Abstract
This paper considers Cyber-Physical Systems (CPSs) in the presence of Denial-of-Service (DoS) attacks, and investigates the networked control problem under data rate limitations. We develop a framework for CPSs in the presence of DoS attacks, and present a state-estimate control scheme for CPSs under DoS attacks. For the different communication status, the information on the plant state is transmitted to the controller by employing a different data rate in order to mitigate the influence of DoS attacks. Sufficient conditions on the data rate for mean square observability and stabilization of CPSs are derived by applying information theoretic tools of source coding. Our result is less conservative than some existing results. An illustrative example is given to demonstrate the effectiveness of the proposed quantization-coding scheme.
1. Introduction
In recent years, Cyber-Physical Systems (CPSs) have been an active research area (Fioravanti et al., Citation2023; Wang & Shen, Citation2023). As fundamental issues in control theory, the observability and stabilization problem for CPSs has attracted much attention because of their applications, such as intelligent transportation, smart grids and process automation systems (Weng et al., Citation2023). In CPSs, the information on the plant state is transmitted to the controller over a communication channel, which can be threatened by malicious attacks, such as denial-of-service (DoS) 4attacks. In remote state estimation, DoS attacks can block communication channels. This leads to degraded Quality of Service (QoS) of the communication network. In very severe cases, very few information on the plant state is transmitted to the controller due to DoS attacks such that the close-loop feedback system becomes instable. The networked control problem for CPSs in the presence of DoS attacks has received considerable attention (Liu et al., Citation2023).
A framework on DoS attacks was proposed in Persis and Tesi (Citation2015). In Qin et al. (Citation2017), the authors proposed an optimal DoS attack scheduling with energy constraint over packet-dropping networks, and in Ding et al. (Citation2017), the authors proposed a multi-channel transmission schedule for remote state estimation under DoS attacks. Li et al. (Citation2017) considered SINR-based DoS attacks on remote state estimation. Kato et al. (Citation2022) employed a deterministic DoS attack model constrained in terms of attacks' frequency and duration, and studied the stabilization problem of networked control systems under DoS attacks. Liu et al. (Citation2022) was concerned with the problem of stabilizing continuous-time linear time-invariant systems subject to quantization and DoS attacks, and proposed a novel structure based on a deadbeat controller as well as a delicate transmission protocol for the input and output channels, and codesigned a deadbeat controller and transmission protocol.
Networked state estimation over a shared communication medium was introduced in Xia et al. (Citation2017). An LMI approach could be used to design the state estimator for networked control systems (Muehlebach & Trimpe, Citation2018). A comprehensive solution to the plant state estimation problem for networked control systems in a distributed fashion over communication networks was provided in Li et al. (Citation2018). A remote state estimator over a wireless fading channel was designed (Ren et al., Citation2018). Furthermore, the problem of estimating the state of weakly coupled linear systems was considered, and an optimal allocation of the channel capacity was proposed (Chen et al., Citation2017). Kircher et al. (Citation2022) gave an optimization framework for resilient batch estimation in CPSs. Liu et al. (Citation2023) addressed remote estimation for energy harvesting systems under multiplicative noises. Xu et al. (Citation2022) addressed state estimation under joint false data injection attacks.
A lot of excellent results on data rate limitation have been reported in the literature. A lower bound on the data rate required to ensure observability and stabilizability of linear control systems was provided by Tatikonda and Mitter (Citation2004). Liu and Jin (Citation2017) further developed the result, and gave a smaller lower bound by employing the quantization and coding scheme where all plant states are quantized, coded and converted together into a codeword. Liu and Rui (Citation2018) constructed a binary code where the codeword length is determined by the real state prediction error, and further gave a less conservative result. A data rate condition to stabilize a continuous-time scalar linear system was derived on the basis of event triggering (Ling, Citation2017). Furthermore, event-triggering control under bandwidth limitation was also studied by Li et al. (Citation2017). Kostina et al. (Citation2022) gave sufficient conditions on the exact minimum number of bits to stabilize a linear system. Based on the spherical polar coordinate quantizer, a quantization method with finite data rate was proposed for handling the nested quantization and achieving the convergence to the origin of the system with input and output quantizations (Wang, Citation2023).
