Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Security control method of event-driven network control system under multi-network attack

A network control system, network attack technology, applied in transmission systems, digital transmission systems, data exchange networks, etc., can solve the problems that affect the effective operation of the system, reduce system performance, and the security of network information cannot be guaranteed. and energy consumption, stable operation, and the effect of saving network bandwidth resources

Active Publication Date: 2019-09-06
NANJING UNIV OF FINANCE & ECONOMICS
View PDF5 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] It should be pointed out that if network information security is not guaranteed, it will seriously affect the effective operation of the system and reduce system performance.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security control method of event-driven network control system under multi-network attack
  • Security control method of event-driven network control system under multi-network attack
  • Security control method of event-driven network control system under multi-network attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0107] 1. Considering the impact of network deception attack, replay attack and DoS attack in turn, establish a closed-loop model of network control system:

[0108] (1) The NCS object described in (1) is described by the following linear state equation:

[0109]

[0110] where A and B are coefficient matrices, is the system state vector, is the control input vector, and the corresponding state feedback controller is

[0111] u(t)=Kx(t)(2)

[0112] where .K∈R m×n is the gain matrix of the controller to be designed.

[0113] (2) Considering the impact of network spoofing attacks, the input of the controller under the influence of network spoofing attacks is

[0114] x D (t)=α(t)f(x(t))+(1-α(t))x(t k h) (3)

[0115] Among them, h represents a fixed sampling period, t k h represents the moment when the sensor releases data (t k ∈{1,2,3,...}), f(x(t)) is a nonlinear function assumed to represent a network spoofing attack signal and subject to the following nonlinear...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a security control method of an event-driven network control system under a multi-network attack. Considering the network transmission security problem, a random network spoofing attack, a replay attack and a DoS attack are sequentially introduced, and a system closed-loop model under the multi-network attack is established. Further considering the constraint of the limitednetwork bandwidth, an event trigger mechanism is introduced to screen and release sampling data meeting a preset event trigger condition to the network for transmission, thereby establishing a new switching system model on the basis of the system closed-loop model. Based on a switching system model, a Lyapunov stability theory is utilized to obtain a sufficiency condition for enabling the system to meet the stability of a mean square index, and a group of linear matrix inequalities is solved to obtain the gain of the state feedback controller. Compared with an existing controller design method, safe and stable operation of the network control system under the influence of multi-network attacks is guaranteed, meanwhile, the data transmission frequency is reduced, and limited network bandwidth resources are saved.

Description

technical field [0001] The invention relates to a security control method for a network control system based on an event trigger mechanism under multi-network attacks, and belongs to the technical field of network control. Background technique [0002] The network control system uses the network to connect the controlled object, sensors, controllers and actuators to form a closed-loop feedback loop. Compared with the traditional point-to-point connection control system, the network control system has the advantages of convenient installation and maintenance, information sharing, and low cost. Therefore, it has been well applied in teleoperation robots, multi-agents and smart grids. However, due to the influence of limited network bandwidth, problems such as delay and packet loss are unavoidable, which brings challenges to the analysis and control synthesis of networked control systems. [0003] At the same time, the introduction of the network has expanded the application ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L29/06
CPCH04L41/145H04L63/1458H04L63/1483H04L63/1441
Inventor 刘金良王誉达曹杰
Owner NANJING UNIV OF FINANCE & ECONOMICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products