Interval Functional Observers Design for Time-Delay Systems Under Stealthy Attacks

被引:22
作者
Huong, Dinh Cong [1 ]
Huynh, Van T. [2 ]
Trinh, Hieu [2 ]
机构
[1] Quy Nhon Univ, Dept Math & Stat, Binh Dinh 55000, Vietnam
[2] Deakin Univ, Sch Engn, Geelong, Vic 3217, Australia
关键词
Observers; Cyber-physical systems; Sensor systems; Security; Delay effects; Linear programming; Interval functional observers; time-delay systems; stealthy attacks; cyber-physical systems; CYBER-PHYSICAL SYSTEMS; SECURITY;
D O I
10.1109/TCSI.2020.3001402
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This study considers stealthy attacks in the design of interval functional observers for time-delay systems. We are interested in the case where a malicious agent compromises the sensors of the systems. We first design reduced-order observers to estimate bounds of the attack signals. Then by using the information on the bounds of the attack signals, we design novel interval functional observers for the systems. We derive conditions for the existence of the interval observers and formulate them in terms of linear programmings which are very efficient computational techniques. Two illustrative examples with extensive simulations are given to show correctness and effectiveness of the proposed method.
引用
收藏
页码:5101 / 5112
页数:12
相关论文
共 44 条
[31]   A Lyapunov-Krasovskii methodology for ISS and iISS of time-delay systems [J].
Pepe, P. ;
Jiang, Z. -P. .
SYSTEMS & CONTROL LETTERS, 2006, 55 (12) :1006-1014
[32]   On exponential stability of nonlinear differential systems with time-varying delay [J].
Pham Huu Anh Ngoc .
APPLIED MATHEMATICS LETTERS, 2012, 25 (09) :1208-1213
[33]   Climate change, 2007 [J].
Saier, M. H., Jr. .
WATER AIR AND SOIL POLLUTION, 2007, 181 (1-4) :1-2
[34]  
Sandberg H., 2010, 1 WORKSH SEC CONTR S
[35]   CYBERPHYSICAL SECURITY IN NETWORKED CONTROL SYSTEMS AN INTRODUCTION TO THE ISSUE [J].
Sandberg, Henrik ;
Amin, Saurabh ;
Johansson, Karl Henrik .
IEEE CONTROL SYSTEMS MAGAZINE, 2015, 35 (01) :20-23
[36]   Lessons learned from the Maroochy Water breach [J].
Slay, Jill ;
Miller, Michael .
CRITICAL INFRASTRUCTURE PROTE CTION, 2008, 253 :73-+
[37]   Cyber security of a power grid: State-of-the-art [J].
Sun, Chih-Che ;
Hahn, Adam ;
Liu, Chen-Ching .
INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2018, 99 :45-56
[38]   A secure control framework for resource-limited adversaries [J].
Teixeira, Andre ;
Shames, Iman ;
Sandberg, Henrik ;
Johansson, Karl Henrik .
AUTOMATICA, 2015, 51 :135-148
[39]   SECURE CONTROL SYSTEMS A QUANTITATIVE RISK MANAGEMENT APPROACH [J].
Teixeira, Andre ;
Sou, Kin Cheong ;
Sandberg, Henrik ;
Johansson, Karl Henrik .
IEEE CONTROL SYSTEMS MAGAZINE, 2015, 35 (01) :24-45
[40]   Design of Reduced-Order Positive Linear Functional Observers for Positive Time-Delay Systems [J].
Trinh, H. ;
Huong, D. C. ;
Hien, L. V. ;
Nahavandi, S. .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2017, 64 (05) :555-559