In this paper, we will consider networked control systems under data-rate constraints and DoS attacks. Namely, communication between sensors and controllers may take place over data-rate-limitation channels in the presence of DoS attacks. There exists the trade-offs between system resilience and data rate, which affects the stability of control systems (Feng et al., Citation2021). Feng et al. (Citation2022) further developed a variable bit rate (VBR) encoding–decoding protocol and quantized controller to stabilize the control system in the presence of DoS attacks. Ran et al. (Citation2023) were concerned with the quantized consensus problem for uncertain nonlinear multiagent systems under data-rate constraints and DoS attacks, and proposed a novel dynamic quantization with zooming-in and holding capabilities. The main differences between this paper and Feng et al. (Citation2022) include the following points. (1) Feng et al. (Citation2022) considered a system without the disturbance or noise, but we consider a system with the disturbance or noise. Clearly, our results are more meaningful. (2) (Feng et al., Citation2022) gave conditions for exponentially stability. However, we give ones for mean square observability and stabilization. (3) We gave a lower bound of data rates for mean square observability and stabilization, which is smaller than one given by Feng et al. (Citation2022). Thus, our result is less conservative than the results given by Feng et al., (Citation2021, Citation2022). (4) Our proof of technical methods is different from the proof given by Feng et al. (Citation2022).
The remainder of this paper is organized as follows: Section 2 introduces problem formulation. Section 3 proposes a state-estimate control scheme under DoS attacks, and presents sufficient conditions for observability and stabilization. The result of a numerical example is presented in Section 4. Conclusions are stated in Section 5.
2. Problem formulation
2.1. Process model
In this paper, we consider the CPS in Figure , where the process is a linear time-invariant control system as given below: (1) (1) Here, denotes the plant state, denotes the control input, and denotes the disturbance or noise. A, B and F are known real matrices.
Here, we considered a networked control system with a state-estimate feedback controller, which is different from other existing frameworks. Notice that, the sensor is able to connect to the controller via a stationary memoryless digital communication channel. Thus, the plant state needs to be quantized, encoded and transmitted to the estimator. Then, the estimator will compute the estimation on the basis of data packets sent by the encoder. However, it is possible that some data packets are intercepted by attackers in communication networks. DoS attacks may cause failure of some transmission attempts. In remote state estimation, packet losses have important effects on observability and stabilization of the system (Equation1(1) (1) ).
Here, we impose the following assumptions (Feng et al., Citation2022) on system (Equation1(1) (1) ).
Proof
• Assumption 2.1
The initial state may be considered as a zero mean, Gaussian random variable, satisfying (2) (2) and the disturbance may be considered as a stationary stochastic process, satisfying (3) (3)
Proof
• Assumption 2.2
Our model of the communication channel neglects the effect of networked-induced delay.
Proof
• Assumption 2.3
System (Equation1(1) (1) ) is a TCP-like system, which employs the packet acknowledgment (ACK) scheme.
Proof
• Assumption 2.4
The network communication between the sensor and controller takes place over a data-rate limited communication channel subject to DoS attacks.
2.2. Attacker model
Defending against DoS attacks has become important in CPSs. DoS attacks block the communication channel to prevent information exchange between the sensor and controller. Namely, transmission attempts will fail in DoS status. Let T denote the sampling interval. We define the set of the state sampling instants by where we set and .
As stated in Feng et al. (Citation2021), the sequence of DoS off/on transitions is defined by with . Let denote the finite time interval where t and τ is the end or beginning, respectively. Then, given with , we define as the number of DoS off/on transitions in time , and define as the time set where the communication channel lies in the DoS status. Here, we impose the following assumptions on DoS attacks.
