首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 328 毫秒
1.
This paper is concerned with the security control problem for a class of networked systems subject to deception attacks and packet dropouts. First, by taking into account the deception attacks and packet dropouts in an unified framework, a discrete-time stochastic system is presented. In virtue of matrix exponential computation, an equivalent discrete-time stochastic model is established. Based on this, the security analysis is given by the law of total expectation and some sufficient conditions are provided. Subsequently, a controller is designed. Finally, the effectiveness of the proposed method is illustrated by two examples including a practical power grid system.  相似文献   

2.
A new distributed fusion receding horizon filtering problem is investigated for uncertain linear stochastic systems with time-delay sensors. First, we construct a local receding horizon Kalman filter having time delays (LRHKFTDs) in both the system and measurement models. The key technique is the derivation of recursive error cross-covariance equations between LRHKFTDs in order to compute the optimal matrix fusion weights. It is the first time to present distributed fusion receding horizon filter for linear discrete-time systems with delayed sensors. It has a parallel structure that enables processing of multisensory time-delay measurements, so the calculation burden can be reduced and it is more reliable than the centralized version if some sensors turn faulty. Simulations for a multiple time-delays system show the effectiveness of the proposed filter in comparison with centralized receding horizon filter and non-receding versions.  相似文献   

3.
This paper focuses on the extended dissipative filter design problem for a class of uncertain semi-Markov jump systems in the discrete-time context, where the parameter uncertainties are assumed to be occurred in a special probabilities way. The aim of this paper is to design a mode-dependent filter ensuring the stochastic stability of the resulting filtering error system. To reduce the burden of communication network, the event-triggered scheme and quantized measurement are employed. By constructing a new Lyapunov functional, the filter design methodology is put forward. Finally, two numerical examples are proposed to demonstrate the usefulness of the filter design methodology.  相似文献   

4.
This paper is devoted to the investigation of the delay-dependent H filtering problem for a class of discrete-time singular Markov jump systems with Wiener process and partly unknown transition probabilities. The class of stochastic singular model under consideration is more general and covers the stochastic singular Markov jump time-varying delay systems with completely known and completely unknown transition probabilities as two special cases. Firstly, based on a stochastic Lyapunov–Krasovskii candidate function and an auxiliary vector function, by employing some appropriate free-weighting matrices, the discretized Jensen inequality and combining them with the structural characteristics of the filtering error system, a set of delay-dependent sufficient conditions are established, which ensure that the filtering error system is stochastically admissible. And then, a singular filter is designed such that the filtering error system is not only regular, causal and stochastically stable, but also satisfy a prescribed H performance for all time-varying delays no larger than a given upper bound. Furthermore, the sufficient conditions for the solvability of the H filtering problem are obtained in terms of a new type of Lyapunov–Krasovskii candidate function and a set of linear matrix inequalities. Finally, simulation examples are presented to illustrate the effectiveness of the proposed method in the paper.  相似文献   

5.
In this paper, a security consistent tracking control scheme with event-triggered strategy and sensor attacks is developed for a class of nonlinear multi-agent systems. For the sensor attacks on the system, a security measurement preselector and a state observer are introduced to combat the impact of the attacks and achieve secure state estimation. In addition, command filtering technology is introduced to overcome the “complexity explosion” caused by the use of the backstepping approach. Subsequently, a new dynamic event-triggered strategy is proposed, in which the triggering conditions are no longer constants but can be adjusted in real time according to the adaptive variables, so that the designed event-triggered mechanism has stronger online update ability. The measurement states are only transmitted through the network based on event-triggered conditions. The proposed adaptive backstepping algorithm not only ensures the security of the system under sensor attacks but also saves network resources and ensures the consistent tracking performance of multi-agent systems. The boundedness of all closed-loop signals is proved by Lyapunov stability analysis. Simulation examples show the effectiveness of the control scheme.  相似文献   

