Next Article in Journal
Dynamics and Computed-Muscle-Force Control of a Planar Muscle-Driven Snake Robot
Previous Article in Journal
Preliminary Assessment of an FBG-Based Landing Gear Weight on Wheel System
Previous Article in Special Issue
Fusion Localization Algorithm Based on Robust IMM Model Combined with Semi-Definite Programming
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

H Control for ICPS with Hybrid-Triggered Mechanism Encountering Stealthy DoS Jamming Attacks

1
China Industrial Control Systems Cyber Emergency Response Team, Beijing 100040, China
2
State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450001, China
3
College of Control Science and Engineering, Zhejiang University, Hangzhou 310027, China
*
Author to whom correspondence should be addressed.
Actuators 2022, 11(7), 193; https://doi.org/10.3390/act11070193
Submission received: 6 June 2022 / Revised: 10 July 2022 / Accepted: 14 July 2022 / Published: 16 July 2022
(This article belongs to the Special Issue Wireless Sensor–Actuator Networks)

Abstract

:
In recent years, with the upgrading of the attack technology, stealthy DoS jamming attacks have become the primary factor to threaten the security of Industrial Cyber-Physical Systems (ICPS). Considering the complex industrial scenarios of ICPS, which are influenced by a variety of external and internal interference, a H controller designing problem is studied in this paper for an ICPS which deploys a hybrid-triggered mechanism (HTM) in the wireless channel encountering stealthy DoS jamming attacks. By employing a compensation mechanism which is employed in the controller to mitigate the impacts of attacks, external disturbance, limited channel capacity, wireless channel noise, we establish a closed-loop system and prove the closed-loop system is mean square exponentially stable and can achieve the desired H disturbance rejection level theoretically. Finally, simulation examples are used to demonstrate effectiveness of the proposed H controller.

1. Introduction

Recently, the traditional “air-gap” Industrial Control System (ICS) has been deeply integrated with advanced information technology (IT) and communication technology (CT) under the trend of Industry 4.0 [1], and then the Industrial Cyber-Physical System (ICPS) [2,3,4,5] was proposed and can be employed in many crucial infrastructures, such as smart grids [6], transportation systems [7], smart buildings [8], etc. However, almost all the ICPSs are facing serious security issues due to the lack of consideration of effective security guaranteeing mechanisms when engineers design and deploy an ICS [9]. In the past decade, many security events of ICPS occurred in nuclear facility, petroleum industry, and subway system, which resulted in huge economic loss and great social instability [10,11,12]. After analyzing the intrusion processes of these malicious security events, researchers found that these attackers not only have a comprehensive information of the system, but also have the ability to bypass intrusion detection systems and launch stealthy attacks [13,14]. Obviously, the ICPSs are at a distinct disadvantage from the defender’s point of view.
As a research hotspot, recently, security issues in different control scenarios have been studied [15], and malicious attacks have been categorized into Denial-of-Service (DoS) jamming attacks, false data injection attacks, replay attacks, wormhole attacks, etc. [16,17,18,19,20]. Due to the integration of more shared and general CTs in ICPSs, DoS jamming attacks, which aim to interference communication quality, can be considered as the most reachable attacks [21,22,23,24]. Foroush et al. [25] established a periodic attack strategy for a DoS jammer in which partial information has been detected, and then studied a resilience controller design problem for a remote wireless control scenario. However, the assumption of partial information of the jammer has been detected, which is conservative from the view of stealthy attacks in ICPS security analysis and research [26,27,28]. To maximize the effect of the attacks on the system performance, Zhang et al. studied the optimal attack strategy where a DoS jammer has constrained energy in a general wireless networked control scenario [29]. Ding et al. proposed a model by using the relationship among SER (Symbol Error Rate), SNR (Signal to Noise Ratio), and SINR (Signal to Interference plus Noise Ratio) in a communication channel based on the wireless communication technology, and studied the optimal attack scheduling of an energy constrained DoS jammer by establishing a two-player game in a multi-channel remote state estimation [30]. However, as a premeditated and supported attacker, the limitation of energy or other cost may not be the most important factors to be considered. Ding et al. studied an event-based security control for a discrete-time unified framework by defining a concept of working subcycle networked control system encountering randomly DoS jamming attacks [31]. However, as a purposeful and conscious individual compared with external disturbance, these kinds of attack strategies, which use random variables, cannot fully describe the jammer’s intention [32]. In Ref. [33], a unified framework of the attack strategy for a DoS jammer is discussed, and a H controller design problem for a control system subject to DoS jamming attacks is studied without any known information of the DoS jammers’ attack strategy.
Besides, as a system deployed in complex industrial scenarios, ICPS also faces interference factors from inside and outside [34,35,36,37]. These non-negligible factors, like external disturbance, limited channel capacity and channel noise, can result in random dropout of packet in the network and ultimately affect the stability of the whole system [38,39]. In the previous studies, a variable which follows the Bernoulli distribution was used to described random packet dropouts caused by external disturbance or channel fading, and some effective algorithms were deployed to increase the transmission efficiency. For example, in Ref. [40], a hybrid-driven communication scheme is proposed and a controller design method is investigated for networked control systems with time delay. In Ref. [41], an event-triggered scheme and a quantiser are deployed in an array of discrete time-varying systems, and a distributed state estimation problem is studied. However, these studies have not considered the security requirements of networked systems, which is an urgent problem to be solved. Therefore, as a fundamental problem in the industrial scenarios, the H controller design for an ICPS with traditional internal and external interference encountering stealthy DoS jamming attacks needs to be addressed. Then, in Ref. [42], we studied the H control for an ICPS with event-triggered mechanism (ETM) encountering reactive DoS jamming attacks. However, consider that the hybrid-triggered mechanism (HTM) has more advantages than the ETM in utilizing network resources, and a smart attacker can use the characteristics of HTM to achieve more stealthy attacks, the H control problem for an ICPS with HTM needs to be further investigated.
To sum up, due to the constraints of the current wireless communication technology and the increasingly complex industrial scenarios, ICPS not only faces a variety of external and internal interference, but also faces severe security issues caused by stealthy malicious attacks. In this paper, therefore, we consider that an ICPS, which deployed a HTM to improve the network bandwidth utilization, is intruded by a stealthy DoS jammer, where the DoS jammer keeps sensing the wireless channel and cleverly uses a reactive attack strategy to ensure its stealthiness based on the communication traffic. Then, based on the relationship among SER, SNR, and SINR, the impacts of stealthy DoS jamming attacks, external disturbance, limited channel capacity, and channel noise are described in a unified framework, and a compensation mechanism is employed in the controller to mitigate the impact of stealthy attacks due to the ICPS does not know the jammer’s attack strategy. Finally, simulation examples are given to show the effectiveness of the proposed H control method. The main contributions of this paper can be summarized as follows.
  • For a smart DoS jammer, it can use the trigger characteristics of HTM, which is an effective communication mechanism, to launch attacks on the premise of ensuring its stealth, and finally destroy the stable operation of the ICPS. Therefore, we studied the H controller design problem for an ICPS with HTM to solve the stable operation of the ICPS encountering stealthy DoS jamming attacks.
  • Unlike the existing studies that consider energy limitation of the attacker, we focus on attack purpose and stealthiness, and consider that the attacker keeps sensing the wireless channel traffic and cleverly uses a reactive attack strategy to achieve its purpose and ensure its stealthiness.
  • We consider both of the stealthy DoS jamming attacks, external disturbance, limited channel capacity, wireless channel noise, and use the SER of wireless channel in a unified framework to describe the channel’s communication quality.
Notation: R n stands for the n-dimensional Euclidean space. The symbol · stands for Euclidean norm. Z + stands for the set of positive integers. For a matrix A, λ max ( A ) ( λ min ( A ) ) stands for the largest (smallest) eigenvalue of A, A T stands for the transposition of A, and A > 0 ( A < 0 ) stands for a positive (negative) definite matrix. Let I and 0 be identity matrix and zero matrix with appropriate dimensions, respectively. P r [ · ] stands for the probability of a stochastic event. E { · } denotes the expectation of a stochastic variable. The symbol ∗ within a matrix represents the symmetric entries.

