Software-defined event trigger control method for large-scale network system under spoofing attack

A spoofing attack, event-triggered technology, applied in information technology support systems, complex mathematical operations, instruments, etc., can solve problems such as communication channel spoofing attacks, and achieve the effect of reducing management complexity, reducing management complexity, and reducing burden

Pending Publication Date: 2022-06-03
NANJING UNIV OF SCI & TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The communication channel between the controller and the actuator is also vulnerable to spoofing attacks
Therefore, it is a challenging problem to study software-defined event-triggered control methods for large-scale network systems under spoofed network attacks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software-defined event trigger control method for large-scale network system under spoofing attack
  • Software-defined event trigger control method for large-scale network system under spoofing attack
  • Software-defined event trigger control method for large-scale network system under spoofing attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] The present invention will be further described below in conjunction with the accompanying drawings. Obviously, the described embodiments are some, but not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0075] like figure 1 Shown is a flowchart of a software-defined event triggering control method for a large-scale network system under a spoofing attack provided by the present invention, including the following steps:

[0076] Step S1, establish a large-scale network control system model, which is specifically expressed as follows:

[0077]

[0078] The system consists of N subsystems, each of which is modeled as follows:

[0079]

[0080] in, represents the state variable of the ith subsystem, represents the control input of the ith subsystem; A i and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a software-defined event trigger control method for a large-scale network system under spoofing attack, which comprises the following steps: firstly, establishing a large-scale network control system model, and then introducing a dynamic weighted centralized event trigger mechanism; considering the influence of spoofing attack on network transmission data, and establishing a network attack model; a large-scale networked system model is improved based on a spoofing attack and dynamic weighted event triggering mechanism; and finally, based on a Lyapunov stability theory, obtaining a sufficiency condition for ensuring that the system is finally consistent and bounded, and obtaining an event trigger parameter and a state estimator gain by solving a linear matrix inequality. According to the method, the problem of management complexity caused by a centralized event triggering mechanism can be effectively reduced, the burden of network transmission is relieved, serious threats of spoofing attacks to a network control system are considered, and the data transmission efficiency is effectively improved.

Description

technical field [0001] The invention relates to the technical field of software-defined network control, and mainly relates to a software-defined event triggering control method for a large-scale network system under spoofing attack. Background technique [0002] With the development of communication technology, network control system has received extensive attention. In contrast to traditional control systems, system components such as sensors, controllers, and actuators in networked control systems are connected via wired or wireless networks rather than point-to-point links. This provides ease of installation, maintenance and adjustment, as well as increased flexibility, reliability and scalability. These advantages make the network control system widely used in different fields. At the same time, with the continuous maturity of component technology and the increasingly complex system tasks, the scale of the network control system continues to expand, and multiple subsy...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06F21/55G06F17/11G06F30/20
CPCG06F21/56G06F21/554G06F17/11G06F30/20Y04S40/20
Inventor 曹杰刘金良王昌辉查利娟王煜尧申冬琴蒋聚
Owner NANJING UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products