首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 218 毫秒
1.
In this paper, the centralized security-guaranteed filtering problem is studied for linear time-invariant stochastic systems with multirate-sensor fusion under deception attacks. The underlying system includes a number of sensor nodes with a centralized filter, where each sensor is allowed to be sampled at different rate. A new measurement output model is proposed to characterize both the multiple rates and the deception attacks. By exploiting the lifting technique, the multi-rate sensor system is cast into a single-rate discrete-time system. With a new concept of security level, the aim of this paper is to design a filter such that the filtering error dynamics achieves the prescribed level of the security under deception attacks. By using the stochastic analysis techniques, sufficient conditions are first derived such that the filtering error system is guaranteed to have the desired security level, and then the filter gain is parameterized by using the semi-definite programme method with certain nonlinear constraints. Finally, a numerical simulation example is provided to demonstrate the feasibility of the proposed filtering scheme.  相似文献   

2.
In this paper, we investigate the consensus problem for discrete linear multi-agent systems (MASs) with Markovian packet dropouts. Both identical and nonidentical packet dropouts are studied. For the discrete-time MASs under identical packet dropouts, we present the expectation of the total sojourn time of packet dropouts and successful message transmission, the switching number from packet dropouts to successful message transmission, and the awaken number of packet dropouts and successful message transmission. Based on these expectations, a linear consensus controller is designed through analyzing the transient properties of the Markov process such that the MASs can reach consensus almost surely for any initial distribution of packet dropouts. When it comes to the nonidentical packet dropouts where all the packets are independent and stochastic, a Markovian-lossy-channel based switching model (MLCBS model) is proposed. Based on the MLCBS model, we also propose an easy-to-implement linear consensus controller such that the MASs with nonidentical packet dropouts can achieve consensus almost surely. Finally, the theoretical results are illustrated by simulation examples.  相似文献   

3.
This paper is concerned with the security control problem of the networked control system (NCSs) subjected to denial of service (DoS) attacks. In order to guarantee the security performance, this paper treats the influence of packet dropouts due to DoS attacks as a uncertainty of triggering condition. Firstly, a novel resilient triggering strategy by considering the uncertainty of triggering condition caused by DoS attacks is proposed. Secondly, the event-based security controller under the resilient triggering strategy is designed while the DoS-based security performance is preserved. At last, the simulation results show that the proposed resilient triggering strategy is resilient to DoS attacks while guaranteing the security performance.  相似文献   

4.
The paper is concerned with the modeling and stabilization problem of networked control systems under simultaneous consideration of bounded packet dropouts and occasionally missing control inputs. In particular, the focus of the paper is to capture the case where the packet dropouts and control inputs missing are subject to multiple sampling periods, and not periodic as in existing results. By input-delay approach and then fully considering the probability distribution characteristic of packet dropouts in the modeling, the original linear system is firstly transformed to a switched stochastic time-delay system. Meanwhile, the probability distribution values of stochastic delay taking values in m(m ≥ 2) given intervals can be explicitly obtained, which is of vital importance to analyse the stabilization problem of considered system. Secondly, by means of the average dwell time technique, some sufficient conditions in terms of linear matrix inequalities for the existence of desired stabilizing controller are derived. Finally, an illustrative example is given to illustrate the effectiveness of the proposed stabilizing controller and some less conservative results are obtained.  相似文献   

5.
This paper is concerned with the problem of stochastic synchronization for semi-Markovian jump chaotic Lur’e systems. Firstly, packet dropouts and multiple sampling periods are both considered. By input-delay approach and then fully considering the probability distribution characteristic of packet dropouts in the modeling, the original system is transformed to a stochastic time-delay system. Secondly, by getting the utmost out of the usable information on the actual sampling pattern, the probability distribution values of stochastic delay taking values in m given intervals can be explicitly obtained. Then, a newly augmented Lyapunov-Krasovskii functional is constructed. Based on that, some sufficient conditions in terms of linear matrix inequalities (LMIs) are derived to ensure the stochastic stability of the error system, and thus, the master system stochastically synchronize with the slave system. Finally, the effectiveness and potential of the obtained results is verified by a simulation example.  相似文献   

