Adaptive sliding-mode tracking control of networked control systems with false data injection attacks

被引:33
|
作者
Li, Meng [1 ,2 ]
Chen, Yong [1 ,2 ]
Zhang, Yueyuan [3 ]
Liu, Yuezhi [1 ,2 ]
机构
[1] Univ Elect Sci & Technol China, Sch Automat Engn, Chengdu 611731, Peoples R China
[2] Univ Elect Sci & Technol China, Inst Elect Vehicle Driving Syst & Safety Technol, Chengdu 611731, Peoples R China
[3] Soochow Univ, Sch Mech & Elect Engn, Suzhou 215131, Peoples R China
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
Networked control systems; False data injection attacks; Augmented state observer; And terminal integral sliding mode control;
D O I
10.1016/j.ins.2021.11.069
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, the problem of tracking control of networked control systems with false data injection attacks is studied. A new terminal integral adaptive sliding mode control method is proposed. Firstly, the mathematical model of networked control system with the actuator and sensor false data injection attacks is modeled. Secondly, an augmented state observer is designed in order to estimate the augmented states, in which, a discontinuous input term is designed to defenses the actuator attack, and the convergence of the estimation error is proved. Thirdly, the tracking output errors are introduced to design the terminal integral sliding mode control method. Furthermore, in order to reduce the oscillation induced by the sensor false data injection attack, the terminal integral adaptive sliding mode control algorithm using the estimation error as adaptive factor is structured, and the stability of the algorithm are proved by using Lyapunov theory. Finally, a numerical simulation and a practical experiment are executed to verify the superiority of proposed control strategies. (c) 2021 Elsevier Inc. All rights reserved.
引用
收藏
页码:194 / 208
页数:15
相关论文
共 50 条
  • [1] False Data Injection Attacks for Output Tracking Control Systems
    Pang Zhonghua
    Hou Fangyuan
    Zhou Yuguo
    Sun Dehui
    2015 34TH CHINESE CONTROL CONFERENCE (CCC), 2015, : 6747 - 6752
  • [2] Security Analysis of Stochastic Networked Control Systems under False Data Injection Attacks
    Hu, Liang
    Wang, Zidong
    Naeem, Wasif
    2016 UKACC 11TH INTERNATIONAL CONFERENCE ON CONTROL (CONTROL), 2016,
  • [3] SWITCHED STACKELBERG GAME ANALYSIS OF FALSE DATA INJECTION ATTACKS ON NETWORKED CONTROL SYSTEMS
    Huang, Yabing
    Zhao, Jun
    KYBERNETIKA, 2020, 56 (02) : 261 - 277
  • [4] False Data Injection Attacks on Networked Control Systems: A Stackelberg Game Analysis
    Li, Yuzhe
    Shi, Dawei
    Chen, Tongwen
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2018, 63 (10) : 3503 - 3509
  • [5] False Data Injection Attacks for a Class of Output Tracking Control Systems
    Hou, Fangyuan
    Pang, Zhonghua
    Zhou, Yuguo
    Sun, Dehui
    2015 27TH CHINESE CONTROL AND DECISION CONFERENCE (CCDC), 2015, : 3319 - 3323
  • [6] Optimal tracking performance of networked control systems with time delay under multiplicative false data injection attacks
    Zhang, Bin
    Ren, Yingying
    An, Cuijuan
    Ding, Da-Wei
    SYSTEMS & CONTROL LETTERS, 2025, 196
  • [7] Adaptive control of bilateral teleoperation systems with false data injection attacks and attacks detection
    Cai, Chuanjie
    Zhang, Yijun
    Chen, Qian
    2022 41ST CHINESE CONTROL CONFERENCE (CCC), 2022, : 4407 - 4412
  • [8] Event-triggering adaptive neural network output feedback control for networked systems under false data injection attacks
    Zhao, Dongke
    Shi, Michael
    Zhang, Huiyan
    Liu, Yongchao
    Zhao, Ning
    CHAOS SOLITONS & FRACTALS, 2024, 180
  • [9] False Data Injection Attacks Against Partial Sensor Measurements of Networked Control Systems
    Pang, Zhong-Hua
    Fan, Lan-Zhi
    Dong, Zhe
    Han, Qing-Long
    Liu, Guo-Ping
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2022, 69 (01) : 149 - 153
  • [10] Design of False Data Injection Attacks for Output Tracking Control of CARMA Systems
    Pang, Zhonghua
    Hou, Fangyuan
    Zhou, Yuguo
    Sun, Dehui
    2015 IEEE INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION, 2015, : 1273 - 1277