2. Problem Formulation

In this section, the problem of H control for an ICPS with HTM encountering stealthy DoS jamming attacks is formulated.

2.1. Basic Structure

The basic structure of an ICPS with HTM encountering stealthy jamming attacks can be shown in Figure 1, which consists of a physical system, a time-triggered sensor, a controller, and an actuator. Specifically, states of the physical system are captured by the sensor and transmitted to the controller through a memoryless wireless channel with a HTM. Meanwhile, based on Ref. [33], a stealthy DoS jammer who keeps sensing the traffic of wireless channel and uses the reactive attack strategy to increase the probability of packet dropouts, and we assume that the ICPS does not have any intrusion detected systems and does not know any information of the DoS jammer’s attack strategy. Considering the physical system has the following form
x ( k + 1 ) = A x ( k ) + B u ( k ) + D 1 ω ( k ) , y ( k ) = C 1 x ( k ) , z ( k ) = C 2 x ( k ) + D 2 ω ( k ) ,
where x ( k ) R n , y ( k ) R m , z ( k ) R q , and ω ( k ) R q stand for the system state, measured output, controlled output, and external disturbance input belonging to l 2 [ 0 , ) , respectively. A, B, C 1 , C 2 , D 1 , and D 2 are known real matrices with appropriate dimensions. Consider the wireless channel has independent Additive White Gaussian Noise (AWGN), communication quality of the wireless channel can be modeled as [43,44]
S E R = 2 q ξ S N R , S N R = p s σ 2 ,
where p s , ξ > 0 and σ 2 stand for transmission power, network parameter and AWGN power, respectively. Meanwhile, q = 1 / 2 π x exp ( ρ 2 / 2 ) d ρ .

2.2. Hybrid-Triggered Mechanism

A HTM is deployed in the wireless channel to alleviate the limitation of network resources. Specifically,
Time-triggered mechanism (TTM): Consider the measured output via only the TTM which received by the controller can be described as
y ˜ ( k ) = y ( k ) ,
Event-triggered mechanism (ETM): An ETM is deployed to improve the network bandwidth utilization, and consider the event-triggered condition as
k s + 1 = min k > k s { k ( y ( k ) y ( k s ) ) T Φ ( y ( k ) y ( k s ) ) y ( k s ) T Ψ y ( k s ) } ,
where Φ > 0 and Ψ > 0 stand for event-triggered matrices to be designed, { k s } s 0 Z + with k 0 = 0 , { k s } s 1 stand for the packet transmission instants sequence. We define
e y ( k ) = y ( k s ) y ( k ) , k [ k s , k s + 1 ) ,
then (4) can be rewritten as
e y ( k ) T Φ e y ( k ) y ( k s ) T Ψ y ( k s ) , k [ k s , k s + 1 ) .
Then, the measured output via only the ETM which received by the controller can be described as
y ˜ ( k ) = e y ( k ) + y ( k ) ,
Therefore, we can define a Bernoulli distribution stochastic variable θ ( k ) to stand for the probability of triggered mechanism being selected, and by combining (3) with (7), the measured output via the HTM, which is received by the controller, can be described as
y ˜ ( k ) = ( 1 θ ( k ) ) y ( k ) + θ ( k ) ( e y ( k ) + y ( k ) ) ,
where P r [ θ ( k ) = 1 ] = θ ¯ , P r [ θ ( k ) = 0 ] = 1 θ ¯ , and the mathematical variance of θ ( k ) is δ 2 . The sojourn probability θ ¯ can be obtained by the following statistical method
θ ¯ = lim n k i n , k i Z + , n Z +
where k i is the times of θ ( k ) = 1 in the interval [ 1 , n ] , and we assume that θ ¯ in the wireless channel is known.

2.3. Stealthy DoS Jamming Attacks

A stealthy DoS jammer who uses reactive attack strategy keeps sensing the traffic of wireless channel and changes attack modes autonomously according to whether a packet is transmitting in the wireless channel [33]. Denoting α ( k ) { 0 , 1 } stands for different periods, the nth working subcycle of the DoS jammer, which consists of the start time T ( n ) , the duration of attack period t a ( n ) , and the duration of silent period t s ( n ) , can be described as
α ( k ) = 1 , k [ T ( n ) , T ( n ) + t a ( n ) 1 ] , 0 , k [ T ( n ) + t a ( n ) , T ( n ) + t a ( n ) + t s ( n ) 1 ] ,
where α ( k ) = 1 and α ( k ) = 0 stand for the attack period and the silent period, respectively. Combining (2), the inherent packet dropouts caused by limited capacity of wireless channel and channel noise are considered in the silent periods, and in the attack periods, the DoS jammer uses attack power p a on the wireless channel to increase the probability of packet dropouts. Then, we have
S E R = 2 q ξ S I N R , S I N R = p s p a + σ 2 .
Combining with (10) and (11), SER for the wireless channel can be described in a unified framework as
S E R = 2 q ξ p s α ( k ) p a + σ 2 = 2 q ξ S N R , α ( k ) = 0 , 2 q ξ S I N R , α ( k ) = 1 .

