Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/108952
PIRA download icon_1.1View/Download Full Text
DC FieldValueLanguage
dc.contributorDepartment of Applied Mathematicsen_US
dc.creatorLi, Ben_US
dc.creatorZhou, Xen_US
dc.creatorNing, Zen_US
dc.creatorGuan, Xen_US
dc.creatorYiu, KFCen_US
dc.date.accessioned2024-09-11T08:33:51Z-
dc.date.available2024-09-11T08:33:51Z-
dc.identifier.issn0020-0255en_US
dc.identifier.urihttp://hdl.handle.net/10397/108952-
dc.language.isoenen_US
dc.publisherElsevier Inc.en_US
dc.rights© 2022 Elsevier Inc. All rights reserved.en_US
dc.rights© 2022. This manuscript version is made available under the CC-BY-NC-ND 4.0 license https://creativecommons.org/licenses/by-nc-nd/4.0/en_US
dc.rightsThe following publication Li, B., Zhou, X., Ning, Z., Guan, X., & Yiu, K.-F. C. (2022). Dynamic event-triggered security control for networked control systems with cyber-attacks: A model predictive control approach. Information Sciences, 612, 384-398 is available at https://doi.org/10.1016/j.ins.2022.08.093.en_US
dc.subjectDeception attacksen_US
dc.subjectDynamic event-triggered protocolen_US
dc.subjectModel predictive controlen_US
dc.subjectPacket dropoutsen_US
dc.subjectSecurity controlen_US
dc.titleDynamic event-triggered security control for networked control systems with cyber-attacks : a model predictive control approachen_US
dc.typeJournal/Magazine Articleen_US
dc.identifier.spage384en_US
dc.identifier.epage398en_US
dc.identifier.volume612en_US
dc.identifier.doi10.1016/j.ins.2022.08.093en_US
dcterms.abstractThis article studies a dynamic event-triggered security control problem for networked control systems subject to deception attacks and packet dropouts. First, a combined cyberattack model is proposed, which utilises two sets of independent stochastic sequences to reflect randomly occurring cyber-attacks. Subsequently, a dynamic event-triggered protocol is constructed to relieve the restricted bandwidth pressure by reducing the data transmission of the communication channel from the plant to the controller. With the consideration of randomly occurring deception attacks, packet dropouts, and dynamic event-triggered protocols, an online model predictive control algorithm is established to ensure the stochastic stability of the closed-loop model with expected H2=H1 performance. Finally, two examples are simulated to interpret the validity and effectiveness of the proposed design strategy.en_US
dcterms.accessRightsopen accessen_US
dcterms.bibliographicCitationInformation sciences, Oct. 2022, v. 612, p. 384-398en_US
dcterms.isPartOfInformation sciencesen_US
dcterms.issued2022-10-
dc.identifier.scopus2-s2.0-85137179713-
dc.identifier.eissn1872-6291en_US
dc.description.validate202409 bcchen_US
dc.description.oaAccepted Manuscripten_US
dc.identifier.FolderNumbera3186b-
dc.identifier.SubFormID49749-
dc.description.fundingSourceRGCen_US
dc.description.pubStatusPublisheden_US
dc.description.oaCategoryGreen (AAM)en_US
Appears in Collections:Journal/Magazine Article
Files in This Item:
File Description SizeFormat 
Li_Dynamic_Event-triggered_Security.pdfPre-Published version835.75 kBAdobe PDFView/Open
Open Access Information
Status open access
File Version Final Accepted Manuscript
Access
View full-text via PolyU eLinks SFX Query
Show simple item record

Page views

47
Citations as of Apr 14, 2025

Downloads

73
Citations as of Apr 14, 2025

SCOPUSTM   
Citations

138
Citations as of Sep 12, 2025

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.