Robust adaptive control for nonlinear cyber‐physical systems with FDI attacks via attack estimation
This article investigates the adaptive control problem for nonlinear cyber‐physical systems with network communication encountered false data injection (FDI) attacks. To address such attacks, the attack estimate method is designed whose objective is to minimize the vulnerability of FDI attacks. This...
Saved in:
Published in | International journal of robust and nonlinear control Vol. 33; no. 15; pp. 9299 - 9316 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Bognor Regis
Wiley Subscription Services, Inc
01.10.2023
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | This article investigates the adaptive control problem for nonlinear cyber‐physical systems with network communication encountered false data injection (FDI) attacks. To address such attacks, the attack estimate method is designed whose objective is to minimize the vulnerability of FDI attacks. This article aim to find, using the historical FDI attack,
a
solution with guaranteed out‐of‐sample forecasting, so as for the attacker to plan its attacks such that the worst possible action on the system measurement. The approach is to formulate a robust optimization problem using the box‐like sets, and then transform it into a linear programming model for solving problems. Consequently, under the framework of backstepping, a robust adaptive state‐feedback control method is proposed. By using Lyapunov stability theory, the proposed control scheme can guarantee that all the closed‐loop signals are globally bounded and the stabilization error converges to the origin. Finally, simulation results illustrate the effectiveness of the proposed control scheme. |
---|---|
AbstractList | This article investigates the adaptive control problem for nonlinear cyber‐physical systems with network communication encountered false data injection (FDI) attacks. To address such attacks, the attack estimate method is designed whose objective is to minimize the vulnerability of FDI attacks. This article aim to find, using the historical FDI attack, a solution with guaranteed out‐of‐sample forecasting, so as for the attacker to plan its attacks such that the worst possible action on the system measurement. The approach is to formulate a robust optimization problem using the box‐like sets, and then transform it into a linear programming model for solving problems. Consequently, under the framework of backstepping, a robust adaptive state‐feedback control method is proposed. By using Lyapunov stability theory, the proposed control scheme can guarantee that all the closed‐loop signals are globally bounded and the stabilization error converges to the origin. Finally, simulation results illustrate the effectiveness of the proposed control scheme. This article investigates the adaptive control problem for nonlinear cyber‐physical systems with network communication encountered false data injection (FDI) attacks. To address such attacks, the attack estimate method is designed whose objective is to minimize the vulnerability of FDI attacks. This article aim to find, using the historical FDI attack, a solution with guaranteed out‐of‐sample forecasting, so as for the attacker to plan its attacks such that the worst possible action on the system measurement. The approach is to formulate a robust optimization problem using the box‐like sets, and then transform it into a linear programming model for solving problems. Consequently, under the framework of backstepping, a robust adaptive state‐feedback control method is proposed. By using Lyapunov stability theory, the proposed control scheme can guarantee that all the closed‐loop signals are globally bounded and the stabilization error converges to the origin. Finally, simulation results illustrate the effectiveness of the proposed control scheme. |