2.4. Closed-Loop System

Let y ¯ ( k ) stand for received measurement of the controller, and let mutually independent Bernoulli stochastic variable β ( α ( k ) , k ) indicate whether a packet is successfully received or not by the controller, we have
β ( α ( k ) , k ) = 1 , s u c c e s s f u l l y , 0 , o t h e r w i s e .
Then, combining with (11), (12), and (13), we have
Pr [ β ( α ( k ) , k ) = 1 ] = 1 S E R = β ¯ , Pr [ β ( α ( k ) , k ) = 0 ] = S E R = 1 β ¯ ,
where β ¯ [ 0 , 1 ) is a known constant.
Due to the deployment of HTM, it is difficult for the controller to know whether the packet is dropped or just not transmitted. Additionally, the ICPS dose not know the attack strategy of the DoS jammer due to it lack of intrusion detection systems. Thus, an compensation mechanism which employs the latest transmitted quantized measurement is established in the controller to decrease the impact of packet dropouts. Specifically, if the packet is received by the controller, we use y ¯ ( k ) = y ˜ ( k ) . Otherwise, the previous packet y ¯ ( k 1 ) will be used. Therefore, combining with (13), we have
y ¯ ( k ) = β ( α ( k ) , k ) [ ( 1 θ ( k ) ) y ( k ) + θ ( k ) ( e y ( k ) + y ( k ) ) ] + ( 1 β ( α ( k ) , k ) ) y ¯ ( k 1 ) .
To achieve the control objective, we consider an observer-based controller as
O b s e r v e r : x ^ ( k + 1 ) = A x ^ ( k ) + B u ( k ) + L ( y ¯ ( k ) y ¯ ^ ( k ) ) , y ¯ ^ ( k ) = β ( α ( k ) , k ) y ^ ( k ) + ( 1 β ( α ( k ) , k ) ) y ¯ ( k 1 ) ,
C o n t r o l l e r : u ( k ) = K x ^ ( k ) ,
where y ¯ ^ k is the observer output, L is the observer gain matrix, and K is the controller gain matrix. We denote the estimation error as
e ( k ) = x ( k ) x ^ ( k ) .
Then, a closed-loop system for the ICPS with HTM encountering stealthy DoS jamming attacks can be described as
x ( k + 1 ) = ( A + B K ) x ( k ) B K e ( k ) + D 1 ω ( k ) , e ( k + 1 ) = ( A β ¯ L C 1 ) e ( k ) ( β ( α ( k ) , k ) β ¯ ) L C 1 ) e ( k ) β ¯ ( θ ( k ) θ ¯ ) L e y ( k ) β ¯ θ ¯ L e y ( k ) ( β ( α ( k ) , k ) β ¯ ) ( θ ( k ) θ ¯ ) L e y ( k ) θ ¯ ( β ( α ( k ) , k ) β ¯ ) L × e y ( k ) + D 1 ω ( k ) .
Assumption 1.
The matrix B is of full column rank.
As the closed-loop system (19) is a stochastic parameter system, the following Definition is needed.
Definition 1.
Consider the ICPS with HTM encountering stealthy DoS jamming attacks. Let η ( k ) = x ( k ) T e ( k ) T T . The closed-loop system (19) satisfies exponentially mean-square stable with ω ( k ) = 0 , if there exist constants ϵ > 0 and τ ( 0 , 1 ) such that
E { η ( k ) 2 } ϵ τ k E { η ( 0 ) 2 } ,
where η ( 0 ) R n , k Z + .
By the Definition 1, the objective of this paper is to design a controller to guarantee the closed-loop system (19) which satisfies the following requirements simultaneously.
(1)
The closed-loop system (19) with ω ( k ) = 0 is exponentially mean-square stable;
(2)
Given a scalar γ > 0 . For all nonzero ω ( k ) , under the zero-initial condition, the controlled input z ( k ) satisfies
k = 0 E { z ( k ) 2 } < γ 2 k = 0 E { ω ( k ) 2 } ,

3. Main Results

In this section, proof process of the H control is discussed. First, the required Lemmas are listed.
Lemma 1
([45]). Let V ( η ( k ) ) as a Lyapunov function. If there exist real scalars λ 0 , μ > 0 , ν > 0 , and 0 < φ < 1 such that
μ η ( k ) 2 V ( η ( k ) ) ν η ( k ) 2 ,
E { V ( η ( k + 1 ) ) | η ( k ) } V ( η ( k ) ) λ φ V ( η ( k ) ) ,
then
E { η ( k ) 2 } ν μ η ( k ) 2 ( 1 φ ) k + λ μ φ .
Lemma 2
([34]). For the matrix B of full-column rank, there always exists a singular value decomposition (SVD), such that
B = U T Σ 0 V T = U 1 U 2 Σ 0 V T ,
where U R n × n and V R m × m are orthogonal matrices, Σ = d i a g { ϖ 1 , ϖ 2 , , ϖ m } , where ϖ i ( i = 1 , 2 , , m ) are nonzero singular values of B.
Lemma 3
([38]). For the matrix B of full-column rank, if there exist positive definite matrices P 1 R m × m , P 2 R ( n m ) × ( n m ) , and matrix P satisfies
P = U T P 1 0 0 P 2 U = U 1 T P 1 U 1 + U 2 T P 2 U 2 ,
then there exist a nonsingular matrix P ¯ , such that P B = B P ¯ .

