Optimal control for 2-D systems under malicious attacks

被引:0
|
作者
Li, Lingling [1 ]
Yang, Rongni [2 ]
Wu, Ligang [1 ,3 ]
机构
[1] Harbin Engn Univ, Coll Intelligent Syst Sci & Engn, Harbin 150001, Peoples R China
[2] Shandong Univ, Sch Control Sci & Engn, Jinan 250061, Peoples R China
[3] Harbin Inst Technol, Sch Astronaut, Harbin 150001, Peoples R China
来源
2022 41ST CHINESE CONTROL CONFERENCE (CCC) | 2022年
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Cyber-physical systems (CPSs); denial-of-service (DoS) attacks; H-infinity control; 2-D Roesser model; CYBER-PHYSICAL SYSTEMS; SLIDING-MODE CONTROL;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper investigates the H-infinity control problem for the cyber-physical systems (CPSs) described by two-dimensional (2-D) Roesser model subject to denial-of-service (DoS) attacks. First of all, the DoS attacks are characterized by the concepts of DoS frequency and DoS duration. Then, according to the intermittent characteristic of DoS attacks, the original 2-D CPSs are rewritten as a class of switched systems. Further, by means of Lyapunov theory for switched systems, the exponential stability and H-infinity noise attenuation performance for the resultant 2-D closed-loop dynamic are discussed. Sufficient conditions for the existence of desired H-infinity controller are established in terms of linear matrix inequalities (LMIs), and then the design scheme of the corresponding controller is transformed into a convex optimization problem. Finally, a simulation example is provided to illustrate the effectiveness of the proposed method.
引用
收藏
页码:4245 / 4250
页数:6
相关论文
共 50 条
  • [11] Optimal control of 2-D systems with non-local terms
    Belbas, S.A.
    System and Control: Theory and Applications, 2000, : 1 - 6
  • [12] Domain decomposition in optimal control of elliptic systems on 2-d networks
    Lagnese, JE
    CONTROL OF DISTRIBUTED PARAMETER AND STOCHASTIC SYSTEMS, 1999, 13 : 63 - 70
  • [13] Optimal Distributed Cooperative Control Strategy for Frequency Restoration in AC Microgrid under Malicious Attacks
    Wang, Xueqi
    Wang, Yaxin
    Chen, Yulin
    Qi, Donglian
    2022 4TH INTERNATIONAL CONFERENCE ON SMART POWER & INTERNET ENERGY SYSTEMS, SPIES, 2022, : 1491 - 1496
  • [14] Event-Triggered Resilient Control for Interconnected Servo Systems Under Malicious Attacks
    Miao, Zhenhai
    Li, Meng
    Chen, Yong
    Zhang, Meng
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (06): : 7590 - 7598
  • [15] Continuous 2-D control systems
    Dymkov, M
    FOURTH INTERNATIONAL WORKSHOP ON MULTIDIMENSIONAL SYSTEMS - NDS 2005, 2005, : 235 - 240
  • [16] NONINTERACTING CONTROL OF 2-D SYSTEMS
    FORNASINI, E
    MARCHESINI, G
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 1991, 36 (01) : 90 - 95
  • [17] Performance of Electric Power Systems Under Physical Malicious Attacks
    Bilis, Evangelos I.
    Kroeger, Wolfgang
    Nan, Cen
    IEEE SYSTEMS JOURNAL, 2013, 7 (04): : 854 - 865
  • [18] Distributed model predictive control for wide area measurement power systems under malicious attacks
    Liu, Andong
    Bai, Liye
    IET CYBER-PHYSICAL SYSTEMS: THEORY & APPLICATIONS, 2018, 3 (03) : 111 - 118
  • [19] Dynamically Triggering Resilient Control for Networked Nonlinear Systems under Malicious Aperiodic DoS Attacks
    Tan, Wei
    Wang, He
    Hou, Huazhou
    Liu, Xiaoxu
    Zheng, Meng
    PROCESSES, 2022, 10 (12)
  • [20] Distributed Secondary Control for Isolated Microgrids under Malicious Attacks
    Lu, Lin-Yu
    Liu, Hao Jan
    Zhu, Hao
    2016 NORTH AMERICAN POWER SYMPOSIUM (NAPS), 2016,