Next Article in Journal
Technologies—Aims and Scope Update
Previous Article in Journal
Performance Evaluation of IM/DD FSO Communication System Under Dust Storm Conditions
Previous Article in Special Issue
Model-Driven Clock Synchronization Algorithms for Random Loss of GNSS Time Signals in V2X Communications
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Ellipsoidal-Set Design of Robust and Secure Control Against Denial-of-Service Cyber Attacks in Electric-Vehicle Induction Motor Drives

by
Ehab H. E. Bayoumi
1,*,
Hisham M. Soliman
2 and
Sangkeum Lee
3,*
1
Department of Electrical Engineering, Faculty of Engineering and Technology, University of Botswana, Gaborone UB0022, Botswana
2
Department of Electrical Power Engineering, Faculty of Engineering, Cairo University, Cairo 12613, Egypt
3
Department of Computer Engineering, Hanbat National University, 125, Dongseo-daero, Yuseong-gu, Daejeon 12613, Republic of Korea
*
Authors to whom correspondence should be addressed.
Technologies 2025, 13(7), 289; https://doi.org/10.3390/technologies13070289
Submission received: 20 May 2025 / Revised: 2 July 2025 / Accepted: 2 July 2025 / Published: 7 July 2025
(This article belongs to the Special Issue Smart Transportation and Driving)

Abstract

Electric vehicles face increasing cybersecurity threats that can compromise the integrity of their electric drive systems, especially under Denial-of-Service (DoS) attacks. To precisely regulate torque and speed in electric vehicles, vector-controlled induction motor drives rely on continuous communication between controllers and sensors. This flow could be broken by a DoS attack, which could result in unstable motor operation or complete drive system failure. To address this, we propose a novel ellipsoidal-set-based state feedback controller with integral action, formulated via linear matrix inequalities (LMIs). This controller improves disturbance rejection, maintains system stability under DoS-induced input disruptions, and enhances security by constraining the system response within a bounded invariant set. The proposed tracker has a faster dynamic reaction and better disturbance attenuation capabilities than the traditional H control method. The effectiveness of the proposed controller is validated through a series of diverse testing scenarios.

