A novel approach to H8 performance analysis of discrete-time networked systems subject to network-induced delays and malicious packet dropouts

被引:143
作者
Zhang, Xian-Ming [1 ]
Han, Qing-Long [1 ]
Ge, Xiaohua [1 ]
机构
[1] Swinburne Univ Technol, Sch Sci Comp & Engn Technol, Melbourne, Vic 3122, Australia
关键词
Networked systems; Network-induced delays; Malicious packet dropouts; Lyapunov functional; H-infinity performance; STABILIZATION;
D O I
10.1016/j.automatica.2021.110010
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper is concerned with the H-infinity performance of discrete-time networked systems subject to network-induced delays and malicious packet dropouts. First, the introduction of a data packet processor enables us to calculate both network-induced delays and the number of consecutive malicious packet dropouts explicitly. Second, a novel Lyapunov functional is constructed, whose forward difference along with the trajectory of the closed-loop system is estimated as a quartic polynomial. A class of necessary and sufficient conditions on such an inequality are established by using the Finsler lemma. By employing the Lyapunov method, a bounded real condition is formulated, which depends on the upper bound of network-induced delays and the maximum number of consecutive malicious packet dropouts. Therefore, their effects on H-infinity performance can be investigated simultaneously. Finally, the effectiveness of the proposed method is shown through an inverted pendulum system. (c) 2021 Elsevier Ltd. All rights reserved.
引用
收藏
页数:6
相关论文
共 19 条
[1]  
Cannon R. H., 1967, DYNAMICS PHYS SYSTEM
[2]   Networked Control Under Random and Malicious Packet Losses [J].
Cetinkaya, Ahmet ;
Ishii, Hideaki ;
Hayakawa, Tomohisa .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2017, 62 (05) :2434-2449
[3]  
de Oliveira MC, 2001, LECT NOTES CONTR INF, V268, P241
[4]  
Furuta K., 1990, Proceedings of the 1990 American Control Conference (IEEE Cat. No.90CH2896-9), P3067
[5]   A new delay system approach to network-based control [J].
Gao, Huijun ;
Chen, Tongwen ;
Lam, James .
AUTOMATICA, 2008, 44 (01) :39-52
[6]   Resilient H∞ Filtering for Event-Triggered Networked Systems Under Nonperiodic DoS Jamming Attacks [J].
Hu, Songlin ;
Yue, Dong ;
Chen, Xiaoli ;
Cheng, Zihao ;
Xie, Xiangpeng .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2021, 51 (03) :1392-1403
[7]   Resilient Event-Triggered Controller Synthesis of Networked Control Systems Under Periodic DoS Jamming Attacks [J].
Hu, Songlin ;
Yue, Dong ;
Xie, Xiangpeng ;
Chen, Xiaoli ;
Yin, Xiuxia .
IEEE TRANSACTIONS ON CYBERNETICS, 2019, 49 (12) :4271-4281
[8]   Polynomials-based summation inequalities and their applications to discrete-time systems with time-varying delays [J].
Lee, Seok Young ;
Lee, Won Il ;
Park, PooGyeon .
INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2017, 27 (17) :3604-3619
[9]   Input-to-State Stabilizing Control for Cyber-Physical Systems With Multiple Transmission Channels Under Denial of Service [J].
Lu, An-Yang ;
Yang, Guang-Hong .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2018, 63 (06) :1813-1820
[10]   Switching-Like Event-Triggered Control for Networked Control Systems Under Malicious Denial of Service Attacks [J].
Peng, Chen ;
Sun, Hongtao .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2020, 65 (09) :3943-3949