Memory-Based Continuous Event-Triggered Control for Networked T-S Fuzzy Systems Against Cyberattacks

被引:106
作者
Gu, Zhou [1 ,2 ]
Shi, Peng [2 ]
Yue, Dong [3 ]
Yan, Shen [1 ]
Xie, Xiangpeng [3 ]
机构
[1] Nanjing Forestry Univ, Coll Mech & Elect Engn, Nanjing 210037, Peoples R China
[2] Univ Adelaide, Sch Elect & Elect Engn, Adelaide, SA 5005, Australia
[3] Nanjing Univ Posts & Telecommun, Inst Adv Technol, Nanjing 210023, Peoples R China
基金
中国国家自然科学基金;
关键词
Fuzzy systems; Symmetric matrices; Linear systems; Uncertainty; Bandwidth; Switches; Deception attacks; memory-based event-triggered mechanism; networked Takagi-Sugeno (T-S) fuzzy systems; DELAY; DESIGN;
D O I
10.1109/TFUZZ.2020.3012771
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This article investigates the problem of resilient control for the Takagi-Sugeno (T-S) fuzzy systems against bounded cyberattack. A novel memory-based event triggering mechanism (ETM) is developed, by which the past information of the physical process through the window function is utilized. Using such an ETM cannot only lead to a lower data-releasing rate but also reduce the occurrence of wrong triggering event. Furthermore, the frequency of event generation is relatively smoother than existing ETMs. From the current releasing instant to the next, two periods are designed. The ETM works only when the first period ends, thereby avoiding the Zeno behavior that commonly exists in continuous ETM designs. The control system is then formulated as a switched fuzzy control system with two modes in each releasing period. Based on an assumption of secure control, and the proposed ETM, sufficient conditions are obtained to guarantee the exponential stability of networked T-S fuzzy systems in the presence of deception attacks in secure sense. Finally, a single-link rigid robot is taken as an example to illustrate the advantages of theoretical results.
引用
收藏
页码:3118 / 3129
页数:12
相关论文
共 35 条
  • [11] Heemels WPMH, 2012, IEEE DECIS CONTR P, P3270, DOI 10.1109/CDC.2012.6425820
  • [12] Stability analysis of interval type-2 fuzzy-model-based control systems
    Lam, H. K.
    Seneviratne, Lakmal D.
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 2008, 38 (03): : 617 - 628
  • [13] Lee EA, 2008, ISORC 2008: 11TH IEEE SYMPOSIUM ON OBJECT/COMPONENT/SERVICE-ORIENTED REAL-TIME DISTRIBUTED COMPUTING - PROCEEDINGS, P363, DOI 10.1109/ISORC.2008.25
  • [14] Reliable Fuzzy Control for Active Suspension Systems With Actuator Delay and Fault
    Li, Hongyi
    Liu, Honghai
    Gao, Huijun
    Shi, Peng
    [J]. IEEE TRANSACTIONS ON FUZZY SYSTEMS, 2012, 20 (02) : 342 - 357
  • [15] Event-Based Secure Leader-Following Consensus Control for Multiagent Systems With Multiple Cyber Attacks
    Liu, Jinliang
    Yin, Tingting
    Yue, Dong
    Karimi, Hamid Reza
    Cao, Jinde
    [J]. IEEE TRANSACTIONS ON CYBERNETICS, 2021, 51 (01) : 162 - 173
  • [16] Event-based control for networked T-S fuzzy cascade control systems with quantization and cyber attacks
    Liu, Jinliang
    Wang, Yuda
    Zha, Lijuan
    Yan, Huaicheng
    [J]. JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2019, 356 (16): : 9451 - 9473
  • [17] Stabilization of Networked Control Systems With Hybrid-Driven Mechanism and Probabilistic Cyber Attacks
    Liu, Jinliang
    Wu, Zheng-Guang
    Yue, Dong
    Park, Ju H.
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2021, 51 (02): : 943 - 953
  • [18] Secure Control Against Replay Attacks
    Mo, Yilin
    Sinopoli, Bruno
    [J]. 2009 47TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1 AND 2, 2009, : 911 - 918
  • [19] Mousavi SH, 2014, IEEE DECIS CONTR P, P1239, DOI 10.1109/CDC.2014.7039551
  • [20] Event-Triggered Predictive Control for Networked Nonlinear Systems With Imperfect Premise Matching
    Peng, Chen
    Wu, Min
    Xie, Xiangpeng
    Wang, Yu-Long
    [J]. IEEE TRANSACTIONS ON FUZZY SYSTEMS, 2018, 26 (05) : 2797 - 2806