1. Introduction

The motivation and literature review of the secure control of electric vehicles are summarized as follows. The global transportation system is rapidly changing due to environmental concerns, energy efficiency goals, and new technologies. Electric vehicles (EVs) are leading this transformation by increasingly using smart digital systems to improve their performance and integration with broader infrastructures. Smart digital systems are central to EV development, enabling real-time data acquisition, intelligent control, advanced diagnostics, and easy connection with smart grids and transportation networks.
The Internet of Things (IoT) has transformed EV component monitoring and management. Embedded sensors and controllers enable continuous data collection, which is handled on EVs and in the cloud, leading to predictive maintenance, remote diagnostics, and performance optimization. These capabilities enhance user experience and system reliability [1]. Artificial Intelligence (ML) and Artificial Intelligence (AI) have been progressively used to optimize energy management, forecast battery condition, and analyze driver behavior, contributing to extended battery life and improved vehicle range [2].
Vehicle-to-Everything (V2X) communication represents another crucial advancement, enabling real-time information sharing among EVs, infrastructure, and the power grid. This allows for adaptive routing, traffic coordination, and demand-side energy management, ultimately improving operational efficiency and grid stability [3]. Additionally, digital twin technology is increasingly significant, providing real-time simulation and virtual prototyping for predictive performance analysis and fault detection without physical testing [4].
The expanding use of networked control systems (NCSs) to connect EV components (sensors, actuators, controllers) presents new reliability and security challenges. NCSs are preferred for their lower costs, flexibility, simplicity of installation, and dependability. However, they are exposed to cyber threats due to the open nature of communication channels. Wireless networks used in NCSs, while enabling remote control and feedback as illustrated in Figure 1, are particularly susceptible to cyberattacks such as False Data Injection (FDI) and Denial-of-Service (DoS) attacks. These threats can degrade system performance or cause instability by disrupting control signals [5].
DoS attacks are sophisticated cyber-physical threats that disrupt sensors and actuator data in embedded systems by injecting malicious signals into control loops. EV system functionality depends heavily on reliable sensor data and real-time communication between Electronic Control Units (ECUs). As a result of using protocol vulnerabilities or injecting harmful inputs, DoS attacks can impair critical EV functions such as torque control, regenerative braking, and motor speed regulation [6,7].
EV drive systems depend on a well-matched relationship between inverter operations and motor control. Figure 2 demonstrates an effective DoS attack can result in instability, energy inefficiency, or hardware failure. The nature of these attacks makes them difficult to detect, often bypassing conventional software-based security methods. With the beginning of V2X communication and cloud integration, the EV attack surface has expanded significantly. Therefore, understanding and mitigating DoS attacks is essential for ensuring secure motor control and protecting power electronic components [8]. Therefore, researchers are developing advanced intrusion detection systems (IDS) and secure control frameworks to detect anomalies and enhance system resilience. These approaches are essential in enhancing EV systems against false signals and maintaining operational integrity [9,10].
Several recent studies have explored fault-tolerant and resilient control frameworks to mitigate DoS effects; however, most rely on assumptions of known disturbance profiles or constant attack patterns. Conventional controllers, such as PID or model predictive control, often lack of stability under unpredictable, stochastic cyber disturbances and are vulnerable to delayed or lost feedback [11].
The digitalization of EVs creates numerous cybersecurity risks, as EVs increasingly depend on complex networks of sensors, controllers, and communication modules. Components such as Battery Management Systems (BMS), V2X modules, and cloud interfaces are at risk of unauthorized access and DoS attacks. These threats can compromise safety-critical systems, including braking, steering, and energy management, posing risks to passengers and the public [12].
Note that compromised EVs can act as entry points for broader cyberattacks targeting smart grids, charging infrastructure, and transportation networks. The increase in Vehicle-to-Grid (V2G) technology further intensifies these risks, potentially disrupting the grid or exposing sensitive user data. Therefore, implementing robust cybersecurity architectures, real-time intrusion detection systems, and secure communication protocols is essential to mitigate these vulnerabilities [13].
Cybersecurity is vital for protecting individual EVs and for enabling their integration into smart transport and energy systems. Active research and the implementation of standardized security measures is essential in maintaining system integrity, user trust, and public safety.
The EV drive system consists of electric motors, power electronic converters, energy storage units, and control subsystems, operating to deliver reliable propulsion and optimized energy consumption. Among the several motor technologies, Induction Motors (IMs) and Brushless DC (BLDC) motors are the most widely used due to their robust performance characteristics. IMs are robust and cheap in high-power applications, while BLDC motors offer higher efficiency, compact form, and better torque control, making them suitable for light-duty EVs and two-wheelers [14].
Using new materials like silicon carbide (SiC) and gallium nitride (GaN) in the power converters of EVs has enhanced inverter performance by enabling higher switching frequencies, reduced thermal losses, and improved power density. These advancements contribute directly to increased driving range and system efficiency [15,16].
The accurate functioning of EVs depends on the communication protocols that coordinate interactions among sensors, controllers, actuators, and external infrastructure. In-vehicle communication protocols, such as Controller Area Network (CAN), Local Interconnect Network (LIN), and FlexRay, enable deterministic, real-time data exchange critical for motor control, regenerative breaking, and battery management [17]. Meanwhile, V2X technologies, including V2G, Vehicle-to-Infrastructure (V2I), and Vehicle-to-Vehicle (V2V) communication, are being increasingly implemented to support advanced functions such as traffic optimization, energy coordination, and safety assurance in connected EV ecosystems [18]. The collaboration between advanced motor technologies and intelligent communication protocols forms the backbone of modern, energy-optimized, and connected EV platforms.
EVs are becoming more connected and using more software, which means they are more at risk of cyberattacks. One of the most critical attacks is the DoS attack, which targets the communication network inside the EV, like the CAN bus. Although many safety-critical functions are logically separated from infotainment or non-critical systems, they are often connected via shared communication backbones such as CAN, FlexRay, or Ethernet. These protocols, particularly CAN, lack inherent encryption and authentication mechanisms, which make them vulnerable to message injections, spoofing, or flooding. A well-timed DoS attack targeting the CAN bus can delay or block transmission of control signals, indirectly affecting critical functions such as motor torque control, regenerative braking, or inverter operation. By overwhelming or stopping communication pathways, a DoS attack can harm essential vehicle operations, such as powertrain control, battery management, and braking. This can make the EV perform badly or lead to dangerous situations [19].
Besides DoS attacks, there are other serious threats like Man-in-the-Middle (MitM) attacks, where someone secretly listens in, and attacks where fake messages are sent (spoofing) or old messages are used again to cause trouble (replay attacks), particularly within V2X communication channels. These types of attacks can compromise authentication, disrupt vehicle-to-infrastructure coordination, and impair traffic safety [20]. Additionally, telematics systems, On-Board Diagnostics (OBD-II) ports, and over-the-air (OTA) update mechanisms can be developed by malicious actors to inject unauthorized code or disable critical services.
Research has proposed various anomaly detection and encryption-based techniques to secure in-vehicle networks; however, these often act after an attack has occurred rather than preemptively enhancing system-level resilience. Control approaches that do not explicitly model input uncertainties due to DoS attacks cannot ensure stability during transient disconnections or erratic packet loss.
Since EVs are turning into software-based systems, the need for comprehensive cybersecurity frameworks becomes necessary. This means having different kinds of security levels, such as encrypted communications, intrusion detection systems, secure firmware updates, and continuous system monitoring to maintain vehicle reliability and user trust [21].
Some weaknesses have been found in different parts of EVs, which, if used, can compromise vehicle functionality and user safety. The main one is the in-vehicle CAN bus network, which lacks inherent support for encryption or authentication. Attackers can inject large volumes of high-priority but invalid messages to monopolize the CAN bus, preventing legitimate control messages from reaching the motor controller. This form of DoS attack has been validated in testbeds and commercial EV models and can result in unexpected motor behavior, such as failure to accelerate, irregular torque delivery, or controller shutdown due to safety triggers. Even when drive control ECUs are technically isolated, the use of shared network gateways or insufficient access control in diagnostic tools creates indirect pathways for compromise. These vulnerabilities become especially critical as more EVs integrate V2X communication, which opens attack surfaces beyond the physical vehicle. This limitation allows attackers to inject malicious messages or manipulate control signals, potentially affecting critical functions like acceleration or braking [19].
Public EV charging stations are not always secure either. Stations that operate with outdated firmware or unsecured communication protocols are subject to manipulation, enabling energy theft, billing fraud, or service denial [22,23]. For example, the Open Charge Point Protocol (OCPP), widely used in EV charging, has been shown to transmit unencrypted messages, exposing it to interception or replay attacks [24].
Another area of concern is the V2G interface. Without robust security measures, attackers may send unauthorized control commands to the grid or extract sensitive user data. Furthermore, OTA update systems designed to streamline software maintenance can serve as attack vectors if not safeguarded by strong encryption and authentication mechanisms. These security gaps highlight the urgent need for industry-standardized cybersecurity solutions. Implementing secure communication protocols, real-time intrusion detection, and resilient system architectures is essential to protect the integrity and safety of EV systems against evolving cyber threats.
The paper structure is as follows: Section 2 provides essential context through a Background and Literature Review. It covers the basics of EV drive systems and their communication, common cyber threats to modern EVs, and an analysis of known vulnerabilities. Section 3 then defines the problem, introducing models for Vector-Control Induction Motors and DoS attacks. Section 4 details the methodology, focusing on linearizing the IM model and the design of the ellipsoid tracker and H controller. Section 5 presents the results from various test scenarios. The Discussion section addresses the challenges in securing EV drive systems against cyber threats and suggests future research and technological advancements. Finally, the paper concludes with a summary of its key findings.
This research addresses the critical challenge of ensuring the dependable and secure operation of EV vector-controlled induction motor drive systems when subjected to parametric uncertainty and DoS attacks. The DoS attack is formulated as an external disturbance, necessitating effective attenuation of its impact. The primary control objective is to steer the system’s state towards and maintain it within an invariant set, specifically an ellipsoid centered at the origin. Minimizing the volume of this invariant ellipsoid serves as a guarantee of system stability and a means of mitigating the effects of external disturbances. Given the limitations of existing methods, this paper introduces an ellipsoidal-set-based robust control strategy that actively constrains system behavior within a bounded invariant set, offering preemptive security and stability guarantees even under stochastic cyber disruptions and physical uncertainty.
The key contributions of this paper are as follows:
  • The use of the ellipsoidal-set technique to improve the system’s robustness against inherent uncertainties and offer security against DoS cyberattacks.
  • The creation of a robust and secure invariant-set control approach based on the state-input and disturbance matrices’ quadratic boundedness of uncertainty.
  • Unlike prior use of ellipsoidal methods in autonomous navigation, our contribution applies to the robust and secure control of EV induction motor drives under cyberattacks, a novel and distinct use case.

