{"title":"Co-Design of a Switching-Type Control Scheme for Nonlinear Networked Systems With Protocol-Based Communication and Its Application to Circuits","authors":"Yu Shan;Xiang-Peng Xie;Zehui Mao","doi":"10.1109/TASE.2024.3431235","DOIUrl":null,"url":null,"abstract":"This article investigates the resilient security control problem of nonlinear network systems under randomly activated deception attacks and a two-phase data transfer mechanism (TP-DTM). Initially, in order to solve the problem of high conservatism caused by the one-order free-weighting matrix (OFM) method in previous research results, this study introduces a high-order multi-mode switching free-weighting matrix (HMSFM) mechanism to establish free-weighting matrix groups under various switching modes, At the same time, sometime-varying balance matrices (TVBMs) are proposed to cooperate with HMSFM to collect proprietary features about each switching mode. Furthermore, in the context of the system subjected to deception attacks, a TP-DTM employing adaptive event-triggered mechanism (AETM) and round robin (RR) protocol is proposed to alleviate the impact of limited communication resources. Then, considering the above factors, the asymptotic stability of the augmented fuzzy system can be guaranteed under the given sufficient criteria. Consequently, a numerical example and a tunnel diode circuit example are executed to verify the advancement of the developed results. Note to Practitioners—The motivation of this paper comes from the problem that nonlinear networked control systems are vulnerable to malicious network attacks in the actual environment. In particular, malicious attacks will bring security risks such as data tampering and functional damage to the actual communication circuit system, and many state variables cannot be directly monitored due to objective conditions or financial constraints. Based on this, this paper proposes a HMSFM-based co-design mechanism for nonlinear NCSs under malicious attacks. The improved co-design scheme can deal with some difficult-to-measure state variables through observer-assisted tracking control. The main difficulty of this paper is how to reduce the conservatism of resilient control design. The improved co-design scheme can be adjusted according to the dynamic characteristics of the system by combining with TVBMs, making the constraints more relaxed and the state estimation more accurate.","PeriodicalId":51060,"journal":{"name":"IEEE Transactions on Automation Science and Engineering","volume":"22 ","pages":"5828-5840"},"PeriodicalIF":6.4000,"publicationDate":"2024-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Automation Science and Engineering","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10609346/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
This article investigates the resilient security control problem of nonlinear network systems under randomly activated deception attacks and a two-phase data transfer mechanism (TP-DTM). Initially, in order to solve the problem of high conservatism caused by the one-order free-weighting matrix (OFM) method in previous research results, this study introduces a high-order multi-mode switching free-weighting matrix (HMSFM) mechanism to establish free-weighting matrix groups under various switching modes, At the same time, sometime-varying balance matrices (TVBMs) are proposed to cooperate with HMSFM to collect proprietary features about each switching mode. Furthermore, in the context of the system subjected to deception attacks, a TP-DTM employing adaptive event-triggered mechanism (AETM) and round robin (RR) protocol is proposed to alleviate the impact of limited communication resources. Then, considering the above factors, the asymptotic stability of the augmented fuzzy system can be guaranteed under the given sufficient criteria. Consequently, a numerical example and a tunnel diode circuit example are executed to verify the advancement of the developed results. Note to Practitioners—The motivation of this paper comes from the problem that nonlinear networked control systems are vulnerable to malicious network attacks in the actual environment. In particular, malicious attacks will bring security risks such as data tampering and functional damage to the actual communication circuit system, and many state variables cannot be directly monitored due to objective conditions or financial constraints. Based on this, this paper proposes a HMSFM-based co-design mechanism for nonlinear NCSs under malicious attacks. The improved co-design scheme can deal with some difficult-to-measure state variables through observer-assisted tracking control. The main difficulty of this paper is how to reduce the conservatism of resilient control design. The improved co-design scheme can be adjusted according to the dynamic characteristics of the system by combining with TVBMs, making the constraints more relaxed and the state estimation more accurate.
期刊介绍:
The IEEE Transactions on Automation Science and Engineering (T-ASE) publishes fundamental papers on Automation, emphasizing scientific results that advance efficiency, quality, productivity, and reliability. T-ASE encourages interdisciplinary approaches from computer science, control systems, electrical engineering, mathematics, mechanical engineering, operations research, and other fields. T-ASE welcomes results relevant to industries such as agriculture, biotechnology, healthcare, home automation, maintenance, manufacturing, pharmaceuticals, retail, security, service, supply chains, and transportation. T-ASE addresses a research community willing to integrate knowledge across disciplines and industries. For this purpose, each paper includes a Note to Practitioners that summarizes how its results can be applied or how they might be extended to apply in practice.