Abstract

This article studies the attack detection problem of cyber–physical systems (CPSs) with the event-triggered (ET) mechanism. A switching-based moving-target defense (MTD) strategy is developed to detect malicious false-data-injection (FDI) attacks, which is characterized by the average dwell-time (ADT) property. Even if attacks may remain stealthy when the MTD mechanism is adopted, the impact of these stealthy attacks on the system performance is relatively small when the switching signal is unknown to the adversary. In order to reduce the cost of data transmission, an ET mechanism is added into the system. Furthermore, we prove that there exists a lower bound of the execution interval, which indicates that the Zeno phenomenon is excluded. Finally, numerical examples are employed to illustrate the effectiveness of the main results.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call