2. Induction Motor (IM) Modeling and Problem Formulation

2.1. Notations and Facts

Standard notation is used throughout. Small Greek letters stand for scalars, small letters for vectors, and capital letters for matrices. (.)′ indicates transposition for vectors or matrices. For symmetric matrices, X is positive definite (nonnegative definite) if X > 0 (≥0). Sets of real numbers are denoted by R. Trace (X) denotes the trace function of X for square matrices, while the sign (*) generically indicates each of its symmetric blocks to simplify the notation of partitioned symmetric matrices.
The following matrix inequalities are used in the sequel.
Fact 1-Bounding inequality [25]:
For any real matrices X 1 , X 2 , and X 3 with appropriate dimensions and X 3 X 3 I , it follows that
X 1   X 3   X 2 + ε X 1   X 1 + ε 1   X 2 X 2 ,   s c a l a r   ε > 0
Fact 2-Schur complement [25]:
For a matrix X composed of constant matrices X 1 , X 2 , X 3 , where X 1 = X 1 and 0 < X 2 = X 2 as follows
X = X 1 X 3 X 2 ,
we have the following result: X > 0 , if and only if
X 2 > 0 , X 1 X 3 X 2 1 X 3 > 0 ,

2.2. Vector-Control Induction Motor Modeling

The following equations model the IM dynamics in the dq-reference frame [24].
i d s d t = 1 σ L s R s + R r M 2 L r 2 i d s + ω s i q s + ω s M R r σ L s L r 2 ϕ d r + ω r M σ L s L r ϕ q r + 1 σ L s u d s i q s d t = ω s i d s 1 σ L s R s + R r M 2 L r 2 i q s ω r M σ L s L r ϕ d r + M R r σ L s L r ϕ q r + 1 σ L s u q s   ϕ d r d t = M R r L r i d s R r L r ϕ d r + ω s l i p ϕ q r ϕ q r d t = M R r L r i q s ω s l i p ϕ d r R r L r ϕ q r d ω r d t = p 2 M J L r ϕ d r i q s p 2 M J L r ϕ q r i d s p J T L
The parameters of the study IM are described in Table 1.
  • where σ = 1 M 2 L s L r , the state variables are stator currents (ids, iqs), the rotor fluxes (ϕdr, ϕqr), and the rotor speed (ωr). Applying the vector control principle, the rotor fluxes ϕqr = 0 and ϕr = ϕdr. Therefore, the slip speed (ωslip) = M R r L r ϕ d r i q s [24]. The mathematical model in Equation (1) becomes the following:
    i d s d t = 1 σ L s R s + R r M 2 L r 2 i d s + ω s i q s + ω s M R r σ L s L r 2 ϕ r + 1 σ L s u d s i q s d t = ω s i d s 1 σ L s R s + R r M 2 L r 2 i q s ω r M σ L s L r ϕ r + 1 σ L s u q s ϕ r d t = M R r L r i d s R r L r ϕ r d ω r d t = p 2 M J L r ϕ r i q s p J T L
Equation (2) can be expressed as follows:
x ˙ t = f ( x )   x t + B u t + D w ( t ) ,
where the n-dimension state vector x(t) = [ids iqs ϕr ωr]′ = [x1 x2 x3 x4]′, the m-dim control vector u(t) = [uds uqs]′, and the disturbance vector D = p J ,   w = T L .
Consider:
α = 1 σ L s R s + R r M 2 L r 2 ,   β = M σ L s L r ,   γ = R r L r ,   E = p 2 M J L r ,   F = M R r L r ,   a n d   k 1 = 1 σ L s
So, the mathematical model in Equation (2) becomes the following:
x ˙ = α x 1 + ω s x 2 + β γ x 3 ω s x 1 + α x 2 β x 3 x 4 F x 1 γ x 3 E x 2 x 3 + k 1 0 0 k 1 0 0 0 0 u t + 0 0 0 p J T L
Since, ω s = ω r + ω s l i p = x 4 + M R r L r x 2 x 3 = x 4 + F x 2 x 3 , therefore Equation (4) becomes the following:
x ˙ = α x 1 + x 4 x 2 + F x 2 2 x 3 + β γ x 3 x 4 x 1 F x 1 x 2 x 3 + α x 2 β x 3 x 4 F x 1 γ x 3 E x 2 x 3 + k 1 0 0 k 1 0 0 0 0 u t + 0 0 0 p J T L
The inherent nonlinearities present in the induction motor model defined by Equation (5) necessitate linearization around a specified operating point. The continuous-time linearized IM model is
x ˙ = A c x + B c u + D c w ,   y = C x ,   C = 0 0 0 1
where x(t) and u(t) are as defined before, whereas w(t) = load torque external-disturbance TL. The l-dimensional y(t) is the output vector for feedback. Matrix C is selected for motor speed control.
The induction motor parameter values are listed in Table 2.

