Resilient Memory Event-Triggered Finite-Time Bounded for Networked Control Systems with Multiple Cyber-Attacks

Sathishkumar Murugesan, Yen Chen Liu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)


This work is concerned with the resilient memory event-triggered finite-time bounded of networked control systems (NCSs) with actuator faults and multiple attacks. The deception and denial-of-service (DoS) attacks are modelled in a unified framework within multiple attacks. Firstly, the purpose of memory event-triggered scheme (METS) is utilized to release certain packets to establish new events contrasting with the existing event-triggered method. This approach not only enhances the system dynamics but also improves the flexibility. The attack strategy is then developed to consider the security issue of NCSs. A random variable is presented to relate multiple attacks where the malicious signals are injected by adversaries. By utilizing Lyapunov stability theory and linear matrix inequalities (LMIs), a sufficient condition is constructed to attain the exponentially mean-square finite-time bounded of NCSs subjected to multiple attacks. In the end, a satellite system is simulated to illustrate the efficacy of the proposed METS.

Original languageEnglish
Title of host publication2021 American Control Conference, ACC 2021
PublisherInstitute of Electrical and Electronics Engineers Inc.
Number of pages7
ISBN (Electronic)9781665441971
Publication statusPublished - 2021 May 25
Event2021 American Control Conference, ACC 2021 - Virtual, New Orleans, United States
Duration: 2021 May 252021 May 28

Publication series

NameProceedings of the American Control Conference
ISSN (Print)0743-1619


Conference2021 American Control Conference, ACC 2021
Country/TerritoryUnited States
CityVirtual, New Orleans

All Science Journal Classification (ASJC) codes

  • Electrical and Electronic Engineering


Dive into the research topics of 'Resilient Memory Event-Triggered Finite-Time Bounded for Networked Control Systems with Multiple Cyber-Attacks'. Together they form a unique fingerprint.

Cite this