Security control of cyber-physical switched systems under Round-Robin protocol: Input-to-state stability in probability

被引:54
作者
Zhao, Haijuan [1 ]
Niu, Yugang [1 ]
Jia, Tinggang [2 ]
机构
[1] East China Univ Sci & Technol, Minist Educ, Key Lab Adv Control & Optimizat Chem Proc, Shanghai 200237, Peoples R China
[2] Shanghai Elect Automat Grp, Shanghai 200070, Peoples R China
关键词
Cyber-physical systems; Deception attacks; Round-Robin protocol; Sliding mode control; EVENT-TRIGGERED CONSENSUS; NETWORKED CONTROL-SYSTEMS; SLIDING MODE CONTROL; TRY-ONCE-DISCARD; MULTIAGENT SYSTEMS; TIME; ATTACKS; DESIGN;
D O I
10.1016/j.ins.2019.08.056
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This work addresses the sliding mode control (SMC) problem for a class of cyber-physical switched systems, in which both the Round-Robin (RR) protocol scheduling and the deception attacks may happen on the controller-to-actuator (C/A) channels. Under the regulation of RR protocol, only one controller node at each instant can access the network and transmit its signal to the corresponding actuator node, that is, the other actuators cannot obtain any new control information. Especially, the transmitted signal could be contaminated by randomly injecting false data. Thus, a key problem is how to design a suitable sliding surface and a desirable sliding mode controller for guaranteeing the dynamic performance of the closed-loop switched systems. To this end, a compensation strategy is proposed for those actuator nodes that don't receive any new control signals at certain instant, based which a token-dependent SMC law is designed. Besides, the method of input-to-state stability in probability (ISSiP) is introduced and the sufficient conditions are established for the reachability of the specified sliding surface and the ISSiP of the resultant switched systems. Finally, some numerical simulation results are provided. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页码:121 / 134
页数:14
相关论文
共 30 条
[1]   Delay-independent dual-rate PID controller for a packet-based networked control system [J].
Alcaina, J. ;
Cuenca, A. ;
Salt, J. T. ;
Casanova, V. ;
Piza, R. .
INFORMATION SCIENCES, 2019, 484 :27-43
[2]   Passive inference of attacks on CPS communication protocols [J].
Bou-Harb, Elias ;
Ghani, Nasir ;
Erradi, Abdelkarim ;
Shaban, Khaled .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 43 :110-122
[3]  
Cardenas A., 2009, POWER ENERGY ENG C, P1
[4]   Realization of Try-Once-Discard in Wireless Multihop Networks [J].
Christmann, Dennis ;
Gotzhein, Reinhard ;
Siegmund, Stefan ;
Wirth, Fabian .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2014, 10 (01) :17-26
[5]   A survey on security control and attack detection for industrial cyber-physical systems [J].
Ding, Derui ;
Han, Qing-Long ;
Xiang, Yang ;
Ge, Xiaohua ;
Zhang, Xian-Ming .
NEUROCOMPUTING, 2018, 275 :1674-1683
[6]   Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks [J].
Ding, Derui ;
Wang, Zidong ;
Ho, Daniel W. C. ;
Wei, Guoliang .
AUTOMATICA, 2017, 78 :231-240
[7]   Event-triggered consensus control for discrete-time stochastic multi-agent systems: The input-to-state stability in probability [J].
Ding, Derui ;
Wang, Zidong ;
Shen, Bo ;
Wei, Guoliang .
AUTOMATICA, 2015, 62 :284-291
[8]   Stability analysis of token-based wireless networked control systems under deception attacks [J].
Du, Dajun ;
Zhang, Changda ;
Wang, Haikuan ;
Li, Xue ;
Hu, Huosheng ;
Yang, Taicheng .
INFORMATION SCIENCES, 2018, 459 :168-182
[9]   Robust Sliding Mode Control for Discrete Stochastic Systems With Mixed Time Delays, Randomly Occurring Uncertainties, and Randomly Occurring Nonlinearities [J].
Hu, Jun ;
Wang, Zidong ;
Gao, Huijun ;
Stergioulas, Lampros K. .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2012, 59 (07) :3008-3015
[10]   State estimation under false data injection attacks: Security analysis and system protection [J].
Hu, Liang ;
Wang, Zidong ;
Han, Qing-Long ;
Liu, Xiaohui .
AUTOMATICA, 2018, 87 :176-183