6.
In this paper, the state estimation problem for discrete-time networked systems with communication constraints and random packet dropouts is considered. The communication constraint is that, at each sampling instant, there is at most one of the various transmission nodes in the networked systems is allowed to access a shared communication channel, and then the received data are transmitted to a remote estimator to perform the estimation task. The channel accessing process of those transmission nodes is determined by a finite-state discrete-time Markov chain, and random packet dropouts in remote data transmission are modeled by a Bernoulli distributed white sequence. Using Bayes’ rule and some results developed in this study, two state estimation algorithms are proposed in the sense of minimum mean-square error. The first algorithm is optimal, which can exactly compute the minimum mean-square error estimate of system state. The second algorithm is a suboptimal algorithm obtained under a lot of Gaussian hypotheses. The proposed suboptimal algorithm is recursive and has time-independent complexity. Computer simulations are carried out to illustrate the performance of the proposed algorithms.  相似文献   

7.
The optimal widely linear state estimation problem for quaternion systems with multiple sensors and mixed uncertainties in the observations is solved in a unified framework. For that, we devise a unified model to describe the mixed uncertainties of sensor delays, packet dropouts and uncertain observations by using three Bernoulli distributed quaternion random processes. The proposed model is valid for linear discrete-time quaternion stochastic systems measured by multiple sensors and it allows us to provide filtering, prediction and smoothing algorithms for estimating the quaternion state through a widely linear processing. Simulation results are employed to show the superior performance of such algorithms in comparison to standard widely linear methods when mixed uncertainties are present in the observations.  相似文献   

8.
This paper addresses the nonstationary quantized control problem for the discrete-time Markov jump singularly perturbed systems (MJSPSs) subject to deception attacks (DAs). The control inputs are characterized by randomly occurring DAs and nonstationary quantization simultaneously, where the DAs are depicted by means of a Bernoulli distributed sequence. By applying a multi-layer structure methodology (MLSM), the nonstationary controllers are devised for MJSPSs. Meanwhile, the correlation among system mode, controller mode, and quantizer mode are portrayed via the nonstationary Markov process. Based on a mode-dependent Lyapunov functional, sufficient criteria are established such that the resulting closed-loop system (CLS) is stochastic mean square exponential ultimately bounded (SMSEUB), and the desired controller is designed. Ultimately, two simulation examples are offered to elaborate on the validity and superiority of the proposed theoretical results.  相似文献   

9.
In this paper, the networked stabilization of discrete-time periodic piecewise linear systems under transmission package dropouts is investigated. The transmission package dropouts result in the loss of control input and the asynchronous switching between the subsystems and the associated controllers. Before studying the networked control, the sufficient conditions of exponential stability and stabilization of discrete-time periodic piecewise linear systems are proposed via the constructed dwell-time dependent Lyapunov function with time-varying Lyapunov matrix at first. Then to tackle the bounded time-varying packet dropouts issue of switching signal in the networked control, a continuous unified time-varying Lyapunov function is employed for both the synchronous and asynchronous subintervals of subsystems, the corresponding stabilization conditions are developed. The state-feedback stabilizing controller can be directly designed by solving linear matrix inequalities (LMIs) instead of iterative optimization used in continuous-time periodic piecewise linear systems. The effectiveness of the obtained theoretical results is illustrated by numerical examples.  相似文献   

10.
This paper studies the asynchronous state fusion estimation problem for multi-sensor networked systems subject to stochastic data packet dropouts. A set of Bernoulli sequences are adopted to describe the random packet losses with different arriving probabilities for different sensor communication channels. The asynchronous sensors considered in this paper can have arbitrary sampling rates and arbitrary initial sampling instants, and may even sample the system non-uniformly. Asynchronous measurements collected within the fusion interval are transformed to the fusion time instant as a combined equivalent measurement. An optimal asynchronous estimation fusion algorithm is then derived based on the transformed equivalent measurement using the recursive form of linear minimum mean squared error (LMMSE) estimator. Cross-correlations between involved random variables are carefully calculated with the stochastic data packet dropouts taken into account. A numerical target tracking example is provided to illustrate the feasibility and effectiveness of the proposed algorithm.  相似文献   