6.
This paper investigates the problem of finite-time outer-synchronization for discrete-time complex networks with Markov jump topology in the presence of communication delays and possible information losses and its application to image encryption. A hybrid control, which is subject to both stochastic jumps and deterministic switches, is proposed to realize finite-time and stochastic outer-synchronization for the concerned networks. By utilizing a stochastic Lyapunov functional combined with the average dwell-time method, sufficient conditions are found such that the synchronization error dynamical system is stochastically stable in finite-time. Two numerical examples are presented to illustrate the effectiveness of the proposed method. Finally, the complex network consists of four coupled Lorenz systems are utilized to generate chaotic sequences and a new chaotic image cryptosystem is constructed to transmit encrypted images based on the synchronized drive-response complex networks. Experiments are conducted by using numerical simulation, and the security is analyzed in terms of key space, key sensitivity, histogram distributions, correlation coefficients, information entropy and differential attack measures. The experimental results show that the proposed chaotic image cryptosystem has the advantages of high security against some classical attacks.  相似文献   

7.
In this article, a fusion estimation scheme is proposed for stochastic uncertain systems with time-correlated fading channels (TFCs). A batch of random variables obeying Gaussian distributions is employed to describe the parameter uncertainties. The sensor communicates with the local filter through a TFC where the evolution of the channel coefficient is characterized by a certain dynamic process with one-step correlated noises. For further analyzing the effects of TFCs, a class of additional variables is first introduced by augmenting the dynamics of channel coefficients and the concerned system. Then, a new group of modified local filters is developed and the unbiasedness of local filters is examined by means of inductive method. Furthermore, the filter gains which minimize the local filtering error covariances are designed for the modified local filters in the simultaneous presence of stochastic uncertainties and TFCs. Subsequently, the cross-covariances among local estimates are computed iteratively and, based on the obtained cross-covariances as well as the unbiased local estimates and their corresponding filtering error covariances, a fusion estimate is obtained by using weighted least square fusion method. Finally, the effectiveness of the proposed fusion estimation scheme is verified by two examples.  相似文献   

8.
This paper studies networked H filtering for Takagi–Sugeno fuzzy systems with multi-output multi-sensor asynchronous sampling. Different output variables in a dynamic system are sampled by multiple sensors with different sampling rates. To estimate the signals of such a system, a continuous multi-rate sampled-data fusion method is proposed to design a novel networked filter. By considering a class of decentralized event-triggered transmission schemes, multi-channel network-induced delays, and the updating modes of the MOMR sampled-data, a networked jumping fuzzy filter is proposed to estimate system signals based on the transmitted multi-rate sampled-data of fuzzy system and the multi-rate sampled states of filter, and the jumping among filter modes is governed by a Markov process which depends on the arrival times of sampled output sub-vectors. To deal with asynchronous membership functions, the networked fuzzy filtering system is modeled as an uncertain fuzzy stochastic system with membership function deviation bounds. Based on stability and H performance analysis, several membership-function-dependent conditions are presented to co-design the event-triggered transmission schemes and the fuzzy filter such that the filtering error system is robustly mean-square exponentially stable with a prescribed H attenuation level. Finally, the improvement in estimation performance and comparison with the existing filtering methods are discussed through simulation examples.  相似文献   

9.
This paper is concerned with the distributed H filtering problem for a class of sensor networks with stochastic sampling. System measurements are collected through a sensor network stochastically and the phenomena such as random measurement missing and quantization are also considered. Firstly, the stochastic sampling process of the sensor network is modeled as a discrete-time Markovian system. Then, the logarithmic quantization effect is transformed into the parameter uncertainty of the filtering system, and a set of binary variables is introduced to model the random measurement missing phenomenon. Finally, the resulting augmented system is modeled as an uncertain Markovian system with multiple random variables. Based on the Lyapunov stability theory and the stochastic system analysis method, a sufficient condition is obtained such that the augmented system is stochastically stable and achieves an average H performance level γ; the design procedure of the optimal distributed filter is also provided. A numerical example is given to demonstrate the effectiveness of the proposed results.  相似文献   