Proof
• Assumption 2.5 (Feng et al., Citation2021)
There exist constant and constant such that holds for any with .
Proof
• Assumption 2.5 (Feng et al., Citation2021)
There exist constant and constant such that holds for any with .
We define the subset as the sequence of the time instants where transmissions are successful. Then, we give Lemma 2.1 following from Feng et al. (Citation2021).
Lemma 2.1
Feng et al., Citation2021
Consider the system (Equation1(1) (1) ) over a communication channel subject to DoS attacks characterized by Assumptions 2.1–2.6. Let denote the number of successful transmissions in the time interval . If hold, it follows that
2.3. Problem formulation and contribution
Let and denote the state estimate and estimation error, respectively. Namely, we have (4) (4) Here, we implement a state-estimate feedback control law of the form (5) (5) where we select K such that A + BK is a Hurwitz matrix.
The value of the plant state can be quantized and encoded into a finite number of bits. We define as the number of bits transmitted at the kth sampling interval. The data rate at the kth sampling interval is defined as
Definition 2.1
System (Equation1(1) (1) ) with the initial state and disturbance satisfying conditions (Equation2(2) (2) ) and (Equation3(3) (3) ) is said to be mean square observable if there exists a quantization and coding scheme such that holds, where is a know constant.
Definition 2.2
System (Equation1(1) (1) ) with the initial state and disturbance satisfying conditions (Equation2(2) (2) ) and (Equation3(3) (3) ) is said to be mean square stabilizable if there exists a state-estimate feedback control law of the form (Equation5(5) (5) ) such that holds, where is a know constant.
In this paper, we will derive a lower bound of the data rate for mean square observability and stabilization of the system (Equation1(1) (1) ), and give a state-estimate feedback control scheme for system (Equation1(1) (1) ) in the presence of DoS attacks.
The main contributions of this paper are as follows.
We develop a framework for CPSs in the presence of DoS attacks, and present a state-estimate control scheme for CPSs under DoS attacks.
We discuss the effect of the disturbance, and derive sufficient conditions for mean square observability and stabilization of CPSs.
We present a lower bound on the data rate for observability and stabilization of CPSs, which is less conservative than some existing results (Feng et al., Citation2021, Citation2022).
3. State-estimate control under doS attacks
In order to achieve a tight result on the data rate for observability and stabilization of system (Equation1(1) (1) ) in the presence of DoS attacks, we first carry out the transformation on . Let denote a real orthogonal matrix that can diagonalize where we define the ith eigenvalue by and further define Here, we only consider this case where matrix A has real eigenvalues each with geometric multiplicity one. For other cases, there exist the same result (Feng et al., Citation2022). Next, we define (6) (6) Clearly, we have (7) (7) Thus, system (Equation1(1) (1) ) can be rewritten as For brevity, we define In particular, system (Equation1(1) (1) ) is also rewritten as (8) (8) We employ a predictive coding method for plant states. Namely, at time , , not , is quantized and encoded,. By doing so, our result will be less conservative than the existing results (Feng et al., Citation2021, Citation2022). Let and denote the quantization value and quantization error at time , respectively. Then, can be encoded into a finite number of bits. We define as the number of bits transmitted at the kth sampling interval. Then, a data packet of bits will be sent to the decoder. Namely, we can obtain the data rate given by Then, we give Lemma 3.1 following from Cover and Thomas (Citation2006).
Lemma 3.1
Cover & Thomas, Citation2006
Consider the system (Equation1(1) (1) ) over a communication channel. Let denote the quantization value of . For a given , find such that (9) (9) If set (bits), there exists a quantization and coding scheme such that condition (Equation9(9) (9) ) holds. Thus, the data rate is given by
The information of the plant state needs to be transmitted over the communication channel under DoS attacks. Here, we divide time into three time zones. The first one is the DoS attack time zone defined as , where the communication channel is in the DoS attack status. The second one is the defense time zone defined as , where the communication channel is in the defense status. The last one is the peace time zone defined as , which is the time zone behind the defense time zone and in front of the next DoS attack time zone. Thus, we divide the set of the state sampling instants into three types of sets: DoS attack instant set , defense instant set and peace instant set . We define Here, we employ a variable data rate in order to mitigate the influence of DoS attacks. Especially, the data rate changes with the communication status, and is determined by (10) (10) where e denotes the natural constant.