11.
This paper is concerned with the strong γc-γcl H stabilization problem for networked control systems (NCSs) subject to denial of service (DoS) attacks, which are common attack behaviors that affect the packet transmission of measurement or control signals. The purpose of the problem under consideration is to design a stable dynamic output feedback (DOF) controller (strong stabilizing controller) with the prescribed H performance norm bound γc to tolerate multiple packet dropouts caused by DoS attacks, such that, the closed-loop system is mean-square stable and captures the H disturbance attenuation norm bound γcl. Based on the Lyapunov functional and the stochastic control approach, some sufficient conditions with the form of matrix inequalities for the existence of the desired stable DOF controller are established. Then, by an orthogonal complement space technique, the controller gain is parameterized. Next, an iterative linear matrix inequality (LMI) algorithm is developed to obtain the controller gain. Finally, the usefulness of the proposed method is indicated by a numerical simulation example.  相似文献   

12.
《Journal of The Franklin Institute》2021,358(18):10052-10078
This paper is concerned with the fixed-time quasi-synchronization of coupled memristive neural networks (CMNNs). The communication channel is subject to the deception attack described by the Bernoulli stochastic variable. To reduce signal transmissions, a dual-channel event-triggered mechanism is proposed. In each channel of sensor to controller and controller to actuator, an event-triggered mechanism is designed. Compared with the single event-triggered mechanism in the communication loop, the main difficulties lie in how to deal with the problems of packet scheduling and network attacks. By using Lyapunov method combining with a new proposed lemma, some sufficient conditions are derived to guarantee the leader-following quasi-synchronization of CMNNs. The Zeno behavior is excluded for the designed dual-channel event-triggered mechanism. The influence of the event-triggered mechanism on the estimation of settling time is discussed. Three numerical examples are provided to show the effectiveness of the theoretical results.  相似文献   

13.
This paper investigates output-based dynamic event-triggered control for networked control systems (NCSs), in which hybrid cyber attacks randomly occur in communication network. First, a gain adjustable dynamic output feedback (DOF) controller is designed for NCSs and relaxes state-available constraint in presence of three types of attacks, including stochastic deception attacks, replay attacks and aperiodic denial-of-service (DoS) attacks. Second, a output-based dynamic event-triggered mechanism (DETM) is designed to optimize limited network resources under the cyber attacks. Third, a new switched system is established to describe the effect of hybrid cyber attacks, the DOF controller and the DETM simultaneously. Then, criteria for guaranteeing asymptotically stability of the switched system are obtained. Furthermore, the co-design method of DETM and DOF controller is provided to maintain the NCSs stability. Finally, an example is presented to show the effectiveness of the proposed methods in this paper.  相似文献   

14.
《Journal of The Franklin Institute》2022,359(18):11155-11185
Nowadays, cyber-physical systems (CPSs) have been widely used in various fields due to their powerful performance and low cost. The cyber attacks will cause security risks and even huge losses according to the universality and vulnerability of CPSs. As a typical network attack, deception attacks have the features of high concealment and strong destructiveness. Compared with the traditional deception attack models with a constant value, a deception attack with random characteristics is introduced in this paper, which is difficult to identify. In order to defend against such deception attacks and overcome energy constraints in CPSs, the secure state estimation and the event-triggered communication mechanism without feedback information are co-considered to reconcile accuracy of estimation and energy consumption. Firstly, an event-triggered augmented state estimator is proposed for secure state estimation and attack identification. Then, under the ideology of equivalence, the augmented state estimator is derived as a concise two-stage estimator with reduced order. The two-stage estimator can perform the secure state estimation and attack identification respectively. The estimators ensure the accuracy of attack identification well since not treating attack information as the trigger event. Afterward, the comparison of the computational complexity of these two algorithms is analyzed. Finally, an example of a target tracking system is supplied to prove the effectiveness and efficiency of the proposed algorithm.  相似文献   

