• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于降阶观测器的含状态延迟的信息物理系统攻击估计与状态重构

Attack estimation and state reconstruction for cyber-physical systems with state delay via reduced-order observer.

作者信息

Piao Xianglin, Lin Chong, Zhang Man, Chen Bing

机构信息

Institute of Complexity Science, Shandong Key Laboratory of Industrial Control Technology, School of Automation, Qingdao University, Qingdao 266071, China.

出版信息

ISA Trans. 2024 Jan;144:11-17. doi: 10.1016/j.isatra.2023.10.013. Epub 2023 Oct 16.

DOI:10.1016/j.isatra.2023.10.013
PMID:37891071
Abstract

This paper investigates the attack estimation and state reconstruction problem for linear cyber-physical systems with state delay and simultaneous sensor and actuator attacks. Reduced-order observer is designed for the augmented system to simultaneously estimate the actuator attack, sensor attack and the state of system. By adopting the double integral term into the Lyapunov-Krasovskii functional and decomposing the cross term, the delay-dependent results are obtained. The method proposed in this paper can accurately estimate the state, actuator and sensor attacks simultaneously without additional design. Compared with the previous method, the time delay information is fully utilized and the conservation is greatly reduced. Finally, the correctness of the results is verified by simulation.

摘要

本文研究了具有状态延迟以及同时存在传感器和执行器攻击的线性网络物理系统的攻击估计和状态重构问题。针对增广系统设计了降阶观测器,以同时估计执行器攻击、传感器攻击和系统状态。通过在Lyapunov-Krasovskii泛函中引入双重积分项并分解交叉项,得到了依赖于延迟的结果。本文提出的方法无需额外设计即可同时准确估计状态、执行器和传感器攻击。与先前方法相比,充分利用了时间延迟信息,大大降低了保守性。最后,通过仿真验证了结果的正确性。

相似文献

1
Attack estimation and state reconstruction for cyber-physical systems with state delay via reduced-order observer.基于降阶观测器的含状态延迟的信息物理系统攻击估计与状态重构
ISA Trans. 2024 Jan;144:11-17. doi: 10.1016/j.isatra.2023.10.013. Epub 2023 Oct 16.
2
Fault Estimation Method for Nonlinear Time-Delay System Based on Intermediate Observer-Application on Quadrotor Unmanned Aerial Vehicle.基于中间观测器的非线性时滞系统故障估计方法-在四旋翼无人机中的应用。
Sensors (Basel). 2022 Dec 20;23(1):34. doi: 10.3390/s23010034.
3
Secure Estimation for Cyber-Physical Systems via Sliding Mode.基于滑模的网络物理系统安全估计
IEEE Trans Cybern. 2018 Dec;48(12):3420-3431. doi: 10.1109/TCYB.2018.2825984. Epub 2018 Apr 26.
4
Reliable Control Policy of Cyber-Physical Systems Against a Class of Frequency-Constrained Sensor and Actuator Attacks.针对一类频域受限传感器和执行器攻击的信息物理系统可靠控制策略。
IEEE Trans Cybern. 2018 Dec;48(12):3432-3439. doi: 10.1109/TCYB.2018.2815758. Epub 2018 Mar 27.
5
A Secure Control Learning Framework for Cyber-Physical Systems Under Sensor and Actuator Attacks.传感器和执行器攻击下的网络物理系统安全控制学习框架
IEEE Trans Cybern. 2021 Sep;51(9):4648-4660. doi: 10.1109/TCYB.2020.3006871. Epub 2021 Sep 15.
6
Secure control design for nonlinear cyber-physical systems under DoS, replay, and deception cyber-attacks with multiple transmission channels.具有多传输通道的拒绝服务、重放和欺骗性网络攻击下非线性网络物理系统的安全控制设计
ISA Trans. 2022 Sep;128(Pt B):294-308. doi: 10.1016/j.isatra.2021.11.033. Epub 2021 Dec 13.
7
Distributed interval state estimation with l-gain optimization for cyber-physical systems subject to bounded disturbance and random stealthy attacks.针对受有界干扰和随机隐蔽攻击的信息物理系统,基于 l 增益优化的分布式区间状态估计
ISA Trans. 2022 Aug;127:22-31. doi: 10.1016/j.isatra.2022.01.010. Epub 2022 Jan 12.
8
Lyapunov matrix-based adaptive resilient control for unmanned marine vehicles with sensor and thruster attacks.基于李雅普诺夫矩阵的无人航海器传感器与推进器攻击下的自适应弹性控制
ISA Trans. 2024 Oct;153:70-77. doi: 10.1016/j.isatra.2024.08.005. Epub 2024 Aug 6.
9
Stabilization of Periodic Piecewise Time-Varying Systems With Time-Varying Delay Under Multiple Cyber Attacks: An Augmented Lyapunov Functional Approach.多重网络攻击下具有时变延迟的周期分段时变系统的镇定:一种增广李雅普诺夫泛函方法
IEEE Trans Cybern. 2024 Aug;54(8):4389-4401. doi: 10.1109/TCYB.2023.3311609. Epub 2024 Jul 18.
10
Stealthy false data injection attacks with resource constraints against multi-sensor estimation systems.针对多传感器估计系统的具有资源约束的隐蔽虚假数据注入攻击。
ISA Trans. 2022 Aug;127:32-40. doi: 10.1016/j.isatra.2022.02.045. Epub 2022 Mar 4.