首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
This paper investigates the resilient control problem for constrained continuous‐time cyber‐physical systems subject to bounded disturbances and denial‐of‐service (DoS) attacks. A sampled‐data robust model predictive control law with a packet‐based transmission scheduling is taken advantage to compensate for the loss of the control data during the intermittent DoS intervals, and an event‐triggered control strategy is designed to save communication and computation resources. The robust constraint satisfaction and the stability of the closed‐loop system under DoS attacks are proved. In contrast to the existing studies that guarantee the system under DoS attacks is input‐to‐state stable, the predicted input error caused by the system constraints can be dealt with by the input‐to‐state practical stability framework. Finally, a simulation example is performed to verify the feasibility and efficiency of the proposed strategy.  相似文献   

2.
In this paper, the security issues of cyber‐physical systems under undetectable attacks are studied. The geometric control theory is used to investigate the design, implementation, and impact evaluation of undetectable attacks. First, a feedforward‐feedback structure for undetectable attacks is proposed, which provides a designable form for an attack to be undetectable. The corresponding attack strategy is designed via pole placement in the weakly unobservable subspace of the attacked system. Then, the security analysis of several common undetectable attacks injected from actuators, sensors, and the coordinated of the two is discussed. Finally, the simulations on the quadruple‐tank process demonstrate the effectiveness of the proposed methods.  相似文献   

3.
This paper studies the problem of cooperative attack strategy design for cyber‐physical systems modeled by discrete‐time linear systems. A function that reflects the attacker's target is established, and a linear attack strategy is designed based on the objective function, in which the attack signal is unknown but energy bounded, while the statistical information of the existing ones is required to be known. Unlike the existing analysis methods for attack strategy, new Lyapunov functions that depend on the system states at different instants are constructed in the attack strategy analysis, and the sensitivity to the state estimator and the robustness against the detector are both enhanced on attack signals through using the H?/H scheme. Finally, two simulation examples are given to show that the designed attack strategy achieves larger estimation errors and smaller detection probability simultaneously than the existing design methods.  相似文献   

4.
This paper considers the adaptive control problem for a class of nonlinear cyber‐physical systems with unknown nonlinearities and false data injection attacks, where the sensors are corrupted by attackers. To mitigate the effects caused by the considered attacks, a novel coordinate transformation is developed in the backstepping control design. In addition, to deal with the multiple unknown time‐varying state feedback gains caused by the sensor attacks, the new types of Nussbaum functions are introduced in the adaptive control. By using Lyapunov stability theory, the proposed control scheme can guarantee all the closed‐loop system signals globally bounded. Finally, the examples demonstrate the effectiveness of the proposed method.  相似文献   

5.
The problem of secure control in cyber‐physical systems is considered in this work. A new modeling framework is first introduced, ie, cyber‐physical systems with attacks/faults changing system dynamics is modeled as a switched system, where the switching among subsystems is triggered by a rule generated by attackers but unknown for defenders. Based on an average dwell‐time approach incorporated by the attack frequency and duration properties, a convergence condition of the Lyapunov function on active intervals of subsystems (ie, the attack and healthy modes), under the developed switched controller, is given. Next, the unknown rule, however, leads to the asynchronous switching problem between the candidate controllers and system modes. As a result, degradation of the system performance (eg, a large chatter occurred in the system state trajectories) in the asynchronous intervals is caused. To address the difficulty, a novel switching law based on a prescribed performance is proposed, and it is shown that the asynchronous intervals are shortened by reducing adjustable parameters in the switching law. An illustrative example verifies the effectiveness of the proposed method.  相似文献   

6.
This article studies the problem of H filtering for linear discrete‐time systems with state delay. Via delay partitioning idea, two new H filter design methods are proposed with much less conservatism than most existing results. The improvement lies in constructing two new Lyapunov–Krasovskii functionals by partitioning the known constant lower bound of delay into several segments equally. Using free‐weighting matrix and Jensen inequality methods, two new delay‐dependent bound real lemmas (BRLs) are obtained, which depend on both the delay and the partitioning number. Based on the obtained BRLs, new H filter design approaches are proposed in terms of linear matrix inequalities. The results are immediately extended to multiple time delay case and polytopic uncertain case, respectively. Three numerical examples are presented to illustrate the effectiveness and advantage of the proposed approaches. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   

