Optimal Control of an Uncertain Linear Networked Control Systems Under Denial of Service Attacks

Tua A Tamba


Controller design based on networked control system (NCS) framework typically relies on the use of computers and communication network systems to automatically monitor and manage the interactions and data exchanges between plant, sensor, controller and actuator elements of the considered closed loop NCS. Such design and implementation scheme are often challenging, particularly due to the requirement of guaranteed reliability and resiliency to possible failure of or malicious cyber attacks on the communication system part. This paper examines the stability of a class of uncertain linear NCS that is subjected to Denial-of-Service (DoS) attacks. In essence, a DoS is a failure phenomenon on the communication links which in NCS framework can prevents the execution of ideal control inputs to take place. Specifically, this paper examines the design of an event-triggered resilient controller for an uncertain linear NCS in the face of such a DoS phenomenon and characterizes sufficient conditions under which the closed loop NCS is guaranteed to remain globally asymptotically stable.


Networked Control Systems; Denial of Service Attacks, Event-Triggered Control

Full Text:



E. A. Lee, “Cyber physical systems: Design challenges,” in Proc. ISORC, 2008, pp. 363–369.

P. Tabuada, “Event-triggered real-time scheduling of stabilizing control tasks,” IEEE T. Automat. Contr., vol. 52, no. 9, pp. 1680–1685, 2007.

M. D. Lemmon, “Event-triggered feedback in control, estimation, and optimization,” in Networked Control Systems. Springer, 2010.

A. Cervin, D. Henriksson, B. Lincoln, J. Eker, and K.-E. Arz ˚ en, “How does control timing affect performance?” IEEE Contr. Syst. Mag., vol. 23, no. 3, pp. 16–30, 2003.

X. Ge, Q.-L. Han, X.-M. Zhang, and D. Ding, “Dynamic event-triggered control and estimation: A survey,” Int. J. Autom. Comput., vol. 18, no. 6, pp. 857–886, 2021.

E. Garcia and P. J. Antsaklis, “Model-based event-triggered control for systems with quantization and time-varying delays,” IEEE Trans. Autom. Control, vol. 58, no. 2, pp. 422–434, 2013.

K. Liu, E. Fridman, and Y. Xia, Networked Control Under Communication Constraints. Springer, 2020.

X.-M. Zhang, Q.-L. Han, X. Ge, D. Ding, L. Ding, D. Yue, and C. Peng, “Networked control systems: A survey of trends and techniques,” IEEE/CAA J. Autom. Sin., vol. 7, no. 1, pp. 1–17, 2019.

A. A. Cardenas, S. Amin, Z.-S. Lin, Y.-L. Huang, C.-Y. Huang, and S. Sastry, “Attacks against process control systems: risk assessment, detection, and response,” in Proc. ACM Symp. Inform., Comp. & Comm. Security, 2011, pp. 355–366.

D. Ding, Q.-L. Han, Y. Xiang, X. Ge, and X.-M. Zhang, “A survey on security control and attack detection for industrial cyber-physical systems,” Neurocomputing, vol. 275, pp. 1674–1683, 2018.

F. Pasqualetti, F. Dorfler, and F. Bullo, “Attack detection and identification in cyber-physical systems,” IEEE Trans. Autom. Control, vol. 58, no. 11, pp. 2715–2729, 2013.

Y. Zou, J. Zhu, X. Wang, and L. Hanzo, “A survey on wireless security: Technical challenges, recent advances, and future trends,” Proc. IEEE, vol. 104, no. 9, pp. 1727–1765, 2016.

A. Cetinkaya, H. Ishii, and T. Hayakawa, “An overview on denial-ofservice attacks in control systems: Attack models and security analyses,” Entropy, vol. 21, no. 2, p. 210, 2019.

C. G. Rieger, D. I. Gertman, and M. A. McQueen, “Resilient control systems: next generation design research,” in Proc. Conf. Human System Interactions, 2009, pp. 632–636.

A. A. Cardenas, S. Amin, and S. Sastry, “Secure control: Towards survivable cyber-physical systems,” in Proc. Int. Conf. Dist. Comput. Syst. Wksp., 2008, pp. 495–500.

T. A. Tamba, “A metaheuristic scheme for secure control of cyberphysical systems,” in Metaheuristic Algorithms in Industry 4.0. CRC Press, 2021, pp. 47–72.

F. Lin and A. W. Olbrot, “An LQR approach to robust control of linear systems with uncertain parameters,” in Proc. IEEE Conf. Decision & Control, vol. 4, 1996, pp. 4158–4163.

C. De Persis and P. Tesi, “Resilient control under denial-of-service,” IFAC Proc. Vol., vol. 47, no. 3, pp. 134–139, 2014.

C. De Persis and P. Tesi, “Input-to-state stabilizing control under denial-of-service,” IEEE Trans. Autom. Control, vol. 60, no. 11, pp. 2930–2944, 2015.

F. Lin, R. D. Brandt, and J. Sun, “Robust control of nonlinear systems: compensating for uncertainty,” Int. J. Control, vol. 56, no. 6, pp. 1453–1459, 1992.

J. P. Hespanha and A. S. Morse, “Stability of switched systems with average dwell-time,” in Proc. IEEE Conf. Decision & Control, 1999, pp. 2655–2660.

T. A. Tamba and Y. Y. Nazaruddin, “Event-triggered resilient control of a class of cyber-physical systems under denial-of-service,” in Proc. 5th Int. Conf. Instrum. Control Autom., 2017, pp. 41–46.

T. A. Tamba, Y. Y. Nazaruddin, and B. Hu, “Resilient control under denial-of-service via dynamic event triggering,” in Proc. 11th Asian Control Conf., 2017, pp. 1749–1754.

A. Girard, “Dynamic triggering mechanisms for event-triggered control,” IEEE Trans. Autom. Control, vol. 60, no. 7, pp. 1992–1997, 2015.

H. K. Khalil, Nonlinear Control, 3rd ed. Pearson New York, 2015.

DOI: http://dx.doi.org/10.12962/j24775401.v9i2.16303


  • There are currently no refbacks.

View My Stats

Creative Commons License
International Journal of Computing Science and Applied Mathematics by Pusat Publikasi Ilmiah LPPM, Institut Teknologi Sepuluh Nopember is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Based on a work at https://iptek.its.ac.id/index.php/ijcsam.