Hybrid-triggered interval type-2 fuzzy control for networked systems under attacks

被引:63
作者
Lian, Zhi [1 ]
Shi, Peng [1 ]
Lim, Cheng-Chew [1 ]
机构
[1] Univ Adelaide, Sch Elect & Elect Engn, Adelaide, SA 5005, Australia
基金
澳大利亚研究理事会;
关键词
Networked control systems; Cyber attacks; Hybrid-triggered control; Interval type-2 fuzzy control;
D O I
10.1016/j.ins.2021.03.050
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, the security control problem is considered for nonlinear networked control systems under cyber attacks. The nonlinearities are described by interval type-2 fuzzy models. To enhance bandwidth utilization and improve network control performance, a hybrid-triggered scheme is proposed. The networked control systems contain parametric uncertainties and time delays and are subject to external disturbances and cyber attacks. A hybrid-triggered-based control method is established to ensure the robust stability and a prescribed performance of the resulting closed-loop systems against attacks. Numerical simulation and a practical example of the bolt-tightening tool are provided to illustrate the effectiveness of the new control design method. (c) 2021 Elsevier Inc. All rights reserved.
引用
收藏
页码:332 / 347
页数:16
相关论文
共 33 条
[21]   Design of networked polynomial control systems with random delays: sum of squares approach [J].
Rakhshan, Mohsen ;
Vafamand, Navid ;
Shasadeghi, Mokhtar ;
Dabbaghjamanesh, Morteza ;
Moeini, Amirhossein .
INTERNATIONAL JOURNAL OF AUTOMATION AND CONTROL, 2016, 10 (01) :73-86
[22]   Wirtinger-based integral inequality: Application to time-delay systems [J].
Seuret, A. ;
Gouaisbaut, F. .
AUTOMATICA, 2013, 49 (09) :2860-2866
[23]   Attack and estimator design for multi-sensor systems with undetectable adversary [J].
Song, Haiyu ;
Shi, Peng ;
Lim, Cheng-Chew ;
Zhang, Wen-An ;
Yu, Li .
AUTOMATICA, 2019, 109
[24]   Supervisor synthesis to thwart cyber attack with bounded sensor reading alterations [J].
Su, Rong .
AUTOMATICA, 2018, 94 :35-44
[25]   ANALYST INTUITION INSPIRED NEURAL NETWORK BASED CYBER SECURITY ANOMALY DETECTION [J].
Teoh, Teik-Toe ;
Nguwi, Yok-Yen ;
Elovici, Yuval ;
Ng, Wai-Loong ;
Thiang, Soon-Yao .
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2018, 14 (01) :379-386
[26]   Memory-Based Event-Triggering H∞ Load Frequency Control for Power Systems Under Deception Attacks [J].
Tian, Engang ;
Peng, Chen .
IEEE TRANSACTIONS ON CYBERNETICS, 2020, 50 (11) :4610-4618
[27]  
Wibisono W., 2020, INT J INNOVATIVE COM, V16, P701
[28]   Analysis and Design of Interval Type-2 Polynomial-Fuzzy-Model-Based Networked Tracking Control Systems [J].
Xiao, Bo ;
Lam, Hak-Keung ;
Zhou, Hongying ;
Gao, Jianli .
IEEE TRANSACTIONS ON FUZZY SYSTEMS, 2021, 29 (09) :2750-2759
[29]   H∞ Refined Antidisturbance Control of Switched LPV Systems With Application to Aero-Engine [J].
Yang, Dong ;
Zong, Guangdeng ;
Karimi, Hamid Reza .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2020, 67 (04) :3180-3190
[30]   Anomaly Detection Based on Zone Partition for Security Protection of Industrial Cyber-Physical Systems [J].
Yang, Jun ;
Zhou, Chunjie ;
Yang, Shuanghua ;
Xu, Haizhou ;
Hu, Bowen .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2018, 65 (05) :4257-4267