• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Multi-path switching protection for networked control systems under unbounded DoS attacks

    2021-06-24 04:34:14ZhuQiaohuiLiangQipengKangYuZhaoYunbo

    Zhu Qiaohui, Liang Qipeng, Kang Yu, Zhao Yunbo,*

    1. College of Information Engineering, Zhejiang University of Technology, Hangzhou 310000, China;2. School of Information Science and Technology, University of Science and Technology of China, Hefei 230027, China

    Abstract: The strategy design and closed-loop stability of networked control systems under unbounded denial of service (DoS) attacks are probed. A multi-path switching protection strategy is firstly designed by noticing the usually available multiple paths in data communication networks. The strategy consists of a DoS attack detection module at the actuator side to identify DoS attacks from normal data packet dropouts, and a multi-path switching module at the sensor side to effectively switch the data transmission path when necessary. Then, the sufficient conditions for the closed-loop system being global mean square asymptotic stability are given, with a corresponding controller gain design method. Numerical examples illustrate the effectiveness of the proposed approach.

    Keywords: networked control systems; unbounded DoS attack; DoS attack detection; multi-path switching

    1 Introduction

    Networked Control Systems (NCSs), whose data transmission channels are closed by some form of data communication networks such as the Internet, have witnessed its fast development and wide applications in recent years[1,2], due to its unique advantages including, e.g., the structural flexibility, the reduced overall cost, the easier implementation, etc[3,4]. These advantages are, however, not obtained at no cost; in fact, the unique characteristics introduced by the inserted data communication networks such as network-induced delay[5,6], data packet dropout[7-9], etc., have already been challenging control theorists and engineers in this field for decades. In recent years, besides these long-going challenges, the security issue has become one main focus[10-14], since the open and often shared data communication network in NCSs is so convenient for the attackers to intrude.

    Among these network attacks, the Denial of Service (DoS) attack is the most often seen which can cause severe consequences to NCSs[15-21]. A DoS attack plays its role by sending massive requests to the target machine to exhaust all the network resources, thus failing the legitimate users. As the result of a DoS attack, the controller (actuator) in NCSs will be unable to receive data from the sensor (controller), and therefore the considered NCS will be forced to run in the open-loop, resulting in severe disasters[22-24].

    In order to deal with the above challenge, considerable work has already been done, for periodic DoS attacks[25-27], random DoS attacks[28-33], on-off Dos attacks[34,35], and so forth. The considered models and approaches include queuing models[28], Bernoulli modeling[29-31]for DoS attacks, the Markov modeling of DoS attacks[32,33], the frequency and duration description of DoS attacks[35], the periodic event-triggered resilient control under DoS attacks[36], the design and analysis of multi-channel NCSs under DoS attacks[35,38], pulse control that maximizes the frequency and duration of the tolerable DoS attack[39], the design of adaptive-event-triggered filter under DoS attacks[40], just to name a few.

    We observe that most existing works assume that the DoS attack is somewhat bounded, either in its frequency, or duration, or some other index. Such an assumption means that the data exchange in the NCSs is not completely shut down under DoS attacks and hence various control approaches can be proposed to stabilize the system in such a scenario. Though this bounded DoS attack assumption can be fair and sound in the community of communication networks, it may not be appropriate for NCSs. In fact, one can readily realize that an NCS can be permanently damaged as long as the system is left open-loop for a sufficiently long time. Therefore, to DoS attack an NCS, the attacker should either be strong enough to kill the NCS at one round by forcing it open-loop for a sufficiently long time, or otherwise be too unwise to start any attack at the first instance. For such an "unbounded" DoS attack, conventional approaches will not work since the data exchange has been completely shut down.

    The above observation on the "unbounded" DoS attack motivates this present work. Unlike most existing works with the frequency and duration constraints of the DoS attack, here we assume no power boundary. This assumption basically means that any control strategy relying on the constraints of the DoS attacker will not work. To deal with this challenge, we seek for help from the intrinsic nature of large data communication networks, where there are often many independent paths from the data sender to the receiver. This "multi-path" privilege then justifies our strategy: whenever the current path is attacked, the NCS should move to another path as soon as possible to recover the data transmission. Following this philosophy, in this paper we propose a so-called "multi-path switching protection" strategy, which can effectively detect the occurring DoS attack, and then switch the data transmission path to close the NCS. Under this strategy, we provide the sufficient conditions for the global mean square asymptotic stability of the closed-loop system, and numerical examples will illustrate the effectiveness of the proposed approach.

    The remainder of the paper is organized as follows. Section 2 formulates the problem of interest, and section 3 discusses the attack detection method and the multi-path switching protection strategy. Then, Section 4 gives the sufficient conditions to ensure the global mean square asymptotic stability of the system under the designed multi-path switching protection strategy, and the controller is designed on this basis. The effectiveness of the proposed approach is demonstrated through numerical simulation in Section 5, and the paper is concluded in Section 4.

    2 Related works and problem formulation

    Consider the system setup as shown in Figure 1, where the sensing data from the sensor the controller and the control data from the controller to the actuator are transmitted via the data communication network, and the plant is modeled as a linear discrete-time system as

    Figure 1. Illustrating networked control systems under DoS attack, where multiple independent paths exist for both the sensor-to-controller and the controller-two-actuator channels.

    x(k+1)=Ax(k)+Bu(k)

    (1)

    In our system setup in Figure 1, the data communication networks are assumed to have three features: ① Data transmissions are subject to unbounded DoS attacks; ② Data transmissions can be lossy in a stochastic nature; ③ For both the sensor-to-controller and the controller-to-actuator channels, multiple independent paths exist for data transmissions. These assumptions are further discussed in detail in what follows.

    2.1 Unbounded DoS attacks

    DoS attacks are common in data communication networks which are often exposed to the open space. In such type of attacks, the DoS attacker can simply generate massive useless data transmission requests to jam the channel. Since NCSs are essentially relying on data communication networks to transmit their sensing and control data, they are not free from such attacks, and extensive works have already been seen in recent years to deal with the resulting challenges for the system design and analysis.

