Abstract
In this article, the deception attacks are the research object, which are widely concerned in cyber attacks, and the feasibility of <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <tex-math notation="LaTeX">$H_\infty $ </tex-math></inline-formula> filtering for networked system based on event-triggered mechanism (ETM) is discussed. Firstly, in order to avoid waste of limited bandwidth, the ETM are introduced. At the same time, considering the impact of two types of different deception attacks, we introduce respectively two sets of random variables satisfying the Bernoulli distribution to depict the probability of the data transmitted by the network being subjected to deception attacks and the switching law of two types of deception attacks. Furthermore, a function model in accordance with the above situation is established. Then, by using Lyapunov-Krasovskii functional (LKF) and linear matrix inequalities (LMIs) techniques, the stability criterion of the established system model and the display expression of filter parameters are obtained. For the single integral terms in the derivative of LKF, we utilize Jensen’s Inequality and reciprocally convex combination lemma (RCCL) to process them. Finally, the feasibility of the proposed method is verified by a simulation example.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.