IEEE/CAA Journal of Automatica Sinica
Citation:  Kritika Bansal and Pankaj Mukhija, "Aperiodic SampledData Control of Distributed Networked Control Systems Under Stochastic CyberAttacks," IEEE/CAA J. Autom. Sinica, vol. 7, no. 4, pp. 10641073, July 2020. doi: 10.1109/JAS.2020.1003249 
[1] 
X. Ge, F. Yang, and Q.L. Han, “Distributed networked control systems: A brief overview,” Information Sciences, vol. 380, pp. 117–131, 2017. doi: 10.1016/j.ins.2015.07.047

[2] 
X. Zhang, Q. Han, and X. Yu, “Survey on recent advances in networked control systems,” IEEE Trans. Industrial Informatics, vol. 12, no. 5, pp. 1740–1752, Oct. 2016. doi: 10.1109/TII.2015.2506545

[3] 
F. Pasqualetti, F. Dorfler, and F. Bullo, “Controltheoretic methods for cyberphysical security: Geometric principles for optimal crosslayer resilient control systems,” IEEE Control Systems Magazine, vol. 35, no. 1, pp. 110–127, Feb. 2015. doi: 10.1109/MCS.2014.2364725

[4] 
C. De Persis and P. Tesi, “Inputtostate stabilizing control under denialofservice,” IEEE Trans. Automatic Control, vol. 60, no. 11, pp. 2930–2944, Nov. 2015. doi: 10.1109/TAC.2015.2416924

[5] 
G. Wu, J. Sun, and J. Chen, “Optimal data injection attacks in cyberphysical systems,” IEEE Trans. Cybernetics, vol. 48, no. 12, pp. 3302–3312, Dec. 2018. doi: 10.1109/TCYB.2018.2846365

[6] 
Y. Chen, S. Kar, and J. M. F. Moura, “Cyberphysical systems: Dynamic sensor attacks and strong observability, ” in Proc. IEEE Int. Conf. Acoustics, Speech and Signal Processing, 2015, pp. 1752–1756.

[7] 
L. Wei and J. Liu, “Stabilization for networked control systems under stochastic cyberattacks, ” in Proc. 36th Chinese Control Conf., 2017, pp. 8020–8025.

[8] 
M. Fattahi and A. Afshar, “Resilient sampleddata control of networked control systems against cyber attacks, ” Int. J. Dynamics and Control, 2018.

[9] 
X. Ge, Q.L. Han, M. Zhong, and X.M. Zhang, “Distributed krein spacebased attack detection over sensor networks under deception attacks,” Automatica, vol. 109, pp. 108557, 2019. doi: 10.1016/j.automatica.2019.108557

[10] 
A. Teixeira, H. Sandberg, and K. H. Johansson, “Networked control systems under cyber attacks with applications to power networks, ” in Proc. 2010 American Control Conf., Jun. 2010, pp. 3690–3696.

[11] 
H. Zhang, P. Cheng, L. Shi, and J. Chen, “Optimal DoS attack scheduling in wireless networked control system,” IEEE Trans. Control Systems Technology, vol. 24, no. 3, pp. 843–852, May 2016. doi: 10.1109/TCST.2015.2462741

[12] 
Z. Feng, G. Hu, and G. Wen, “Distributed consensus tracking for multiagent systems under two types of attacks,” Int. J. Robust and Nonlinear Control, vol. 26, no. 5, pp. 896–918, 2016. doi: 10.1002/rnc.3342

[13] 
M. Mazo and P. Tabuada, “On eventtriggered and selftriggered control over sensor/actuator networks, ” in Proc. 47th IEEE Conf. Decision and Control, Dec. 2008, pp. 435–440.

[14] 
K.E. Åarzén, “A simple eventbased PID controller, ” in Proc. 14th IFAC World Congr., vol. 32, no. 2, pp. 8687–8692, Beijing, China, 1999.

[15] 
M. S. Mahmoud and M. Sabih, “Networked eventtriggered control: an introduction and research trends,” Int. J. General Systems, vol. 43, no. 8, pp. 810–827, 2014. doi: 10.1080/03081079.2014.908190

[16] 
C. Peng and F. Li, “A survey on recent advances in eventtriggered communication and control,” Information Sciences, vol. 457–458, pp. 113–125, 2018. doi: 10.1016/j.ins.2018.04.055

[17] 
X. Wang and M. D. Lemmon, “Eventtriggering in distributed networked control systems,” IEEE Trans. Automatic Control, vol. 56, no. 3, pp. 586–601, Mar. 2011. doi: 10.1109/TAC.2010.2057951

[18] 
Z. Zhong, Y. Zhu, and H. Lam, “Asynchronous piecewise outputfeedback control for largescale fuzzy systems via distributed eventtriggering schemes,” IEEE Trans. Fuzzy Systems, vol. 26, no. 3, pp. 1688–1703, Jun. 2018. doi: 10.1109/TFUZZ.2017.2744599

[19] 
J. Liu, E. Tian, X. Xie, and H. Lin, “Distributed eventtriggered control for networked control systems with stochastic cyberattacks,” J. Franklin InstituteEngineering and Applied Mathematics, vol. 356, no. 17, pp. 10260–10276, 2019. doi: 10.1016/j.jfranklin.2018.01.048