    One can immediately see that the core to the design and analysis of NCSs under DoS attacks is first to appropriately model DoS attacks within the NCS framework. In order to explain our DoS attack model clearly, we first discuss several classic models for comparison. We use Atand Aηto represent the duration and frequency of the DoS attack, and modify the original expression of each model to fit this unified frameworks, then the reader may readily compare the similarity and difference of these models.

    The periodic DoS attack model[26]In such a model, the considered NCS is attacked at every time instantsnTperiodwithnbeing integers andTperiod>0 being the attack period, and the duration of each attack isTd,Td

    At:Td

    (2a)

    (2b)

    With the above periodic DoS attack model, the attack is deterministic and periodic, i.e., we can readily know that during [nTperiod,nTperiod+Td]) ?nthe considered NCS is being attacked while during [nTperiod+Td, (n+1)Tperiod), ?nit is not.

    The random DoS attack model[31]This original model considers a discrete-time system. In such a model, once the attack is triggered, it will last exactly one sampling periodTsample(for continuous-time system the duration may be changed to some other value), and whether the considered NCS is attacked at each time instantk, is determined by a random variableσ(k) subject to the Bernoulli distribution, that is

    At:Tsample

    (3a)

    Aη:σ(k)

    (3b)

    With the above random DoS attack model, the DoS attack is triggered with certain probability Pr{σ(k)}, but for each attack the duration is constant and fixed.

    The frequency and duration limited model[34]In such a model, during the time interval (τ,t), both the attack duration At(τ,t) and the frequency Aη(τ,t) are upper bounded as

    (4a)

    (4b)

    One may readily notice that all these above three classic DoS attack models assume some type of "boundedness" of either or both of the attack duration and frequency. These assumptions seem reasonable, since attacks are at least subject to power consumption, which is always limited. Hence attacks can never be without limit.

    However, one may also notice that, to destroy any practical control system, the duration and frequency of the DoS attack (whose effect is to cut the information exchange channel), do not necessarily need to be infinite, for obviously, any practical control systems can only be left open-loop without being destabilized for a limited time. In this sense, any DoS attack should always be sufficiently “unbounded”for a considered control system, and conversely, any DoS attacker that is not sufficiently powerful enough, should not start the attack at all.

    The above discussion means that a more practically meaningful assumption on DoS attacks is "unbounded" as follows, which basically fails most existing studies, and motives out present work

    At: unbounded

    (5a)

    Aη: unbounded

    (5b)

    2.2 Lossy data transmission

    Besides DoS attacks, normal data transmissions without DoS attacks can still be lossy. That is, for any data packets transmitted in the considered NCS, it can reach its destination only with certain probability. Since the data transmission in the sensor-to-controller and the controller-to-actuator channels are separate and independent, and for the control system what really matters is mainly the round-trip transmission, we may consider only the combined effects of the lossy transmission in both channels. For this reason, we simply assume that the sensing datax(k) can successfully reach the actuator (after being used at the controller side) with probabilityp. Define

    (6)

    then it is obvious that Pr{θk=1}=1-pand Pr{θk=0}=p.

    2.3 Multiple independent paths

    As mentioned earlier, both the sensor-to-controller and the controller-to-actuator channels can contain multiple feasible paths to transmit the data independently (e.g. the solid and dashed paths in Figure 1). This is true in most typical data communication networks, since in these communication networks, data links are essentially unreliable, and the redundancy in data links is a common method to improve the quality of data transmissions.

    Figure 2. Illustrating the multi-path switching protection strategy for networked control systems subject to unbounded DoS attacks but with multiple independent paths.

    As assumed in equation(5), a DoS attacker may attack the currently activated path of both the sensor-to-controller and the controller-to-actuator channels, and when such an attack happens, it is sufficiently powerful, i.e., within reasonably finite time, the control system can not recover its data transmission from the path under attack. However, with multiple independent paths of both the sensor-to-controller and the controller-to-actuator channels, it is now possible to switch the path from the currently under attack one to another free one. We may further assume that, for a path that is newly switched to, it is not that easy to be recognized and attacked, which then consequently means that with multiple independent paths the frequency of DoS attacks is naturally bounded, that is

    At: unbounded

    (7b)

    (7b)

    Hence, unlike the unbounded DoS attack assumption in equation(5) which basically means that no control strategy can be designed to stabilize the system, the existence of multiple independent paths makes the attack frequency Aηbounded, thus giving us the opportunity to design appropriate control strategies to stabilize the system.

    Finally, our goal in this work is to design appropriate control strategies for the system in Figure 1, where the system plant is described as in equation(1), and the data transmissions in both the sensor-to-controller and the controller-to-actuator channels are subject to both lossy transmissions as described in equation(6) and DoS attacks as in equation(7). One may realize that the co-existence of DoS attacks and lossy transmissions are the key challenge to deal with, since the existence of the normal data loss makes DoS attacks not easily identifiable, and consequently, no path switching rule can be directly implemented. In the section that follows, we will propose a DoS attack detection method, with which a path switching rule can then be defined.

    3 Design of the multi-path switching protection strategy

    For the NCS that suffers from unbounded DoS attacks and has multiple independent paths, we propose a multi-path switching protection strategy with two modules. The DoS attack detection module is designed in the actuator to identify whether the DoS attack is currently in progress, by comparing the difference between the random packet dropouts and the packet dropouts caused by the DoS attack. The multi-path switching module is designed on the sensor to switch paths when a DoS attack is detected. In what follows we will detail the design of the two modules and finally give the overall algorithm.

    3.1 Design of the DoS attack detection module

    To detect whether a DoS attack is ongoing is the first step to design the path switching rule. This however is not easy. The main challenge here is that the packet dropout itself can not be simply used as an indicator for the DoS attack, since the lossy data transmission can also cause data packet dropout.

    To deal with this challenge, one may notice that packet dropouts caused by the normal lossy channel and DoS attacks should have different features. As assumed in equation(6), the former should behave probabilistically, i.e., a data packet may drop or not with certain probability, while the latter should be persistent once it occurs.