Author | Li, Yongming Tong, Shaocheng Chen, Lexin |
Author_xml | – sequence: 1 givenname: Lexin surname: Chen fullname: Chen, Lexin organization: College of Science Liaoning University of Technology Jinzhou China – sequence: 2 givenname: Yongming orcidid: 0000-0003-1789-8278 surname: Li fullname: Li, Yongming organization: College of Science Liaoning University of Technology Jinzhou China – sequence: 3 givenname: Shaocheng orcidid: 0000-0002-7366-7805 surname: Tong fullname: Tong, Shaocheng organization: College of Science Liaoning University of Technology Jinzhou China |
BookMark | eNplUM1KAzEQDlLBtgo-QsCLl61JuslujlKtFgqC9L5ks7M0dbtZk7SyNx_BZ_RJTG1PepoP5vuZ-UZo0NoWELqmZEIJYXeu1RORc3qGhpRImVA2lYMDTmWSSza9QCPvN4TEHUuHCF5tufMBq0p1wewBa9sGZxtcW4ejdWNaUA7rvgT3_fnVrXtvtGqw732ArccfJqzx_GGBVQhKv3m8N-qEMfhgtioY216i81o1Hq5Oc4xW88fV7DlZvjwtZvfLRDPOQ5LlEniVMZWpinPBaw2lgJSWmuWK6UxokeoaWFpRBZQJ4DKtQJeiFISJajpGN0fbztn3XYwvNnbn2phYsFykQmY0ZZE1ObK0s947qAttwu-ZwSnTFJQUhyaL2GRxaDIKbv8IOhcfc_1_6g8L-Xk5 |
CitedBy_id | crossref_primary_10_1002_oca_3096 crossref_primary_10_1002_rnc_7593 crossref_primary_10_1115_1_4066316 crossref_primary_10_1002_acs_3854 crossref_primary_10_1002_rnc_7536 crossref_primary_10_1002_rnc_7832 crossref_primary_10_1016_j_nahs_2025_101575 crossref_primary_10_1109_TCYB_2024_3490656 crossref_primary_10_3934_era_2024306 crossref_primary_10_1002_acs_3720 crossref_primary_10_1002_acs_3797 |
Cites_doi | 10.1109/TAC.2022.3206135 10.1109/TAC.2017.2676679 10.1109/TAC.2021.3130883 10.1016/j.automatica.2019.06.019 10.1016/j.ins.2020.07.022 10.1016/j.automatica.2017.11.018 10.1109/TNNLS.2021.3070623 10.1090/S0002-9904-1943-07859-7 10.1016/j.automatica.2021.109869 10.1109/TAC.2017.2652127 10.1109/TCSI.2021.3116670 10.1002/rnc.4749 10.1016/j.ins.2017.07.029 10.1109/TCYB.2018.2868781 10.1109/TSG.2016.2581588 10.1002/rnc.5498 10.1016/j.automatica.2023.110895 10.1109/TIE.2016.2644606 10.1109/TAC.2015.2492159 10.1109/TAC.2017.2766759 10.1109/TFUZZ.2021.3111453 10.1109/TFUZZ.2021.3070700 10.1109/TSMCB.2011.2108283 10.1016/j.automatica.2018.12.027 |
ContentType | Journal Article |
Copyright | 2023 John Wiley & Sons, Ltd. |
Copyright_xml | – notice: 2023 John Wiley & Sons, Ltd. |
DBID | AAYXX CITATION 7SC 7SP 7TB 8FD FR3 JQ2 L7M L~C L~D |
DOI | 10.1002/rnc.6851 |
DatabaseName | CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Mechanical & Transportation Engineering Abstracts Technology Research Database Engineering Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Mechanical & Transportation Engineering Abstracts Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Engineering Research Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Technology Research Database CrossRef |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1099-1239 |
EndPage | 9316 |
ExternalDocumentID | 10_1002_rnc_6851 |
