共 50 条
Sampled-data stabilization for networked control systems under deception attack and the transmission delay
被引:4
作者:
Lee, Seok Young
[1
]
Park, Junmin
[2
]
机构:
[1] Soonchunhyang Univ, Dept Elect Engn, Asan 31538, Chungnam, South Korea
[2] Chungnam Natl Univ, Dept Elect Engn, Daejeon 34134, South Korea
来源:
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION
|
2024年
/
131卷
基金:
新加坡国家研究基金会;
关键词:
Cyber-physical system;
Sampled-data system;
Cyber-attacks;
Transmission delay;
STABILITY ANALYSIS;
LINEAR-SYSTEMS;
EXPONENTIAL SYNCHRONIZATION;
DISSIPATIVE ANALYSIS;
INEQUALITY;
CRITERION;
DESIGN;
D O I:
10.1016/j.cnsns.2024.107817
中图分类号:
O29 [应用数学];
学科分类号:
070104 ;
摘要:
For the stability analysis and stabilization synthesis problems, this paper considers networked control systems (NCSs) with the transmission delay and the deception attack under aperiodic samplings, where the deception attack and its activation function are represented as a sector bound function and a random variable with Bernoulli distribution, respectively. This paper proposes the stability and stabilization criteria for the NCSs by constructing Lyapunov- Krasovskii (L-K) functionals with continuous functionals and looped-functionals. Compared with the literature, the proposed continuous functionals take into account the mixed delay including the transmission delay and the maximum allowable sampling interval, as well as the augmented vector and integral terms. Also, the proposed looped-functionals construct two augmented vectors with integral vectors that are zeros at 𝑡� = 𝑡�𝑘� and 𝑡� = 𝑡�𝑘�+1, respectively. By utilizing these two augmented vectors, the looped-functionals fully utilize the sampling patterns compared with the literature. Based on the proposed L-K functionals, this paper derives not only the stability criterion for the NCSs with the transmission delay, but also the stabilization criterion for the NCSs with the transmission delay and the deception attack in terms of linear matrix inequalities (LMIs), respectively. Numerical example demonstrates the validity of the proposed approach.
引用
收藏
页数:15
相关论文