    Bear this in mind, the logic to detect DoS attacks is then clear: it should be regarded as a DoS attack at timekif the recorded consecutive data packet dropouts at the actuator side, denoted byNd(k) are beyond certain threshold, denoted byNd, or otherwise it should be regarded as normal dropouts. For example, with packet dropouts ratep= 0.1, the occurrence of a consecutive 5 packet loss might be regarded as a DoS attack, since the probability of causing such a consecutive 5 packet loss is as low as 0.00001 should it be only credited to random packet loss, and we have good reasons to think that an event with a low probability of 0.00001 should not easily happen in the real world.

    Then, it becomes clear that for the design of the DoS attack detection module the key is first to calculate the consecutive data packet dropoutsNd(k) and then determine the thresholdNd.

    The determination ofNd(k) can be easily done by the DoS attack detection module. We may simply run a counter within this module, which updates its value at every time instantk, either being initiated by 0 if the control signal calculated at timek, denoted byuc(k) is received, or added by 1 if otherwise. That is

    (8)

    The determination of the thresholdNdcan be tricky. It is readily understood thatNdbeing too large will mean that ongoing DoS attack is not detected whileNdbeing too small will mean that normal data packet dropout is detected as DoS attacks. In order to balance between these two types of errors, we introduceαreflecting the detection sensitivity and define the thresholdNdas

    Nd=logpα

    (9)

    With equations(8) and (9), the DoS attack detection module can finally be designed as

    (10)

    where the indicatorσd(k) indicates whether a DoS attack occurs at timek.

    With equations(8), (9) and (10), the working logic of the DoS attack detection module can be interpreted as follows. At every time instantk, this module updates its counterNd(k) and compare it with the thresholdNd, and claims the occurrence of a DoS attack wheneverNd(k)>Nd. Notice that whenever the module makes such a claim, the actual consecutive data packet dropout is larger thanNd, and if conversely, no DoS attack is ongoing while these data packet dropouts are contributed by normal data loss, the probability of having larger thanNdconsecutive dropouts is less thanpNd=α. Hence,αas the tunable parameter, can be used to control the balance of the aforementioned two types of errors: the largerαis, the more actual DoS attacks can be recognized, and the more normal data loss will be falsely recognized as DoS attacks. In practice, the value ofαshould be carefully chosen by considering both the system cost and performance.

    3.2 Design of the multi-path switching module

    With Subsection 3.1, the DoS attack detection module can effectively detect whether a DoS attack is ongoing. Once such an attack is detected, the current path (the solid one in Figure 2) which can not be recovered in a short time should be switched to a new available path (the dashed one in Figure 2), thanks to the multiple available paths for NCSs.

    Figure 3. The considered system is unstable under unbounded DoS attack, if the proposed multi-path switching protection strategy is not in use.

    Figure 4. The considered system is stable under the unbounded DoS attack, if the proposed multi-path switching protection strategy is in use.

    One may intuitively think that the switching rule can be simply designed as "switching the path whenever a DoS attack is detected, i.e.,σd(k) isTRUE". As the newly switched path is hardly found by the DoS attackers and hence can maintain service for some time, such a switching rule can then effectively deal with DoS attacks.

    The above approach is sound should only the effects of DoS attacks be of interest. However, we notice that even without DoS attacks, the normal data loss can also produce consecutive data packet dropouts, which may destabilize the system in severe conditions. Therefore, we may take advantage of the switching module that will be designed anyway for DoS attacks to further overcome the negative effects of the normal data loss.

    With the above considerations, our multi-path switching module can then be designed as

    (11)

    where the indicator functionσP(k) indicates whether the current path at timekshould be switched, and the actual switching boundNis defined as

    N=min{Nd,Nc}

    (12)

    whereNcis the maximum number of consecutive data packet dropouts under which the considered NCS can still maintain its required performance, the determination of which will be further detailed in subsection 4.2.

    With equations(11) and (12), the working logic of the multi-path switching rule can then be interpreted as follows. At every time instantk, this module obtains the current number of consecutive data packet dropoutsNd(k), compares it with the actual switching boundN, and finally decides whether to switch the path according to equation(11).

    3.3 The multi-path switching protection algorithm

    In our system design, the controller simply generates the control signal based on its latest available sensing data and sends it to the actuator. The actuator then selects its latest available control signal to apply it to the plant. Hence, the control signal actually applied can be determined as

    (13)

    The overall algorithm of the multi-path switching protection strategy for NCSs with unbounded DoS attacks and multiple independent paths, can then be organized as in Algorithm 3.1.

    Algorithmic 3.1 Multi-path switching protection algorithm

    1InitializationGiven the plant model in equation(1), data loss probabilityp, and the design parametersα. Calculate the thresholdNdby equation(9), determine the allowed maximum number of consecutive data packet dropoutNcby equation(40), and calculate the actual thresholdNby equation(12).

    2SamplingAt timek, the sensor samples the plant and sends the samplex(k) to the controller.

    3ControllerThe controller generates the control law and sends the control signal to the actuator.

    4ExecutionandSwitchingConditionThe actuator applies the available control signal as in equation(13) to the plant, and its DoS attack detection module calculates the consecutive data packet dropoutNd(k) by equation(8) and sends it to the sensor.

    5SwitchingThe sensor decides whether to switch the path according to equation(11).

    4 Stability analysis and controller design

    This section first obtains the closed-loop system under the multi-path switching protection strategy proposed in Section 3, then analyzes the closed-loop system stability, and finally proposes a design method for the controller gainK.

    The following concept of global mean square asymptotic stability is needed.

    Definition 4.1[41]The system in equation(1) is said to be globally mean-square asymptotically stable (GMSAS), if for any given initial statex(0)∈Rn, it holds that

    4.1 Closed-loop system under state feedback control

    We consider a simple state feedback controller for equation(13), but we should bear in mind that any control law can be applied to equation(13) provided it can ensure the desired system performance.