Notice that, the communication between the sensor and controller is subject to data rate limitations. We want to give a tight result on the data rate for observability and stabilization of system (Equation1(1) (1) ) in the presence of DoS attacks. First, we give the main result on observability of system (Equation1(1) (1) ).
Theorem 3.1
Consider system (3.1) in the presence of DoS attacks in Assumptions 2.1–2.6. Let denote n positive real eigenvalues of matrix A. Assume that hold. If the information of the plant state is transmitted by employing the data rate given by (Equation10(10) (10) ), the system (Equation1(1) (1) ) is mean square observable.
Proof.
First, we consider the case where the communication channel is in DoS attack status.
In TCP/IP network communication, the encoder may receive a data packet acknowledgment (ACK) from the decoder if one data packet is successfully transmitted to the decoder. However, for the DoS attack status, no data packet can be received at the decoder, and no ACK can be received at the encoder too. Thus, both the encoder and the decoder know that the communication channel is in the DoS attack status. For this case, there is no need to transmit any data packet. Clearly, the data rate is equal to zero in DoS attack status. Thus, we have when the system (Equation1(1) (1) ) is in the DoS attack status.
In the DoS attack status, both the encoder and the decoder compute the state estimate using the same method. First, we compute on the basis of (11) (11) where we define According to Equations (Equation7(7) (7) ), (Equation8(8) (8) ), and (Equation11(11) (11) ), we can obtain By solving the differential equation above, we may give (12) (12) If , will not increase. For this case, it is unnecessary for the encoder to encode . Namely, we do not transmit the information on , and set . On the contrary, , will be enlarged more than times.
It follows from Equation (Equation12(12) (12) ) that (13) (13) Furthermore, notice that the disturbance may be considered as a stationary stochastic process, satisfying (Equation3(3) (3) ). Then, it follows from Assumptions 1 that we can define (14) (14) Substituting Equation (Equation14(14) (14) ) into Equation (Equation13(13) (13) ), we obtain (15) (15) According to the recurrence formula (Equation15(15) (15) ) above, we can further obtain Thus, it follows that (16) (16) where we define . Clearly, the uncertainty of the state estimation error will increase in the DoS attack status because the information on the plant state cannot be sent to the estimator due to DoS attacks.
In defense status, both the encoder and the decoder compute the state estimate using the same method. First, we compute on the basis of (17) (17) where we define According to Equations (Equation7(7) (7) ), (Equation8(8) (8) ), and (Equation17(17) (17) ), we can obtain By solving the differential equation above, we may give (18) (18) with .
Then, it follows from Equation (Equation18(18) (18) ) that (19) (19) where we have Clearly, it means that holds too. Substituting Equation (Equation14(14) (14) ) into Equation (Equation19(19) (19) ), we obtain with . Then, it follows that (20) (20) where we have (21) (21) Furthermore, notice that Then, it follows from Lemma 3.1 that we have (22) (22) and (23) (23) According to (Equation22(22) (22) ) and (Equation23(23) (23) ), we quantize, encode and have (24) (24) Substituting Equations (Equation20(20) (20) ) and (Equation21(21) (21) ) into Equation (Equation24(24) (24) ), we obtain According to the recurrence formula above, we can further obtain (25) (25) where we define .
