networked control systems under two types of malicious attacks and bit rate constraints. The malicious attacks may lead to parameter mismatches, including scaling variable mismatches between the encoder and decoder sides and discrepancies between the data sent by the encoder and received by the decoder, causing system instability. To address these issues, scaling variable update rules are proposed for the encoder and decoder sides separately to mitigate the adverse effects of malicious attacks. A control strategy featuring a compensation term is designed to counteract the detrimental impacts of the mismatch. A lower bound on the bit rate is established to prevent quantization saturation and achieve exponential stability of the system. Finally, confirmatory and comparative simulations showcase the effectiveness of the theoretical insights and the merits of the proposed strategies, respectively.
期刊介绍:
The Journal of The Franklin Institute has an established reputation for publishing high-quality papers in the field of engineering and applied mathematics. Its current focus is on control systems, complex networks and dynamic systems, signal processing and communications and their applications. All submitted papers are peer-reviewed. The Journal will publish original research papers and research review papers of substance. Papers and special focus issues are judged upon possible lasting value, which has been and continues to be the strength of the Journal of The Franklin Institute.