3.1. Stability Analysis

Theorem 1.
Consider the ICPS with HTM encountering stealthy DoS jamming attacks. Given the controller gain matrix K and the observer gain matrix L. The closed-loop system (19) is exponentially mean-square stable, if there exist positive definite matrices P and S satisfying (24).
Δ 1 0 Δ 4 0 0 Δ 8 Δ 2 Δ 5 0 Δ 11 0 Δ 6 0 0 Δ 12 0 Δ 7 0 0 0 Δ 13 Δ 3 0 Δ 9 0 0 0 Δ 14 0 0 Δ 10 0 0 0 0 Δ 15 < 0 ,
where Δ 1 = P , Δ 2 = A + B K , Δ 3 = C 1 , Δ 4 = S , Δ 5 = B K , Δ 6 = A β ¯ L C 1 , Δ 7 = L C 1 , Δ 8 = Φ , Δ 9 = I , Δ 10 = L , Δ 11 = P 1 , Δ 12 = S 1 , Δ 13 = ε 1 1 S 1 , Δ 14 = Ψ 1 , Δ 15 = β ¯ 1 θ ¯ 1 S 1 , ε 1 = ( 1 β ¯ ) β ¯ , ε 2 = ( 1 θ ¯ ) θ ¯ .
Proof. 
We define a Lyapunov function as
V ( η ( k ) ) = x ( k ) T P x ( k ) + e ( k ) T S e ( k ) .
By (19), we have
E { V ( η ( k + 1 ) ) } V ( η ( k ) ) = E { x ( k + 1 ) T P x ( k + 1 ) + e ( k + 1 ) T S e ( k + 1 ) } x ( k ) T P x ( k ) e ( k ) T S e ( k ) = E { [ ( A + B K ) x ( k ) B K e ( k ) ] T P [ ( A + B K ) x ( k ) B K e ( k ) ] + [ ( A β ¯ L C 1 ) × e ( k ) ( β ( α ( k ) , k ) β ¯ ) L C 1 ) e ( k ) β ¯ ( θ ( k ) θ ¯ ) L e y ( k ) β ¯ θ ¯ L e y ( k ) ( β ( α ( k ) , k ) β ¯ ) ( θ ( k ) θ ¯ ) L e y ( k ) θ ¯ ( β ( α ( k ) , k ) β ¯ ) L e y ( k ) ] T P × [ ( A β ¯ L C 1 ) e ( k ) ( β ( α ( k ) , k ) β ¯ ) L C 1 ) e ( k ) β ¯ ( θ ( k ) θ ¯ ) L e y ( k ) β ¯ θ ¯ L e y ( k ) ( β ( α ( k ) , k ) β ¯ ) ( θ ( k ) θ ¯ ) L e y ( k ) θ ¯ ( β ( α ( k ) , k ) β ¯ ) L e y ( k ) ] x ( k ) T P x ( k ) e ( k ) T S e ( k ) .
Combining with E { ( β ( α ( k ) , k ) β ¯ ) 2 } = ( 1 β ¯ ) β ¯ , E { ( θ ( k ) θ ¯ ) 2 } = ( 1 θ ¯ ) θ ¯ and (6), we have
e y ( k ) T Φ e y ( k ) [ e y ( k ) + y ( k ) ] T Ψ [ e y ( k ) + y ( k ) ] ,
where k [ k s , k s + 1 ) . Therefore,
E { V ( η ( k + 1 ) ) } V ( η ( k ) ) E { x ( k + 1 ) T P x ( k + 1 ) + e ( k + 1 ) T S e ( k + 1 ) } x ( k ) T P x ( k ) e ( k ) T S e ( k ) + [ e y ( k ) + y ( k ) ] T Ψ [ e y ( k ) + y ( k ) ] e y ( k ) T Φ e y ( k ) = η ^ ( k ) T Π 1 T Π 2 Π 1 + Π 3 Π 4 Π 5 η ^ ( k ) = η ^ ( k ) T Π η ^ ( k ) , k [ k s , k s + 1 ) ,
where η ^ ( k ) = η ( k ) T e y ( k ) T T , Π 2 = d i a g { P , S , ε 1 S , Ψ } , Π 3 = d i a g { P , S } , Π 4 = Π 41 Π 42 , Π 41 = Ψ C 1 , Π 42 = ε 1 θ ¯ L T S L C 1 β ¯ θ ¯ L T S ( A β ¯ L C 1 ) , Π 5 = β ¯ θ ¯ L T S L + Ψ Φ ,
Π 1 = A + B K B K 0 A β ¯ L C 1 0 L C 1 C 1 0 .
By Schur complement, (24) implies that Π < 0 , and Π is a strick matrix inequality, then there exits a constant κ such that
E { V ( η ( k + 1 ) ) } V ( η ( k ) ) η ^ ( k ) T d i a g { κ I , 0 } η ^ ( k ) < κ η ( k ) T η ( k ) ,
where 0 < κ < min { λ min ( Π ) , ϑ } , ϑ = max { λ max ( P ) , λ max ( S ) } . Then, we have
E { V ( η ( k + 1 ) ) } V ( η ( k ) ) < κ η ( k ) T η ( k ) κ ϑ η ( k ) T η ( k ) .
By Lemma 1, we have
E { η ( k ) 2 } V ( η ( k ) ) κ ϑ ( 1 κ ϑ ) k η ( 0 ) 2 ,
where 0 < κ ϑ < 1 . Therefore, the closed-loop system (19) is exponentially mean-square stable. This completes the proof. □