[20] 
J. Liu, L. Wei, X. Xie, E. Tian, and S. Fei, “Quantized stabilization for TS fuzzy systems with hybridtriggered mechanism and stochastic cyberattacks,” IEEE Trans. Fuzzy Systems, vol. 26, no. 6, pp. 3820–3834, Dec. 2018. doi: 10.1109/TFUZZ.2018.2849702

[21] 
A.Y. Lu and G.H. Yang, “Eventtriggered secure observerbased control for cyberphysical systems under adversarial attacks,” Information Sciences, vol. 420, pp. 96–109, 2017. doi: 10.1016/j.ins.2017.08.057

[22] 
X. Ge, Q. Han, X. Zhang, L. Ding, and F. Yang, “Distributed eventtriggered estimation over sensor networks: A survey,” IEEE Trans. Cybernetics, vol. 50, no. 3, pp. 1306–1320, Mar. 2020. doi: 10.1109/TCYB.2019.2917179

[23] 
Y. Fan, L. Liu, G. Feng, and Y. Wang, “Selftriggered consensus for multiagent systems with zenofree triggers,” IEEE Trans. Automatic Control, vol. 60, no. 10, pp. 2779–2784, Oct. 2015. doi: 10.1109/TAC.2015.2405294

[24] 
X. Wang and M. D. Lemmon, “Selftriggered feedback control systems with finitegain L _{2} stability,” IEEE Trans. Automatic Control, vol. 54, no. 3, pp. 452–467, Mar. 2009. doi: 10.1109/TAC.2009.2012973

[25] 
U. Tiberi and K. Johansson, “A simple selftriggered sampler for nonlinear systems,” in Proc. 4th IFAC Conf. Analysis and Design of Hybrid Systems, vol. 45, no. 9, pp. 76–81, 2012,

[26] 
M. Xing, F. Deng, and X. Zhao, “Synchronization of stochastic complex dynamical networks under selftriggered control,” Int. J. Robust and Nonlinear Control, vol. 27, no. 16, pp. 2861–2878, 2017. doi: 10.1002/rnc.3716

[27] 
Y. Yan, M. Xia, A. Rahnama, and P. Antsaklis, “A passivitybased selftriggered strategy for cyber physical systems under denialofservice attack, ” in Proc. 56th Annual Conf. Decision and Control, Dec. 2017, pp. 6082–6087.

[28] 
D. Senejohnny, P. Tesi, and C. De Persis, “A jammingresilient algorithm for selftriggered network coordination,” IEEE Trans. Control of Network Systems, vol. 5, no. 3, pp. 981–990, Sep. 2018. doi: 10.1109/TCNS.2017.2668901

[29] 
M. Kishida, M. Kögel, and R. Findeisen, “Combined event and selftriggered control approach with guaranteed finitegain L_{2} stability for uncertain linear systems,” IET Control Theory Applications, vol. 11, no. 11, pp. 1674–1683, 2017. doi: 10.1049/ietcta.2016.1263

[30] 
K. Bansal and P. Mukhija, “A hybrid aperiodic sampleddata strategy for distributed networked control system, ” in Proc. 2019 12th Asian Control Conf., Jun. 2019, pp. 1577–1582.

[31] 
Z. Zhan, M. Xu, and S. Xu, “Characterizing honeypotcaptured cyber attacks: Statistical framework and case study,” IEEE Trans. Information Forensics and Security, vol. 8, no. 11, pp. 1775–1789, 2013. doi: 10.1109/TIFS.2013.2279800

[32] 
T. Li, X. Tang, H. Zhang, and S. Fei, “Improved eventtriggered control for networked control systems under stochastic cyberattacks,” Neurocomputing, vol. 350, pp. 33–43, 2019. doi: 10.1016/j.neucom.2019.03.058

[33] 
J. Liu, J. Xia, E. Tian, and S. Fei, “Hybriddrivenbased H1 filter design for neural networks subject to deception attacks,” Applied Mathematics and Computation, vol. 320, pp. 158–174, 2018. doi: 10.1016/j.amc.2017.09.007

[34] 
L. Wei and J. Liu, “Stabilization for networked control systems under stochastic cyberattacks, ” in Proc. IEEE 2017 36th Chinese Control Conf., 2017, pp. 8020–8025.

[35] 
S. Boyd, L. El Ghaoui, E. Feron, and V. Balakrishnan, Linear Matrix Inequalities in System and Control Theory. Society for Industrial and Applied Mathematics, 1994.

[36] 
H. K. Khalil, Nonlinear Systems, 3rd ed. Upper Saddle River, NJ: PrenticeHall, 2000.

[37] 
K. Tanaka and M. Sano, “A robust stabilization problem of fuzzy control systems and its application to backing up control of a trucktrailer,” IEEE Trans. Fuzzy Systems, vol. 2, no. 2, pp. 119–134, May 1994. doi: 10.1109/91.277961

[38] 
M. Guinaldo, D. V. Dimarogonas, K. H. Johansson, J. Sánchez, and S. Dormido, “Distributed eventbased control for interconnected linear systems, ” in Proc. 50th IEEE Conf. Decision and Control and European Control Conf., Dec. 2011, pp. 2553–2558.