    For state feedback control, the general form of the control signals in equation(13) can be specified as

    uc(k)=Kx(k)

    (14a)

    (14b)

    where the control gainKis to be designed.

    z(k+1)=Φθkz(k)

    (15)

    where

    (16)

    (17)

    Similarly, the closed-loop system under DoS attack can be written as

    z(k+1)=Φ0z(k)

    (18)

    With equation(15) and (18), the closed-loop system can be written as

    (19)

    4.2 Closed-loop stability

    Theorem 4.1Givenξ,p, 0<γ<1,β>1, the closed-loop system in equation(19) is GMSAS, if

    (20a)

    whereξ=supAηis the upper bound of the attack frequency,

    (20b)

    (20c)

    andP0,P1,P2are symmetric positive definite matrices that satisfy the following inequalities,

    (20d)

    (20c)

    (20f)

    ProofWe consider two subsystems, being DoS attacked or not, denoted byΣ1andΣ2, respectively.

    Consider subsystemΣ1. Choose the following Lyapunov function candidate

    V1(k)=zT(k)Pθkz(k)

    (21)

    Along the trajectory of the closed-loop system in equation(19), we obtain that

    E(V1(k+1)|z(k),θk)-γV1(k)=

    E(zT(k+1)Pθ (k+1)z(k+1)|z(k),θk)-

    γzT(k)Pθkz(k)=

    (22)

    Combining equations(20d) and (20e), from equation(22) we obtain

    E(V1(k+1)|z(k),θk)-γV1(k)<0

    (23)

    Therefore, recursion can be obtained in subsystemΣ1, as

    E(V1(k)|z(ti),θ(ti))<γk-tiV1(ti)

    (24)

    wheretiis the moment when the path is switched for theith time, andt0=0.

    For anykin the subsystemΣ1, it holds that

    E{‖z(k)‖2}

    (25)

    Now consider subsystemΣ2. Choose the following Lyapunov function candidate

    V2(k)=zT(k)P2z(k)

    (26)

    Along the closed-loop system in equation(19), we obtain

    E(V2(k+1)|z(k))-βV2(k)=

    (27)

    Combining (20f), from (27) we obtain

    E(V2(k+1)|z(k))-βV2(k)<0

    (28)

    Therefore, recursion can be obtained in subsystemΣ2, as

    (29)

    For anykin the subsystemΣ2, it holds that

    (30)

    In what follows we prove that

    ‖z(ti+1)‖<‖z(ti)‖

    (31)

    In fact, by combining equations(20a), (25), (30), one obtains that

    E{‖z(ti+1)‖2}<

    c2βNc1γT-NE{‖z(ti)‖2}<

    [c2βNc1γT-N]i+1‖z(t0)‖2

    (32)

    With equation(32), we can rewrite equation(25) as

    E{‖z(k)‖2}

    (33)

    Using equation(20), it yields that

    c2βNc1γT-N<1

    (34)

    Thus,

    (35)

    SinceE{‖z(k)‖2}>0, by combining equations(33), (35), one obtains that

    (36)

    Analogously, with equation(32), we can rewrite equation(30) as

    [c2βNc1γT-N]i‖z(t0)‖2

    (37)

    Due to equation(34), it yields that

    (38)

    SinceE{‖z(k)‖2}>0, by combining equations(37), (38), one obtains that

    (39)

    Finally by Definition 4.1, the closed-loop system in equation(19) is GMSAS.

    From Theorem 4.1, we may determineNcas follows to ensure the system stability,

    (40)

    Remark 4.1One may notice that earlier works[34,35]often assume the constraints on both the DoS attack frequency and duration to ensure the system performance, while in our present work, only attack frequency Aηis constrained. What is more, unlike these earlier works where these constraints are arbitrarily assumed, our constraint on the attack frequency makes sense in practice. Indeed, the attack frequency relies on the path switch and it is reasonable to say that for a newly switched path the attacker must take some time to find it to initiate the attack.

    Additionally, according to equations(7) and (34), it can be further obtained that the GMSAS of the system can be ensured as long as the DoS attack frequency is upper bounded as

    (41)

    4.3 Controller design

    Based on Theorem 4.1, we give the following feedback gain design method.

    Theorem 4.2Givenξ,p, 0<γ<1,β>1. If (20a) can be ensured withc1,c2being defined in Theorem 4.1, andP0,P1,P2being the solution of the following inequalities.

    (42)

    (43)

    (44)

    then the control gainKas solved in equations(42), (43) and (44) ensures the GMSAS of the closed loop system in equation(19).

    ProofUsing Shure’s complement lemma, equations (20d), (20e), (20f) can be transformed into equations (42), (43), (44), and thence the theorem can be readily obtained.

    Equations (42), (43), (44) are nonlinear matrix inequalities, which cannot be solved directly using the LMI toolbox. Cone Complementary Linearization Iteration (CCL) algorithm[42]can be used to obtain an approximated solution by converting it into its linear counterpart.

    5 Numerical example

    Consider the system in equation(1) with an added disturbance termw(k), as follows

    x(k+ 1)=Ax(k)+Bu(k)+w(k).

    In the simulation,w(k) is assumed to be Gauss white noise with its variance being 0.01, and the system matrices are taken from reference [43], as

    which can be readily seen to be open-loop unstable, with their eigenvalues being 0.7788, 0.6065 and 1.2840, respectively.

    In the simulation, the initial state of the considered system is set asx(0)=[1 1 1]T, and the normal data loss probability isp=0.3. We simulate the system for 200 time steps, and the unbounded DoS attacks occur arbitrarily, attacking the current path in use, with the upper bound of the attack frequencyξ=0.02.

    From Theorem 4.2 and equation(40), we may obtainNc=13.8460, andNd=9.5624 can be determined forα=10-5. HenceN=Nd. Further, using Theorem 4.2, the controller gainKcan be calculated as follows (withγ=0.8,β=1.1)

    K=[0.1490,0.0334,-0.7513].

