×

Event-triggered \(\mathcal{L}_2 - \mathcal{L}_\infty\) control for discrete-time Markov jump systems with DoS attacks and exogenous disturbance. (English) Zbl 1534.93309

Summary: This paper is concerned with the event-triggered \(\mathcal{L}_2-\mathcal{L}_\infty\) control problem for discrete-time Markov jump systems with DoS attacks and exogenous disturbance. Instead of one common event-triggering scheme, multiple triggering schemes are introduced to sample system signals and the event-triggered Markov closed-loop jump systems are further obtained under the full state feedback controller. Generally, mode information of subsystems is not completely available for the modules of trigger and controller such that asynchronous jump behaviour may occur among the modes of subsystems, triggering scheme and controller. Thus, a hidden Markov model (HMM) is developed to describe such asynchronous behaviour. Meanwhile, security issues of networks are widely studied in recent many literature. For discrete-time Markov jump systems, few works consider cyber attacks, especially periodic denial-of-service (DoS) attacks. Based on the HMM, the DoS attacks are taken into account and a set of sufficient conditions are further presented to guarantee the \(\mathcal{L}_2-\mathcal{L}_\infty\) control performance of the resulting Markov closed-loop jump systems. Subsequently, the design of controller and event-triggering parameters are provided by using matrix inequality method. Finally, an example is given to show the effectiveness of the proposed approach.

MSC:

93C65 Discrete event control/observation systems
93C55 Discrete-time control/observation systems
93E03 Stochastic systems in control theory (general)
93C73 Perturbations in control/observation systems
62M05 Markov processes: estimation; hidden Markov models
Full Text: DOI

References:

