Observer-Based PID Security Control for Discrete Time-Delay Systems Under Cyber-Attacks

被引:80
作者
Zhao, Di [1 ]
Wang, Zidong [2 ]
Ho, Daniel W. C. [3 ]
Wei, Guoliang [4 ]
机构
[1] Univ Shanghai Sci & Technol, Dept Control Sci & Engn, Shanghai Key Lab Modern Opt Syst, Shanghai 200093, Peoples R China
[2] Brunel Univ London, Dept Comp Sci, Uxbridge UB8 3PH, Middx, England
[3] City Univ Hong Kong, Dept Math, Hong Kong, Peoples R China
[4] Univ Shanghai Sci & Technol, Coll Sci, Shanghai 200093, Peoples R China
来源
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS | 2021年 / 51卷 / 06期
基金
中国国家自然科学基金;
关键词
Security; PD control; PI control; Delays; Observers; Upper bound; Tuning; Deception attacks; denial-of-service (DoS) attacks; exponentially mean-square input-to-state stability (ISS); observer-based proportional-integral-derivative (PID) control; security control; TO-STATE STABILITY; NETWORKED CONTROL-SYSTEMS; STOCHASTIC-SYSTEMS; DESIGN; GAIN;
D O I
10.1109/TSMC.2019.2952539
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article deals with the observer-based proportional-integral-derivative (PID) security control problem for a kind of linear discrete time-delay systems subject to cyber-attacks. The cyber-attacks, which include both denial-of-service and deception attacks, are allowed to be randomly occurring as regulated by two sequences of Bernoulli distributed random variables with certain probabilities. A novel observer-based PID controller is proposed such that the closed-loop system achieves the desired security level and the quadratic cost criterion (QCC) has an upper bound. Sufficient conditions are derived under which the exponentially mean-square input-to-state stability is guaranteed and the desired security level is then achieved. Subsequently, an upper bound of the QCC is obtained and the explicit expression of the desired PID controller is also parameterized. Finally, the validity of the developed design approach is verified via an illustrative example.
引用
收藏
页码:3926 / 3938
页数:13
相关论文
共 50 条
[1]   PID control system analysis, design, and technology [J].
Ang, KH ;
Chong, G ;
Li, Y .
IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2005, 13 (04) :559-576
[2]   Fuzzy PID controller: Design, performance evaluation, and stability analysis [J].
Carvajal, J ;
Chen, GR ;
Ogmen, H .
INFORMATION SCIENCES, 2000, 123 (3-4) :249-270
[3]   An Advanced Cyber Physical Framework for Micro Devices Assembly [J].
Cecil, J. ;
Albuhamood, Sadiq ;
Cecil-Xavier, Aaron ;
Ramanathan, P. .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2019, 49 (01) :92-106
[4]   Networked Control Under Random and Malicious Packet Losses [J].
Cetinkaya, Ahmet ;
Ishii, Hideaki ;
Hayakawa, Tomohisa .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2017, 62 (05) :2434-2449
[5]   Adaptive robust PID controller design based on a sliding mode for uncertain chaotic systems [J].
Chang, WD ;
Yan, JJ .
CHAOS SOLITONS & FRACTALS, 2005, 26 (01) :167-175
[6]   Asynchronous observer-based H∞ control for switched stochastic systems with mixed delays under quantization and packet dropouts [J].
Chen, Yonggang ;
Wang, Zidong ;
Qian, Wei ;
Alsaadi, Fuad E. .
NONLINEAR ANALYSIS-HYBRID SYSTEMS, 2018, 27 :225-238
[7]   Distributed H∞ Filtering for Switched Stochastic Delayed Systems Over Sensor Networks With Fading Measurements [J].
Chen, Yun ;
Wang, Zidong ;
Yuan, Yuan ;
Date, Paresh .
IEEE TRANSACTIONS ON CYBERNETICS, 2020, 50 (01) :2-14
[8]   PID-Like Neural Network Nonlinear Adaptive Control for Uncertain Multivariable Motion Control Systems [J].
Cong, S. ;
Liang, Y. .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2009, 56 (10) :3872-3879
[9]  
Datta A., 2000, ADV IND CON
[10]   Security Control for Discrete-Time Stochastic Nonlinear Systems Subject to Deception Attacks [J].
Ding, Derui ;
Wang, Zidong ;
Han, Qing-Long ;
Wei, Guoliang .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2018, 48 (05) :779-789