GroupedDBID | .3N .GA .Y3 05W 0R~ 10A 1L6 1OB 1OC 31~ 33P 3SF 3WU 4.4 50Y 50Z 51W 51X 52M 52N 52O 52P 52S 52T 52U 52W 52X 5GY 5VS 66C 702 7PT 8-0 8-1 8-3 8-4 8-5 8UM 930 A03 AAESR AAEVG AAHHS AAHQN AAMNL AANHP AANLZ AAONW AASGY AAXRX AAYCA AAYXX AAZKR ABCQN ABCUV ABEML ABIJN ABJNI ACAHQ ACBWZ ACCFJ ACCZN ACGFO ACGFS ACIWK ACPOU ACRPL ACSCC ACXBN ACXQS ACYXJ ADBBV ADEOM ADIZJ ADKYN ADMGS ADNMO ADOZA ADXAS ADZMN ADZOD AEEZP AEIGN AEIMD AENEX AEQDE AEUYR AEYWJ AFBPY AFFPM AFGKR AFWVQ AFZJQ AGHNM AGQPQ AGYGG AHBTC AI. AIAGR AITYG AIURR AIWBW AJBDE AJXKR ALAGY ALMA_UNASSIGNED_HOLDINGS ALUQN ALVPJ AMBMR AMVHM AMYDB ASPBG ATUGU AUFTA AVWKF AZBYB AZFZN AZVAB BAFTC BDRZF BFHJK BHBCM BMNLL BMXJE BNHUX BROTX BRXPI BY8 CITATION CMOOK CS3 D-E D-F DCZOG DPXWK DR2 DRFUL DRSTM DU5 EBS EJD F00 F01 F04 FEDTE G-S G.N GNP GODZA H.T H.X HF~ HGLYW HHY HHZ HVGLF HZ~ IX1 J0M JPC KQQ LATKE LAW LC2 LC3 LEEKS LH4 LITHE LOXES LP6 LP7 LUTES LW6 LYRES M59 MEWTI MK4 MRFUL MRSTM MSFUL MSSTM MXFUL MXSTM N04 N05 N9A NF~ NNB O66 O9- P2P P2W P2X P4D PALCI Q.N Q11 QB0 QRW R.K RIWAO RJQFR ROL RX1 RYL SAMSI SUPJJ TUS UB1 V2E VH1 W8V W99 WBKPD WH7 WIH WIK WJL WLBEL WOHZO WQJ WXSBR WYISQ XG1 XV2 ZZTAW ~IA ~WT 7SC 7SP 7TB 8FD AAMMB AEFGJ AGXDD AIDQK AIDYY FR3 JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c255t-789e5d72a7ad5565fceb6e41bc28a2c76c64cfe24d1ae126e594decb6b6026d3 |
ISSN | 1049-8923 |
IngestDate | Fri Jul 25 10:17:44 EDT 2025 Tue Jul 01 01:03:13 EDT 2025 Thu Apr 24 23:05:24 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 15 |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-c255t-789e5d72a7ad5565fceb6e41bc28a2c76c64cfe24d1ae126e594decb6b6026d3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0003-1789-8278 0000-0002-7366-7805 |
PQID | 2864697142 |
PQPubID | 1026344 |
PageCount | 18 |
ParticipantIDs | proquest_journals_2864697142 crossref_citationtrail_10_1002_rnc_6851 crossref_primary_10_1002_rnc_6851 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2023-10-00 20231001 |
PublicationDateYYYYMMDD | 2023-10-01 |
PublicationDate_xml | – month: 10 year: 2023 text: 2023-10-00 |
PublicationDecade | 2020 |
PublicationPlace | Bognor Regis |
PublicationPlace_xml | – name: Bognor Regis |
PublicationTitle | International journal of robust and nonlinear control |
PublicationYear | 2023 |
Publisher | Wiley Subscription Services, Inc |
Publisher_xml | – name: Wiley Subscription Services, Inc |
References | e_1_2_11_10_1 e_1_2_11_14_1 e_1_2_11_12_1 e_1_2_11_11_1 e_1_2_11_7_1 e_1_2_11_6_1 e_1_2_11_28_1 e_1_2_11_5_1 e_1_2_11_27_1 e_1_2_11_4_1 e_1_2_11_26_1 e_1_2_11_2_1 Zhao JP (e_1_2_11_21_1) 2023; 437 Sanislav T (e_1_2_11_3_1) 2012; 14 e_1_2_11_20_1 e_1_2_11_25_1 e_1_2_11_24_1 e_1_2_11_9_1 e_1_2_11_23_1 e_1_2_11_8_1 e_1_2_11_22_1 e_1_2_11_18_1 e_1_2_11_17_1 e_1_2_11_16_1 e_1_2_11_15_1 e_1_2_11_19_1 Yucelen T (e_1_2_11_13_1) 2016; 2 |
References_xml | – ident: e_1_2_11_24_1 doi: 10.1109/TAC.2022.3206135 – ident: e_1_2_11_6_1 doi: 10.1109/TAC.2017.2676679 – ident: e_1_2_11_28_1 doi: 10.1109/TAC.2021.3130883 – ident: e_1_2_11_11_1 doi: 10.1016/j.automatica.2019.06.019 – ident: e_1_2_11_16_1 doi: 10.1016/j.ins.2020.07.022 – ident: e_1_2_11_22_1 doi: 10.1016/j.automatica.2017.11.018 – ident: e_1_2_11_19_1 doi: 10.1109/TNNLS.2021.3070623 – ident: e_1_2_11_23_1 doi: 10.1090/S0002-9904-1943-07859-7 – ident: e_1_2_11_4_1 doi: 10.1016/j.automatica.2021.109869 – ident: e_1_2_11_14_1 doi: 10.1109/TAC.2017.2652127 – ident: e_1_2_11_8_1 doi: 10.1109/TCSI.2021.3116670 – ident: e_1_2_11_15_1 doi: 10.1002/rnc.4749 – ident: e_1_2_11_9_1 doi: 10.1016/j.ins.2017.07.029 – ident: e_1_2_11_7_1 