Truncated predictive control for delayed cyber-physical systems under deception attacks

被引:0
|
作者
Anusuya, S. [1 ]
Sakthivel, R. [1 ]
Mohammadzadeh, A. [2 ]
Kwon, O. M. [3 ]
机构
[1] Bharathiar Univ, Dept Appl Math, Coimbatore 641046, India
[2] Shenyang Univ Technol, Multidisciplinary Ctr Infrastruct Engn, Shenyang 110870, Peoples R China
[3] Chungbuk Natl Univ, Sch Elect Engn, Cheongju 28644, South Korea
来源
JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS | 2025年 / 362卷 / 01期
关键词
Cyber-physical systems; Interval type-2 fuzzy technique; Truncated predictor approach; Uncertainty and disturbance estimator strategy; Tracking control problems; Deception attacks; UNCERTAINTY; NETWORKS;
D O I
10.1016/j.jfranklin.2024.107361
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this work, the state tracking, input delay prediction, uncertainty and disturbance rejection problems are studied for the delayed cyber-physical systems under uncertainties, nonlinearities and external disturbances in which the addressed model is described by the fuzzy technique. More specifically, such an input-delayed system is linearized through an interval type-2 fuzzy technique accompanied by a parallel distribution compensation method. Further, the presence of constant input delays in the examined system is proficiently compensated with the assistance of a truncated predictor feedback approach. In parallel, the impacts of external disturbances and uncertainties that are occurred in the system are estimated by means of uncertainty and disturbance estimator method in an efficacious way. With the help of this estimated information, an uncertainty and disturbance estimator-based truncated predictive tracking control protocol is formulated to acquire the state tracking results of the underlying system in the presence of external disturbances and uncertainties. Remarkably, in this study, the interval type-2 fuzzy is blended with the designed reference system. Furthermore, the secure tracking control law is designed for the considered system under the random deception attacks. To address the deception attacks, the Bernoulli stochastic distribution is considered in this study. Moreover, the constraints are expressed for computing the truncated predictive feedback control gain matrices. Conclusively, the numerical simulation analysis is carried out to demonstrate the usefulness of the devised approach.
引用
收藏
页数:16
相关论文
共 50 条
  • [31] Synthesis of sensor deception attacks at the supervisory layer of Cyber-Physical Systems
    Meira-Goes, Romulo
    Kang, Eunsuk
    Kwong, Raymond H.
    Lafortune, Stephane
    AUTOMATICA, 2020, 121
  • [32] Optimal Intermittent Deception Attacks With Energy Constraints for Cyber-Physical Systems
    Liu, Xuan
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2024, 54 (10): : 5889 - 5900
  • [33] Minimum Violation Control Synthesis on Cyber-Physical Systems under Attacks
    Niu, Luyao
    Fu, Jie
    Clark, Andrew
    2018 IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2018, : 262 - 269
  • [34] Detection, reconstruction and mitigation of deception attacks in nonlinear cyber-physical systems
    Shahriari-kahkeshi, Maryam
    Alem, Sayed Amirhosein
    Shi, Peng
    INTERNATIONAL JOURNAL OF ADAPTIVE CONTROL AND SIGNAL PROCESSING, 2024, 38 (09) : 2972 - 2995
  • [35] Real-time detection of deception attacks in cyber-physical systems
    Feiyang Cai
    Xenofon Koutsoukos
    International Journal of Information Security, 2023, 22 : 1099 - 1114
  • [36] Research on secure control and communication for cyber-physical systems under cyber-attacks
    Li, Wei
    Shi, Yahong
    Li, Yajie
    TRANSACTIONS OF THE INSTITUTE OF MEASUREMENT AND CONTROL, 2019, 41 (12) : 3421 - 3437
  • [37] Secure control design for nonlinear cyber-physical systems under DoS, replay, and deception cyber-attacks with multiple transmission channels
    Tahoun, A. H.
    Arafa, M.
    ISA TRANSACTIONS, 2022, 128 : 294 - 308
  • [38] Attack detection and secure correction control for cyber-physical systems subject to actuator deception attacks
    He, Ke
    Long, Yue
    Li, Tieshan
    2023 35TH CHINESE CONTROL AND DECISION CONFERENCE, CCDC, 2023, : 3356 - 3361
  • [39] Secure Correct Control for Cyber-Physical Systems under Multiple Stochastic Physical Attacks
    Dong, Lewei
    Xu, Huiling
    PROCEEDINGS OF THE 32ND 2020 CHINESE CONTROL AND DECISION CONFERENCE (CCDC 2020), 2020, : 3824 - 3829
  • [40] TIMING OF CYBER-PHYSICAL ATTACKS ON PROCESS CONTROL SYSTEMS
    Krotofil, Marina
    Cardenas, Alvaro
    Angrishi, Kishore
    CRITICAL INFRASTRUCTURE PROTECTION VIII, 2014, 441 : 29 - +