[1] Amin, S., Litrico, X., Sastry, S., & Bayen, A. M. (2013). Cyber security of water SCADA systems-part I: Analysis and experimentation of stealthy deception attacks. IEEE Transactions on Control Systems Technology, 21(5), 1963-1970.
[2] Bayraktaroglu, E., King, C., Liu, X., Noubir, G., Rajaraman, R., & Thapa, B. (2008). On the Performance of IEEE 802.11 under Jamming. in Proceedings of IEEE Infocom (pp. 1265-1274). IEEE.
[3] Befekadu, G. K., Gupta, V., & Antsaklis, P. J. (2015). Risk-sensitive control under Markov modulated denial-of-service (DoS) attack strategies. IEEE Transactions on Automatic Control, 60(12), 3299-3304. · Zbl 1360.93766
[4] Cao, L., Cheng, Z., Liu, Y., & Li, H. (2022). Event-based adaptive NN fixed-time cooperative formation for multiagent systems. IEEE Transactions on Neural Networks and Learning Systems, to be published. doi:
[5] Cao, L., Pan, Y., Liang, H., & Huang, T. (2023). Observer-based dynamic event-triggered control for multiagent systems with time-varying delay. IEEE Transactions on Cybernetics, 53(5), 3376-3387.
[6] Cheng, J., Ahn, C. K., Karimi, H. R., Cao, J., & Qi, W. (2019). An event-based asynchronous approach to Markov jump systems with hidden mode detections and missing measurements. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 49(9), 1749-1758.
[7] Cheng, P., He, S., Dong, H., Chen, W., & Zhang, W. (2023). Extended state observer-based finite-region control for 2-D Markov jump systems. International Journal of Robust and Nonlinear Control, 33(2), 1010-1026. · Zbl 1531.93140
[8] Cheng, P., Zhang, C., Xie, W., Zhang, W., & He, S. (2023). Network-based adaptive multi-event-triggered fuzzy dynamic positioning controller design for unmanned surface vehicles against denial-of-service attacks. IEEE Transactions on Control of Network Systems, 10(2), 612-624.
[9] Cheng, P., Zhang, G., Zhang, W., & He, S. (2022). Co-design of adaptive event-triggered mechanism and asynchronous \(H_\infty\) control for 2-D Markov jump systems via genetic algorithm. IEEE Transactions on Cybernetics to be published. doi:
[10] Ding, D., Wang, Z., Ho, D. W. C., & Wei, G. (2017). Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks. Automatica, 78, 231-240. · Zbl 1357.93096
[11] Dong, S., Wu, Z., Pan, Y., Su, H., & Liu, Y. (2019). Hidden-Markov-model-based asynchronous filter design of nonlinear Markov jump systems in continuous-time domain. IEEE Transactions on Cybernetics, 49(6), 2294-2304.
[12] Du, B., Lam, J., Zou, Y., & Shu, Z. (2013). Stability and stabilization for Markovian jump time-delay systems with partially unknown transition rates. IEEE Transactions on Circuits and Systems I: Regular Papers, 60(2), 341-351. · Zbl 1468.93134
[13] Foroush, H. S., & Martínez, S. (2012). On event-triggered control of linear systems under periodic denial-of-service jamming attacks. 51st IEEE Conference on Decision and Control (pp. 2551-2556). IEEE.
[14] Foroush, H. S., & Martínez, S. (2016). On triggering control of single-input linear systems under pulse-width modulated DoS signals. SIAM Journal on Control and Optimization, 54(6), 3084-3105. · Zbl 1349.93178
[15] Goncalves, A. P. C., Fioravanti, A. R., & Geromel, J. C. (2009). \( H_\infty\) filtering of discrete-time Markov jump linear systems through linear matrix inequalities. IEEE Transactions on Automatic Control, 54(6), 1347-1351. · Zbl 1367.93643
[16] Hou, T., & Ma, H. (2016). Exponential stability for discrete-time infinite Markov jump systems. IEEE Transactions on Automatic Control, 61(12), 4241-4246. · Zbl 1359.93514
[17] Hu, S., Yue, D., Xie, X., Chen, X., & Yin, X. (2019). Resilient event-triggered controller synthesis of networked control systems under periodic DoS jamming attacks. IEEE Transactions on Cybernetics, 49(12), 4271-4281.
[18] Huang, H., Feng, G., & Chen, X. (2012). Stability and stabilization of Markovian jump systems with time delay via new lyapunov functionals. IEEE Transactions on Circuits and Systems I: Regular Papers, 59(10), 2413-2421. · Zbl 1468.93185
[19] Kao, Y., Xie, J., & Wang, C. (2014). Stabilization of singular Markovian jump systems with generally uncertain transition rates. IEEE Transactions on Automatic Control, 59(9), 2604-2610. · Zbl 1360.93743
[20] Li, H., Shi, P., & Yao, D. (2016). Adaptive sliding-mode control of Markov jump nonlinear systems with actuator faults. IEEE Transactions on Automatic Control, 62(4), 1933-1939. · Zbl 1366.93718
[21] Li, Q., Xue, H., Pan, Y., & Liang, H. (2021). Dynamic output feedback control for interval type-2 fuzzy systems against dos attacks and sensor failures. International Journal of Systems Science, 1-17. · Zbl 1530.93124
[22] Luan, X., Zhao, S., & Liu, F. (2013). \( H_\infty\) control for discrete-time Markov jump systems with uncertain transition probabilities. IEEE Transactions on Automatic Control, 58(6), 1566-1572. · Zbl 1369.93178
[23] Luo, X., & Chang, R. K. C. (2005). On a new class of pulsing denial-of-service attacks and the defense. in Proceedings of the Network and Distributed System Security Symposium (NDSS’05) (pp. 1-19). NDSS.
[24] Luo, Y., Wang, Z., Wei, G., & Alsaadi, F. E. (2020). Nonfragile \(l_2-l_\infty\) fault estimation for Markovian jump 2-D systems with specified power bounds. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 50(5), 1964-1975.
[25] Mei, W., Zhao, C., Ogura, M., & Sugimoto, K. (2020). Mixed \(H_2/H_\infty\) control of delayed Markov jump linear systems. IET Control Theory & Applications, 14(15), 2076-2083. · Zbl 1542.93083
[26] Qiu, L., Zhang, B., Xu, G., Pan, J., & Yao, F. (2016). Mixed \(H_2/H_\infty\) control of markovian jump time-delay systems with uncertain transition probabilities. Information Sciences, 373, 539-556. · Zbl 1432.93088
[27] Song, J., Niu, Y., & Xu, J. (2020). An event-triggered approach to sliding mode control of Markovian jump lur’e systems under hidden mode detections. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 50(4), 1514-1525.
[28] Tao, J., Lu, R., Su, H., Shi, P., & Wu, Z. (2018). Asynchronous filtering of nonlinear Markov jump systems with randomly occurred quantization via T-S fuzzy models. IEEE Transactions on Fuzzy Systems, 26(4), 1866-1877.
[29] Teixeira, A., Shames, I., Sandberg, H., & Johansson, K. H. (2015). A secure control framework for resource-limited adversaries. Automatica, 51, 135-148. · Zbl 1309.93020
[30] Wang, X., Ding, D., Ge, X., & Han, Q-L. (2022). Neural-network-based control for discrete-time nonlinear systems with denial-of-service attack: The adaptive event-triggered case. International Journal of Robust and Nonlinear Control, 32(5), 2760-2779. · Zbl 1527.93298
[31] Wu, L., Shi, P., & Gao, H. (2010). State estimation and sliding-mode control of Markovian jump singular systems. IEEE Transactions on Automatic Control, 55(9), 2135-2141. · Zbl 1368.93669
[32] Wu, Z., Shi, P., Shu, Z., Su, H., & Lu, R. (2017). Passivity-based asynchronous control for Markov jump systems. IEEE Transactions on Automatic Control, 62(4), 2020-2025. · Zbl 1366.93611
[33] Xu, Y., Fang, M., Pan, Y-J., Shi, K., & Wu, Z-G. (2021). Event-triggered output synchronization for nonhomogeneous agent systems with periodic denial-of-service attacks. International Journal of Robust and Nonlinear Control, 31(6), 1851-1865. · Zbl 1526.93165
[34] Xu, Z., Wu, Z., Su, H., Shi, P., & Que, H. (2020). Energy-to-peak filtering of semi-Markov jump systems with mismatched modes. IEEE Transactions on Automatic Control, 65(10), 4356-4361. · Zbl 1536.93943
[35] Yuan, Y., Yuan, H., Ho, D. W. C., & Guo, L. (2018). Resilient control of wireless networked control system under denial-of-service attacks: A cross-layer design approach. IEEE Transactions on Cybernetics, 50(1), 48-60.
[36] Zhang, H., Cheng, P., Shi, L., & Chen, J. (2015). Optimal denial-of-service attack scheduling with energy constraint. IEEE Transactions on Automatic Control, 60(11), 3023-3028. · Zbl 1360.68302
[37] Zhang, Y., Ou, Y., Zhou, Y., Wu, X., & Sheng, W. (2015). Observer-based \(l_2-l_\infty\) control for discrete-time nonhomogeneous Markov jump Lur’e systems with sensor saturations. Neurocomputing, 162, 141-149.
[38] Zhu, Y., Zhang, L., & Zheng, W. (2016). Distributed \(H_\infty\) filtering for a class of discrete-time Markov jump Lur’e systems with redundant channels. IEEE Transactions on Industrial Electronics, 63(3), 1876-1885.
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.