×

Event-triggered output-based control of T-S fuzzy systems under quantisation, actuator saturation and cyber attacks. (English) Zbl 1498.93452

In this paper, the authors investigated the event-triggered output-based security control associated with T-S fuzzy system under quantisation, actuator saturation, and stochastic deception attacks. Also, several illustrative application are included in the paper in order to support the theoretical developments.

MSC:

93C65 Discrete event control/observation systems
93C42 Fuzzy control/observation systems
93B70 Networked control
93B52 Feedback control
93D20 Asymptotic stability in control theory
Full Text: DOI

References:

[1] Ding, D.; Han, Q. L.; Wang, Z.; Ge, X., A survey on model-based distributed control and filtering for industrial cyber-physical systems, IEEE Transactions on Industrial Informatics, 15, 5, 2483-2499 (2019) · doi:10.1109/TII.9424
[2] Elia, N.; Mitter, S., Stabilization of linear systems with limited information, IEEE Transactions on Automatic Control, 46, 9, 1384-1400 (2001) · Zbl 1059.93521 · doi:10.1109/9.948466
[3] Fu, J.; Wang, J., Adaptive coordinated tracking of multi-agent systems with quantized information, Systems and Control Letters, 74, 115-125 (2014) · Zbl 1300.93098 · doi:10.1016/j.sysconle.2014.08.009
[4] Gao, L.; Li, F.; Fu, J., Output-based event-triggered resilient control of uncertain NCSs under DoS attacks and quantisation, International Journal of Systems Science, 51, 14, 2582-2596 (2020) · Zbl 1483.93384 · doi:10.1080/00207721.2020.1797923
[5] Hu, S.; Yuan, P.; Yue, D.; Dou, C.; Cheng, Z.; Zhang, Y., Attack-resilient event-triggered controller design of DC microgrids under DoS attacks, IEEE Transactions on Circuits and Systems I: Regular Papers, 67, 2, 699-710 (2020) · Zbl 1469.94243 · doi:10.1109/TCSI.8919
[6] Hu, S.; Yue, D.; Chen, X.; Cheng, Z.; Xie, X., Resilient \(####\) filtering for event-triggered networked systems under nonperiodic DoS jamming attacks resilient \(####\) filtering for event-triggered networked systems under nonperiodic DoS jamming attacks, IEEE Transactions on Systems, Man, and Cybernetics: Systems, 51, 3, 1392-1403 (2021)
[7] Hu, S.; Yue, D.; Han, Q. L.; Xie, X.; Chen, X.; Dou, C., Observer-based event-triggered control for networked linear systems subject to Denial-of-Service attacks, IEEE Transactions on Cybernetics, 50, 5, 1952-1964 (2020) · doi:10.1109/TCYB.6221036
[8] Hu, S.; Yue, D.; Peng, C.; Xie, X.; Yin, X., Event-triggered controller design of nonlinear discrete-time networked control systems in T-S fuzzy model, Applied Soft Computing Journal, 30, 400-411 (2015) · doi:10.1016/j.asoc.2015.01.041
[9] Li, H.; Pan, Y.; Shi, P.; Shi, Y., Switched fuzzy output feedback control and its application to a mass-spring-damping system, IEEE Transactions on Fuzzy Systems, 24, 6, 1259-1269 (2016) · doi:10.1109/TFUZZ.2015.2505332
[10] Li, Y.; Zhang, Q.; Luo, X., Robust \(####\) dynamic output feedback control for a class of networked control systems based on T-S fuzzy model robust \(####\) dynamic output feedback control for a class of networked control systems based on T-S fuzzy model, Neurocomputing, 197, 86-94 (2016) · doi:10.1016/j.neucom.2016.02.056
[11] Liu, J.; Gu, Y.; Zha, L.; Liu, Y.; Cao, J., Event-triggered \(####\) load frequency control for multiarea power systems under hybrid cyber attacks event-triggered \(####\) load frequency control for multiarea power systems under hybrid cyber attacks, IEEE Transactions on Systems, Man, and Cybernetics: Systems, 49, 8, 1665-1678 (2019) · doi:10.1109/TSMC.6221021
[12] Liu, J.; Yang, M.; Zha, L.; Xie, X.; Tian, E., Multi-sensors-based security control for T-S fuzzy systems over resource-constrained networks, Journal of the Franklin Institute, 357, 7, 4286-4315 (2020) · Zbl 1437.93069 · doi:10.1016/j.jfranklin.2020.01.017
[13] Nithya, V.; Sakthivel, R.; Alzahrani, F.; Ma, Y. K., Fault-tolerant \(####\) filtering for fuzzy networked control systems with quantisation effects Fault-tolerant \(####\) filtering for fuzzy networked control systems with quantisation effects, International Journal of Systems Science, 51, 7, 1149-1161 (2020) · Zbl 1483.93137 · doi:10.1080/00207721.2020.1752416
[14] Peng, C.; Li, F., A survey on recent advances in event-triggered communication and control, Information Sciences, 457-458, 113-125 (2018) · Zbl 1448.93210 · doi:10.1016/j.ins.2018.04.055
[15] Peng, C.; Sun, H., Switching-like event-triggered control for networked control systems under malicious denial of service attacks, IEEE Transactions on Automatic Control, 65, 9, 3943-3949 (2020) · Zbl 1533.93493 · doi:10.1109/TAC.9
[16] Saravanan, S.; Syed Ali, M.; Alsulami, H.; Alhodaly, M. S., Robust \(####\) filtering for finite-time boundedness of Markovian jump system with distributed time-varying delays Robust \(####\) filtering for finite-time boundedness of markovian jump system with distributed time-varying delays, International Journal of Systems Science, 51, 2, 368-380 (2020) · Zbl 1483.93661 · doi:10.1080/00207721.2020.1716097