3.2. H Controller Design

Theorem 2.
Consider the ICPS with HTM encountering stealthy DoS jamming attacks. The closed-loop system (19) is exponentially mean-square stable and the H norm constraint (21) is achieved for all nonzero ω ( k ) , if there exist positive definite matrices P and S, the controller gain matrix K and the observer gain matrix L satisfying (30).
Ξ 1 0 Ξ 5 0 0 Ξ 9 0 0 0 Ξ 12 Ξ 2 Ξ 6 0 Ξ 13 Ξ 16 0 Ξ 7 0 Ξ 14 0 Ξ 17 0 Ξ 8 0 0 0 0 Ξ 18 Ξ 3 0 Ξ 10 0 0 0 0 Ξ 19 0 0 Ξ 11 0 0 0 0 0 Ξ 20 Ξ 4 0 0 Ξ 15 0 0 0 0 0 Ξ 21 < 0 ,
where Ξ 1 = P , Ξ 2 = A + B K , Ξ 3 = C 1 , Ξ 4 = C 3 , Ξ 5 = S , Ξ 6 = B K , Ξ 7 = A β ¯ L C 1 , Ξ 8 = L C 1 , Ξ 9 = Φ , Ξ 10 = I , Ξ 11 = L , Ξ 12 = γ 2 I , Ξ 13 = D 1 , Ξ 14 = D 1 , Ξ 15 = D 2 , Ξ 16 = P 1 , Ξ 17 = S 1 , Ξ 18 = ε 1 1 S 1 , Ξ 19 = Ψ 1 , Ξ 20 = β ¯ 1 θ ¯ 1 S 1 , Ξ 21 = I , C 3 = C 2 0 0 .
Proof. 
Let η ˜ ( k ) = η ^ ( k ) T ω ( k ) T T , and combine with (26). For any nonzero ω ( k ) , we have
E { V ( η ( k + 1 ) ) } E { V ( η ( k ) ) } + E { z ( k ) T z ( k ) } γ 2 E { ω ( k ) T ω ( k ) } E { V ( η ( k + 1 ) ) } E { V ( η ( k ) ) } + E { z ( k ) T z ( k ) } γ 2 E { ω ( k ) T ω ( k ) } + [ e y ( k ) + y ( k ) ] T Ψ [ e y ( k ) + y ( k ) ] e y ( k ) T Φ e y ( k ) = E { η ˜ ( k ) T Π + Λ 1 Λ 2 Λ 3 η ˜ ( k ) } = E { η ˜ ( k ) T Λ η ˜ ( k ) } ,
where Λ 1 = C 3 T C 3 , Λ 2 = Λ 21 Λ 22 Λ 23 , Λ 21 = D 1 T P ( A + B K ) + D 2 T C 2 , Λ 22 = D 1 T P B K + D 1 T S ( A β ¯ L C 1 ) , Λ 23 = β ¯ θ ¯ D 1 T S L , Λ 3 = D 1 T P D 1 + D 1 T S D 1 + D 2 T D 2 γ 2 I .
By Schur complement, (30) implies that Λ < 0 , we have
E { V ( η ( k + 1 ) ) } E { V ( η ( k ) ) } + E { z ( k ) T z ( k ) } γ 2 E { ω ( k ) T ω ( k ) } < 0 .
For k = 0 , by summing up (31) we can obtain
k = 0 E { z ( k ) 2 } < γ 2 k = 0 E { ω ( k ) 2 } + E { V ( η ( 0 ) ) } E { V ( η ( ) ) } .
Due to η ( 0 ) = 0 and Theorem 1, we have
k = 0 E { z ( k ) 2 } < γ 2 k = 0 E { ω ( k ) 2 } ,
which means the H norm constraint (21) is achieved. This completes the proof. □
Theorem 3.
Consider the ICPS with HTM encountering stealthy DoS jamming attacks. The closed-loop system (19) is exponentially mean-square stable and the H norm constraint (21) is achieved for all nonzero ω ( k ) , if there exist positive definite matrices P 1 , P 2 and S, real matrices X and Y satisfying (34) and (35). Furthermore, the controller gain matrix K and the observer gain matrix L can be given by (36).
Ω 1 0 Ω 5 0 0 Ω 9 0 0 0 Ω 12 Ω 2 Ω 6 0 Ω 13 Ω 16 0 Ω 7 0 Ω 14 0 Ω 17 0 Ω 8 0 0 0 0 Ω 18 Ω 3 0 Ω 10 0 0 0 0 Ω 19 0 0 Ω 11 0 0 0 0 0 Ω 20 Ω 4 0 0 Ω 15 0 0 0 0 0 Ω 21 < 0 ,
where Ω 1 = P , Ω 2 = P A + B X , Ω 3 = Ψ C 1 , Ω 4 = C 3 , Ω 5 = S , Ω 6 = B X , Ω 7 = S A β ¯ Y C 1 , Ω 8 = Y C 1 , Ω 9 = Φ , Ω 10 = Ψ , Ω 11 = Y , Ω 12 = γ 2 I , Ω 13 = P D 1 , Ω 14 = S D 1 , Ω 15 = D 2 , Ω 16 = P , Ω 17 = S , Ω 18 = ε 1 1 S , Ω 19 = Ψ , Ω 20 = β ¯ 1 θ ¯ 1 S , Ω 21 = I .
P B = B P ¯ ,
K = V Σ 1 P 1 1 Σ V T X , L = S 1 Y .
Proof. 
Because (30) is not an LMI, we need to pre- and post-multiply both side of (30) with matrix d i a g { I , I , I , I , P , S , S , Ψ , S , I } and obtain
Ω ^ 1 0 Ω ^ 5 0 0 Ω ^ 9 0 0 0 Ω ^ 12 Ω ^ 2 Ω ^ 6 0 Ω ^ 13 Ω ^ 16 0 Ω ^ 7 0 Ω ^ 14 0 Ω ^ 17 0 Ω ^ 8 0 0 0 0 Ω ^ 18 Ω ^ 3 0 Ω ^ 10 0 0 0 0 Ω ^ 19 0 0 Ω ^ 11 0 0 0 0 0 Ω ^ 20 Ω ^ 4 0 0 Ω ^ 15 0 0 0 0 0 Ω ^ 21 < 0 ,
where Ω ^ 1 = P , Ω ^ 2 = P A + P B K , Ω ^ 3 = Ψ C 1 , Ω ^ 4 = C 3 , Ω ^ 5 = S , Ω ^ 6 = P B K , Ω ^ 7 = S A β ¯ S L C 1 , Ω ^ 8 = S L C 1 , Ω ^ 9 = Φ , Ω ^ 10 = Ψ , Ω ^ 11 = S L , Ω ^ 12 = γ 2 I , Ω ^ 13 = P D 1 , Ω ^ 14 = S D 1 , Ω ^ 15 = D 2 , Ω ^ 16 = P , Ω ^ 17 = S , Ω ^ 18 = ε 1 1 S , Ω ^ 19 = Ψ , Ω ^ 20 = β ¯ 1 θ ¯ 1 S , Ω ^ 21 = I .
Let X = P ¯ K , Y = S L , and combining with (35), we have (34), which means the closed-loop system (19) is exponentially mean-square stable and the H norm constraint (21) is satisfied. However, it should be noted that (34) has matrix equation constraint.
By Assumption 1, therefore, the column of matrices B and P B are all linearly independent with P ¯ > 0 . Hence, if (34) is satisfied, then
r a n k ( P ¯ ) r a n k ( B P ¯ ) = r a n k ( P B ) r a n k ( B ) = m .
So, we have
K = P ¯ 1 X , L = P 1 Y .
By Lemma 2 and Lemma 3, we have matrices P 1 , P 2 , U 1 , and U 2 , satisfying (22) and (23). The P ¯ can be computed by (39) from P B = B P ¯ , namely
P B = P U T Σ 0 V T = U T Σ 0 V T P ¯ = U 1 U 2 Σ 0 V T P ¯ .
Then, substituting (23) into (39), we have
U T P 1 0 0 P 2 Σ 0 V T = U T Σ 0 V T P ¯ ,
which implies that
P 1 Σ V T = Σ V T P ¯ .
Therefore, the problem of matrix equation constraint is solved by using (23). Then, by (23) and (41), we can obtain (36). This completes the proof. □
Therefore, the optimal H control problem can be solved by
min P 1 > 0 , P 2 > 0 , S > 0 , X , Y γ s . t . ( 23 ) a n d ( 34 ) .

