Important-Data-Based DoS Attack Mechanism and Resilient H Filter Design for Networked T-S Fuzzy Systems

Xun Wang, Engang Tian, Wei Xing Zheng, Xiangpeng Xie

Research output: Contribution to journalArticlepeer-review

43 Citations (Scopus)

Abstract

This article is concerned with the security problems for networked Takagi-Sugeno (T-S) fuzzy systems with asynchronous premise constraints. The primary objective of this article is twofold. First, a novel important-data-based (IDB) denial-of-service (DoS) attack mechanism is proposed from the perspective of the adversary for the first time to reinforce the destructive effect of the DoS attacks. Different from most existing DoS attack models, the proposed attack mechanism can utilize the information of packets, evaluate the importance degree of packets, and only attack the most 'important' ones. As such, a larger system performance degradation can be expected. Second, corresponding to the proposed IDB DoS mechanism, a resilient H fuzzy filter is designed from the defender's point of view to alleviate the negative effect of the attack. Furthermore, since the defender does not know the attack parameter, an algorithm is designed to estimate it. In a word, a unified attack-defense framework is developed in this article for networked T-S fuzzy systems with asynchronous premise constraints. With the help of the Lyapunov functional method, sufficient conditions are successfully established to compute the desired filtering gains and ensure the H performance of the filtering error system. Finally, two examples are exploited to demonstrate the destructiveness of the proposed IDB DoS attack and the usefulness of the developed resilient H filter.

Original languageEnglish
Pages (from-to)3352-3362
Number of pages11
JournalIEEE Transactions on Cybernetics
Volume54
Issue number5
DOIs
Publication statusPublished - 1 May 2024

Bibliographical note

Publisher Copyright:
© 2013 IEEE.

Fingerprint

Dive into the research topics of 'Important-Data-Based DoS Attack Mechanism and Resilient H Filter Design for Networked T-S Fuzzy Systems'. Together they form a unique fingerprint.

Cite this