2.3. IM Discrete-Time Model Under DoS Attack

In the car-motor industry, digital computers are used intensively. To use digital computer control directly, the system dynamics must be discretized. The IM dynamics (6) are discretized with a suitable sampling time T s (selected as one tenth of the time constant of the fastet mode) as linear time-invariant, LTI
x k + 1 = A d x k + B d u k + D d w k , y ( k ) = C x ( k ) , z ( k ) = y ( k )
where k = time instant. The vector z is the output to be optimized.
The study system exhibits steady-state errors for a step input because it is a type 0. The integral control must be inserted to increase the system type and remove such errors. A new state is added for every integral control, as seen in Figure 3.
The state space equations for the study system are as follows:
x k + 1 = A d x k + B d u k + D d w k , y k = C x k x ¯ ( k + 1 ) = x ¯ ( k ) + r ( k ) y ( k ) + 0 I l r ( k )  
u ( k ) = K x x ( k ) + K I x ¯ ( k )
Note that the reference r k =   w r = 0 , The state estimation vector x ¯ is lx1. The state equations can be combined and rewritten as an augmented state vector x a k = x k , x ¯ k ,  Figure 3, as
x k + 1 x ¯ k + 1 = A d 0 C I l x k x ¯ k + B d 0 K x K i x k x ¯ k + D d 0 w k + 0 I l r k
y k = C 0 x k x ¯ k
Or
x a k + 1 = A x a k + B u k + D w k + 0 I l r k ,
u k = K x a k ,   y k = C a x a ( k )
where
A = A d 0 C I l ,   B = B d 0 ,   K = K x K i ,   D = D d 0 ,   a n d   C a = C 0
The dynamics under a DoS attack can be modelled by a stochastic model (Markov or Bernoulli). In the case of vector-controlled induction motor drives, real-time synchronization between the controller and sensors is crucial for maintaining stable torque and speed control. Even intermittent disruptions, such as those modelled via Bernoulli processes, can result in missed control updates, loss of synchronization, or outdated sensor feedback. This leads to degraded dynamic performance, oscillations, or instability, especially under load transients or parameter variations. As such, intermittent DoS attacks are capable of significantly undermining motor performance even without continuous or permanent disruption.
Moreover, since vector control relies on accurate estimation and decoupling of rotor flux and torque-producing components, any delay or dropout in control inputs (e.g., voltage commands from the inverter) directly affects the flux trajectory, causing torque ripple, speed deviation, or shutdown due to fault protection.
The Bernoulli model for the following LTI system is as follows:
x a k + 1 = A x a k + β k B u k + D w k + 0 I l r ( k )
where xa(k) ∈ R n + l , u(k) ∈ R m are the state variables and control input, respectively. In our study system, n = 4, m = 2, l = 1. The independent, identically distributed (i.i.d.) sequence is modelled by The Bernoulli distribution β(k). (The discrete probability Bernoulli distribution is a random variable which takes the value 1 with probability p and the value 0 with probability q = 1 − p. In other words, β ( k ) switches between two values, 0, and 1). Hence, the input matrix under a DoS attack switches between two values 0 n . m , B n . m . This can be modelled as
x a k + 1 = A x a k + B + B u k + D w k + 0 I l r ( k )
where
B = B . d i a g β 1 k β m k = B . B k . I = H B B k F B , B k 1
With
H B = B ,   F B = I
System (12) is the Bernoulli model that uses the norm-bounded format [26] to model the DoS attack. This stochastic modelling of the DoS attack using the Bernoulli distribution effectively captures the intermittent loss of control input, which mimics real-world network disruptions in electric-vehicle drive systems. It enables a mathematically tractable and realistic representation of input dropout scenarios commonly encountered in EV applications.

2.4. IM Discrete-Time Model Under DoS Attack and System Uncertainty

Adding parameters uncertainty (due to, e.g., IM load changes), system (12) becomes
x a k + 1 = A + A x a k + B + B u k + D w k + 0 I l r ( k )
The uncertainty in matrix A can be modelled in the norm-bounded form
A = H A A k F A , A 1
where A 1 . It is required to design state feedback
u ( k ) = K x a ( k )
to stabilize (13) with controller (14), which is robust against system uncertainties and secure in the face of DoS attacks. The combination of norm-bounded uncertainty (to reflect physical parameter variations, such as rotor resistance drift) and the Bernoulli-based DoS modelling ensures that the proposed control framework simultaneously addresses both cybersecurity threats and intrinsic EV system uncertainties. This dual robustness is essential for realistic EV operation.

3. Ellipsoidal Design of Robust and Secure IM Control

3.1. The Proposed Control via Ellipsoidal Design

Given an LTI norm-bounded uncertain system (13)
x a k + 1 = A + A x a k + B + B u k + D w k , z k = C a x a k
A 1 , B 1
The concept of the ellipsoidal control design is that the state trajectory xa(k) has to be attracted into a small region around the origin (ellipsoid, centered the origin)
E = x a k P 1 x a k 1 , P > 0
When the time evolves, xa(k) remains in E after the state trajectory reaches the ellipsoid (time-invariant ellipsoid). Ellipsoid E is hence said to as attractive or invariant. It is necessary to reduce the ellipsoid volume in terms of the linear function trace (P) in order to lessen the effect of the external disturbance on the system performance. The following theorem provides a solution to this issue.
Theorem 1 
([27]). The uncertain system (13) can be stabilized if there is a feasible solution to the following minimization problem.
m i n i m i z e   t r   C a P C a
subject to the following constraints
α P A P + B Y 0 P H A H B Y Ψ D 0 0 1 α I 0 0 ε 1 I 0 ε 2 I 0 ,
P > 0 ,
a n d   t h e   s c a l a r s   0 < α < 1 , ε 1 > 0 , ε 2 > 0
where
Ψ = P + ε 1 F A F A + ε 2 F B F B
and the minimization is carried out concerning the matrix variables P = P   , scalar variables ε1, ε2, and the scalar parameter α. The solution P ^ ,   Y ^ of this problem defines the matrix C a P C a of the output bounding ellipsoid and the state regulator
K ^ = Y ^ P ^ 1
The derivation of Theorem 1 uses Facts 1, 2 [26]. Note that the optimization problem in Theorem 1 is a nonlinear matrix inequality due to the product term α P . This difficulty can be overcome by an iterative algorithm as follows. The scalar α is fixed in an outer loop, and the resulting LMIs are solved in the inner loop.
In the IM control under consideration, the uncertain system under DoS attack (13) is
x a k + 1 = A + A x a k + B + B u k + D w k
where
A = F A A H A ,   B = F B B H B  
w i t h   F B = B , H B = I ,   A 1 ,   B 1
Note that the uncertainty in (13) is also modelled in the norm-bounded form. The above problem can be solved using the following theorem.
Theorem 2. 
The uncertain system under DoS attack (13) can be stabilized if there is a feasible solution to the following minimization problem
m i n i m i z e   t r a c e C a P C a
subject to the following constraints
α P A P + B Y 0 P H A Y P + ε 1 F A F A + ε 2 B B D 0 0 1 α I 0 0 ε 1 I 0 ε 2 I 0 ,
P > 0 ,
a n d   t h e   s c a l a r s   0 < α < 1 , ε 1 > 0 , ε 2 > 0
The solution P ^ , Y ^ of this problem defines the matrix C a P C a of the output bounding ellipsoid and the secure (against cyber-attack), robust (against load uncertainty) state regulator is
K ^ = Y ^ P ^ 1
Proof. 
Substitute F B = B ,   H B = I in Theorem 1. □

3.2. Comparison with H Control

The H control can be obtained as follows
m i n i m i z e   γ
Subject to
P A P B Y D 0 P 0 P C γ I 0 γ I > 0 , P > 0 , γ > 0
The resulting controller is
K = Y P 1
Note that the objective function to be minimized is selected as the trace function, which is a linear function. Hence, the cyberattacks or uncertainties reduce to an optimization problem for minimizing a linear objective function subject to linear constraints. This is a convex optimization problem cast in the LMI form, easy to solve by the MATLAB robust control toolbox.
By enforcing the system state to remain within a bounded invariant ellipsoidal set, the proposed control design ensures guaranteed performance despite both cyber-induced input loss and parametric uncertainty. This approach forms a unified, mathematically sound solution to address cyber-physical challenges in EV induction motor drives.

