伪数据注入攻击下多路网络的双部同步控制

IF 3.8 2区 数学 Q1 MATHEMATICS, APPLIED
Lianlian Ma , Zhengxin Wang , Mei Hong , Cong Zheng , Min Xiao
{"title":"伪数据注入攻击下多路网络的双部同步控制","authors":"Lianlian Ma ,&nbsp;Zhengxin Wang ,&nbsp;Mei Hong ,&nbsp;Cong Zheng ,&nbsp;Min Xiao","doi":"10.1016/j.cnsns.2025.109336","DOIUrl":null,"url":null,"abstract":"<div><div>In this paper, the bipartite synchronization problem of leader-follower multiplex networks under false data injection (FDI) attacks is studied via pinning control. The sensor-to-controller channels of followers directly connected to the leader are compromised by FDI attacks. Firstly, followers that are directly connected to the leader in each layer of multiplex networks are controlled to reach bipartite synchronization under FDI attacks. Then, the results are further extended to the multiplex networks, where only the followers in the first few layers that are connected to the leader are controlled. Finally, stochastic FDI attacks are considered. In order to eliminate the influence of FDI attacks, observers and attack compensators are designed. Based on the observer data and compensator data, control strategies are designed and sufficient criteria of bipartite bounded synchronization are obtained. Moreover, stochastic FDI attacks follow Bernoulli distribution. Furthermore, the simulation results verify the effectiveness of the proposed control strategies.</div></div>","PeriodicalId":50658,"journal":{"name":"Communications in Nonlinear Science and Numerical Simulation","volume":"152 ","pages":"Article 109336"},"PeriodicalIF":3.8000,"publicationDate":"2025-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Bipartite synchronization for multiplex networks under false data injection attacks via pinning control\",\"authors\":\"Lianlian Ma ,&nbsp;Zhengxin Wang ,&nbsp;Mei Hong ,&nbsp;Cong Zheng ,&nbsp;Min Xiao\",\"doi\":\"10.1016/j.cnsns.2025.109336\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>In this paper, the bipartite synchronization problem of leader-follower multiplex networks under false data injection (FDI) attacks is studied via pinning control. The sensor-to-controller channels of followers directly connected to the leader are compromised by FDI attacks. Firstly, followers that are directly connected to the leader in each layer of multiplex networks are controlled to reach bipartite synchronization under FDI attacks. Then, the results are further extended to the multiplex networks, where only the followers in the first few layers that are connected to the leader are controlled. Finally, stochastic FDI attacks are considered. In order to eliminate the influence of FDI attacks, observers and attack compensators are designed. Based on the observer data and compensator data, control strategies are designed and sufficient criteria of bipartite bounded synchronization are obtained. Moreover, stochastic FDI attacks follow Bernoulli distribution. Furthermore, the simulation results verify the effectiveness of the proposed control strategies.</div></div>\",\"PeriodicalId\":50658,\"journal\":{\"name\":\"Communications in Nonlinear Science and Numerical Simulation\",\"volume\":\"152 \",\"pages\":\"Article 109336\"},\"PeriodicalIF\":3.8000,\"publicationDate\":\"2025-09-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Communications in Nonlinear Science and Numerical Simulation\",\"FirstCategoryId\":\"100\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1007570425007452\",\"RegionNum\":2,\"RegionCategory\":\"数学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"MATHEMATICS, APPLIED\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Communications in Nonlinear Science and Numerical Simulation","FirstCategoryId":"100","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1007570425007452","RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"MATHEMATICS, APPLIED","Score":null,"Total":0}
引用次数: 0

摘要

本文通过钉住控制研究了leader-follower多路网络在虚假数据注入(FDI)攻击下的二部同步问题。直接连接到领导者的追随者的传感器到控制器通道受到FDI攻击的破坏。首先,控制多路网络各层中与leader直接相连的follower,使其在FDI攻击下达到双部同步。然后,将结果进一步扩展到复用网络,其中仅控制与领导者连接的前几层中的追随者。最后,考虑随机FDI攻击。为了消除FDI攻击的影响,设计了观察器和攻击补偿器。基于观测器数据和补偿器数据,设计了控制策略,得到了二部有界同步的充分判据。此外,FDI的随机攻击服从伯努利分布。仿真结果验证了所提控制策略的有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Bipartite synchronization for multiplex networks under false data injection attacks via pinning control
In this paper, the bipartite synchronization problem of leader-follower multiplex networks under false data injection (FDI) attacks is studied via pinning control. The sensor-to-controller channels of followers directly connected to the leader are compromised by FDI attacks. Firstly, followers that are directly connected to the leader in each layer of multiplex networks are controlled to reach bipartite synchronization under FDI attacks. Then, the results are further extended to the multiplex networks, where only the followers in the first few layers that are connected to the leader are controlled. Finally, stochastic FDI attacks are considered. In order to eliminate the influence of FDI attacks, observers and attack compensators are designed. Based on the observer data and compensator data, control strategies are designed and sufficient criteria of bipartite bounded synchronization are obtained. Moreover, stochastic FDI attacks follow Bernoulli distribution. Furthermore, the simulation results verify the effectiveness of the proposed control strategies.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Communications in Nonlinear Science and Numerical Simulation
Communications in Nonlinear Science and Numerical Simulation MATHEMATICS, APPLIED-MATHEMATICS, INTERDISCIPLINARY APPLICATIONS
CiteScore
6.80
自引率
7.70%
发文量
378
审稿时长
78 days
期刊介绍: The journal publishes original research findings on experimental observation, mathematical modeling, theoretical analysis and numerical simulation, for more accurate description, better prediction or novel application, of nonlinear phenomena in science and engineering. It offers a venue for researchers to make rapid exchange of ideas and techniques in nonlinear science and complexity. The submission of manuscripts with cross-disciplinary approaches in nonlinear science and complexity is particularly encouraged. Topics of interest: Nonlinear differential or delay equations, Lie group analysis and asymptotic methods, Discontinuous systems, Fractals, Fractional calculus and dynamics, Nonlinear effects in quantum mechanics, Nonlinear stochastic processes, Experimental nonlinear science, Time-series and signal analysis, Computational methods and simulations in nonlinear science and engineering, Control of dynamical systems, Synchronization, Lyapunov analysis, High-dimensional chaos and turbulence, Chaos in Hamiltonian systems, Integrable systems and solitons, Collective behavior in many-body systems, Biological physics and networks, Nonlinear mechanical systems, Complex systems and complexity. No length limitation for contributions is set, but only concisely written manuscripts are published. Brief papers are published on the basis of Rapid Communications. Discussions of previously published papers are welcome.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信