7.
This paper deals with the problem of exponential H filtering for a class of continuous‐time switched linear system with interval time‐varying delay. The time delay under consideration includes two cases: one is that the time delay is differentiable and bounded with a constant delay‐derivative bound, whereas the other is that the time delay is continuous and bounded. Switched linear filters are designed to ensure that the filtering error systems under switching signal with average dwell time are exponentially stable with a prescribed H noise attenuation level. Based on the free‐weighting matrix approach and the average dwell technology, delay‐dependent sufficient conditions for the existence of such a filter are derived and formulated in terms of linear matrix inequalities (LMIs). By solving that corresponding LMIs, the desired filter parameterized matrices and the minimal average dwell time are obtained. Finally, two numerical examples are presented to demonstrate the effectiveness of the developed results. Copyright © 2008 John Wiley & Sons, Ltd.  相似文献   

8.
The smart grid faces a variety of physical and cyber attacks. Coordinated cyber‐physical attacks can cause severer consequences than the single cyber or physical attacks, which can be divided into two categories according to whether the physical attack is stealthy or not. Coordinated cyber‐physical attacks considering DoS attacks are investigated due to the lower cost of DoS attacks. In each category of coordinated cyber‐physical attacks, the mathematical models are derived and suitable methods are adopted to solve the corresponding issue. The experimental simulation demonstrates the potentially damaging effects and threats of this newly proposed attack. It is also presented that this newly proposed attack can use lower attack resources to introduce more catastrophic effects on the power system.  相似文献   

9.
In this paper, the problem of exponential H filter problem for a class of discrete‐time polytopic uncertain switched linear systems with average dwell time switching is investigated. The exponential stability result of the general discrete‐time switched systems using a discontinuous piecewise Lyapunov function approach is first explored. Then, a new µ‐dependent approach is proposed, which means the analysis or synthesis of the underlying systems is dependent on the increase degree µ of the piecewise Lyapunov function at the switching instants. A mode‐dependent full‐order filter is designed such that the developed filter error system is robustly exponentially stable and achieves an exponential H performance. Sufficient existence conditions for the desired filter are derived and formulated in terms of a set of linear matrix inequalities, and consequently the minimal average dwell time and the corresponding filter are obtained from such conditions for a given system decay degree. A numerical example is presented to demonstrate the potential and effectiveness of the developed theoretical results. Copyright © 2007 John Wiley & Sons, Ltd.  相似文献   

10.
This paper deals with the gain‐scheduled H filtering problem for a class of parameter‐varying systems. A sufficient condition for the existence of a gain‐scheduled filter, which guarantees the asymptotic stability with an H noise attenuation level bound for the filtering error system, is given in terms of a finite number of linear matrix inequalities (LMIs). The filter is designed to be parameter‐varying and have a nonlinear fractional transformation structure. A numerical example is presented to demonstrate the application of the proposed method. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   

11.
The H-control problem with a non-zero initial condition for infinite dimensional systems is considered The initial conditions are assumed to be in some subspace. First the H problem with full information is considered and necessary and sufficient conditions for the norm of an input-output operator to be less than a given number are obtained, The characterization of all admissible controllers is also given. This result is then used to solve the general H control problem and the filtering problem with initial uncertainty. The filtering problem on finite horizon involves the estimate of the state at final time. The set of all suboptimal filters is given both on finite and infinite horizons.  相似文献   

12.
In this paper, the resilient control problem is investigated for a wireless networked control system (WNCS) under denial‐of‐service (DoS) attack via a hierarchical game approach. In the presence of a wireless network, a DoS attacker leads to extra packet dropout in the cyber layer of WNCS by launching interference power. A zero‐sum Markov game is exploited to model the interaction between the transmitter and the DoS attacker under dynamic network environment. Additionally, with the attack‐induced packet loss, an H minimax controller is designed in the physical layer by using a delta operator approach. Both value iteration and Q‐learning methods are used to solve the hierarchical game problem for the WNCS. The proposed method is applied to a load frequency control system to illustrate the effectiveness.  相似文献   

13.
In this paper, the problem of delay‐dependent exponential H filtering for discrete‐time switched delay systems is investigated under average dwell time switching signals. Time delay under consideration is interval time‐varying in the states. By introducing a proper factor to construct a novel Lyapunov‐Krasovskii function and using average dwell time approach, sufficient conditions for the solvability of this problem, dependent on the upper and lower bounds of time‐varying delay, are obtained in terms of linear matrix inequalities. A numerical example is presented to demonstrate the effectiveness of the developed results. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   