4. Simulation Verification

The nonlinear nature of the induction motor model, as described by Equation (5), demands linearization at a specific operating point. This linearization process was performed using the MATLAB command jacobian (version 2023b). Subsequently, the system’s A-matrix in Equation (3) is derived under two distinct operating scenarios: (i) a light-load condition, assuming no variation in the rotor resistance (Rr = 100% of its nominal value), yielding the state matrix denoted as A1; and (ii) a heavy -load condition, incorporating a parameter variation in the rotor resistance (Rr = 150% of its nominal value), corresponds to A2. Substituting in (2), the resulting linearized continuous-time state matrices are
A 1 = 32.153 333.15 3.5828 0.0   309.55   37.727   0.0 364.99   44.756 1097 13.887   485.99   0.4 1.3045 0.0 0.0 ,   A 2 = 32.153 270.9 3.5828 0.0   267.91   38.423   0.0 485.99   28.733 904.72 13.887   1215   1.0 1.7726 0.0 0.0
The corresponding discrete-time matrices, with sampling time Ts = 0.002 s, are calculated. The average matrix (between the extremities, light and heavy loads) for the discrete-time system is
A d = 0.87094 0.30934 0.0082771 0.1478   0.30051   0.85689   0.0013947   0.91087 0.081021 1.0079     0.96578   1.1669   0.00077577 0.0034537 4.8094 × 10 6 0.99832
The uncertainty in matrix A can be modelled in the norm-bounded form as follows.
T h e   d e v i a t i o n   A = F A H A is obtained using the singular value decomposition as [25]
F A = 0.0097054 0.036624 0.007476 0.79907 ,   a n d   H A = 0.0050178 0.013707 0.79987 8.8012 × 10 5
Furthermore,
B d = 0.0078198 0 0 0.0078198 0 0 0 0 ,   C = 0 0 0 1 , a n d   D d = 0 0 0 1.2903
Solving Theorem 2, the proposed control is
K x = 56.681 6.7124 1.4943 2.7297 36.425 103.17 48.43 38.711 , a n d   K i = 4.2475 2.2548
The H control is
K x = 135.32 94.704   175.94 149.47 67.868 294.97 267.34 201.92 ,   a n d   K i = 2.0331 0.30943
The performance analysis of the EV induction motor drive is conducted using the MATLAB 2023b software package. A block diagram representation of the developed controller is illustrated in Figure 2. The system model incorporating the proposed controller was evaluated under typical operating conditions, encompassing step variations in the load torque and the presence of a DoS attack. The vector-controlled induction motor drive system, integrated with the proposed tracking mechanism, was assessed across two different scenarios: one without and one with the DoS attack. These scenarios involved deterministic load torque disturbances and parameter variations, specifically rotor resistance variation. Within each scenario, a three-stage DoS attack was simulated using a Bernoulli stochastic variable with a probability of 0.8. The temporal characteristics of the DoS attacks are listed in Table 3. The efficacy of the proposed tracking controller was benchmarked against that of H controllers in each scenario to ascertain its relative performance.
To capture the dynamic effects of DoS attacks, three distinct temporal instances were selected: during a torque step-up (t = 5 s), at steady-state operation (t = 20 s), and during a torque step-down (t = 32 s). The Bernoulli model used a probability of 0.8, representing frequent control packet loss. These scenarios simulate realistic cyberattack patterns and their interaction with transient and steady-state dynamics in the EV drive system.

4.1. Scenario 1: Deterministic Load Torque Disturbance

To validate the sufficiency of the proposed control approach under DoS attack conditions and realistic vehicle assumptions, extensive simulations are carried out with varying load disturbances and stochastic DoS profiles, mimicking real EV operational scenarios.

4.1.1. Case 1: Without DoS Attack

A step up-and-down load torque disturbance is examined with random occurrence at 5 and 30 s, Figure 4a. The deviation of induction motor speed response without attack under load torque disturbances is depicted in Figure 4b. The proposed tracker and H controller with the up-and-down load torque step changes demonstrate the superiority of the suggested method over the H controller in terms of percentage overshoot, settling time, rise time, and steady-state error.

4.1.2. Case 2: With DoS Attack

The system’s response to a step-up-and-down load torque disturbance is investigated under the influence of DoS attacks as depicted in Figure 5a and Figure 6a. The DoS attacks profile is illustrated in Figure 5b and Figure 6b. The transient response of the EV induction motor speed with the proposed tracker and under these combined load torque disturbances and DoS attacks is presented in Figure 5c. Figure 6c shows the performance of the H controller under simultaneous DoS attacks and step changes in load torque, revealing its limited ability to effectively manage these concurrent disturbances. Figure 7 provides a detailed examination of the controller’s behavior under varying attack timings and load torque disturbances, highlighting the slow response and significant overshoots exhibited by the H controller. Conversely, the proposed tracking controller demonstrates superior disturbance rejection capabilities compared to the H controller in the presence of these disturbances.

4.2. Scenario 2: Robustness Against Parameter Variation (Rotor Resistance Variations)

To further establish robustness, the controller is tested under varying rotor resistance values representing parameter drift, combined with DoS-induced input dropout. This joint disturbance scenario reflects realistic stress conditions experienced by EV motor drives.