Notice that, the uncertainty of the state estimation error will increase in the DoS attack status because the information on the plant state cannot be sent to the estimator due to DoS attacks. In order to decrease the state estimation error, we increase the data rate and send more information on the plant state to the estimator. Let denote the last state sampling instant in defense status. Here, we define According to Equations (Equation16(16) (16) ) and (Equation25(25) (25) ), we can obtain There exists a such that with . If we choose such that (26) (26) holds, then the mean square value of the state estimation error is bounded and given by with . Thus, there exists a state-estimate feedback control law of the form (Equation5(5) (5) ) such that holds for any .
Next, we set , and have (27) (27) Clearly, denotes the number of successful transmissions in the time interval . If assume that holds, according to Lemma 1, we may give (28) (28) in the time interval . Substituting (Equation27(27) (27) ) and (Equation28(28) (28) ) into (Equation26(26) (26) ), we have (29) (29) with . Namely, we set the number of bits given by (Equation29(29) (29) ) for encoding when the ith eigenvalue of the system (Equation1(1) (1) ) is greater than or equal to zero. On the contrary, we set when the ith eigenvalue of the system (Equation1(1) (1) ) is less than zero. Furthermore, notice that the number of bits must be an integer. Thus, we obtain The data rate in the defense status is given by In the peace status, both the encoder and the decoder compute the state estimate using the same method. First, we compute on the basis of (30) (30) where we define According to Equations (Equation7(7) (7) ), (Equation8(8) (8) ), and (Equation30(30) (30) ), we can obtain By solving the differential equation above, we may give (31) (31) with .
Then, it follows from Equation (Equation31(31) (31) ) that (32) (32) where we have Clearly, it means that holds too. Substituting Equation (Equation14(14) (14) ) into Equation (Equation32(32) (32) ), we obtain with . Then, it follows that (33) (33) where we have (34) (34) Furthermore, we notice that Then, it follows from Lemma 2 that we have (35) (35) and (36) (36) According to (Equation35(35) (35) ) and (Equation36(36) (36) ), we quantize, encode and have (37) (37) Substituting Equations (Equation33(33) (33) ) and (Equation34(34) (34) ) into Equation (Equation37(37) (37) ), we obtain (38) (38) According to the recurrence formula (Equation38(38) (38) ) above, we can further obtain where we define .
Notice that the uncertainty of the state estimation error has decreased to the level that is considered the allowable error range of system (Equation1(1) (1) ) in peace status. Thus, we only transmit the information on the plant state such that the uncertainty of the state estimation error will no longer increase. Clearly, the number of bits in peace status is less than one in defense status.
There exists a such that with . If we choose such that (39) (39) holds, then the mean square value of the state estimation error is bounded and given by with . Thus, there exists a state-estimate feedback control law of the form (Equation5(5) (5) ) such that holds for any .
Then, it follows from (Equation39(39) (39) ) that the number of bits needs to satisfy (40) (40) such that the system (Equation1(1) (1) ) is mean square observable. Namely, we set the number of bits given by (Equation40(40) (40) ) for encoding when the ith eigenvalue of the system (Equation1(1) (1) ) is greater than or equal to zero. On the contrary, we set when the ith eigenvalue of the system (Equation1(1) (1) ) is less than zero. Furthermore, notice that the number of bits must be an integer. Thus, we obtain The data rate in peace status is given by Combined with the arguments above, we can show that there exists a constant such that holds. Clearly, system (Equation1(1) (1) ) is mean square observable if data packets on the information of the plant state are transmitted by employing the data rate given by (Equation10(10) (10) ).
Remark 3.1
Notice that, we consider system (Equation1(1) (1) ) with random disturbance. Thus, system (Equation1(1) (1) ) is mean square stable, not exponentially stable.
The chief difference in our case is that we consider the communication channel which has three states: DoS status, defense status, and peace status. While the communication status is changing, the data rate is being changed. Thus, our result is less conservative than some existing results (Feng et al., Citation2021, Citation2022).
For the proof technique in Theorem 3.1, we employ not only control theoretic tools but also information theoretic tools.
Next, we derive the sufficient condition on the data rate for mean square stabilization of system (Equation1(1) (1) ) under DoS attacks, and give the following result.
