Fuzzy Memory Controller Design Based-Machine Learning Algorithm and Stability Analysis for Nonlinear NCSs Under Asynchronous Cyber Attacks

被引:1
作者
Cai, Xiao [1 ]
Shi, Kaibo [2 ,3 ]
Sun, Yanbin [1 ,4 ]
Wen, Shiping [5 ]
Yan, Huaicheng [6 ]
Xie, Yuanlun [7 ]
机构
[1] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou 510006, Peoples R China
[2] Chengdu Univ, Sch Elect Informat & Elect Engn, Chengdu 610106, Peoples R China
[3] Sichuan Univ, Coll Elect Engn, Chengdu 610065, Sichuan, Peoples R China
[4] Pazhou Lab, Guangzhou 510330, Peoples R China
[5] Univ Technol Sydney, Australian AI Inst, Fac Engn & Informat Technol, Ultimo, NSW 2007, Australia
[6] East China Univ Sci & Technol, Sch Informat Sci & Engn, Shanghai 200237, Peoples R China
[7] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Chengdu 611731, Peoples R China
来源
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS | 2024年 / 54卷 / 02期
基金
中国国家自然科学基金;
关键词
Cyber attacks; Lyapunov-Krasovskii function (LKF); machine learning; networked control system (NCS); stability analysis; NETWORKED CONTROL-SYSTEMS; COMMUNICATION; STABILIZATION; CONSTRAINTS;
D O I
10.1109/TSMC.2023.3321611
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article addresses the issue of mismatched communication delay (CD) in dual-channel nonlinear networked control systems (NCSs) resulting from the quality of service (QoS) mechanism's queue management. The focus is on the importance of ensuring communication security in NCSs, particularly in the presence of asynchronous cyber attacks (ACAs). First, improved Lyapunov-Krasovskii functions (LKFs) are constructed, taking into account sampling signals, CDs, and nonlinearities in the system. Additionally, a novel looped-functional approach is introduced to reduce the initial constraint of the criterion. Then, the control algorithm's performance is optimized by achieving a tighter upper bound on the integral term and applying quadratic scaling. To ensure stability and security under ACAs, a fuzzy memory sample-data controller (MSAC) is proposed. This controller leverages a machine learning algorithm to address the optimization problem of data sampling period selection, thereby minimizing resource usage and operating efficiently within the system's limited bandwidth. Finally, numerical simulations are conducted using the dynamic equations of the inverted pendulum system (IPS) to validate the practicality of the proposed theoretical approach.
引用
收藏
页码:1082 / 1093
页数:12
相关论文
共 34 条
  • [1] Ahlin L., 1997, PRINCIPLES WIRELESS
  • [2] Bemporad A, 2010, LECT NOTES CONTR INF, V406, P149
  • [3] Optimal integrated control and scheduling of networked control systems with communication constraints:: Application to a car suspension system
    Ben Gaid, Mohamed El Mongi
    Cela, Arben
    Hamam, Yskandar
    [J]. IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2006, 14 (04) : 776 - 787
  • [4] Reliable Sampling Mechanism for Takagi-Sugeno Fuzzy NCSs Under Deception Cyberattacks for the Application of the Inverted Pendulum System
    Cai, Xiao
    Shi, Kaibo
    She, Kun
    Zhong, Shouming
    Soh, Yeng Chai
    Yu, Yue
    [J]. IEEE TRANSACTIONS ON RELIABILITY, 2023, 72 (03) : 1220 - 1231
  • [5] Performance Error Estimation and Elastic Integral Event Triggering Mechanism Design for T-S Fuzzy Networked Control System Under DoS Attacks
    Cai, Xiao
    Shi, Kaibo
    She, Kun
    Zhong, Shouming
    Soh, Yeng Chai
    Yu, Yue
    [J]. IEEE TRANSACTIONS ON FUZZY SYSTEMS, 2023, 31 (04) : 1327 - 1339
  • [6] Quantized Sampled-Data Control Tactic for T-S Fuzzy NCS Under Stochastic Cyber-Attacks and Its Application to Truck-Trailer System
    Cai, Xiao
    Shi, Kaibo
    She, Kun
    Zhong, Shouming
    Tang, Yiqian
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 71 (07) : 7023 - 7032
  • [7] Observer-Based Dynamic Event-Triggered Control for Multiagent Systems With Time-Varying Delay
    Cao, Liang
    Pan, Yingnan
    Liang, Hongjing
    Huang, Tingwen
    [J]. IEEE TRANSACTIONS ON CYBERNETICS, 2023, 53 (05) : 3376 - 3387
  • [8] Denial-of-service attack-detection techniques
    Carl, G
    Kesidis, G
    Brooks, RR
    Rai, S
    [J]. IEEE INTERNET COMPUTING, 2006, 10 (01) : 82 - 89
  • [9] Colandairaj J, 2007, IET CONTROL THEORY A, V1, P430, DOI [10.1049/iet-cta:20050519, 10.1049/iet-cta:20060519]
  • [10] Security Control for Discrete-Time Stochastic Nonlinear Systems Subject to Deception Attacks
    Ding, Derui
    Wang, Zidong
    Han, Qing-Long
    Wei, Guoliang
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2018, 48 (05): : 779 - 789