4.2.1. Case 1: Without DoS Attack

This case presents a comparative analysis of the proposed tracker and the H controller. The robustness of the suggested tracker is evaluated on the EV induction motor drive system under parametric uncertainty, specifically ±50% variations in rotor resistance (Rr). Figure 8a illustrates the multi-step changes in the load. The speed error responses of the EV vector-controlled induction motor drive system, employing both the proposed tracker and the H controller, are shown in Figure 8b for a 50% Rr. Similarly, Figure 8c,d depict the speed error responses of the induction motor drive system utilizing the proposed tracker and the H controller at 100% Rr and 150% Rr, respectively. The proposed tracker demonstrates rapid and robust responses across the tested rotor resistance variations (50%, 100%, and 150%) and during the step changes in the load torque.

4.2.2. Case 2: Under DoS Attack

This case undertakes a comparative analysis of the proposed tracking controller against an H controller. The robustness of the proposed tracker is rigorously evaluated within the context of an EV induction motor drive system operating under conditions of parametric uncertainty, specifically considering ±50% variations in Rr, and subjected to a Denial-of-Service (DoS) attack and multi-step change in load torque. The temporal profiles of the multi-step load variations and the instances of the DoS attack are presented in Figure 9a,b, Figure 10a,b, and Figure 11a,b. The dynamic response of the EV induction motor drive’s speed error under a +50% Rr perturbation is illustrated in Figure 9c–h. Figure 9c,d,h delineates the performance of the proposed controller during three discrete DoS attack intervals, while Figure 9f–h depicts the corresponding response of the H controller under identical DoS attack scenarios. Analogous speed error responses for rotor resistance variations of 100% Rr and 150% Rr are provided in Figure 10c–e and Figure 10f–h, and Figure 11c–e and Figure 11f–h, respectively. The proposed tracking demonstrates rapid and robust performance when subjected concurrently to variations of 50% and 100% Rr, multi-step load changes, and a DoS attack. Moreover, the proposed tracker demonstrates comparatively superior performance to the H controller under simultaneous variations in the three rotor resistance parameters and the application of a DoS attack when these disturbances are simultaneously applied.
It was observed that the impact of DoS attacks varied significantly with their timing and the operating condition of the system. Attacks occurring during torque transients caused more pronounced speed deviations and overshoots compared to those at steady state. Additionally, system degradation was more severe under high rotor resistance variations, revealing a compounded vulnerability when cyber and physical disturbances co-occur. These results emphasize the necessity for integrated robust control that anticipates both the intensity and timing of cyberattacks.

5. Conclusions

A novel control design methodology is introduced to achieve effective and rapid speed regulation of the electric-vehicle (EV) vector-controlled induction motor drive system in the presence of parametric uncertainty and Denial-of-Service (DoS) attacks. The invariant ellipsoid design proposed yields a state feedback controller with integral action.
The nonlinear model of the EV vector-controlled induction motor drive is derived, and a linearized model is then obtained to represent system parameter uncertainties and DoS attacks, facilitating the application of the derived tracking controller. The efficacy of this controller is evaluated across diverse operational conditions and during simulated DoS attacks. These scenarios encompass deterministic load variations and system parameter deviations.
Remarkably, the EV vector-controlled induction motor drive system, integrated with the proposed tracker, demonstrates successful stabilization under these operational conditions and in the face of DoS attacks. The control strategy exhibits resilience against DoS attacks and robustness to system uncertainties. Performance analysis substantiates its superiority when compared to an H controller. This methodology treats the DoS attack as a norm-bounded uncertainty in the input matrix. Load changes of the induction motor result in parameter uncertainties, modelled in a norm-bounded format within the state matrix (considered an external disturbance). The effect of these composite disturbances is attenuated through the minimization of the invariant-ellipsoidal volume.

Author Contributions

Conceptualization, E.H.E.B.; methodology, H.M.S. and E.H.E.B.; software, E.H.E.B. and H.M.S.; validation, E.H.E.B. and H.M.S.; formal analysis, E.H.E.B. and H.M.S.; investigation, E.H.E.B. and H.M.S.; resources, S.L.; data curation, E.H.E.B. and S.L.; writing—original draft preparation, E.H.E.B., H.M.S. and S.L.; writing—review and editing, E.H.E.B., H.M.S. and S.L.; visualization, E.H.E.B. and H.M.S.; supervision, E.H.E.B. and H.M.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The original contributions presented in the study are included in the article, further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

AIArtificial Intelligence
BLDCBrushless DC
BMSBattery Management Systems
CANController Area Network
DoSDenial-of-Service
ECUsElectronic Control Units
EVsElectric Vehicles
FDIFalse Data Injection
GaNGallium Nitride
IDSIntrusion Detection Systems
IMsInduction Motors
IoTInternet of Things
LINLocal Interconnect Network
LMIsLinear Matrix Inequalities
LTILinear Time Invariant
MitMMan-in-the-Middle
MLMachine Learning
NCSsNetworked Control Systems
OBD-IIOn-Board Diagnostics II
OCPPOpen Charge Point Protocol
OTAOver-The-Air
SiCSilicon Carbide
V2GVehicle-to-Grid
V2IVehicle-to-Infrastructure
V2VVehicle-to-Vehicle
V2XVehicle-to-Everything