Theorem 3.2
Consider system (Equation1(1) (1) ) in the presence of DoS attacks in Assumptions 2.1–2.6. Let denote n positive real eigenvalues of matrix A. Assume that hold. If the information of the plant state is transmitted by employing the data rate given by (Equation10(10) (10) ), system (Equation1(1) (1) ) is mean square stabilizable.
Proof.
According to (Equation4(4) (4) ) and (Equation6(6) (6) ), we obtain Notice that both the encoder and decoder have a knowledge of at any time t. However, is a random variable for the encoder and decoder. Then, we have (41) (41) As stated in Theorem 3.1, we have (42) (42) If there exists a constant such that (43) (43) holds, we may obtain Now, we will drive Inequality (Equation43(43) (43) ) in three different situations. First, we consider the case where the communication channel is in DoS attack status. For this case, there is no need to transmit any data packet. Thus, we have when the system (Equation1(1) (1) ) is in DoS attack status.
According to (Equation5(5) (5) ) and (Equation6(6) (6) ), we obtain Then, we have with . Notice that, we select K such that A + BK is a Hurwitz matrix. Thus, it follows that there exists a constant such that holds in DoS attack status.
Secondly, we consider the case where the communication channel is in defense status. For this case, we increase the data rate and send more information on the plant state to the estimator in order to decrease the state estimation error. Namely, the data rate in defense status is given by We define For any , we have Notice that, is the quantization value of , and is norm-bounded. At the same time, A + BK is a Hurwitz matrix. Thus, it follows that there exists a constant such that holds in defense status.
Finally, we consider the case where the communication channel is in peace status. For this case, the uncertainty of the state estimation error has decreased to the level that is considered the allowable error range of system (Equation1(1) (1) ). Thus, we only transmit the information on the plant state such that the uncertainty of the state estimation error will no longer increase. The data rate in peace status is given by (44) (44) For any , we have Arguing as before, we can show that there exists a constant such that holds in peace status.
Combined with the arguments above, there exists a constant such that (45) (45) holds. Thus, according to (Equation41(41) (41) ), (Equation42(42) (42) ), and (Equation45(45) (45) ), we can show that there exists a constant such that holds. Clearly, if the information of the plant state is transmitted by employing the data rate given by (Equation10(10) (10) ), system (Equation1(1) (1) ) is mean square stabilizable.
Remark 3.2
It is shown in Theorem 3.2 that there exists a lower bound on the data rate above which one can find a state-estimate feedback control scheme to stabilize system (1) under DoS attacks.
No information on the plant state can be sent to the controller over the communication channel due to DoS attacks. Thus, one needs to transmit more information in defense status by employing higher data rate.
If assume that the disturbance is equal to 0, it follows from Theorem 2 that system (Equation1(1) (1) ) is exponentially stable.
4. Numerical examples and simulations
In order to better understand our results, we give a simple numerical example. Consider a networked control system which is open-loop unstable and is given by Here, we implement a state-estimate feedback control law of the form with Let the sampling period T = 1 s. As stated before, we consider the communication channel in the presence of DoS attacks, and set and . Clearly, we have . Over a simulation horizon of 0–20 s, the communication channel is in peace status. Over a simulation horizon of 21–70 s, the communication channel is in DoS attack status. Over a simulation horizon of 71–100 s, the communication channel is in defense status. Over a simulation horizon of 101–150 s, the communication channel is in peace status again.
First, we select the data rate given by which satisfies the condition in Theorems 3.1 and 3.2. The data rate is given by Feng et al. (Citation2022). The curves of the data rate response are shown in Figure . Clearly, our result is less conservative than the one in Feng et al. (Citation2022). The simulation results of are shown in Figure . Clearly, is mean square convergent and the system is mean square observable. The simulation results of are shown in Figure . Clearly, is mean square convergent and the system is mean square stabilizable too.