[17] Shi, Y.; Tian, E.; Shen, S.; Zhao, X., Adaptive memory-event-triggered \(####\) control for network-based T-S fuzzy systems with asynchronous premise constraints adaptive memory-event-triggered \(####\) control for network-based T-S fuzzy systems with asynchronous premise constraints, IET Control Theory and Applications, 15, 4, 534-544 (2021) · doi:10.1049/cth2.v15.4
[18] Sun, Y.; Yu, J.; Yu, X.; Gao, H., Decentralized adaptive event-triggered control for a class of uncertain systems with deception attacks and its application to electronic circuits, IEEE Transactions on Circuits and Systems I: Regular Papers, 67, 12, 5405-5416 (2020) · Zbl 1468.94818 · doi:10.1109/TCSI.8919
[19] Tahoun, A.; Arafa, M., Cooperative control for cyberphysical multi-agent networked control systems with unknown false data-injection and replay cyber-attacks, ISA Transactions, 110, 1-14 (2020) · doi:10.1016/j.isatra.2020.10.002
[20] Tian, E.; Peng, C., Memory-based event-triggering \(####\) load frequency control for power systems under deception attacks memory-based event-triggering \(####\) load frequency control for power systems under deception attacks, IEEE Transactions on Cybernetics, 50, 11, 4610-4618 (2020) · doi:10.1109/TCYB.6221036
[21] Tian, Y.; Wang, Z., Exponential admissibility analysis for singular systems with time-varying delay based on a parameter-dependent reciprocally convex inequality, International Journal of Systems Science, 51, 16, 3199-3212 (2020) · Zbl 1483.93530 · doi:10.1080/00207721.2020.1809747
[22] Tsumura, K.; Ishii, H.; Hoshina, H., Tradeoffs between quantization and packet loss in networked control of linear systems, Automatica, 45, 12, 2963-2970 (2009) · Zbl 1192.93074 · doi:10.1016/j.automatica.2009.09.030
[23] Wang, Y.; Zheng, Y.; Xie, X.; Yang, J., An improved reduction method based networked control against false data injection attacks and stochastic input delay, Applied Mathematics and Computation, 385 (2020) · Zbl 1508.93081 · doi:10.1016/j.amc.2020.125421
[24] Wang, Z.; Fan, X.; Shi, Z., Periodic event-triggered integral sliding-mode control for T-S fuzzy systems, IEEE Transactions on Cybernetics (2020) · doi:10.1109/TCYB.2020.3036888
[25] Wu, Z.; Xiong, J.; Xie, M., Dynamic event-triggered \(####\) control for networked control systems under deception attacks: a switching method dynamic event-triggered \(####\) control for networked control systems under deception attacks: a switching method, Information Sciences, 561, 168-180 (2021) · Zbl 1526.93164 · doi:10.1016/j.ins.2021.01.076
[26] Xia, Y.; Yan, J.; Shi, P.; Fu, M., Stability analysis of discrete-time systems with quantized feedback and measurements, IEEE Transactions on Industrial Informatics, 9, 1, 313-324 (2013) · doi:10.1109/TII.2012.2218113
[27] Yan, Y.; Yu, S.; Yu, X., Quantized super-twisting algorithm based sliding mode control, Automatica, 105, 43-48 (2019) · Zbl 1429.93057 · doi:10.1016/j.automatica.2019.03.002
[28] Yang, X.; Yan, J.; Hua, C.; Guan, X., Effects of quantization and saturation on performance in bilateral teleoperator, International Journal of Robust and Nonlinear Control, 30, 1, 121-141 (2020) · Zbl 1451.93262 · doi:10.1002/rnc.v30.1
[29] Yue, D.; Tian, E.; Han, Q. L., A delay system method for designing event-triggered controllers of networked control systems, IEEE Transactions on Automatic Control, 58, 2, 475-481 (2013) · Zbl 1369.93183 · doi:10.1109/TAC.2012.2206694
[30] Zhang, X. M.; Han, Q. L., Event-triggered dynamic output feedback control for networked control systems, IET Control Theory and Applications, 8, 4, 226-234 (2014) · doi:10.1049/cth2.v8.4
[31] Zhang, X. M.; Han, Q. L.; Ge, X.; Ding, D.; Ding, L.; Yue, D.; Peng, C., Networked control systems: a survey of trends and techniques, IEEE/CAA Journal of Automatica Sinica, 7, 1, 1-17 (2020) · doi:10.1109/JAS.6570654
[32] Zhang, X. M.; Han, Q. L.; Seuret, A.; Gouaisbaut, F.; He, Y., Overview of recent advances in stability of linear systems with time-varying delays, IET Control Theory and Applications, 13, 1, 1-16 (2019) · Zbl 1434.93034 · doi:10.1049/cth2.v13.1
[33] Zhao, D.; Wang, Z.; Wei, G.; Han, Q. L., A dynamic event-triggered approach to observer-based PID security control subject to deception attacks, Automatica, 120 (2020) · Zbl 1448.93219 · doi:10.1016/j.automatica.2020.109128
[34] Zhao, H.; Niu, Y.; Jia, T., Security control of cyber-physical switched systems under Round-Robin protocol: input-to-state stability in probability, Information Sciences, 508, 121-134 (2020) · Zbl 1472.93159 · doi:10.1016/j.ins.2019.08.056
[35] Zhao, L.; Yang, G. H., Cooperative adaptive fault-tolerant control for multi-agent systems with deception attacks, Journal of the Franklin Institute, 357, 6, 3419-3433 (2020) · Zbl 1437.93026 · doi:10.1016/j.jfranklin.2019.12.032
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.