4. Numerical Simulation

In this section, numerical simulations are used to demonstrate the effectiveness of the proposed H control method. Consider the transmission power P s = 1.5 , the AWGN power σ 2 = 1.0 , and the network parameter ξ = 3 . Then, the probability of inherent randomly packet dropouts caused by external disturbance, limited channel capacity, and channel noise can be calculated as 0.0850 . By choosing the attack power of DoS jammer p a = 1.7500 , the probability of packet dropouts caused by attacks increases to 0.5034 .
(1) Consider an uninterruptible power system (UPS) with 1KVA. Its discrete-time model (1) can be described with 10ms at half-load operating point in the following [46]
A = 0.9226 0.6330 0 1 0 0 0 1 0 , B = 1 0 0
C 1 = 23.7380 20.2870 0 , C 2 = 0.1 0 0 , D 1 = 0.5 0 2 T , D 2 = 0.1 .
We chose the initial conditions as x ( 0 ) = 1 1 0 T , x ^ ( 0 ) = 0 0 0 T . Let γ = 1 , by using the H control method, we can obtain that
Ψ = 12.2804 , Φ = 3.9826 ,
K = 0.0037 0.0035 0.0054 , L = 0.1512 0.5958 0.7268 T
Figure 2 shows the norm of states for the UPS encountering stealthy DoS jamming attacks, which indicates that the proposed H control method can achieve the control objective successfully and effectively. Figure 3 shows switch times of the HTM. Figure 4 shows times of the DoS jamming attacks on the wireless channel.
(2) Consider a tunnel diode circuit in the following [47]
A = 0.9887 0.9024 0.0180 0.8100 , B = 0.0093 0.0181 ,
C 1 = 1 0 , C 2 = 1 0 , D 1 = 1 1 T , D 2 = 1 .
We chose the initial conditions as x ( 0 ) = 0.1 0.1 T , x ^ ( 0 ) = 0 0 T . Let γ = 1 , by using the H control method, we can obtain that
Ψ = 9.0342 , Φ = 3.3312 ,
K = 0.1 5 × 0.2683 0.3196 , L = 5.8106 4.6382 T .
Figure 5 shows the norm of states for the tunnel diode circuit encountering stealthy DoS jamming attacks, which indicates that the proposed H control method can achieve the control objective successfully and effectively. Figure 6 shows switch times of the HTM. Figure 7 shows times of the DoS jamming attacks on the wireless channel.

5. Conclusions

In this paper, considering the external disturbance, limited channel capacity, and channel noise, a H controller designing problem was studied for an ICPS with HTM encountering stealthy DoS jamming attacks. A closed-loop system was established based on a compensation mechanism, which compensates the impacts of stealthy DoS jamming attacks and inherent random packet dropouts. We proved that the closed-loop system is mean square exponentially stable and can achieve the desired H disturbance rejection level, and simulation results shown the effectiveness of the H control method. In the future, we will study the controller designing problem for industrial scenarios which deployed intrusion detection systems and industrial protocol enhancement methods, and the relationship between system security and operating efficiency will be further discussed.

Author Contributions

Conceptualization, M.W. and J.W.; methodology, M.W. and Y.G.; software, M.W. and K.L.; validation, M.W., Y.G. and X.C.; formal analysis, M.W., Y.G. and J.W.; investigation, K.L., X.C. and Q.W.; writing—original draft preparation, M.W., Y.G. and J.W.; writing—review and editing, M.W. and Q.W.; supervision, J.W. and Q.W.; project administration, M.W., J.W. and X.C. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the Funds of the National Natural Science Foundation of China (No. 61972345), the Natural Science Foundation of Zhejiang (No. LZ22F030010), the National Natural Science Foundation of China-Guangdong big data Science Center Project (No. U1911401), the Fundamental Research Funds for the Central Universities (Zhejiang University NGICS Platform) (No. K20210001).

Institutional Review Board Statement

This study did not require ethical approval.

