Network control method under spoofing attack based on interval type-2 T-S fuzzy

A technology of interval type 2 and spoofing attacks, applied in the field of network control under spoofing attacks, to achieve the effect of reducing bandwidth requirements, reducing control energy consumption, and reducing network system load

Pending Publication Date: 2021-11-09
HANGZHOU DIANZI UNIV
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Most of the existing technologies are researches on the type I T-S fuzzy control system, and there are few researches on the interval type II T-S fuzzy control system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network control method under spoofing attack based on interval type-2 T-S fuzzy
  • Network control method under spoofing attack based on interval type-2 T-S fuzzy
  • Network control method under spoofing attack based on interval type-2 T-S fuzzy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] Below in conjunction with accompanying drawing, the present invention will be further explained;

[0052] The network control method under the deception attack based on the interval type 2 T-S fuzzy model, specifically including the establishment of a mathematical model of the network system under the deception attack:

[0053]

[0054] Among them, i=1,2. Using the IF-THEN rule of the interval-type T-S model to describe the mathematical model of the network system under spoofing attack:

[0055] Rule 1: IFθ 1 (x(t)) is N 1i THEN

[0056]

[0057] x(t)=φ(t)

[0058] Rule 2: IFθ 2 (x(t)) is N 2i THEN

[0059]

[0060] x(t)=φ(t)

[0061] definition:

[0062] Lemma 1: For any positive definite symmetric matrix R∈R n×n , scalar d 1 , d 2 meet d 1 ≤d 2 , the vector function ω(t) makes the following integral defined, then:

[0063]

[0064] Lemma 2: If the matrices A, B, C have appropriate dimensions, and B=B T , then the following three proposi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network control method under spoofing attack based on interval type-2 T-S fuzzy. Firstly, a new memory event triggering scheme is provided, and expected system performance can be kept while the utilization rate of communication resources is reduced. Different from some existing event triggering mechanisms, the mechanism firstly utilizes a data packet which is released recently, and better flexibility is provided for improving system dynamics. Secondly, in consideration of the security problem of the network control system, a random spoofing attack model is adopted, and bounded malicious signals are injected by hands. In consideration of the influence of METS and spoofing attacks, a novel network control system model is constructed, and a corresponding state feedback controller is designed. Then, the sufficient condition of asymptotic stability of the system is obtained by utilizing a Lyapunov function technology, the gain matrix of a controller is solved, and the problem of event trigger control under spoofing attack based on an interval type-2 T-S fuzzy model is solved.

Description

technical field [0001] The invention belongs to the field of control science and control engineering, and in particular relates to a network control method under a deception attack based on an interval-type T-S fuzzy model. Background technique [0002] With the pervasive use of open but unprotected communication networks, cybersecurity systems within them are increasingly vulnerable to various malicious attackers. According to reports, a successful cyber attack can lead to very serious consequences, including leakage of customer information, destruction of infrastructure, and even life-threatening. Therefore, the security problem of Network Control System (NCS, Network Control System) has attracted more and more attention, among which, spoofing attack is one of the most important network attacks, spoofing attack, also known as false data injection attack, the attacker Send false control input signals through the network, change the authenticity or integrity of data informa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G05B13/04
CPCG05B13/042
Inventor 付世州田田周绍生
Owner HANGZHOU DIANZI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products