Important-Data-Based DoS Attack Mechanism and Resilient H8 Filter Design for Networked T-S Fuzzy Systems

被引:30
|
作者
Wang, Xun [1 ,2 ]
Tian, Engang [1 ]
Zheng, Wei Xing [3 ]
Xie, Xiangpeng [4 ]
机构
[1] Univ Shanghai Sci & Technol, Sch Opt Elect & Comp Engn, Shanghai 200093, Peoples R China
[2] Tongji Univ, Shanghai Res Inst Intelligent Autonomous Syst, Shanghai 200092, Peoples R China
[3] Western Sydney Univ, Sch Comp Data & Math Sci, Sydney, NSW, Australia
[4] Nanjing Univ Posts & Telecommun, Inst Adv Technol, Nanjing 210023, Peoples R China
基金
中国国家自然科学基金; 上海市自然科学基金;
关键词
Important-data-based (IDB) denial-of-service (DoS) attack mechanism; networked Takagi-Sugeno (T-S) fuzzy systems; resilient Hop fuzzy filter; STATE ESTIMATION; UNCERTAINTIES;
D O I
10.1109/TCYB.2023.3285526
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article is concerned with the security problems for networked Takagi-Sugeno (T-S) fuzzy systems with asyn-chronous premise constraints. The primary objective of this article is twofold. First, a novel important-data-based (IDB) denial-of-service (DoS) attack mechanism is proposed from the perspective of the adversary for the first time to reinforce the destructive effect of the DoS attacks. Different from most existing DoS attack models, the proposed attack mechanism can utilize the information of packets, evaluate the importance degree of packets, and only attack the most "important" ones. As such, a larger system performance degradation can be expected. Second, corresponding to the proposed IDB DoS mechanism, a resilient Hop fuzzy filter is designed from the defender's point of view to alleviate the negative effect of the attack. Furthermore, since the defender does not know the attack parameter, an algorithm is designed to estimate it. In a word, a unified attack-defense framework is developed in this article for networked T-S fuzzy systems with asynchronous premise constraints. With the help of the Lyapunov functional method, sufficient conditions are suc-cessfully established to compute the desired filtering gains and ensure the Hop performance of the filtering error system. Finally, two examples are exploited to demonstrate the destructiveness of the proposed IDB DoS attack and the usefulness of the developed resilient Hop filter.
引用
收藏
页码:3352 / 3362
页数:11
相关论文
共 50 条
  • [21] H∞ filter design for discrete-time-delay T-S fuzzy systems
    Li, Jianzhen
    Zhou, Shaosheng
    Chai, Li
    Zhang, Yuejin
    PROCEEDINGS OF THE 2007 IEEE CONFERENCE ON CONTROL APPLICATIONS, VOLS 1-3, 2007, : 584 - 587
  • [22] Finite frequency H∞ filter design for T-S fuzzy systems: New approach
    El Hellani, Doha
    El Hajjaji, Ahmed
    Ceschi, Roger
    SIGNAL PROCESSING, 2018, 143 : 191 - 199
  • [23] Security Control of Networked T-S Fuzzy System Under Intermittent DoS Jamming Attack with Event-Based Predictor
    Ge, Hui
    Yue, Dong
    Xie, Xiangpeng
    Deng, Song
    Hu, Songlin
    INTERNATIONAL JOURNAL OF FUZZY SYSTEMS, 2019, 21 (03) : 700 - 714
  • [24] Event-based fuzzy control for T-S fuzzy networked systems with various data missing
    Chen, Ziran
    Zhang, Baoyong
    Stojanovic, Vladimir
    Zhang, Yijun
    Zhang, Zhengqiang
    Neurocomputing, 2020, 417 : 322 - 332
  • [25] Event-based fuzzy control for T-S fuzzy networked systems with various data missing
    Chen, Ziran
    Zhang, Baoyong
    Stojanovic, Vladimir
    Zhang, Yijun
    Zhang, Zhengqiang
    NEUROCOMPUTING, 2020, 417 : 322 - 332
  • [26] Event-based resilient H∞ fuzzy filter design under DoS attacks
    Cheng, Zihao
    Yue, Dong
    Hu, Songlin
    Chen, Lei
    PROCEEDINGS OF 2018 5TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS (CCIS), 2018, : 198 - 202
  • [27] H8 model reduction of 2D discrete-time T-S fuzzy systems
    El-Amrani, Abderrahim
    Boukili, Bensalem
    El Hajjaji, Ahmed
    Boumhidi, Ismail
    INTERNATIONAL JOURNAL OF AUTONOMOUS AND ADAPTIVE COMMUNICATIONS SYSTEMS, 2023, 16 (04) : 404 - 418
  • [28] Networked H∞ Filtering for T-S Fuzzy Systems Based on Event-Triggered Scheme
    Wang, Qi
    Jia, Xinchun
    Chi, Xiaobo
    He, Dezhi
    Ma, Weiwei
    PROCEEDINGS OF THE 10TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION (WCICA 2012), 2012, : 1037 - 1042
  • [29] H∞ Filtering for Networked T-S Fuzzy Systems With Medium Access Constraint
    Zhang, Changzhu
    Qiu, Jianbin
    Zhang, Hao
    2014 INTERNATIONAL CONFERENCE ON MECHATRONICS AND CONTROL (ICMC), 2014, : 646 - 651
  • [30] Event-based H∞ filter design for T-S fuzzy systems with randomly occurring sensor saturations
    Tan, Yushun
    Liu, Jinliang
    Zhang, Yuanyuan
    2015 34TH CHINESE CONTROL CONFERENCE (CCC), 2015, : 3623 - 3628