An outlier‐resistant approach to observer‐based security control for interval type‐2 T‐S fuzzy systems subject to deception attacks
This article focuses on the outlier‐resistant observer‐based controller for the interval type‐2 T‐S fuzzy discrete‐time systems with distributed delays under deception attacks. The deception attack takes place between sensor channel and observer channel. A neoteric guidance for safety performance is...
Saved in:
Published in | IET control theory & applications Vol. 17; no. 1; pp. 39 - 52 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Stevenage
John Wiley & Sons, Inc
01.01.2023
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | This article focuses on the outlier‐resistant observer‐based controller for the interval type‐2 T‐S fuzzy discrete‐time systems with distributed delays under deception attacks. The deception attack takes place between sensor channel and observer channel. A neoteric guidance for safety performance is constructed to explain the randomly happening spoofing offensive on the control structure. The random events of parameter uncertainty and spoofing offensives are controlled via two sets of Bernoulli stochastic variables with foregone probability distributions. One outlier‐resistant observer‐based security control is constructed to induce an innovation saturation structure in order to alleviate the passive influence on the spoofing offensives about the estimation aspect. The goal of the solution is to design an outlier‐resistant observer‐based security control that can insure boundedness in estimation error while achieving the ideal level of safety. Ultimately, a quantitative value simulation sample is put forward to justify the practicality and validity of the above‐mentioned control project. |
---|---|
Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ISSN: | 1751-8644 1751-8652 |
DOI: | 10.1049/cth2.12359 |