5. Conclusion
In this paper, we addressed the networked control problem for CPSs in the presence of DoS attacks, and derived the sufficient conditions on the data rate for mean square observability and stabilization. There exists a lower bound of the data rate, above which one can find a quantization, coding, and control scheme to stabilize the unstable plant. It is shown in our result that the information on the plant state can be transmitted to the controller by employing the different data rate for the different communication status. The numerical simulation was also given to illustrate the validity of our result.
Disclosure statement
No potential conflict of interest was reported by the author(s).
Additional information
Funding
References
- Chen, X., Belabbas, M., & Başar, T. (2017). Optimal capacity allocation for sampled networked systems. Automatica, 85, 100–112. https://doi.org/10.1016/j.automatica.2017.07.039
- Cover, T., & Thomas, J. (2006). Elements of information theory. Wiley. 200–205
- Ding, K., Li, Y., Quevedo, D. E., Dey, S., & Shi, L. (2017). A multi-channel transmission schedule for remote state estimation under DoS attacks. Automatica, 78, 194–201. https://doi.org/10.1016/j.automatica.2016.12.020
- Feng, S., Cetinkaya, A., Ishii, H., Tesi, P., & Persis, C. D. (2021). Networked control under DoS attacks: Trade-offs between resilience and data rate. IEEE Transactions on Automatic Control, 66(1), 460–467. https://doi.org/10.1109/TAC.9
- Feng, S., Cetinkaya, A., Ishii, H., Tesi, P., & Persis, C. D. (2022). Resilient quantized control under denial-of-service: Variable bit rate quantization. Automatica, 141, 110302–110311. https://doi.org/10.1016/j.automatica.2022.110302
- Fioravanti, C., Panzieri, S., & Oliva, G. (2023). Negativizability: A useful property for distributed state estimation and control in cyber-physical systems. Automatica, 157, 111240–111258. https://doi.org/10.1016/j.automatica.2023.111240
- Kato, R., Cetinkaya, A., & Ishii, H. (2022). Linearization-based quantized stabilization of nonlinear systems under DoS attacks. IEEE Transactions on Automatic Control, 67(12), 6826–6833. https://doi.org/10.1109/TAC.2021.3133180
- Kircher, A., Bako, L., Blanco, E., & Benallouch, M. (2022). An optimization framework for resilient batch estimation in cyber-physical systems. IEEE Transactions on Automatic Control, 67(10), 5246–5261. https://doi.org/10.1109/TAC.2021.3121223
- Kostina, V., Peres, Y., Ranade, G., & Sellke, M. (2022). Exact minimum number of bits to stabilize a linear system. IEEE Transactions on Automatic Control, 67(10), 5548–5554. https://doi.org/10.1109/TAC.2021.3126679
- Li, L., Wang, X., & Lemmon, M. D. (2017). Efficiently attentive event-triggered systems with limited bandwidth. IEEE Transactions on Automatic Control, 62(3), 1491–1497. https://doi.org/10.1109/TAC.2016.2577381
- Li, Y., Philips, S., & R. G. Sanfelice (2018). Robust distributed estimation for linear systems under intermittent information. IEEE Transactions on Automatic Control, 63(4), 973–988. https://doi.org/10.1109/TAC.2017.2737139
- Li, Y., Quevedo, D. E., Dey, S., & Shi, L. (2017). SINR-based DoS attack on remote state estimation: A game-theoretic approach. IEEE Transactions on Control of Network Systems, 4(3), 632–642. https://doi.org/10.1109/TCNS.2016.2549640
- Ling, Q. (2017). Bit rate conditions to stabilize a continuous-time scalar linear system based on event triggering. IEEE Transactions on Automatic Control, 62(8), 4093–4100. https://doi.org/10.1109/TAC.2016.2618000
- Liu, Q., & Jin, F. (2017). State estimation for networked control systems using fixed data rates. International Journal of Systems Science, 48(9), 1818–1828. https://doi.org/10.1080/00207721.2017.1287315
