Secure Synchronization of Coupled Systems via Double Event-Triggering Mechanisms With Actuator Fault

This paper studies the global exponential synchronization almost surely (GES a.s.) for coupled systems (CSs) with stochastic switching topology by using event-based output feedback control. It is assumed that the sensor-controller channel is subject to stochastic deception attacks and the actuator f...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on network science and engineering Vol. 9; no. 5; pp. 3580 - 3589
Main Authors Xu, Zhilu, Tang, Rongqiang, Sun, Yaping, Li, Xiaodi, Yang, Xinsong
Format Journal Article
LanguageEnglish
Published Piscataway IEEE 01.09.2022
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:This paper studies the global exponential synchronization almost surely (GES a.s.) for coupled systems (CSs) with stochastic switching topology by using event-based output feedback control. It is assumed that the sensor-controller channel is subject to stochastic deception attacks and the actuator faults may occur to some modes. Novel double mode-dependent adaptive event-triggering mechanisms (ETMs) are introduced based on sampled data technique. Not only the Zeno phenomenon is naturally excluded, but also the asynchronous phenomenon is skillfully avoided. Based on the Lyapunov-Krasovskii functional method and the linear matrix inequality (LMI) technology, some sufficient conditions are presented to guarantee GES a.s. of the concerned system. Moreover, the event-based output feedback controller and the double ETMs can be designed by solving LMIs. In addition, an event-based pinning control is considered and some sufficient conditions are presented. As a theoretic application, our proposed results can be applied to secure synchronization problem for CSs subject to stochastic mixed attacks consisting of denial-of-service (DoS) attacks and deception attacks. Finally, two numerical examples are presented to demonstrate the effectiveness and the merits of the theoretical analysis.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:2327-4697
2334-329X
DOI:10.1109/TNSE.2022.3177718