Analysis of stochastic switched systems with application to networked control under jamming attacks

Ahmet Cetinkaya, Hideaki Ishii, Tomohisa Hayakawa

Research output: Contribution to journalArticlepeer-review

41 Citations (Scopus)


We investigate the stability problem for discrete-time stochastic switched linear systems under the specific scenarios where information about the switching patterns and the probability of switches are not available. Our analysis focuses on the average number of times each mode becomes active in the long run and, in particular, utilizes their lower and upper bounds. This setup is motivated by cyber security issues for networked control systems in the presence of packet losses due to malicious jamming attacks where the attacker's strategy is not known a priori. We derive a sufficient condition for almost sure asymptotic stability of the switched systems that can be examined by solving a linear programming problem. Our approach exploits the dynamics of an equivalent system that describes the evolution of the switched system's state at every few steps; the stability analysis may become less conservative by increasing the step size. The computational efficiency is further enhanced by exploiting the structure in the stability analysis problem, and we introduce an alternative linear programming problem that has fewer variables. We demonstrate the efficacy of our results by analyzing networked control problems where communication channels face random packet losses as well as jamming attacks.

Original languageEnglish
Article number8353464
Pages (from-to)2013-2028
Number of pages16
JournalIEEE Transactions on Automatic Control
Issue number5
Publication statusPublished - 2019 May
Externally publishedYes


  • Jamming
  • linear programming
  • networked control systems
  • packet losses
  • stability analysis
  • stochastic switched systems

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Computer Science Applications
  • Electrical and Electronic Engineering


Dive into the research topics of 'Analysis of stochastic switched systems with application to networked control under jamming attacks'. Together they form a unique fingerprint.

Cite this