    Figures 3 and 4 show the system state trajectories of two cases, either without or with the use of the proposed multi-path switching protection strategy, where DoS attacks occur at time instants 56, 118, and 179, respectively. It is readily seen from Figure 3 that without the use of our proposed strategy, the system states will become unbounded soon after the first DoS attack at time instant 56, which is understandable since the occurrence of the DoS attack means the system has to run in the open-loop afterwards. However, with the use of our proposed strategy, we see from Figure 4 that the system trajectory can soon recover from the instability trend caused by the consecutive data packet dropout due to the DoS attack, since the path switching strategy can close the control loop after a finite number of consecutive data packet dropouts.

    Figure 5. The state trajectory under the packet-based state feedback controller under the unbounded DoS[21].

    Figure 6. The multi-path switching protection strategy can effectively identify unbounded DoS attacks, and does not mistake them for normal data packet dropouts.

    In order to further prove the effectiveness of our proposed multi-path switching protection strategy, we compare our strategy with the packet-based state feedback controller under DoS attacks as proposed in reference[21]. Under the above system parameters, Figure 5 shows that the method in reference[21] actually destabilizes the system.

    In Figure 6 we further show the time instants of normal data packet dropout (the vertical green lines), the dropouts caused by DoS attacks (the vertical blue lines), and the time instant of path switching (the red circle), under the use of the multi-path switching protection strategy. From Figure 6 we see that our multi-path switching protection strategy can effectively identify unbounded DoS attacks and seldom mistake DoS attacks from normal data packet dropouts.

    Figure 7. The considered system is stable for α=5×10-4.

    Figure 8. DoS attack, packet dropout and path switching signal when N=6.3132.

    In order to further evaluate the effects ofα, we letα=5×10-4and rerun the simulation. In this case,Nd=6.3132, andN=Nd. The controller gainKremains unchanged. The system trajectories are shown in Figure 7, and the time instants of normal data packet dropouts, the unbounded DoS attacks (54, 113, and 175 respectively) and the path switching are shown in Figure 8.

    By comparing Figure 4 with Figure 7, it can be seen, without surprise, that the largerαis, the smallerNcis, the faster DoS attack is identified, and finally the better the system performance can be. On the other hand, it is also not surprising to see that a largerαcan mean more normal data packet dropouts being mistakenly identified as DoS attacks. In fact, from the 100 repeated experiments for both cases (α=10-5andα=5×10-4respectively), we find that the false identification ratio (the number of all mistakenly identified switching divided by the total number of path switching in the 100 experiments) increases from 0.33% to 1.58%, but both are relatively small and acceptable.

    6 Conclusion

    Different from most existing works where the DoS attacks are usually assumed to be bounded in some sense, in the present work we claim that unbounded DoS attacks may be more often seen for networked control systems. Based on this observation, we formulate the corresponding problem, with a novel control strategy specially designed for unbounded DoS attacks, as well as the closed-loop stability analysis and numerical verifications. We believe that our work can be practically meaningful, and will further improve the design in the face of various complicated scenarios.