- Liu, Q., & Rui, D. (2018). Observability and stabilisability of networked control systems with limited data rates. International Journal of Systems Science, 49(11), 2463–2476. https://doi.org/10.1080/00207721.2018.1505003
- Liu, Q., Wang, Z., Dong, H., & Jiang, C. (2023). Remote estimation for energy harvesting systems under multiplicative noises: A binary encoding scheme with probabilistic bit flips. IEEE Transactions on Automatic Control, 68(1), 343–354. https://doi.org/10.1109/TAC.2022.3170540
- Liu, W., Sun, J., Wang, G., Bullo, F., & Chen, J. (2022). Resilient control under quantization and denial-of-service: Codesigning a deadbeat controller and transmission protocol. IEEE Transactions on Automatic Control, 67(8), 3879–3891. https://doi.org/10.1109/TAC.2021.3107145
- Liu, W., Sun, J., Wang, G., Bullo, F., & Chen, J. (2023). Data-driven resilient predictive control under denial-of-service. IEEE Transactions on Automatic Control, 68(8), 4722–4737. https://doi.org/10.1109/TAC.2022.3209399
- Muehlebach, M., & Trimpe, S. (2018). Distributed event-based state estimation for networked systems: A LMI approach. IEEE Transactions on Automatic Control, 63(1), 269–276. https://doi.org/10.1109/TAC.2017.2726002
- Persis, C. D., & Tesi, P. (2015). Input-to-state stabilizing control under denial-of-service. IEEE Transactions on Automatic Control, 60(11), 2930–2944. https://doi.org/10.1109/TAC.2015.2416924
- Qin, J., Li, M., Shi, L., & Yu, X. (2017). Optimal denial-of-service attack scheduling with energy constraint over packet-dropping networks. IEEE Transactions on Automatic Control, 63(6), 1648–1663. https://doi.org/10.1109/TAC.9
- Ran, M., Feng, S., Li, J., & Xie, L. (2023). Quantized consensus under data-rate constraints and DoS attacks: A zooming-in and holding approach. IEEE Transactions on Automatic Control, 68(9), 5397–5412. https://doi.org/10.1109/TAC.2022.3223277
- Ren, X., Wu, J., Johansson, K. H., Shi, G., & Shi, L. (2018). Infinite horizon optimal transmission power control for remote state estimation over fading channels. IEEE Transactions on Automatic Control, 63(1), 85–100. https://doi.org/10.1109/TAC.2017.2709914
- Tatikonda, S., & Mitter, S. K. (2004). Control under communication constraints. IEEE Transactions on Automatic Control, 49(7), 1056–1068. https://doi.org/10.1109/TAC.2004.831187
- Wang, B., & Shen, C. (2023). A time-varying observer-based approach to equilibrium estimation and compensation for synchronization of heterogeneous nonlinear cyber-physical systems. IEEE Transactions on Automatic Control, 68(10), 6176–6183. https://doi.org/10.1109/TAC.2023.3293025
- Wang, J. (2023). Quantized feedback control of discrete-time MIMO linear systems with input and output quantization over finite data rate channels. IEEE Transactions on Automatic Control, 68(10), 6277–6284. https://doi.org/10.1109/TAC.2022.3232991
- Weng, P., Chen, B., Liu, S., & Yu, L. (2023). Secure nonlinear fusion estimation for cyber-physical systems under FDI attacks. Automatica, 148, 110759–110763. https://doi.org/10.1016/j.automatica.2022.110759
- Xia, M., Gupta, V., & Antsaklis, P. J. (2017). Networked state estimation over a shared communication medium. IEEE Transactions on Automatic Control, 62(4), 1729–1741. https://doi.org/10.1109/TAC.2016.2593645
- Xu, W., Wang, Z., Hu, L., & Kurths, J. (2022). State estimation under joint false data injection attacks: Dealing with constraints and insecurity. IEEE Transactions on Automatic Control, 67(12), 6745–6753. https://doi.org/10.1109/TAC.2021.3131145