14.
This paper is concerned with the delay‐dependent H filtering problem for singular systems with time‐varying delay in a range. In terms of linear matrix inequality approach, the delay‐range‐dependent bounded real lemmas are proposed, which guarantee the considered system to be regular, impulse free and exponentially stable while satisfying a prescribed H performance level. The sufficient conditions are proposed for the existence of linear H filter. Numerical examples are given to demonstrate the effectiveness and the benefits of the proposed methods. Copyright © 2009 John Wiley & Sons, Ltd.  相似文献   

15.
This paper deals with the H filtering problem for a class of discrete-time nonlinear systems with or without real time-varying parameter uncertainty and unknown initial state. For the case when there is no parametric uncertainty in the system, we are concerned with designing a nonlinear H filter such that the induced l2 norm of the mapping from the noise signal to the estimation error is within a specified bound. It is shown that this problem can be solved via one Riccati equation. We also consider the design of nonlinear filters which guarantee a prescribed H performance in the presence of parametric uncertainties. In this situation, a solution is obtained in terms of two Riccati equations.  相似文献   

16.
The paper investigates the asynchronous H filtering design problem for continuous‐time linear systems with Markov jump. The hidden Markov jump principle is applied to represent the asynchronous situation between the target system and the designed filter. Via a Lyapunov technique, two sufficient conditions are developed to guarantee that the filtering error system is stochastically stable with a prescribed H noise attenuation level. Furthermore, three filtering design approaches are developed in the form of linear matrix inequalities. Finally, one example is provided to show the effectiveness and feasibility of the developed methods.  相似文献   

17.
This paper considers a class of cyber‐physical networked systems, which are composed of many interacted subsystems, and are controlled in a distributed framework. The operating point of each subsystem changes with the varying of working conditions or productions, which may cause the change of the interactions among subsystems correspondingly. How to adapt to this change with good closed‐loop optimization performance and appropriate information connections is a problem. To solve this problem, the impaction of a subsystem's control action on the performance of related closed‐loop subsystems is first deduced for measuring the coupling among subsystems. Then, a distributed model predictive control (MPC) for tracking, whose subsystems online reconfigure their information structures, is proposed based on this impaction index. When the operating points changed, each local MPC calculates the impaction indices related to its structural downstream subsystems. If and only if the impaction index exceeds a defined bound, its behavior is considered by its downstream subsystem's MPC. The aim is to improve the optimization performance of entire closed‐loop systems and avoid the unnecessary information connections among local MPCs. Besides, contraction constraints are designed to guarantee that the overall system converges to the set points. The stability analysis is also provided. Simulation results show that the proposed impaction index is reasonable along with the efficiency of the proposed distributed MPC.  相似文献   

18.
This paper is concerned with the sampled‐data consensus problem for a class of nonlinear multiagent systems subject to cyber attacks. The considered attacks are assumed to be recoverable, which destroy the connectivity of the network topology with directed spanning tree. In light of the designed sampled‐data control protocol, a more general switched system is proposed to model both the cyber attacks and the sampled‐data mechanism within a unified framework. Then, by using the contradiction methods, the solution of a class of differential equations is provided to deal with the technical challenge resulting from the switching and sampling issues. Furthermore, in terms of such a solution combined with the constructed piecewise Lyapunov function, sufficient conditions are derived under which the nonlinear multiagent systems subject to attacks achieve the consensus exponentially. The relationship between the attack frequency and the sampling period is also revealed through the obtained conditions. Finally, simulations are given to show the effectiveness of the proposed results.  相似文献   

19.
We consider the problem of finite‐horizon discrete‐time H filtering with uncertain initial state condition and establish the relationship between the conventional γ‐performance bound and a recently proposed performance measure. A sub‐optimal but more efficient approach to computing the filter for the new performance measure is also derived. Copyright © 2008 John Wiley & Sons, Ltd.  相似文献   

20.
In this note, a defect occurred in Theorem 1 in the study Du et al. (Int. J. Robust Nonlinear Control 2013; doi: 10.1002/rnc.2961) is addressed. Additionally, the correction of the theorem is presented. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号