    国产在线一区二区三区精| 免费在线观看黄色视频的| 亚洲精品国产一区二区精华液| 国产成人av激情在线播放| 亚洲欧美中文字幕日韩二区| 国产免费又黄又爽又色| 香蕉丝袜av| 成人国产麻豆网| 丰满迷人的少妇在线观看| 无限看片的www在线观看| 在线亚洲精品国产二区图片欧美| 岛国毛片在线播放| 亚洲欧洲国产日韩| 一二三四中文在线观看免费高清| 飞空精品影院首页| www.av在线官网国产| 国产精品无大码| 亚洲精品国产色婷婷电影| www日本在线高清视频| 97在线人人人人妻| 男女之事视频高清在线观看 | 国产精品 国内视频| av又黄又爽大尺度在线免费看| 99久久综合免费| 久久久久久人人人人人| 日韩熟女老妇一区二区性免费视频| 欧美日韩成人在线一区二区| 两个人看的免费小视频| 丰满饥渴人妻一区二区三| 午夜免费男女啪啪视频观看| 久久久亚洲精品成人影院| 自拍欧美九色日韩亚洲蝌蚪91| 亚洲欧美清纯卡通| 精品国产一区二区三区四区第35| 中文天堂在线官网| 久久久国产一区二区| 高清欧美精品videossex| 亚洲少妇的诱惑av| 黄频高清免费视频| 国产男女内射视频| 一边摸一边抽搐一进一出视频| av在线老鸭窝| 永久免费av网站大全| 国产精品人妻久久久影院| av电影中文网址| 国产乱人偷精品视频| 国产免费现黄频在线看| 亚洲欧洲国产日韩| 老司机深夜福利视频在线观看 | 女人被躁到高潮嗷嗷叫费观| av有码第一页| 最新在线观看一区二区三区 | 国产精品免费视频内射| 国产精品二区激情视频| 99热国产这里只有精品6| 高清不卡的av网站| 亚洲伊人色综图| 亚洲av日韩精品久久久久久密 | 又粗又硬又长又爽又黄的视频| 欧美人与性动交α欧美软件| 国产免费又黄又爽又色| 国产精品国产三级专区第一集| 久久ye,这里只有精品| 久热爱精品视频在线9| 人妻 亚洲 视频| 日韩av不卡免费在线播放| 午夜久久久在线观看| 国精品久久久久久国模美| 建设人人有责人人尽责人人享有的| 80岁老熟妇乱子伦牲交| 久久久亚洲精品成人影院| 男女高潮啪啪啪动态图| 亚洲精品中文字幕在线视频| 91精品三级在线观看| 日本色播在线视频| 精品国产国语对白av| 国产乱人偷精品视频| 叶爱在线成人免费视频播放| 午夜久久久在线观看| 97精品久久久久久久久久精品| 午夜福利一区二区在线看| 色精品久久人妻99蜜桃| 看免费av毛片| 精品人妻一区二区三区麻豆| 亚洲精品aⅴ在线观看| √禁漫天堂资源中文www| 日韩 亚洲 欧美在线| 1024香蕉在线观看| 制服诱惑二区| 女人爽到高潮嗷嗷叫在线视频| 国产亚洲精品第一综合不卡| 美女大奶头黄色视频| 夫妻午夜视频| 欧美成人精品欧美一级黄| 精品酒店卫生间| 又大又黄又爽视频免费| 欧美乱码精品一区二区三区| 精品国产一区二区三区四区第35| 亚洲精品久久久久久婷婷小说| 久久ye,这里只有精品| 另类精品久久| 亚洲成人av在线免费| 爱豆传媒免费全集在线观看| 亚洲熟女毛片儿| 亚洲男人天堂网一区| 国产精品一国产av| 午夜福利影视在线免费观看| 国产精品久久久人人做人人爽| 一区二区三区精品91| 观看美女的网站| 国产欧美日韩一区二区三区在线| 免费观看av网站的网址| av天堂久久9| 亚洲熟女毛片儿| 久久鲁丝午夜福利片| 一区二区av电影网| 黄色视频在线播放观看不卡| 捣出白浆h1v1| 操美女的视频在线观看| 亚洲欧美精品综合一区二区三区| 成年人免费黄色播放视频| av福利片在线| 丰满少妇做爰视频| 久久久欧美国产精品| 黄片无遮挡物在线观看| 亚洲综合精品二区| 一区福利在线观看| 亚洲一卡2卡3卡4卡5卡精品中文| 青春草亚洲视频在线观看| 一边摸一边抽搐一进一出视频| 亚洲熟女毛片儿| 99热网站在线观看| 日本av手机在线免费观看| 免费黄色在线免费观看| 国产精品香港三级国产av潘金莲 | 女人久久www免费人成看片| 国产黄色免费在线视频| 啦啦啦在线观看免费高清www| 欧美 亚洲 国产 日韩一| 精品人妻一区二区三区麻豆| 叶爱在线成人免费视频播放| 国产欧美日韩综合在线一区二区| 毛片一级片免费看久久久久| www.自偷自拍.com| 久久久欧美国产精品| av.在线天堂| 久久久精品国产亚洲av高清涩受| 丁香六月欧美| 日韩中文字幕欧美一区二区 | 亚洲av成人不卡在线观看播放网 | 一本大道久久a久久精品| 18禁观看日本| 精品人妻熟女毛片av久久网站| 中文天堂在线官网| xxx大片免费视频| 一区二区三区乱码不卡18| 午夜精品国产一区二区电影| 亚洲国产日韩一区二区| 制服诱惑二区| 人人妻人人添人人爽欧美一区卜| 亚洲成人一二三区av| 亚洲av日韩精品久久久久久密 | 天美传媒精品一区二区| 久久国产精品男人的天堂亚洲| 婷婷色麻豆天堂久久| 久久99热这里只频精品6学生| 国产在线一区二区三区精| 亚洲av欧美aⅴ国产| 两个人看的免费小视频| 巨乳人妻的诱惑在线观看| 成人手机av| 精品卡一卡二卡四卡免费| 久久精品熟女亚洲av麻豆精品| 在线观看免费日韩欧美大片| av不卡在线播放| 亚洲欧美成人精品一区二区| bbb黄色大片| 男人爽女人下面视频在线观看| 人人妻人人爽人人添夜夜欢视频| 亚洲av福利一区| 国产无遮挡羞羞视频在线观看| 欧美最新免费一区二区三区| 日韩av免费高清视频| 亚洲精品中文字幕在线视频| 欧美精品人与动牲交sv欧美| 亚洲,一卡二卡三卡| 丝袜喷水一区| 国产欧美日韩综合在线一区二区| 侵犯人妻中文字幕一二三四区| 美女高潮到喷水免费观看| 成人三级做爰电影| 999精品在线视频| 一级毛片黄色毛片免费观看视频| 青青草视频在线视频观看| 精品亚洲成国产av| 99香蕉大伊视频| 老司机影院成人| 人妻一区二区av| 桃花免费在线播放| 悠悠久久av| 亚洲七黄色美女视频| 国产日韩一区二区三区精品不卡| 