Adaptive Resilient Control for Cyber-Physical Systems Under Cyberattack and Input Saturation

This article investigates the resilient control problem for nonlinear cyber-physical systems with hybrid cyberattacks and physical constraints, including aperiodic denial-of-service attacks, deception attacks, input saturation, and external disturbances. The underlying system is described by the fuz...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on industrial informatics Vol. 19; no. 5; pp. 6513 - 6524
Main Authors Lian, Zhi, Shi, Peng, Lim, Cheng-Chew
Format Journal Article
LanguageEnglish
Published Piscataway IEEE 01.05.2023
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
Abstract This article investigates the resilient control problem for nonlinear cyber-physical systems with hybrid cyberattacks and physical constraints, including aperiodic denial-of-service attacks, deception attacks, input saturation, and external disturbances. The underlying system is described by the fuzzy model by decomposing the nonlinear plant into some local linear subsystems. An input saturating integrator and an antiwindup compensator are introduced inside a dynamic output feedback fuzzy controller to handle the input saturation in both amplitude and rate. Within the resulting fuzzy-model-based control framework, a novel adaptive event-triggered-based resilient control method is proposed to ensure that the insecure and imperfect system is stochastically stable with an <inline-formula><tex-math notation="LaTeX">H_\infty</tex-math></inline-formula> performance level. Simulation results of an autonomous vehicle operating in a wireless network environment are provided to verify the effectiveness of the proposed control method.
AbstractList This article investigates the resilient control problem for nonlinear cyber-physical systems with hybrid cyberattacks and physical constraints, including aperiodic denial-of-service attacks, deception attacks, input saturation, and external disturbances. The underlying system is described by the fuzzy model by decomposing the nonlinear plant into some local linear subsystems. An input saturating integrator and an antiwindup compensator are introduced inside a dynamic output feedback fuzzy controller to handle the input saturation in both amplitude and rate. Within the resulting fuzzy-model-based control framework, a novel adaptive event-triggered-based resilient control method is proposed to ensure that the insecure and imperfect system is stochastically stable with an [Formula Omitted] performance level. Simulation results of an autonomous vehicle operating in a wireless network environment are provided to verify the effectiveness of the proposed control method.
This article investigates the resilient control problem for nonlinear cyber-physical systems with hybrid cyberattacks and physical constraints, including aperiodic denial-of-service attacks, deception attacks, input saturation, and external disturbances. The underlying system is described by the fuzzy model by decomposing the nonlinear plant into some local linear subsystems. An input saturating integrator and an antiwindup compensator are introduced inside a dynamic output feedback fuzzy controller to handle the input saturation in both amplitude and rate. Within the resulting fuzzy-model-based control framework, a novel adaptive event-triggered-based resilient control method is proposed to ensure that the insecure and imperfect system is stochastically stable with an <inline-formula><tex-math notation="LaTeX">H_\infty</tex-math></inline-formula> performance level. Simulation results of an autonomous vehicle operating in a wireless network environment are provided to verify the effectiveness of the proposed control method.
Author Shi, Peng
Lian, Zhi
Lim, Cheng-Chew
Author_xml – sequence: 1
  givenname: Zhi
  orcidid: 0000-0002-8637-1704
  surname: Lian
  fullname: Lian, Zhi
  email: zhi.lian@adelaide.edu.au
  organization: School of Electrical and Electronic Engineering, The University of Adelaide, Adelaide, SA, Australia
– sequence: 2
  givenname: Peng
  orcidid: 0000-0001-8218-586X
  surname: Shi
  fullname: Shi, Peng
  email: peng.shi@adelaide.edu.au
  organization: School of Electrical and Electronic Engineering, The University of Adelaide, Adelaide, SA, Australia
– sequence: 3
  givenname: Cheng-Chew
  orcidid: 0000-0002-2463-9760
  surname: Lim
  fullname: Lim, Cheng-Chew
  email: cheng.lim@adelaide.edu.au
  organization: School of Electrical and Electronic Engineering, The University of Adelaide, Adelaide, SA, Australia
BookMark eNo9kN1LwzAUxYMouE3fBV8CPncmadLmPo7iR2GguO1NCGmbYmeX1iQV-t_bseHTPdx7zj3wm6NL21mD0B0lS0oJPG7zfMkIY8uYgkwALtCMAqcRIYJcTloIGsWMxNdo7v2ekDglMczQ56rSfWh-Df4wvmkbYwPOOhtc1-K6czgbC-Oi96_RN6Vu8Wb0wRw83tnKnI86BF1-Y20rnNt-CHijwzBtm87eoKtat97cnucC7Z6fttlrtH57ybPVOioZ0BDRspapYIKxgjGhSSpKMJBqWgkGopRgKOcJTYShk05TzmVZFAkvgBNZA8QL9HD627vuZzA-qH03ODtVKiYJSOAxTSYXOblK13nvTK161xy0GxUl6shQTQzVkaE6M5wi96dIY4z5t4MUaTIR_ANQUG4b
CODEN ITIICH
CitedBy_id crossref_primary_10_1016_j_jfranklin_2024_106999
crossref_primary_10_1002_acs_3854
crossref_primary_10_1109_TII_2024_3376775
crossref_primary_10_1016_j_chaos_2024_114553
crossref_primary_10_1088_1674_1056_acb91b
crossref_primary_10_1016_j_jfranklin_2023_10_040
crossref_primary_10_1109_TPWRS_2023_3319699
Cites_doi 10.1109/TAC.2020.2989773
10.1109/TII.2021.3097722
10.1109/TAC.2014.2374712
10.1109/TII.2020.3009985
10.1109/TCYB.2021.3068220
10.1016/j.ins.2021.03.050
10.1109/TCYB.2020.3003752
10.1109/TCYB.2020.2989320
10.1109/TCYB.2020.2977056
10.1109/TCSII.2020.3028105
10.1109/TFUZZ.2020.3012771
10.1109/TFUZZ.2022.3148875
10.1109/TFUZZ.2021.3134745
10.1002/rnc.4837
10.1109/TSMC.2019.2912846
10.1109/TCYB.2021.3051963
10.1109/TCYB.2020.3015507
10.1109/TCYB.2022.3151880
10.1109/TCYB.2018.2861834
10.1109/TCSII.2019.2908500
10.1109/TCYB.2017.2659698
10.1109/TCYB.2021.3090398
10.1109/TNNLS.2021.3105664
10.1109/TFUZZ.2021.3069345
10.1109/TCYB.2021.3078572
10.1109/TCYB.2020.2992518
10.1109/TII.2021.3058413
10.1016/j.arcontrol.2019.04.011
10.1109/TCSI.2020.3007953
10.1109/TII.2020.3043802
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
DOI 10.1109/TII.2022.3198699
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005-present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList Technology Research Database

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library Online
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1941-0050
EndPage 6524
ExternalDocumentID 10_1109_TII_2022_3198699
9857600
Genre orig-research
GrantInformation_xml – fundername: China Scholarship Council
  grantid: 201706410099
  funderid: 10.13039/501100004543
– fundername: Australian Research Council
  grantid: DP170102644
  funderid: 10.13039/501100000923
GroupedDBID 0R~
29I
4.4
5GY
5VS
6IK
97E
AAJGR
AASAJ
ABQJQ
ABVLG
ACGFS
ACIWK
AENEX
AETIX
AKJIK
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
HZ~
IFIPE
IPLJI
JAVBF
LAI
M43
O9-
OCL
P2P
RIA
RIE
RIG
RNS
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c291t-1cf8752522b225a075c9e97a1d5295c89e1446165e189e77448cbb64b9408f993
IEDL.DBID RIE
ISSN 1551-3203
IngestDate Thu Oct 10 19:51:40 EDT 2024
Fri Aug 23 03:12:03 EDT 2024
Wed Jun 26 19:27:56 EDT 2024
IsPeerReviewed false
IsScholarly true
Issue 5
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c291t-1cf8752522b225a075c9e97a1d5295c89e1446165e189e77448cbb64b9408f993
ORCID 0000-0001-8218-586X
0000-0002-8637-1704
0000-0002-2463-9760
PQID 2809894316
PQPubID 85507
PageCount 12
ParticipantIDs crossref_primary_10_1109_TII_2022_3198699
ieee_primary_9857600
proquest_journals_2809894316
PublicationCentury 2000
PublicationDate 2023-05-01
PublicationDateYYYYMMDD 2023-05-01
PublicationDate_xml – month: 05
  year: 2023
  text: 2023-05-01
  day: 01
PublicationDecade 2020
PublicationPlace Piscataway
PublicationPlace_xml – name: Piscataway
PublicationTitle IEEE transactions on industrial informatics
PublicationTitleAbbrev TII
PublicationYear 2023
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref12
ref15
ref14
ref30
ref11
ref10
ref2
ref1
ref17
ref16
ref19
ref18
ref24
ref23
ref26
ref25
ref20
ref22
ref21
ref28
ref27
ref29
ref8
ref7
ref9
ref4
ref3
ref6
ref5
References_xml – ident: ref24
  doi: 10.1109/TAC.2020.2989773
– ident: ref4
  doi: 10.1109/TII.2021.3097722
– ident: ref29
  doi: 10.1109/TAC.2014.2374712
– ident: ref1
  doi: 10.1109/TII.2020.3009985
– ident: ref9
  doi: 10.1109/TCYB.2021.3068220
– ident: ref14
  doi: 10.1016/j.ins.2021.03.050
– ident: ref15
  doi: 10.1109/TCYB.2020.3003752
– ident: ref12
  doi: 10.1109/TCYB.2020.2989320
– ident: ref10
  doi: 10.1109/TCYB.2020.2977056
– ident: ref6
  doi: 10.1109/TCSII.2020.3028105
– ident: ref11
  doi: 10.1109/TFUZZ.2020.3012771
– ident: ref22
  doi: 10.1109/TFUZZ.2022.3148875
– ident: ref16
  doi: 10.1109/TFUZZ.2021.3134745
– ident: ref23
  doi: 10.1002/rnc.4837
– ident: ref26
  doi: 10.1109/TSMC.2019.2912846
– ident: ref25
  doi: 10.1109/TCYB.2021.3051963
– ident: ref8
  doi: 10.1109/TCYB.2020.3015507
– ident: ref3
  doi: 10.1109/TCYB.2022.3151880
– ident: ref20
  doi: 10.1109/TCYB.2018.2861834
– ident: ref27
  doi: 10.1109/TCSII.2019.2908500
– ident: ref30
  doi: 10.1109/TCYB.2017.2659698
– ident: ref21
  doi: 10.1109/TCYB.2021.3090398
– ident: ref28
  doi: 10.1109/TNNLS.2021.3105664
– ident: ref7
  doi: 10.1109/TFUZZ.2021.3069345
– ident: ref18
  doi: 10.1109/TCYB.2021.3078572
– ident: ref19
  doi: 10.1109/TCYB.2020.2992518
– ident: ref13
  doi: 10.1109/TII.2021.3058413
– ident: ref17
  doi: 10.1016/j.arcontrol.2019.04.011
– ident: ref5
  doi: 10.1109/TCSI.2020.3007953
– ident: ref2
  doi: 10.1109/TII.2020.3043802
SSID ssj0037039
Score 2.5080948
Snippet This article investigates the resilient control problem for nonlinear cyber-physical systems with hybrid cyberattacks and physical constraints, including...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Publisher
StartPage 6513
SubjectTerms Adaptive control
Adaptive event-triggered control
Adaptive systems
Antiwindup compensators
Control methods
Cyber-physical systems
cyber-physical systems (CPSs)
Cyberattack
Denial of service attacks
Fuzzy control
hybrid cyberattacks
Hybrid systems
input saturation
Linear systems
Nonlinear control
Nonlinear systems
Output feedback
Resilience
Symmetric matrices
Takagi-Sugeno model
Uncertainty
Windup
Wireless networks
Title Adaptive Resilient Control for Cyber-Physical Systems Under Cyberattack and Input Saturation
URI https://ieeexplore.ieee.org/document/9857600
https://www.proquest.com/docview/2809894316
Volume 19
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8QwEB7Ukx58i-uLHLwIZrePtE2OsrjsCoqoC3sQSpJOQVa6y2570F9vkrYq6sFboC2EfMnkm87MNwDnkXGROYaSKsYCyjLPo8IYS6oSHScSDUOObIHz7V08HLObSTRZgcvPWhhEdMln2LVDF8vPZrqyv8p6gkc2jrQKq4kQda1Wa3VDs3OF00aNfBoGXtiGJD3RexqNjCMYBMY_FTx2Kq9fV5DrqfLLELvbZbAFt-286qSSabcqVVe__5Bs_O_Et2GzoZnkqt4XO7CCxS5sfBMf3IPnq0zOrbEjD7h8ebV1kaRfJ64Tw2RJ_03hgt43OJJG2py4Rkn1Q1mWUk-JLDIyKuZVSR6tSqiDeh_Gg-un_pA2vRaoDoRfUl_nBpfAsDFlTrg0REILFIn0MxsJ1FygdRz9OELfjA1nZFwrFTMlmMdzQ3IOYK2YFXgIxBNZzEMurafE8gSF0AwjhTzOrU4kduCiXf50XktqpM4V8URqoEotVGkDVQf27Gp-vtcsZAdOWrzS5swt04B7Tk3ej4_-_uoY1m2z-Dpd8QTWykWFp4ZSlOrM7aUP8_HG5w
link.rule.ids 315,783,787,799,27938,27939,55088
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEB5qPagH32J95uBFMHUf2W1ylKK0akW0ggdhSbJTkMq2tNuD_nqT7G4V9eAtsLsQ8iWTb3ZmvgE4iYyLzDGUVDEWUJZ6HhXGWFLV0nFLomHIkS1w7t3FnSd2_Rw91-BsXguDiC75DJt26GL56UjP7K-yc8EjG0dagMXI8oqiWquyu6HZu8Kpo0Y-DQMvrIKSnjjvd7vGFQwC46EKHjud169LyHVV-WWK3f1ytQa9amZFWsmwOctVU3_8EG3879TXYbUkmuSi2BkbUMNsE1a-yQ9uwctFKsfW3JEHnL6-2cpI0i5S14nhsqT9rnBC70skSSluTlyrpOKhzHOph0RmKelm41lOHq1OqAN7G56uLvvtDi27LVAdCD-nvh4YZALDx5Q549JQCS1QtKSf2lig5gKt6-jHEfpmbFgj41qpmCnBPD4wNGcH6tkow10gnkhjHnJpfSU2aKEQmmGkkMcDqxSJDTitlj8ZF6IaiXNGPJEYqBILVVJC1YAtu5rz98qFbMBBhVdSnrppEnDP6cn78d7fXx3DUqffu01uu3c3-7BsW8cXyYsHUM8nMzw0BCNXR25ffQKLX8o0
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Adaptive+Resilient+Control+for+Cyber-Physical+Systems+Under+Cyberattack+and+Input+Saturation&rft.jtitle=IEEE+transactions+on+industrial+informatics&rft.au=Lian%2C+Zhi&rft.au=Shi%2C+Peng&rft.au=Cheng-Chew%2C+Lim&rft.date=2023-05-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.issn=1551-3203&rft.eissn=1941-0050&rft.volume=19&rft.issue=5&rft.spage=6513&rft_id=info:doi/10.1109%2FTII.2022.3198699&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1551-3203&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1551-3203&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1551-3203&client=summon