10.
《Journal of The Franklin Institute》2021,358(18):10052-10078
This paper is concerned with the fixed-time quasi-synchronization of coupled memristive neural networks (CMNNs). The communication channel is subject to the deception attack described by the Bernoulli stochastic variable. To reduce signal transmissions, a dual-channel event-triggered mechanism is proposed. In each channel of sensor to controller and controller to actuator, an event-triggered mechanism is designed. Compared with the single event-triggered mechanism in the communication loop, the main difficulties lie in how to deal with the problems of packet scheduling and network attacks. By using Lyapunov method combining with a new proposed lemma, some sufficient conditions are derived to guarantee the leader-following quasi-synchronization of CMNNs. The Zeno behavior is excluded for the designed dual-channel event-triggered mechanism. The influence of the event-triggered mechanism on the estimation of settling time is discussed. Three numerical examples are provided to show the effectiveness of the theoretical results.  相似文献   

11.
This paper investigates output-based dynamic event-triggered control for networked control systems (NCSs), in which hybrid cyber attacks randomly occur in communication network. First, a gain adjustable dynamic output feedback (DOF) controller is designed for NCSs and relaxes state-available constraint in presence of three types of attacks, including stochastic deception attacks, replay attacks and aperiodic denial-of-service (DoS) attacks. Second, a output-based dynamic event-triggered mechanism (DETM) is designed to optimize limited network resources under the cyber attacks. Third, a new switched system is established to describe the effect of hybrid cyber attacks, the DOF controller and the DETM simultaneously. Then, criteria for guaranteeing asymptotically stability of the switched system are obtained. Furthermore, the co-design method of DETM and DOF controller is provided to maintain the NCSs stability. Finally, an example is presented to show the effectiveness of the proposed methods in this paper.  相似文献   

12.
This paper investigates the problem of robust H filtering for switched stochastic systems under asynchronous switching. The so-called asynchronous switching means that the switching between the filters and system modes is asynchronous. The aim is to design a filter ensuring robust exponential mean square stability and a prescribed H performance level for the filtering error systems. Based on the average dwell time approach and piecewise Lyapunov functional technique, sufficient conditions for the existence of the robust H filter are derived, and the proposed filter can be obtained by solving a set of LMIs(linear matrix inequalities). Finally, a numerical example is given to show the effectiveness of the proposed approach.  相似文献   

13.
This paper focuses on the dynamic event-based recursive filtering problem for a class of time-varying networked systems under the encoding-decoding mechanism. For the purpose of saving energy consumption, a dynamic event-triggered protocol is applied to determine whether the measurement of the sensor is transmitted or not. In the transmission process of the measurement, a dynamic-quantization-based encoding-decoding mechanism is introduced to encrypt the transmitted measurement. In specific, the measurement outputs are first encoded into codewords which are then transmitted from the encoder to the decoder. After received by the decoder, the codewords are first decoded and then sent to the filter. A bounded uncertainty is introduced to characterize the difference between the original measurement and the decoded measurement. This paper is devoted to developing a recursive filtering algorithm for the considered system such that a minimal upper bound on the filtering error covariance is derived through appropriately designing filter gain. Moreover, the mean-square exponential boundedness of the filtering error is analyzed. Finally, the efficiency and superiority of the proposed algorithm are verified through two simulation examples.  相似文献   

14.
《Journal of The Franklin Institute》2022,359(18):10558-10577
In this article, a secure exponential synchronization problem is studied for multiplex Cohen-Grossberg neural networks under stochastic deception attacks. In order to resist the malicious attack from attackers modifying the data in transmission module under a certain probability, an attack resistant controller, which has the ability to automatically adjust its own parameters according to external attacks, is designed for each Cohen-Grossberg neural subnet. An exponential adaptive quantitative controlling algorithm is proposed to synchronize Cohen-Grossberg neural network state, and a sufficient criterion is established to realize the synchronization error tends to zero under malicious attacks. Moreover, synchronization mode we study is the synchronization among Cohen-Grossberg neural subnets in multiplex networks. An example is presented to testify the validity of proposed theoretical framework.  相似文献   

15.
In this paper, the problem of fuzzy model-based leader-following consensus control for multi-agent systems (MASs) under deception attacks is investigated. For the sake of alleviating the communication burden, a novel memory-based event-triggered scheme (METS) is first proposed for the considered MASs to reduce redundant data transmission, and the leader-following consensus can be achieved faster with a smaller adjustment error by applying the historical released packets. Considering the designed METS and upper-bounded attacks synthetically, the closed-loop fuzzy system model is well established. Furthermore, with the help of Lyapunov-Krasovskii technique, some sufficient conditions are derived to ensure the consensus of MASs subject to deception attacks. Finally, a simulation example is introduced to manifest the effectiveness of the proposed method.  相似文献   

