International Journal of Control, Automation, and Systems 2023; 21(9): 2916-2926
https://doi.org/10.1007/s12555-022-0502-0
© The International Journal of Control, Automation, and Systems
This paper deals with the stochastic stability problem of the closed-loop system under deception attacks based on an adaptive event-triggering scheme (AETS) with saturation constraint. Some novel stability criteria related to networked control systems under deception attacks are devised by taking the fixed threshold which is difficult to adapt to changeable systems into account. An adaptive event-triggering scheme with saturation constraint involving a threshold variable with system states is proposed to reduce network load, and the desired controller gain matrix is obtained by employing the linear matrix inequalities (LMIs) technique. Moreover, the LyapunovKrasovskii method is used to obtain sufficient conditions for ensuring the stability of the system. In the end, the simulation results are shown to indicate the validity of the proposed method.
Keywords Adaptive event-triggering scheme with saturation constraint, deception attacks, networked control systems.
International Journal of Control, Automation, and Systems 2023; 21(9): 2916-2926
Published online September 1, 2023 https://doi.org/10.1007/s12555-022-0502-0
Copyright © The International Journal of Control, Automation, and Systems.
Shuang Liu, Chunmei Duan*, and Wuneng Zhou
Shandong Normal University
This paper deals with the stochastic stability problem of the closed-loop system under deception attacks based on an adaptive event-triggering scheme (AETS) with saturation constraint. Some novel stability criteria related to networked control systems under deception attacks are devised by taking the fixed threshold which is difficult to adapt to changeable systems into account. An adaptive event-triggering scheme with saturation constraint involving a threshold variable with system states is proposed to reduce network load, and the desired controller gain matrix is obtained by employing the linear matrix inequalities (LMIs) technique. Moreover, the LyapunovKrasovskii method is used to obtain sufficient conditions for ensuring the stability of the system. In the end, the simulation results are shown to indicate the validity of the proposed method.
Keywords: Adaptive event-triggering scheme with saturation constraint, deception attacks, networked control systems.
Vol. 21, No. 9, pp. 2771~3126
Yan He, Sida Lin, and Jun Sun*
International Journal of Control, Automation and Systems 2023; 21(2): 464-474Tengli Wang, Chuan Zhou*, Hui Lu, Junda He, and Jian Guo
International Journal of Control, Automation and Systems 2018; 16(1): 197-206Yun-Bo Zhao, Jongrae Kim, Guo-Ping Liu, and David Rees
International Journal of Control, Automation and Systems 2012; 10(5): 1055-1063