Informed Consent Statement

This study did not involve humans.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Jazdi, N. Cyber physical systems in the context of Industry 4.0. In Proceedings of the IEEE International Conference on Automation, Quality and Testing, Robotics, Cluj-Napoca, Romania, 22–24 May 2014; pp. 1–4. [Google Scholar] [CrossRef]
  2. Derler, P.; Lee, E.A.; Vincentelli, A.S. Modeling Cyber-Physical Systems. Proc. IEEE 2012, 100, 13–28. [Google Scholar] [CrossRef]
  3. Kim, K.; Kumar, P.R. Cyber-Physical Systems: A Perspective at the Centennial. Proc. IEEE 2012, 100, 1287–1308. [Google Scholar] [CrossRef]
  4. Wolf, M.; Serpanos, D. Safety and Security in Cyber-Physical Systems and Internet-of-Things Systems. Proc. IEEE 2018, 106, 9–20. [Google Scholar] [CrossRef]
  5. Mo, L.; You, P.C.; Cao, X.H.; Song, Y.Q.; Kritikakou, A. Event-driven joint mobile actuators scheduling and control in Cyber-Physical Systems. IEEE Trans. Ind. Inform. 2019, 15, 5877–5891. [Google Scholar] [CrossRef]
  6. Mo, Y.L.; Kim, T.H.J.; Brancik, K.; Dickinson, D.; Lee, H.; Perrig, A.; Sinopoli, B. Cyber-Physical Security of a Smart Grid Infrastructure. Proc. IEEE 2012, 100, 195–209. [Google Scholar] [CrossRef]
  7. Liu, Y.G.; Xu, B.G.; Ding, Y.H. Convergence Analysis of Cooperative Braking Control for Interconnected Vehicle Systems. IEEE Trans. Intell. Transp. Syst. 2017, 18, 1894–1906. [Google Scholar] [CrossRef]
  8. Razmara, M.; Bharati, G.R.; Shahbakhti, M.; Paudyal, S.; Robinett, R.D. Bilevel Optimization Framework for Smart Building-to-Grid Systems. IEEE Trans. Smart Grid 2018, 9, 582–593. [Google Scholar] [CrossRef]
  9. Khan, M.T.; Serpanos, D.; Shrobe, H. ARMET: Behavior-Based Secure and Resilient Industrial Control Systems. Proc. IEEE 2018, 106, 129–143. [Google Scholar] [CrossRef]
  10. Farwell, J.P.; Rohozinski, R. Stuxnet and the Future of Cyber War. Survival 2011, 53, 23–40. [Google Scholar] [CrossRef]
  11. Iasiello, E. Cyber attack: A dull tool to shape foreign policy. In Proceedings of the 5th International Conference on Cyber Conflict, Tallinn, Estonia, 4–7 June 2013; pp. 1–18. [Google Scholar] [CrossRef]
  12. Petrenko, A.S.; Petrenko, S.A.; Makoveichuk, K.A.; Chetyrbok, P.V. Protection model of PCS of subway from attacks type wanna cry, petya and bad rabbit IoT. In Proceedings of the IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, Moscow and St. Petersburg, Russia, 29 January–1 February 2018; pp. 945–949. [Google Scholar] [CrossRef]
  13. Mo, Y.; Sinopoli, B. On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks. IEEE Trans. Autom. Control 2016, 61, 2618–2624. [Google Scholar] [CrossRef]
  14. Ma, R.K.; Cheng, P.; Zhang, Z.Y.; Liu, W.W.; Wang, Q.X.; Wei, Q. Stealthy Attack Against Redundant Controller Architecture of Industrial Cyber-Physical System. IEEE Internet Things J. 2019, 6, 9783–9793. [Google Scholar] [CrossRef]
  15. Wang, D.; Wang, Z.; Shen, B.; Alsaadi, F.E.; Hayat, T. Recent advances on filtering and control for cyber-physical systems under security and resource constraints. J. Frankl. Inst. 2016, 353, 2451–2466. [Google Scholar] [CrossRef]
  16. Cárdenas, A.A.; Amin, S.; Sastry, S. Secure Control: Towards Survivable Cyber-Physical Systems. In Proceedings of the 28th International Conference on Distributed Computing Systems Workshops, Beijing, China, 17–20 June 2008; pp. 495–500. [Google Scholar] [CrossRef] [Green Version]
  17. Teixeira, A.; Pérez, D.; Sandberg, H.; Johansson, K.H. Attack Models and Scenarios for Networked Control Systems. In Proceedings of the 1st International Conference on High Confidence Networked Systems, Beijing, China, 17–18 April 2012; pp. 55–64. [Google Scholar] [CrossRef]
  18. Lee, P.; Clark, A.; Bushnell, L.; Poovendran, R. A Passivity Framework for Modeling and Mitigating Wormhole Attacks on Networked Control Systems. IEEE Trans. Autom. Control 2014, 59, 3224–3237. [Google Scholar] [CrossRef] [Green Version]
  19. Lu, A.Y.; Yang, G.H. Distributed consensus control for multi-agent systems under denial-of-service. Inf. Sci. 2018, 439–440, 95–107. [Google Scholar] [CrossRef]
  20. Zhang, X.M.; Han, Q.L.; Ge, X.H. A novel approach to H performance analysis of discrete-time networked systems subject to network-induced delays and malicious packet dropouts. Automatica 2022, 136, 110010. [Google Scholar] [CrossRef]
  21. Pelechrinis, K.; Iliofotou, M.; Krishnamurthy, S.V. Denial of Service Attacks in Wireless Networks: The Case of Jammers. IEEE Commun. Surv. Tutor. 2011, 13, 245–257. [Google Scholar] [CrossRef]
  22. Zhang, H.; Cheng, P.; Shi, L.; Chen, J.M. Optimal Denial-of-Service Attack Scheduling With Energy Constraint. IEEE Trans. Autom. Control 2015, 60, 3023–3028. [Google Scholar] [CrossRef]
  23. Lu, A.Y.; Yang, G.H. Input-to-State Stabilizing Control for Cyber-Physical Systems With Multiple Transmission Channels Under Denial of Service. IEEE Trans. Autom. Control 2018, 63, 1813–1820. [Google Scholar] [CrossRef]
  24. Zhang, X.M.; Han, Q.L.; Ge, X.H.; Ding, L. Resilient Control Design Based on a Sampled-Data Model for a Class of Networked Control Systems Under Denial-of-Service Attacks. IEEE Trans. Cybern. 2020, 50, 3616–3626. [Google Scholar] [CrossRef]
  25. Foroush, S.H.; Martínez, S. On event-triggered control of linear systems under periodic denial-of-service jamming attacks. In Proceedings of the 51st IEEE Conference on Decision and Control, Maui, HI, USA, 10–13 December 2012; pp. 2551–2556. [Google Scholar] [CrossRef] [Green Version]
  26. Xu, W.Y.; Ma, K.; Trappe, W.; Zhang, Y.Y. Jamming sensor networks: Attack and defense strategies. IEEE Netw. 2006, 20, 41–47. [Google Scholar] [CrossRef]
  27. Li, M.Y.; Koutsopoulos, I.; Poovendran, R. Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks. IEEE Trans. Mobile Comput. 2010, 9, 1119–1133. [Google Scholar] [CrossRef]
  28. Wang, M.F.; Xu, B.G. Guaranteed cost control of cyber-physical systems with packet dropouts under DoS jamming attacks. Asian J. Control 2020, 22, 1659–1669. [Google Scholar] [CrossRef]
