Secure tracking control against sensor and actuator attacks: A robust model-reference adaptive control method

被引:5
作者
Huang, Xin [1 ,2 ,3 ,4 ]
Dong, Jiuxiang [1 ,2 ,3 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Liaoning, Peoples R China
[2] Northeastern Univ, State Key Lab Synthet Automation Proc Ind, Shenyang 110819, Liaoning, Peoples R China
[3] Northeastern Univ, Key Lab Vibrat & Control Aeroprop Syst, Minist Educ, Shenyang 110819, Liaoning, Peoples R China
[4] Northeast Elect Power Univ, Sch Automation Enginerring, Jilin 132012, Jilin, Peoples R China
基金
中国国家自然科学基金;
关键词
Cyber-physical systems; Secure tracking control; Sensor and actuator attacks; NONLINEAR MULTIAGENT SYSTEMS; LEADERLESS CONSENSUS CONTROL; CYBER-PHYSICAL SYSTEMS; DESIGN;
D O I
10.1016/j.ins.2022.05.014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper is concerned with secure tracking control problems for cyber-physical systems subjected to a class of sensor and actuator attacks via the model-reference control techniques. The considered attack signals are the unknown bounded signals generated from any linear or nonlinear finite-L-2-gain exogenous dynamical system. The auxiliary outputs produced from a high-gain approximate differentiator are first used in co-design for the inputs of the systems and introduced filter, so that the matching condition on the system input and output matrices in the existing results is relaxed. Furthermore, with the aid of the auxiliary outputs, attack's property and small-gain control methods, a novel model-reference controller with a robust adaptive attack compensator is proposed, such that (a) the tracking error converges to a small set around zero where the set bound can be adjusted by the design parameters, and (b) the desired disturbance attenuation performance is obtained. Different from the existing results, the developed one not only compensates the effect of the attacks automatically by online adjusting the adaptive parameter, but also improves the robustness against the attacks efficiently. Finally, the developed method is validated by a simulation example. (C) 2022 Published by Elsevier Inc.
引用
收藏
页码:11 / 27
页数:17
相关论文
共 48 条
  • [1] Crosby GV, 2006, DSSNS 2006: SECOND IEEE WORKSHOP ON DEPENDABILITY AND SECURITY IN SENSOR NETWORKS AND SYSTEMS, P13
  • [2] Cooperative Fault-Tolerant Output Regulation for Multiagent Systems by Distributed Learning Control Approach
    Deng, Chao
    Che, Wei-Wei
    Shi, Peng
    [J]. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2020, 31 (11) : 4831 - 4841
  • [3] Security Control for Discrete-Time Stochastic Nonlinear Systems Subject to Deception Attacks
    Ding, Derui
    Wang, Zidong
    Han, Qing-Long
    Wei, Guoliang
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2018, 48 (05): : 779 - 789
  • [4] Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks
    Fawzi, Hamza
    Tabuada, Paulo
    Diggavi, Suhas
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2014, 59 (06) : 1454 - 1467
  • [5] Leaderless consensus control of uncertain multi-agents systems with sensor and actuator attacks
    Gao, Rui
    Huang, Jiangshuai
    Wang, Lei
    [J]. INFORMATION SCIENCES, 2019, 505 : 144 - 156
  • [6] Ghosh T, 2004, CONF LOCAL COMPUT NE, P224
  • [7] Adaptive Output Feedback Based on Closed-Loop Reference Models
    Gibson, Travis E.
    Qu, Zheng
    Annaswamy, Anuradha M.
    Lavretsky, Eugene
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2015, 60 (10) : 2728 - 2733
  • [8] Computing actuator bandwidth limits for model reference adaptive control
    Gruenwald, Benjamin C.
    Wagner, Daniel
    Yucelen, Tansel
    Muse, Jonathan A.
    [J]. INTERNATIONAL JOURNAL OF CONTROL, 2016, 89 (12) : 2434 - 2452
  • [9] Competitive Interaction Design of Cooperative Systems Against Attacks
    Gusrialdi, Azwirman
    Qu, Zhihua
    Simaan, Marwan A.
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2018, 63 (09) : 3159 - 3166
  • [10] Secure impulsive synchronization control of multi-agent systems under deception attacks
    He, Wangli
    Gao, Xiaoyang
    Zhong, Weimin
    Qian, Feng
    [J]. INFORMATION SCIENCES, 2018, 459 : 354 - 368