引用本文: | 罗文德,侯林林,宗广灯.具有随机网络攻击的切换信息物理系统的事件触发控制(英文)[J].控制理论与应用,2023,40(2):231~239.[点击复制] |
LUO Wen-de,HOU Lin-lin,ZONG Guang-deng.Event-triggered control of switched cyber-physical systems with stochastic cyber attacks[J].Control Theory and Technology,2023,40(2):231~239.[点击复制] |
|
具有随机网络攻击的切换信息物理系统的事件触发控制(英文) |
Event-triggered control of switched cyber-physical systems with stochastic cyber attacks |
摘要点击 1439 全文点击 444 投稿时间:2021-11-24 修订日期:2022-09-08 |
查看全文 查看/发表评论 下载PDF阅读器 |
DOI编号 10.7641/CTA.2022.11148 |
2023,40(2):231-239 |
中文关键词 切换信息物理系统 事件触发控制 模态依赖平均驻留时间 网络攻击 |
英文关键词 switched cyber-physical system event-triggered control mode-dependent average dwell time cyber attacks |
基金项目 国家自然科学基金 |
|
中文摘要 |
本文研究了随机网络攻击下切换信息物理系统的事件触发控制问题. 将信息物理系统描述为一种切换线性系
统形式. 引入事件触发机制来节省系统资源和减轻网络负载, 当误差超过给定阈值时传感器中的采样数据才通过通信网
络传输到控制器中. 考虑在传感器与控制器的通信网络中受到两种不同特征的随机网络攻击. 在网络攻击和所设计的事
件触发控制器下, 建立了切换随机信息物理系统模型. 利用模态依赖平均驻留时间方法构建了相应的切换信号. 在设计
的事件触发控制器和模态依赖平均驻留时间切换信号下实现了系统的均方指数稳定性, 并给出了控制器增益. 最后, 通
过实例验证了所得理论结果的有效性. |
英文摘要 |
This paper focuses on the issue of event-triggered control against stochastic cyber attacks for switched cyber physical systems. Cyber-physical systems are described as a form of switched linear systems. In order to conserve system
resources and alleviate network load, an event-triggered scheme is introduced, under which the sampled data from the
sensor is transmitted to the controller via the communication network when the defined error exceeds a given threshold.
And two different characteristics of stochastic cyber attacks are considered in the sensor-controller communication network.
Then, under cyber attacks and the designed event-triggered controller, a switched stochastic cyber-physical system model is
established. In addition, by utilizing the mode-dependent average dwell time method, the corresponding switching signal is
constructed. The mean-square exponential stability is guaranteed under the designed event-triggered controller and mode dependent average dwell time switching signal, and the controller gain is presented. Finally, an example is exploited to
verify the validity of the obtained theoretical results. |