15.
16.
This paper investigates the problem of finite-time outer-synchronization for discrete-time complex networks with Markov jump topology in the presence of communication delays and possible information losses and its application to image encryption. A hybrid control, which is subject to both stochastic jumps and deterministic switches, is proposed to realize finite-time and stochastic outer-synchronization for the concerned networks. By utilizing a stochastic Lyapunov functional combined with the average dwell-time method, sufficient conditions are found such that the synchronization error dynamical system is stochastically stable in finite-time. Two numerical examples are presented to illustrate the effectiveness of the proposed method. Finally, the complex network consists of four coupled Lorenz systems are utilized to generate chaotic sequences and a new chaotic image cryptosystem is constructed to transmit encrypted images based on the synchronized drive-response complex networks. Experiments are conducted by using numerical simulation, and the security is analyzed in terms of key space, key sensitivity, histogram distributions, correlation coefficients, information entropy and differential attack measures. The experimental results show that the proposed chaotic image cryptosystem has the advantages of high security against some classical attacks.  相似文献   

17.
This paper studies the control problem of uncertain stochastic systems, which takes into account the impact of network attacks. The types of network attacks considered are denial-of-service (DoS) attacks, deception attacks and replay attacks. In order to save network resources and improve communication utilization, the static event-triggered mechanism and adaptive event-triggered mechanism are cited respectively. Firstly, a new Lyapunov-Krasovskii functional is constructed, employing improved Wirtinger-based integral inequality and Jensens inequality, the criteria on stochastic stability in the mean square for uncertain stochastic systems are proposed. Secondly, the design methods of static event-triggered controller and adaptive event-triggered controller are given respectively. Finally, a practical example is given to manifest the effectiveness of the theoretical results.  相似文献   

18.
《Journal of The Franklin Institute》2022,359(18):10558-10577
In this article, a secure exponential synchronization problem is studied for multiplex Cohen-Grossberg neural networks under stochastic deception attacks. In order to resist the malicious attack from attackers modifying the data in transmission module under a certain probability, an attack resistant controller, which has the ability to automatically adjust its own parameters according to external attacks, is designed for each Cohen-Grossberg neural subnet. An exponential adaptive quantitative controlling algorithm is proposed to synchronize Cohen-Grossberg neural network state, and a sufficient criterion is established to realize the synchronization error tends to zero under malicious attacks. Moreover, synchronization mode we study is the synchronization among Cohen-Grossberg neural subnets in multiplex networks. An example is presented to testify the validity of proposed theoretical framework.  相似文献   

19.
The probabilistic-constrained tracking control issue is investigated for a class of time-varying nonlinear stochastic systems with sensor saturation, deception attacks and limited bandwidth in an unified framework. The saturation of sensors is quantified by a sector-bound-based function satisfying certain conditions, and the random deception attacks are considered and modeled by a random indicator variable. To gain more efficient utilization of communication channels, a Round-Robin (RR) protocol is utilized to orchestrate the transmission order of measurements. The main purposes of this study aim to plan an observer-based tracking controller to achieve the following goals: (1) the related performance indicators of the estimation error is less than given bound at each time step; and (2) the violation probability of the tracking error confined in a predefined scope is supposed to be higher than a prescribed scalar and the area is minimized at each instant. In order to reach these requirements, a group of recursive linear matrix inequalities (RLMIs) are developed to estimate the state and design the tracking controller at the same time. Finally, two simulation examples are exploited to illustrate the availability and flexibility of the proposed scheme.  相似文献   

20.
The optimal tracking problem for single-input–single-output (SISO) networked control system over a communication channel with packet dropouts is studied in this paper. The tracking performance is measured by the energy of the error signal between the output of the plant and the reference signal. It is shown that the optimal tracking performance is constrained by nonminimum phase zeros, unstable poles, the characteristics of the reference signal and packet dropout probability, and the optimal controller is obtained. It is also shown that when the communication constraint does not exist, the optimal tracking performance reduces to the existing normal tracking performance of the control system without a communication channel. The result shows how the packet dropouts probability of a communication channel may fundamentally constrain a control system's tracking ability. Some typical examples and simulations are given to illustrate the theoretical results.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号