日本91视频免费播放| av在线观看视频网站免费| 热re99久久国产66热| 成人漫画全彩无遮挡| 老熟女久久久| 电影成人av| 一二三四中文在线观看免费高清| 欧美老熟妇乱子伦牲交| 色综合欧美亚洲国产小说| 国产精品久久久久久久久免| 久久久亚洲精品成人影院| av卡一久久| 国产免费又黄又爽又色| 精品国产一区二区久久| 性色av一级| 精品国产乱码久久久久久男人| 亚洲精品国产色婷婷电影| 女的被弄到高潮叫床怎么办| 久久av网站| bbb黄色大片| 王馨瑶露胸无遮挡在线观看| 男女午夜视频在线观看| 免费在线观看黄色视频的| 欧美精品亚洲一区二区| 免费女性裸体啪啪无遮挡网站| 亚洲国产精品一区三区| 日韩视频在线欧美| 日本wwww免费看| 麻豆乱淫一区二区| 国产福利在线免费观看视频| 精品少妇内射三级| 久久久久精品人妻al黑| av一本久久久久| 91成人精品电影| 久久性视频一级片| 国产精品一区二区精品视频观看| 免费观看av网站的网址| netflix在线观看网站| 国产一卡二卡三卡精品 | 18禁动态无遮挡网站| 中文天堂在线官网| 热99国产精品久久久久久7| 精品少妇黑人巨大在线播放| 久久影院123| 一个人免费看片子| 日韩不卡一区二区三区视频在线| 婷婷色av中文字幕| 国产极品天堂在线| av女优亚洲男人天堂| 90打野战视频偷拍视频| xxxhd国产人妻xxx| 18禁国产床啪视频网站| 欧美另类一区| 欧美97在线视频| 国产精品秋霞免费鲁丝片| 天堂俺去俺来也www色官网| 精品免费久久久久久久清纯 | 免费黄网站久久成人精品| 又大又爽又粗| 亚洲欧美中文字幕日韩二区| 国产成人精品久久久久久| av在线播放精品| 国产午夜精品一二区理论片| 精品午夜福利在线看| www.自偷自拍.com| 国产欧美日韩综合在线一区二区| 美女视频免费永久观看网站| 亚洲人成电影观看| 最近2019中文字幕mv第一页| 一级毛片黄色毛片免费观看视频| netflix在线观看网站| 亚洲在久久综合| 男女边吃奶边做爰视频| 日韩精品免费视频一区二区三区| 少妇人妻久久综合中文| 九九爱精品视频在线观看| 十八禁人妻一区二区| 国产老妇伦熟女老妇高清| 午夜福利在线免费观看网站| 午夜福利视频精品| 精品人妻熟女毛片av久久网站| 久久久精品94久久精品| 美女中出高潮动态图| 一区二区av电影网| 亚洲美女搞黄在线观看| 在线观看免费午夜福利视频| 婷婷色av中文字幕| 成人手机av| 国产精品一区二区精品视频观看| 欧美精品一区二区大全| av女优亚洲男人天堂| 国产熟女欧美一区二区| 丝袜美足系列| 五月开心婷婷网| 成人18禁高潮啪啪吃奶动态图| 国产淫语在线视频| 自拍欧美九色日韩亚洲蝌蚪91| 国产乱人偷精品视频| 亚洲一卡2卡3卡4卡5卡精品中文| 国产精品久久久久久久久免| av免费观看日本| 韩国av在线不卡| 亚洲国产精品一区二区三区在线| 2021少妇久久久久久久久久久| 免费高清在线观看日韩| 国产免费一区二区三区四区乱码| 波野结衣二区三区在线| 亚洲国产欧美网| 亚洲精品美女久久av网站| 亚洲欧洲精品一区二区精品久久久 | 一二三四中文在线观看免费高清| 国产成人一区二区在线| 人人澡人人妻人| 日韩一区二区视频免费看| 国产成人欧美在线观看 | 国产av码专区亚洲av| 丁香六月欧美| 日韩熟女老妇一区二区性免费视频| 日韩成人av中文字幕在线观看| 18禁国产床啪视频网站| 国产日韩一区二区三区精品不卡| 午夜福利,免费看| www.熟女人妻精品国产| 久久久精品免费免费高清| 一级片'在线观看视频| 国产一区有黄有色的免费视频| 国产一区二区在线观看av| 欧美亚洲日本最大视频资源| 国产 一区精品| 亚洲精品在线美女| 欧美日韩视频精品一区| 国产精品久久久久久久久免| 在线观看免费午夜福利视频| www.自偷自拍.com| 日韩精品有码人妻一区| 国产爽快片一区二区三区| 观看av在线不卡| 国产成人欧美| 日本色播在线视频| 国产欧美日韩一区二区三区在线| 操出白浆在线播放| 狠狠精品人妻久久久久久综合| 最新的欧美精品一区二区| 午夜激情av网站| 欧美日韩一区二区视频在线观看视频在线| 亚洲精品国产av成人精品| 波野结衣二区三区在线| 亚洲综合精品二区| 男女免费视频国产| 欧美日韩精品网址| 亚洲一区二区三区欧美精品| 亚洲精品第二区| 亚洲精品自拍成人| 国产亚洲av高清不卡| 亚洲国产欧美一区二区综合| 亚洲精品第二区| 亚洲精品自拍成人| 久久精品久久久久久久性| 国产精品偷伦视频观看了| 国产精品国产三级国产专区5o| 欧美精品一区二区大全| 亚洲精品第二区| 午夜日本视频在线| 青春草国产在线视频| 久久99精品国语久久久| 热re99久久精品国产66热6| 亚洲人成电影观看| 国产成人欧美| 欧美日韩一级在线毛片| 女的被弄到高潮叫床怎么办| 国产麻豆69| 韩国精品一区二区三区| 极品人妻少妇av视频| 国产乱人偷精品视频| 日本vs欧美在线观看视频| 亚洲国产精品国产精品| 一级毛片 在线播放| 精品人妻一区二区三区麻豆| av又黄又爽大尺度在线免费看| 亚洲在久久综合| 久久99热这里只频精品6学生| 欧美日本中文国产一区发布| 国产成人a∨麻豆精品| 欧美激情极品国产一区二区三区| 好男人视频免费观看在线| 美女高潮到喷水免费观看| 91精品国产国语对白视频| 亚洲精品美女久久av网站| 两个人看的免费小视频| 国产在线免费精品| 久久精品国产综合久久久| 成人亚洲精品一区在线观看| 9191精品国产免费久久| 亚洲七黄色美女视频| 亚洲国产精品成人久久小说| 伊人亚洲综合成人网| 国产老妇伦熟女老妇高清| 国产成人精品无人区| 亚洲精品国产av成人精品| 精品酒店卫生间| 国产亚洲最大av| 国产又爽黄色视频| av网站在线播放免费| 久久久久久久国产电影| 欧美日韩成人在线一区二区| 国产精品国产三级国产专区5o| 久久99精品国语久久久| 久久人人爽人人片av| 久久天躁狠狠躁夜夜2o2o | 久久天堂一区二区三区四区| 亚洲情色 制服丝袜| 蜜桃在线观看..