  29. Zhang, H.; Cheng, P.; Shi, L.; Chen, J.M. Optimal DoS Attack Scheduling in Wireless Networked Control System. IEEE Trans. Control Syst. Technol. 2016, 24, 843–852. [Google Scholar] [CrossRef]
  30. Ding, K.M.; Li, Y.Z.; Quevedo, D.E.; Dey, S.; Shi, L. A multi-channel transmission schedule for remote state estimation under DoS attacks. Automatica 2017, 78, 194–201. [Google Scholar] [CrossRef] [Green Version]
  31. Ding, D.R.; Wang, Z.D.; Wei, G.L.; Alsaadi, F.E. Event-based security control for discrete-time stochastic systems. IET Control Theory Appl. 2016, 10, 1808–1815. [Google Scholar] [CrossRef] [Green Version]
  32. Amin, S.; Cárdenas, A.A.; Sastry, S.S. Safe and Secure Networked Control Systems under Denial-of-Service Attacks. In Proceedings of the International Workshop on Hybrid Systems: Computation and Control; Springer: Berlin/Heidelberg, Germany, 2009; pp. 31–45. [Google Scholar] [CrossRef]
  33. Wang, M.F.; Liu, Y.G.; Xu, B.G. Observer-based H control for cyber-physical systems encountering DoS jamming attacks: An attack–tolerant approach. ISA Trans. 2020, 14, 1–14. [Google Scholar] [CrossRef]
  34. Wang, Z.D.; Yang, F.W.; Ho, D.W.C.; Liu, X.H. Robust H Control for Networked Systems With Random Packet Losses. IEEE Trans. Syst. Man Cybern.-Part B (Cybern.) 2007, 37, 916–924. [Google Scholar] [CrossRef]
  35. Mo, L.; Cao, X.H.; Song, Y.Q.; Kritikakou, A. Distributed Node Coordination for Real-Time Energy-Constrained Control in Wireless Sensor and Actuator Networks. IEEE Internet Things J. 2018, 5, 4151–4163. [Google Scholar] [CrossRef] [Green Version]
  36. Cheng, J.; Park, J.H.; Cao, J.D.; Qi, W.H. Hidden Markov Model-Based Nonfragile State Estimation of Switched Neural Network With Probabilistic Quantized Outputs. IEEE Trans. Cybern. 2020, 50, 1900–1909. [Google Scholar] [CrossRef]
  37. Liu, X.L.; Lin, W.; Zhao, C.R.; Hu, Y.H. Digital control of a family of time-delay feedforward systems with sparse sampling. Syst. Control Lett. 2022, 163, 105200. [Google Scholar] [CrossRef]
  38. Wu, J.; Chen, T.W. Design of Networked Control Systems With Packet Dropouts. IEEE Trans. Autom. Control 2007, 52, 1314–1319. [Google Scholar] [CrossRef]
  39. Xiong, J.; Lam, J. Stabilization of linear systems over networks with bounded packet loss. Automatica 2007, 43, 80–87. [Google Scholar] [CrossRef]
  40. Liu, J.L.; Zha, L.J.; Cao, J.; Fei, S.M. Hybrid-driven-based stabilisation for networked control systems. IET Control Theory Appl. 2016, 10, 2279–2285. [Google Scholar] [CrossRef]
  41. Wang, S.Y.; Wang, Z.D.; Dong, H.L.; Chen, Y. Distributed State Estimation Under Random Parameters and Dynamic Quantizations Over Sensor Networks: A Dynamic Event-Based Approach. IEEE Trans. Signal Inf. Process. Netw. 2020, 6, 732–743. [Google Scholar] [CrossRef]
  42. Wang, M.F.; Liu, K.; Wang, J.P.; Wang, M.Z.; Zhao, Z.J.; Xu, C. H Control for Industrial Cyber-Physical Systems Encountering Reactive DoS Jamming Attacks. In Proceedings of the 39th Chinese Control Conference, Shenyang, China, 27–29 July 2020; pp. 4328–4333. [Google Scholar] [CrossRef]
  43. Proakis, J.; Salehi, M. Digital Communications, 5th ed.; McGraw-Hill: New York, NY, USA, 2007. [Google Scholar]
  44. Li, Y.Z.; Quevedo, D.E.; Dey, S.; Shi, L. SINR-Based DoS Attack on Remote State Estimation: A Game-Theoretic Approach. IEEE Trans. Control Netw. Syst. 2017, 4, 632–642. [Google Scholar] [CrossRef] [Green Version]
  45. Tarn, T.J.; Rasis, Y. Observers for nonlinear stochastic systems. IEEE Trans. Autom. Control 1976, 21, 441–448. [Google Scholar] [CrossRef]
  46. Yang, F.W.; Wang, Z.D.; Hung, Y.S.; Gani, M. H control for networked systems with random communication delays. IEEE Trans. Autom. Control 2006, 51, 511–518. [Google Scholar] [CrossRef] [Green Version]
  47. Wan, J.; Hu, Z.R.; Cai, J.P.; Luo, Y.X.; Mei, C.L.; Han, A.T. Non-fragile dissipative filtering of cyber–physical systems with random sensor delays. ISA Trans. 2020, 104, 115–121. [Google Scholar] [CrossRef]
Figure 1. Basic structure of the ICPS with HTM encountering stealthy DoS jamming attacks.
Figure 1. Basic structure of the ICPS with HTM encountering stealthy DoS jamming attacks.
Actuators 11 00193 g001
Figure 2. Norm of states for the UPS encountering stealthy DoS jamming attacks when γ = 1 .
Figure 2. Norm of states for the UPS encountering stealthy DoS jamming attacks when γ = 1 .
Actuators 11 00193 g002
Figure 3. Switch times of the HTM.
Figure 3. Switch times of the HTM.
Actuators 11 00193 g003
Figure 4. Times of DoS jamming attacks.
Figure 4. Times of DoS jamming attacks.
Actuators 11 00193 g004
Figure 5. Norm of states for the tunnel diode circuit encountering stealthy DoS jamming attacks when γ = 1 .
Figure 5. Norm of states for the tunnel diode circuit encountering stealthy DoS jamming attacks when γ = 1 .
Actuators 11 00193 g005
Figure 6. Switch times of the HTM.
Figure 6. Switch times of the HTM.
Actuators 11 00193 g006
Figure 7. Times of DoS jamming attacks.
Figure 7. Times of DoS jamming attacks.
Actuators 11 00193 g007
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Wang, M.; Geng, Y.; Wang, J.; Liu, K.; Che, X.; Wei, Q. H Control for ICPS with Hybrid-Triggered Mechanism Encountering Stealthy DoS Jamming Attacks. Actuators 2022, 11, 193. https://doi.org/10.3390/act11070193

AMA Style

Wang M, Geng Y, Wang J, Liu K, Che X, Wei Q. H Control for ICPS with Hybrid-Triggered Mechanism Encountering Stealthy DoS Jamming Attacks. Actuators. 2022; 11(7):193. https://doi.org/10.3390/act11070193

Chicago/Turabian Style

Wang, Mufeng, Yangyang Geng, Jingpei Wang, Ke Liu, Xin Che, and Qiang Wei. 2022. "H Control for ICPS with Hybrid-Triggered Mechanism Encountering Stealthy DoS Jamming Attacks" Actuators 11, no. 7: 193. https://doi.org/10.3390/act11070193

APA Style

Wang, M., Geng, Y., Wang, J., Liu, K., Che, X., & Wei, Q. (2022). H Control for ICPS with Hybrid-Triggered Mechanism Encountering Stealthy DoS Jamming Attacks. Actuators, 11(7), 193. https://doi.org/10.3390/act11070193

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop