Observer-Based Control for Interval Type-2 Fuzzy Systems Under PDT-Based DoS Attacks

被引:0
作者
Shen, Hao [1 ]
Liu, Xinmiao [2 ,3 ]
Ma, Qian [4 ]
Wang, Jing [1 ]
机构
[1] Anhui Univ Technol, Sch Elect & Informat Engn, Maanshan 243032, Peoples R China
[2] Tongji Univ, Coll Elect & Informat Engn, Dept Control Sci & Engn, Shanghai 200092, Peoples R China
[3] Tongji Univ, Shanghai Res Inst Intelligent Autonomous Syst, Shanghai 201210, Peoples R China
[4] Nanjing Univ Sci & Technol, Sch Automat, Nanjing 210094, Peoples R China
来源
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS | 2025年 / 55卷 / 06期
基金
中国国家自然科学基金;
关键词
Switches; Uncertain systems; Fuzzy systems; Switched systems; Control systems; Vectors; Observers; Denial-of-service attack; Uncertainty; Stability criteria; Interval type-2 (IT2) fuzzy systems; persistent dwell time (PDT); stability; switched systems; STABILITY; SECURITY; PRIVACY; AVERAGE;
D O I
10.1109/TSMC.2025.3547320
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The work addresses the issue of observer-based control for networked nonlinear systems suffering from denial-of-service (DoS) attacks which are modeled in a novel persistent dwell time (PDT) switched form. The interval type-2 Takagi-Sugeno fuzzy model is adopted to accurately characterize the nonlinear feature in investigated systems and effectively capture uncertain parameters via membership functions. It should be noticed that a new framework comprising a special PDT switching strategy is proposed for distributed DoS attacks with energy limitation. Accordingly, the controlled system is converted into a complex and constrained PDT-switched system. Subsequently, based on weak multi-Lyapunov functions, membership-function-dependent sufficient criteria are offered for judging the globally uniformly exponential stability of the researched closed-loop system, from which the gains of the observer and the controller can be computed. Finally, an algorithm generating PDT switching sequences for distributed DoS attacks is proposed, and simulations are given to substantiate the usability of the developed approach.
引用
收藏
页码:3780 / 3790
页数:11
相关论文
共 47 条
[1]  
Ardenas A., 2008, Proceedings of the 3rd conference on Hot topics in security, San Jose, CA, P1
[2]   Detection of Covert Cyber-Attacks in Interconnected Systems: A Distributed Model-Based Approach [J].
Barboni, Angelo ;
Rezaee, Hamed ;
Boem, Francesca ;
Parisini, Thomas .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2020, 65 (09) :3728-3741
[3]  
Byres E., 2004, PROC VDE CONVENTION, V2004, P213
[4]   Denial-of-service attack-detection techniques [J].
Carl, G ;
Kesidis, G ;
Brooks, RR ;
Rai, S .
IEEE INTERNET COMPUTING, 2006, 10 (01) :82-89
[5]   Input-to-State Stabilizing Control Under Denial-of-Service [J].
De Persis, Claudio ;
Tesi, Pietro .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2015, 60 (11) :2930-2944
[6]   Efficient Model-Predictive Control for Nonlinear Systems in Interval Type-2 T-S Fuzzy Form Under Round-Robin Protocol [J].
Dong, Yuying ;
Song, Yan ;
Wei, Guoliang .
IEEE TRANSACTIONS ON FUZZY SYSTEMS, 2022, 30 (01) :63-74
[7]   Efficient Model-Predictive Control for Networked Interval Type-2 T-S Fuzzy System With Stochastic Communication Protocol [J].
Dong, Yuying ;
Song, Yan ;
Wei, Guoliang .
IEEE TRANSACTIONS ON FUZZY SYSTEMS, 2021, 29 (02) :286-297
[8]   Resilient control under Denial-of-Service: Robust design [J].
Feng, Shuai ;
Tesi, Pietro .
AUTOMATICA, 2017, 79 :42-51
[9]   Memory-Event-Triggered Fault Detection of Networked IT2 T-S Fuzzy Systems [J].
Gu, Zhou ;
Yue, Dong ;
Park, Ju H. ;
Xie, Xiangpeng .
IEEE TRANSACTIONS ON CYBERNETICS, 2023, 53 (02) :743-752
[10]   Security and privacy for implantable medical devices [J].
Halperin, Daniel ;
Kohno, Tadayoshi ;
Heydt-Benjamin, Thomas S. ;
Fu, Kevin ;
Maisel, William H. .
IEEE PERVASIVE COMPUTING, 2008, 7 (01) :30-39