doi: 10.1109/TCYB.2018.2868781 – ident: e_1_2_11_2_1 doi: 10.1109/TSG.2016.2581588 – ident: e_1_2_11_17_1 doi: 10.1002/rnc.5498 – ident: e_1_2_11_26_1 doi: 10.1016/j.automatica.2023.110895 – volume: 14 start-page: 28 issue: 2 year: 2012 ident: e_1_2_11_3_1 article-title: Cyber‐physical systems‐concept challenges and research areas publication-title: J Control Eng Appl Inform – volume: 437 issue: 15 year: 2023 ident: e_1_2_11_21_1 article-title: Fuzzy adaptive secure tracking control against unknown false data injection attacks for uncertain nonlinear systems with input quantization publication-title: Appl Math Comput – ident: e_1_2_11_25_1 doi: 10.1109/TIE.2016.2644606 – volume: 2 start-page: 1165 issue: 1 year: 2016 ident: e_1_2_11_13_1 article-title: Adaptive control architectures for mitigating sensor attacks in cyber‐physical systems publication-title: Cyber Phys Syst – ident: e_1_2_11_10_1 doi: 10.1109/TAC.2015.2492159 – ident: e_1_2_11_12_1 doi: 10.1109/TAC.2017.2766759 – ident: e_1_2_11_20_1 doi: 10.1109/TFUZZ.2021.3111453 – ident: e_1_2_11_18_1 doi: 10.1109/TFUZZ.2021.3070700 – ident: e_1_2_11_27_1 doi: 10.1109/TSMCB.2011.2108283 – ident: e_1_2_11_5_1 doi: 10.1016/j.automatica.2018.12.027 |
SSID | ssj0009924 |
Score | 2.4442248 |
Snippet | This article investigates the adaptive control problem for nonlinear cyber‐physical systems with network communication encountered false data injection (FDI)... |
SourceID | proquest crossref |
SourceType | Aggregation Database Enrichment Source Index Database |
StartPage | 9299 |
SubjectTerms | Adaptive control Control methods Feedback control Linear programming Nonlinear control Optimization Problem solving Robust control |
Title | Robust adaptive control for nonlinear cyber‐physical systems with FDI attacks via attack estimation |
URI | https://www.proquest.com/docview/2864697142 |
Volume | 33 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3LbhMxFLVCu4EFggKitCAjIbEYTWkcj2e8REBVUMuiSqV2NfKTh2gapZMKWPEJ_cZ-Sa9f8aR0UdiMLGcezpwTX1_n3nMRelVb0jSC2tJKv1sFP0WplSyp0kISS7ny_57vf2a7h_TTUXU0GFz0opbmndxSv2_MK_kfVKEPcHVZsv-A7OKm0AFtwBeOgDAcb4Xxwamcn3WF0GLqI4BS3LkLHZwEDQwxK9QvCbikoIZpAiZoOMfstp33HwvRdS7hvjh3eVq-XTgJjpOM3fcc9p53EXvaE7M4nonuPz4MKscRhIluz_z8lsOBfEzB8enky0kypX7nO-5lfxWurlf8IG5RkBzslmZVcEPKhofE4i0T-7irwxCUjNJUHDQxEuWq3sQKqzjeM9J8FDI0_zIAQVB2BnMra6KS7ZLG9jXbt4hIDOrNpIUrW3flHbRKwPHwTvpBFiTjPJRJTl8oyRlvkzfpmcsLnGX77hct4wfofvQ28NtAnYdoYCZr6F5Pg_IRMoFEOJEIR7wwkAgvUMSeRJd_LhJ9cKQPdvTBQB8c6YOBPrGNM30eo_HOh_G73TLW3igVOJldWTfcVLomoha6gkW_VUYyQ4dSkUYQVTPFqLKGUD0UZkiYqTjVRkkmXU0zPXqCVmCI5inCisuREJaDp7BNtRSAZGO1rLSlEkycXUev0_tqVdSld-VRfrTXMVlHLxdnToMWyw3nbKZX3kb-n7WkYZTxekjJs1vcYgPdzSTeRCvdbG6ew8qzky88Ga4AGgeNaA |
linkProvider | Wiley-Blackwell |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Robust+adaptive+control+for+nonlinear+cyber%E2%80%90physical+systems+with+FDI+attacks+via+attack+estimation&rft.jtitle=International+journal+of+robust+and+nonlinear+control&rft.au=Chen%2C+Lexin&rft.au=Li%2C+Yongming&rft.au=Tong%2C+Shaocheng&rft.date=2023-10-01&rft.issn=1049-8923&rft.eissn=1099-1239&rft.volume=33&rft.issue=15&rft.spage=9299&rft.epage=9316&rft_id=info:doi/10.1002%2Frnc.6851&rft.externalDBID=n%2Fa&rft.externalDocID=10_1002_rnc_6851 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1049-8923&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1049-8923&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1049-8923&client=summon |