Event-Based Finite-Time $$H_\infty $$ Security Control for Networked Control Systems with Deception Attacks

IF 3.6 3区 计算机科学 Q2 AUTOMATION & CONTROL SYSTEMS International Journal of Fuzzy Systems Pub Date : 2024-09-19 DOI:10.1007/s40815-024-01810-3
Sitong Shang, Linchuang Zhang, Yingnan Pan
{"title":"Event-Based Finite-Time $$H_\\infty $$ Security Control for Networked Control Systems with Deception Attacks","authors":"Sitong Shang, Linchuang Zhang, Yingnan Pan","doi":"10.1007/s40815-024-01810-3","DOIUrl":null,"url":null,"abstract":"<p>This paper studies the finite-time <span>\\(H_\\infty \\)</span> security control problem based on a dynamic adaptive event-triggered mechanism (DAETM) for interval type-2 fuzzy networked control systems (NCSs) under deception attacks. Firstly, a DAETM is proposed to conserve network resources of NCSs. In contrast to existing DAETMs, the threshold of the proposed DAETM is determined founded on the average of the triggering error. This approach provides greater adaptability and flexibility in maintaining system control performance and conserving network communication bandwidth burden. Then, the closed-loop system is finite-time bounded and fulfills the desired <span>\\(H_\\infty \\)</span> performance through constructing an appropriate Lyapunov function. Furthermore, the sufficient conditions for the existence of the finite-time <span>\\( H_\\infty \\)</span> fuzzy controller are proved. Finally, a simulation example is provided to demonstrate the effectiveness of the proposed design approach.</p>","PeriodicalId":14056,"journal":{"name":"International Journal of Fuzzy Systems","volume":null,"pages":null},"PeriodicalIF":3.6000,"publicationDate":"2024-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Fuzzy Systems","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s40815-024-01810-3","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

This paper studies the finite-time \(H_\infty \) security control problem based on a dynamic adaptive event-triggered mechanism (DAETM) for interval type-2 fuzzy networked control systems (NCSs) under deception attacks. Firstly, a DAETM is proposed to conserve network resources of NCSs. In contrast to existing DAETMs, the threshold of the proposed DAETM is determined founded on the average of the triggering error. This approach provides greater adaptability and flexibility in maintaining system control performance and conserving network communication bandwidth burden. Then, the closed-loop system is finite-time bounded and fulfills the desired \(H_\infty \) performance through constructing an appropriate Lyapunov function. Furthermore, the sufficient conditions for the existence of the finite-time \( H_\infty \) fuzzy controller are proved. Finally, a simulation example is provided to demonstrate the effectiveness of the proposed design approach.

Abstract Image

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于事件的有限时间 $$H_\infty $$ 网络控制系统安全控制与欺骗攻击
本文研究了欺骗攻击下基于动态自适应事件触发机制(DAETM)的区间型-2模糊网络控制系统(NCS)的有限时间(H_\infty \)安全控制问题。首先,提出了一种 DAETM 来保护 NCS 的网络资源。与现有的 DAETM 相比,拟议 DAETM 的阈值是根据触发误差的平均值确定的。这种方法在保持系统控制性能和节省网络通信带宽负担方面具有更大的适应性和灵活性。然后,通过构建适当的 Lyapunov 函数,闭环系统是有限时间有界的,并满足所需的\(H_\infty \)性能。此外,还证明了有限时间模糊控制器存在的充分条件。最后,提供了一个仿真实例来证明所提出的设计方法的有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
International Journal of Fuzzy Systems
International Journal of Fuzzy Systems 工程技术-计算机:人工智能
CiteScore
7.80
自引率
9.30%
发文量
188
审稿时长
16 months
期刊介绍: The International Journal of Fuzzy Systems (IJFS) is an official journal of Taiwan Fuzzy Systems Association (TFSA) and is published semi-quarterly. IJFS will consider high quality papers that deal with the theory, design, and application of fuzzy systems, soft computing systems, grey systems, and extension theory systems ranging from hardware to software. Survey and expository submissions are also welcome.
期刊最新文献
Event-Based Finite-Time $$H_\infty $$ Security Control for Networked Control Systems with Deception Attacks A Distance-Based Approach to Fuzzy Cognitive Maps Using Pythagorean Fuzzy Sets Relaxed Stability and Non-weighted $$L_2$$ -Gain Analysis for Asynchronously Switched Polynomial Fuzzy Systems Nonsingular Fast Terminal Sliding Mode Control of Uncertain Robotic Manipulator System Based on Adaptive Fuzzy Wavelet Neural Network Efficient and Effective Anomaly Detection in Autonomous Vehicles: A Combination of Gradient Boosting and ANFIS Algorithms
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1