References

  1. Amudhavalli, P.; Zahira, R.; Umashankar, S.; Fernando, X.N. A Smart Approach to Electric Vehicle Optimization via IoT-Enabled Recommender Systems. Technologies 2024, 12, 137. [Google Scholar] [CrossRef]
  2. Jondhle, H.; Nandgaonkar, A.B.; Nalbalwar, S.; Jondhle, S. An artificial intelligence and improved optimization-based energy management system of battery-fuel cell-ultracapacitor in hybrid electric vehicles. J. Energy Storage 2023, 74 Pt A, 109079. [Google Scholar] [CrossRef]
  3. Ying, Z.; Wang, K.; Xiong, J.; Ma, M. A literature review on V2X communications security: Foundation, solutions, status, and future. IET Commun. 2024, 18, 1683–1715. [Google Scholar] [CrossRef]
  4. Verma, S.; Sharma, A.; Tran, B.; Alahakoon, D. A systematic review of digital twins for electric vehicles. J. Traffic Transp. Eng. 2024, 11, 815–834. [Google Scholar] [CrossRef]
  5. Mahmoud, M.S.; Hamdan, M.M.; Baroudi, U.A. Modeling and control of Cyber-Physical Systems subject to cyber attacks: A survey of recent advances and challenges. Neurocomputing 2019, 338, 101–115. [Google Scholar] [CrossRef]
  6. Wilson, B.; Mansour, C. Security of Electric Vehicles: A Brief Survey. In Proceedings of the 2024 7th International Conference on Information and Communications Technology (ICOIACT), Ishikawa, Japan, 20–21 November 2024; pp. 125–129. [Google Scholar] [CrossRef]
  7. Aljohani, T.; Almutairi, A. A comprehensive survey of cyberattacks on EVs: Research domains, attacks, defensive mechanisms, and verification methods. Def. Technol. 2024, 42, 31–58. [Google Scholar] [CrossRef]
  8. Xing, W.; Shen, J. Security Control of Cyber–Physical Systems under Cyber Attacks: A Survey. Sensors 2024, 24, 3815. [Google Scholar] [CrossRef]
  9. Oh, J.; Yoo, D.; Kim, C.; Oh, H.; Ryu, Y.; Lee, K.-W.; Sung, D.-U. A hybrid fault diagnostic approach using operational transfer path analysis and denoising deep learning with remote sensors: Application to electric vehicles. Expert Syst. Appl. 2025, 270, 126470. [Google Scholar] [CrossRef]
  10. Soliman, H.; Bayoumi, E.; Lee, S. Ellipsoidal Design of Robust Secure Frequency Control in Smart Cities Under Denial-of-Service Cyberattack. Smart Cities 2025, 8, 39. [Google Scholar] [CrossRef]
  11. Khan, O.; Mustafa, G.; Khan, A.Q.; Abid, M.; Ali, M. Fault-Tolerant Robust Model-Predictive Control of Uncertain Time-Delay Systems Subject to Disturbances. IEEE Trans. Ind. Electron. 2021, 68, 11400–11408. [Google Scholar] [CrossRef]
  12. Javed, M.A.; Ben Hamida, E.; Znaidi, W. Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice. Sensors 2016, 16, 879. [Google Scholar] [CrossRef] [PubMed]
  13. Wang, X.; Li, S.; Rahman, M.A. A Comprehensive Survey on Enabling Techniques in Secure and Resilient Smart Grids. Electronics 2024, 13, 2177. [Google Scholar] [CrossRef]
  14. Veerendra, A.S.; Mohamed, M.R.B.; García Márquez, F.P. Energy management control strategies for energy storage systems of hybrid electric vehicle: A review. Energy Storage 2024, 6, e573. [Google Scholar] [CrossRef]
  15. Buffolo, M.; Favero, D.; Marcuzzi, A.; De Santi, C.; Meneghesso, G.; Zanon, E.; Meneghini, M. Review and Outlook on GaN and SiC Power Devices: Industrial State-of-the-Art, Applications, and Perspectives. IEEE Trans. Electron. Devices 2024, 71, 1344–1355. [Google Scholar] [CrossRef]
  16. Bayoumi, E.H.E. Power Electronics in Renewable Energy Smart Grid: A Review. Int. J. Ind. Electron. Drives 2015, 2, 43–61. [Google Scholar] [CrossRef]
  17. Kumar, M.; Panda, K.P.; Naayagi, R.T.; Thakur, R.; Panda, G. Comprehensive Review of Electric Vehicle Technology and Its Impacts: Detailed Investigation of Charging Infrastructure, Power Management, and Control Techniques. Appl. Sci. 2023, 13, 8919. [Google Scholar] [CrossRef]
  18. Kabalci, Y.; Mutlu, U. Emerging Communication Technologies for V2X: Standards and Protocols. In Smart Grid 3.0. Power Systems; Appasani, B., Bizon, N., Eds.; Springer: Cham, Switzerland, 2023. [Google Scholar] [CrossRef]
  19. Bozdal, M.; Samie, M.; Jennions, I. A Survey on CAN Bus Protocol: Attacks, Challenges, and Potential Solutions. In Proceedings of the 2018 International Conference on Computing, Electronics & Communications Engineering (iCCECE), Southend, UK, 16–17 August 2018; pp. 201–205. [Google Scholar] [CrossRef]
  20. Rishiwal, V.; Agarwal, U.; Alotaibi, A.; Tanwar, S.; Yadav, P.; Yadav, M. Exploring Secure V2X Communication Networks for Human-Centric Security and Privacy in Smart Cities. IEEE Access 2024, 12, 138763–138788. [Google Scholar] [CrossRef]
  21. Annabi, M.; Zeroual, A.; Messai, N. Towards zero trust security in connected vehicles: A comprehensive survey. Comput. Secur. 2024, 145, 104018. [Google Scholar] [CrossRef]
  22. Johnson, J.; Berg, T.; Anderson, B.; Wright, B. Review of Electric Vehicle Charger Cybersecurity Vulnerabilities, Potential Impacts, and Defenses. Energies 2022, 15, 3931. [Google Scholar] [CrossRef]
  23. El Baset Abd El Halim, A.A.; Bayoumi, E.H.E.; El-Khattam, W.; Ibrahim, A.M. Electric Vehicles: A Review of their Components and Technologies. Int. J. Power Electron. Drive Syst. (IJPEDS) 2022, 13, 2041–2061. [Google Scholar] [CrossRef]
  24. Alcaraz, C.; Cumplido, J.; Trivino, A. OCPP in the spotlight: Threats and countermeasures for electric vehicle charging infrastructures 4.0. Int. J. Inf. Secur. 2023, 22, 1395–1421. [Google Scholar] [CrossRef]
  25. Poznyak, A. Robust Control: Supplementary Topics; Cambridge Scholars Publishing: Newcastle upon Tyne, UK, 2024. [Google Scholar]
  26. Werner, H.; Korba, P.; Yang, T.C. Robust Tuning of Power System Stabilizers Using LMI-Techniques. IEEE Trans. Control Syst. Technol. 2003, 11, 147–152. [Google Scholar] [CrossRef]
  27. Khlebnikov, M.V.; Polyak, B.T.; Kuntsevich, V.M. Optimization of Linear Systems Subject to Bounded Exogenous Disturbances: The Invariant Ellipsoid Technique. Autom. Remote Control 2011, 72, 2227–2275. [Google Scholar] [CrossRef]
Figure 1. Network-based closed-loop system with DoS attack.
Figure 1. Network-based closed-loop system with DoS attack.
Technologies 13 00289 g001
Figure 2. Electric-vehicle drive system with cyber-attack.
Figure 2. Electric-vehicle drive system with cyber-attack.
Technologies 13 00289 g002
Figure 3. State feedback with integral control.
Figure 3. State feedback with integral control.
Technologies 13 00289 g003