16.
Network security is becoming a prominent issue for the development of information technology, and intelligent network attacks pose great challenges to system security due to its strong concealment. The existence of these attacks threatens the operation process of the complicated control system. Motivated by such a security problem, we study the secure distributed filtering algorithm under a kind of complex data integrity attack which can attack in two forms. We design a detection mechanism based on local outlier factor to distinguish the rightness of exchanged data, which determines whether to fuse the estimates by comparing the local density (LD) of the estimation of each sensor. Such a detection mechanism does not need the sensor to transmit redundant data information, thus greatly saving calculation cost and improving transmission efficiency. Meanwhile, we optimize the distributed filtering algorithm and obtain a suboptimal estimation gain. Finally, we demonstrate a numerical example to verify the availability of the filtering algorithm, and explore the influence of detector parameters on the performance of the estimation system.  相似文献   

17.
This paper investigates the event-triggered control problem for networked control systems subject to deception attacks. An improved event-triggered scheme is proposed to reduce transmission rate by using both the information of the relative error and the past released signals. Under the proposed event-triggered scheme, a new switched time-delay system model is proposed for the event-triggered control systems. Based on the new model, the exponential mean-square stability criteria are derived by using the constructed Lyapunov function. Then, a co-design method is developed to obtain both trigger parameters and mode-dependent controller gains. Finally, the proposed scheme is verified by an unmanned aerial vehicle system.  相似文献   

18.
In this paper, a dynamically event-triggered filtering problem is investigated for a class of discrete time-varying systems with censored measurements and parameter uncertainties. The censored measurements under consideration are described by the Tobit measurement model. In order to save the communication energy, a dynamically event-triggered mechanism is utilized to decide whether the measurements should be transmitted to the filter or not. The aim of this paper is to design a robust recursive filter such that the filtering error covariance is minimized in certain sense for all the possible censored measurements, parameter uncertainties as well as the effect induced by the dynamically event-triggered mechanism. By means of the mathematical induction, an upper bound is firstly derived for the filtering error covariance in terms of recursive matrix equations. Then, such an upper bound is minimized by designing the filter gain properly. Furthermore, the boundedness is analyzed for the minimized upper bound of the filtering error covariance. Finally, two numerical simulations are exploited to demonstrate the effectiveness of the proposed filtering algorithm.  相似文献   

19.
This work investigates the issue of the dissipativity-based asynchronous filtering for Markov jump discrete-time systems subject to mixed time delays. Different from the existing results on this topic, a kind of distributed time delay is fully considered, which randomly occurs. The aim of this paper is to determine the parameters of the designed asynchronous filter. By utilizing the convex optimization technique and stochastic analysis theory, some new sufficient conditions with less conservatism are established, which ensure the resulting error system is stochastically stable with the extended dissipative performance level. The superiority and availability of the developed approach are finally verified by some comparison examples.  相似文献   

20.
The probabilistic-constrained tracking control issue is investigated for a class of time-varying nonlinear stochastic systems with sensor saturation, deception attacks and limited bandwidth in an unified framework. The saturation of sensors is quantified by a sector-bound-based function satisfying certain conditions, and the random deception attacks are considered and modeled by a random indicator variable. To gain more efficient utilization of communication channels, a Round-Robin (RR) protocol is utilized to orchestrate the transmission order of measurements. The main purposes of this study aim to plan an observer-based tracking controller to achieve the following goals: (1) the related performance indicators of the estimation error is less than given bound at each time step; and (2) the violation probability of the tracking error confined in a predefined scope is supposed to be higher than a prescribed scalar and the area is minimized at each instant. In order to reach these requirements, a group of recursive linear matrix inequalities (RLMIs) are developed to estimate the state and design the tracking controller at the same time. Finally, two simulation examples are exploited to illustrate the availability and flexibility of the proposed scheme.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号