Yuan Wang;Huaicheng Yan;Ju H. Park;Hao Zhang;Hao Shen
{"title":"Protocol-Based Control for Hidden Markov Jump Systems With Incomplete Transition Descriptions Against Injection Attacks","authors":"Yuan Wang;Huaicheng Yan;Ju H. Park;Hao Zhang;Hao Shen","doi":"10.1109/TCNS.2024.3446696","DOIUrl":null,"url":null,"abstract":"This article aims to design the dynamic event-triggered protocol for hidden Markov jump systems subject to injection attacks. We initially introduce the hidden Markov model (HMM), which accommodates incomplete transition descriptions found in both the transition probability matrix and the observation probability matrix of the observation signal. Importantly, the underlying HMM demonstrates applicability to a broader range of scenarios than certain existing works. Furthermore, data are vulnerable to cyberattacks before being transmitted to the controller due to the open communication architecture, in which adversaries are assumed to inject false data that are capable of affecting data security. To effectively mitigate unnecessary utilization, we develop a novel dynamic event-based protocol involving dynamic threshold parameter and system modes in the feedback channel. Our methodology tackles the vulnerability of data to cyberattacks in open communication architectures, and the proposed protocol provides a feasible security solution for the hidden Markov jump systems. Eventually, the theoretical findings are demonstrated by two provided simulation examples.","PeriodicalId":56023,"journal":{"name":"IEEE Transactions on Control of Network Systems","volume":"12 1","pages":"165-176"},"PeriodicalIF":4.0000,"publicationDate":"2024-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Control of Network Systems","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10640295/","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
Protocol-Based Control for Hidden Markov Jump Systems With Incomplete Transition Descriptions Against Injection Attacks
This article aims to design the dynamic event-triggered protocol for hidden Markov jump systems subject to injection attacks. We initially introduce the hidden Markov model (HMM), which accommodates incomplete transition descriptions found in both the transition probability matrix and the observation probability matrix of the observation signal. Importantly, the underlying HMM demonstrates applicability to a broader range of scenarios than certain existing works. Furthermore, data are vulnerable to cyberattacks before being transmitted to the controller due to the open communication architecture, in which adversaries are assumed to inject false data that are capable of affecting data security. To effectively mitigate unnecessary utilization, we develop a novel dynamic event-based protocol involving dynamic threshold parameter and system modes in the feedback channel. Our methodology tackles the vulnerability of data to cyberattacks in open communication architectures, and the proposed protocol provides a feasible security solution for the hidden Markov jump systems. Eventually, the theoretical findings are demonstrated by two provided simulation examples.
期刊介绍:
The IEEE Transactions on Control of Network Systems is committed to the timely publication of high-impact papers at the intersection of control systems and network science. In particular, the journal addresses research on the analysis, design and implementation of networked control systems, as well as control over networks. Relevant work includes the full spectrum from basic research on control systems to the design of engineering solutions for automatic control of, and over, networks. The topics covered by this journal include: Coordinated control and estimation over networks, Control and computation over sensor networks, Control under communication constraints, Control and performance analysis issues that arise in the dynamics of networks used in application areas such as communications, computers, transportation, manufacturing, Web ranking and aggregation, social networks, biology, power systems, economics, Synchronization of activities across a controlled network, Stability analysis of controlled networks, Analysis of networks as hybrid dynamical systems.