Fuzzy Memory Controller Design Based-Machine Learning Algorithm and Stability Analysis for Nonlinear NCSs Under Asynchronous Cyber Attacks

被引:2
作者
Cai, Xiao [1 ]
Shi, Kaibo [2 ,3 ]
Sun, Yanbin [1 ,4 ]
Wen, Shiping [5 ]
Yan, Huaicheng [6 ]
Xie, Yuanlun [7 ]
机构
[1] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou 510006, Peoples R China
[2] Chengdu Univ, Sch Elect Informat & Elect Engn, Chengdu 610106, Peoples R China
[3] Sichuan Univ, Coll Elect Engn, Chengdu 610065, Sichuan, Peoples R China
[4] Pazhou Lab, Guangzhou 510330, Peoples R China
[5] Univ Technol Sydney, Australian AI Inst, Fac Engn & Informat Technol, Ultimo, NSW 2007, Australia
[6] East China Univ Sci & Technol, Sch Informat Sci & Engn, Shanghai 200237, Peoples R China
[7] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Chengdu 611731, Peoples R China
来源
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS | 2024年 / 54卷 / 02期
基金
中国国家自然科学基金;
关键词
Cyber attacks; Lyapunov-Krasovskii function (LKF); machine learning; networked control system (NCS); stability analysis; NETWORKED CONTROL-SYSTEMS; COMMUNICATION; STABILIZATION; CONSTRAINTS;
D O I
10.1109/TSMC.2023.3321611
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article addresses the issue of mismatched communication delay (CD) in dual-channel nonlinear networked control systems (NCSs) resulting from the quality of service (QoS) mechanism's queue management. The focus is on the importance of ensuring communication security in NCSs, particularly in the presence of asynchronous cyber attacks (ACAs). First, improved Lyapunov-Krasovskii functions (LKFs) are constructed, taking into account sampling signals, CDs, and nonlinearities in the system. Additionally, a novel looped-functional approach is introduced to reduce the initial constraint of the criterion. Then, the control algorithm's performance is optimized by achieving a tighter upper bound on the integral term and applying quadratic scaling. To ensure stability and security under ACAs, a fuzzy memory sample-data controller (MSAC) is proposed. This controller leverages a machine learning algorithm to address the optimization problem of data sampling period selection, thereby minimizing resource usage and operating efficiently within the system's limited bandwidth. Finally, numerical simulations are conducted using the dynamic equations of the inverted pendulum system (IPS) to validate the practicality of the proposed theoretical approach.
引用
收藏
页码:1082 / 1093
页数:12
相关论文
共 34 条
[1]  
Ahlin L., 1997, PRINCIPLES WIRELESS
[2]  
Bemporad A, 2010, LECT NOTES CONTR INF, V406, P149
[3]   Optimal integrated control and scheduling of networked control systems with communication constraints:: Application to a car suspension system [J].
Ben Gaid, Mohamed El Mongi ;
Cela, Arben ;
Hamam, Yskandar .
IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2006, 14 (04) :776-787
[4]   Reliable Sampling Mechanism for Takagi-Sugeno Fuzzy NCSs Under Deception Cyberattacks for the Application of the Inverted Pendulum System [J].
Cai, Xiao ;
Shi, Kaibo ;
She, Kun ;
Zhong, Shouming ;
Soh, Yeng Chai ;
Yu, Yue .
IEEE TRANSACTIONS ON RELIABILITY, 2023, 72 (03) :1220-1231
[5]   Performance Error Estimation and Elastic Integral Event Triggering Mechanism Design for T-S Fuzzy Networked Control System Under DoS Attacks [J].
Cai, Xiao ;
Shi, Kaibo ;
She, Kun ;
Zhong, Shouming ;
Soh, Yeng Chai ;
Yu, Yue .
IEEE TRANSACTIONS ON FUZZY SYSTEMS, 2023, 31 (04) :1327-1339
[6]   Quantized Sampled-Data Control Tactic for T-S Fuzzy NCS Under Stochastic Cyber-Attacks and Its Application to Truck-Trailer System [J].
Cai, Xiao ;
Shi, Kaibo ;
She, Kun ;
Zhong, Shouming ;
Tang, Yiqian .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 71 (07) :7023-7032
[7]   Observer-Based Dynamic Event-Triggered Control for Multiagent Systems With Time-Varying Delay [J].
Cao, Liang ;
Pan, Yingnan ;
Liang, Hongjing ;
Huang, Tingwen .
IEEE TRANSACTIONS ON CYBERNETICS, 2023, 53 (05) :3376-3387
[8]   Denial-of-service attack-detection techniques [J].
Carl, G ;
Kesidis, G ;
Brooks, RR ;
Rai, S .
IEEE INTERNET COMPUTING, 2006, 10 (01) :82-89
[9]  
Colandairaj J, 2007, IET CONTROL THEORY A, V1, P430, DOI 10.1049/iet-cta:20060519
[10]   Security Control for Discrete-Time Stochastic Nonlinear Systems Subject to Deception Attacks [J].
Ding, Derui ;
Wang, Zidong ;
Han, Qing-Long ;
Wei, Guoliang .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2018, 48 (05) :779-789