Figure 4. A step up-and-down load torque disturbance (a) load torque, (b) EV induction motor drive speed error change response using the proposed tracker and H controllers without DoS Attack.
Figure 4. A step up-and-down load torque disturbance (a) load torque, (b) EV induction motor drive speed error change response using the proposed tracker and H controllers without DoS Attack.
Technologies 13 00289 g004
Figure 5. A step up-and-down load torque disturbance (a) load torque, (b) DoS Attack, (c) EV induction motor drive speed error change response with DoS Attack for the proposed tracker.
Figure 5. A step up-and-down load torque disturbance (a) load torque, (b) DoS Attack, (c) EV induction motor drive speed error change response with DoS Attack for the proposed tracker.
Technologies 13 00289 g005
Figure 6. A step up-and-down load torque disturbance (a) load torque, (b) DoS Attack, (c) EV induction motor drive speed error change response with DoS Attack for the H controller.
Figure 6. A step up-and-down load torque disturbance (a) load torque, (b) DoS Attack, (c) EV induction motor drive speed error change response with DoS Attack for the H controller.
Technologies 13 00289 g006
Figure 7. Zoom in on the speed deviation response H controller under the DoS attack, (a) during a step change, (b) at normal operation, (c) during speed settling.
Figure 7. Zoom in on the speed deviation response H controller under the DoS attack, (a) during a step change, (b) at normal operation, (c) during speed settling.
Technologies 13 00289 g007
Figure 8. Robustness against rotor resistance variation (±50% Rr) (a) The multi-step changes in load torque, (b) EV induction motor drive speed error change response at 50% Rr, (c) EV induction motor drive speed error change response at 100% Rr, (d) EV induction motor drive speed error change response at 150% Rr.
Figure 8. Robustness against rotor resistance variation (±50% Rr) (a) The multi-step changes in load torque, (b) EV induction motor drive speed error change response at 50% Rr, (c) EV induction motor drive speed error change response at 100% Rr, (d) EV induction motor drive speed error change response at 150% Rr.
Technologies 13 00289 g008
Figure 9. Robustness against rotor resistance variation (50% Rr). (a) The multi-step changes in load torque, (b) Dos Attack, (ce) EV induction motor drive speed error change response of proposed tracker during the three DoS attacks, (fh) EV induction motor drive speed error change response of H controller during the three DoS attacks.
Figure 9. Robustness against rotor resistance variation (50% Rr). (a) The multi-step changes in load torque, (b) Dos Attack, (ce) EV induction motor drive speed error change response of proposed tracker during the three DoS attacks, (fh) EV induction motor drive speed error change response of H controller during the three DoS attacks.
Technologies 13 00289 g009
Figure 10. Robustness against rotor resistance variation (100% Rr). (a) The multi-step changes in load torque, (b) Dos attack, (ce) EV induction motor drive speed error change response of proposed tracker during the three DoS attacks, (fh) EV induction motor drive speed error change response of H controller during the three DoS attacks.
Figure 10. Robustness against rotor resistance variation (100% Rr). (a) The multi-step changes in load torque, (b) Dos attack, (ce) EV induction motor drive speed error change response of proposed tracker during the three DoS attacks, (fh) EV induction motor drive speed error change response of H controller during the three DoS attacks.
Technologies 13 00289 g010
Figure 11. Robustness against rotor resistance variation (150% Rr). (a) The multi-step changes in load torque, (b) Dos Attack, (ce) EV induction motor drive speed error change response of proposed tracker during the three DoS attacks, (fh) EV induction motor drive speed error change response of H controller during the three DoS attacks.
Figure 11. Robustness against rotor resistance variation (150% Rr). (a) The multi-step changes in load torque, (b) Dos Attack, (ce) EV induction motor drive speed error change response of proposed tracker during the three DoS attacks, (fh) EV induction motor drive speed error change response of H controller during the three DoS attacks.
Technologies 13 00289 g011
Table 1. IM model parameters.
Table 1. IM model parameters.
NotationDescription
ids, iqsdq-reference frame of stator current
ϕdr, ϕqrdq-reference frame of rotor fluxes
ωrAngular speed of rotor
ωslipSlip
ωsSynchronous angular speed
Rr, RsResistance of rotor and stator respectively
MMutual inductance between rotor and stator
Lr, LsSelf-inductance of rotor and stator respectively
pNumber of pole pairs of induction motor.
JMotor moment of inertia
ϕ r = ϕ d r 2 + ϕ q r 2 Rotor Flux
Table 2. Induction motor parameter values.
Table 2. Induction motor parameter values.
NotationValue
Rs4.8500 Ω
Rr3.8050 Ω
Ls0.2740 H
Lr0.2740 H
M0.2580 H
p2
J0.0031 kg·m2
Table 3. Timing of the DoS Attack.
Table 3. Timing of the DoS Attack.
Attack #TimeStatus
1t = 5 sDuring a step load torque increase
2t = 20 sAt normal operation
3t = 32 sDuring step load torque decrease
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Bayoumi, E.H.E.; Soliman, H.M.; Lee, S. Ellipsoidal-Set Design of Robust and Secure Control Against Denial-of-Service Cyber Attacks in Electric-Vehicle Induction Motor Drives. Technologies 2025, 13, 289. https://doi.org/10.3390/technologies13070289

AMA Style

Bayoumi EHE, Soliman HM, Lee S. Ellipsoidal-Set Design of Robust and Secure Control Against Denial-of-Service Cyber Attacks in Electric-Vehicle Induction Motor Drives. Technologies. 2025; 13(7):289. https://doi.org/10.3390/technologies13070289

Chicago/Turabian Style

Bayoumi, Ehab H. E., Hisham M. Soliman, and Sangkeum Lee. 2025. "Ellipsoidal-Set Design of Robust and Secure Control Against Denial-of-Service Cyber Attacks in Electric-Vehicle Induction Motor Drives" Technologies 13, no. 7: 289. https://doi.org/10.3390/technologies13070289

APA Style

Bayoumi, E. H. E., Soliman, H. M., & Lee, S. (2025). Ellipsoidal-Set Design of Robust and Secure Control Against Denial-of-Service Cyber Attacks in Electric-Vehicle Induction Motor Drives. Technologies, 13(7), 289. https://doi.org/10.3390/technologies13070289

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop