ADP-Based Security Decentralized Sliding Mode Control for Partially Unknown Large-Scale Systems Under Injection Attacks

In this paper, the decentralized optimal control problem is addressed for a class of large-scale systems subject to injection attacks. All subsystem matrices are considered to be unavailable to the designer. A model-free decentralized sliding mode control (SMC) scheme for each subsystem is designed...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on circuits and systems. I, Regular papers Vol. 67; no. 12; pp. 5290 - 5301
Main Authors Song, Jun, Huang, Long-Yang, Karimi, Hamid Reza, Niu, Yugang, Zhou, Jiale
Format Journal Article
LanguageEnglish
Published New York IEEE 01.12.2020
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:In this paper, the decentralized optimal control problem is addressed for a class of large-scale systems subject to injection attacks. All subsystem matrices are considered to be unavailable to the designer. A model-free decentralized sliding mode control (SMC) scheme for each subsystem is designed via just utilizing its own state information and the known bounds of the interconnections and the injection attacks. Moreover, the adaptive dynamic programming (ADP) approach is incorporated to deal with the infinite horizon optimal control problem for the sliding mode dynamics, which is equivalent to the solution of a set of parallel algebraic Riccati equations. Furthermore, a novel parallel policy iteration algorithm is developed to implement the proposed decentralized SMC scheme without using all subsystems dynamics matrices. Specifically, it is shown that during the whole policy iteration steps, the reachability of each sliding variable and the stability of each sliding mode dynamics are guaranteed simultaneously by the online updating decentralized SMC scheme. Finally, the applicability of the proposed novel ADP-based decentralized SMC strategy is illustrated by a two-machine power system subject to three different injection attacks.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:1549-8328
1558-0806
DOI:10.1109/TCSI.2020.3014253