| 久久人人爽av亚洲精品天堂| 久久久久精品人妻al黑| 午夜91福利影院| 在线天堂最新版资源| 免费在线观看视频国产中文字幕亚洲 | 国语对白做爰xxxⅹ性视频网站| 欧美日韩综合久久久久久| 欧美乱码精品一区二区三区| 交换朋友夫妻互换小说| 日韩中文字幕欧美一区二区 | 午夜福利视频精品| 国产精品av久久久久免费| 老司机影院成人| 男女边摸边吃奶| 一级黄片播放器| 青草久久国产| 99久久人妻综合| 色吧在线观看| 在线观看免费视频网站a站| 免费av中文字幕在线| 亚洲精华国产精华液的使用体验| 天美传媒精品一区二区| 色网站视频免费| 超碰成人久久| 国产黄色免费在线视频| 亚洲国产欧美日韩在线播放| 日韩精品有码人妻一区| 女人高潮潮喷娇喘18禁视频| 中文字幕色久视频| 久久精品aⅴ一区二区三区四区| av天堂久久9| 国产欧美亚洲国产| 精品第一国产精品| 精品视频人人做人人爽| 大话2 男鬼变身卡| 麻豆av在线久日| 亚洲国产最新在线播放| 精品视频人人做人人爽| 精品酒店卫生间| 日韩成人av中文字幕在线观看| 免费看不卡的av| e午夜精品久久久久久久| 久久久久久人妻| 国产精品一国产av| 一级a爱视频在线免费观看| 亚洲av日韩在线播放| 女人爽到高潮嗷嗷叫在线视频| 午夜福利免费观看在线| 黄片播放在线免费| av在线老鸭窝| xxx大片免费视频| 一区二区日韩欧美中文字幕| 久久久久国产一级毛片高清牌| 18禁观看日本| 国产极品粉嫩免费观看在线| 欧美成人午夜精品| 国产成人精品久久二区二区91 | 欧美成人精品欧美一级黄| 成人手机av| 少妇 在线观看| 香蕉丝袜av| 下体分泌物呈黄色| 伦理电影大哥的女人| 日日爽夜夜爽网站| 亚洲国产日韩一区二区| 成人18禁高潮啪啪吃奶动态图| 国产一区有黄有色的免费视频| 爱豆传媒免费全集在线观看| 极品少妇高潮喷水抽搐| 国产成人免费观看mmmm| 久久精品国产a三级三级三级| 黄片无遮挡物在线观看| 99热全是精品| 美女脱内裤让男人舔精品视频| 我要看黄色一级片免费的| 国产av精品麻豆| 一区二区三区乱码不卡18| 精品免费久久久久久久清纯 | 两个人看的免费小视频| 1024香蕉在线观看| 丰满迷人的少妇在线观看| 人妻一区二区av| 青春草亚洲视频在线观看| av视频免费观看在线观看| 各种免费的搞黄视频| 国产日韩欧美在线精品| svipshipincom国产片| 日韩电影二区| 爱豆传媒免费全集在线观看| 免费黄频网站在线观看国产| 大片电影免费在线观看免费| 精品视频人人做人人爽| 亚洲精品国产色婷婷电影| 中文字幕人妻丝袜一区二区 | 久热这里只有精品99| 777米奇影视久久| 乱人伦中国视频| 中文字幕人妻熟女乱码| 一区二区三区激情视频| 这个男人来自地球电影免费观看 | 永久免费av网站大全| 久久久久网色| 免费女性裸体啪啪无遮挡网站| 一区二区三区乱码不卡18| 免费高清在线观看日韩| 美女福利国产在线| 黄色一级大片看看| 黄色怎么调成土黄色| 亚洲精品一二三| 丰满乱子伦码专区| 久久精品aⅴ一区二区三区四区| 久久久国产一区二区| 美女中出高潮动态图| 可以免费在线观看a视频的电影网站 | 日韩一区二区视频免费看| 国产激情久久老熟女| 久久狼人影院| 大片电影免费在线观看免费| 精品一区二区三卡| 亚洲精品乱久久久久久| 国产又爽黄色视频| av天堂久久9| 国产精品.久久久| 久久精品国产综合久久久| 大陆偷拍与自拍| 免费在线观看视频国产中文字幕亚洲 | 欧美亚洲 丝袜 人妻 在线| 丝袜脚勾引网站| 永久免费av网站大全| 成年人午夜在线观看视频| 人成视频在线观看免费观看| 女性被躁到高潮视频| 国产一区二区激情短视频 | 日韩av不卡免费在线播放| 亚洲欧美一区二区三区久久| 色94色欧美一区二区| 精品卡一卡二卡四卡免费| 欧美日韩综合久久久久久| 一本大道久久a久久精品| 成年美女黄网站色视频大全免费| 国产精品熟女久久久久浪| 在线看a的网站| 热99国产精品久久久久久7| 汤姆久久久久久久影院中文字幕| 如何舔出高潮| 菩萨蛮人人尽说江南好唐韦庄| 欧美av亚洲av综合av国产av | 天天躁狠狠躁夜夜躁狠狠躁| 最近最新中文字幕免费大全7| 久久婷婷青草| 一二三四中文在线观看免费高清| 日韩av在线免费看完整版不卡| 十八禁高潮呻吟视频| 中国国产av一级| 国产伦人伦偷精品视频| 如何舔出高潮| 欧美国产精品一级二级三级| 大陆偷拍与自拍| 热re99久久精品国产66热6| 国产男人的电影天堂91| 精品酒店卫生间| 侵犯人妻中文字幕一二三四区| 女人精品久久久久毛片| 精品人妻熟女毛片av久久网站| 9热在线视频观看99| 亚洲国产av新网站| 蜜桃在线观看..| 2021少妇久久久久久久久久久| av福利片在线| 午夜免费男女啪啪视频观看| 一本大道久久a久久精品| 如日韩欧美国产精品一区二区三区| 久久狼人影院| netflix在线观看网站| 两性夫妻黄色片| avwww免费| 咕卡用的链子| 成人手机av| avwww免费| 午夜91福利影院| 哪个播放器可以免费观看大片| 日韩欧美一区视频在线观看| 人妻人人澡人人爽人人| av免费观看日本| 欧美变态另类bdsm刘玥| 咕卡用的链子| 日本午夜av视频| 午夜福利一区二区在线看| 无限看片的www在线观看| av福利片在线| 亚洲精品一二三| 老司机亚洲免费影院| 人人妻人人澡人人看| 亚洲视频免费观看视频| 国产精品嫩草影院av在线观看| 日本一区二区免费在线视频| 免费看不卡的av| 在现免费观看毛片| 亚洲国产av新网站| 亚洲在久久综合| 免费黄色在线免费观看|