Preset-Time Tracking Control for Nonlinear Cyber-Physical Systems Against Cyber Attacks
In this article, we developed a novel preset-time adaptive fuzzy tracking control strategy to dispose of the preset-time tracking control issue for a family of nonlinear cyber-physical systems (CPSs), which are subject to spiteful actuator attacks occurring in controller-actuator (C-A) channel. Part...
Saved in:
Published in | IEEE access Vol. 13; pp. 55094 - 55103 |
---|---|
Main Authors | , , , , , , |
Format | Journal Article |
Language | English |
Published |
IEEE
2025
|
Subjects | |
Online Access | Get full text |
ISSN | 2169-3536 2169-3536 |
DOI | 10.1109/ACCESS.2025.3552438 |
Cover
Abstract | In this article, we developed a novel preset-time adaptive fuzzy tracking control strategy to dispose of the preset-time tracking control issue for a family of nonlinear cyber-physical systems (CPSs), which are subject to spiteful actuator attacks occurring in controller-actuator (C-A) channel. Particularly, a new Gaussian radial basis function neural network (RBFNN) is designed as a neural estimator acting in an on-line pattern to estimate the vitriolic attacks. The designed control strategy can guarantee that the output tracking error enters a predefined small region around the equilibrium point, but also all the other states of the closed-loop system keep semi-globally practical finite-time stable (SGPFS), where the regulation time and tracking accuracy level remain prior known and could be preassigned. Significantly, the initial value of each system state is independent of the developed tracking controller and can be chosen in the constrained region specified by the designed finite-time performance function at random. Finally, a typical application instance is presented to attest the feasibility and effectiveness of the designed control approach. |
---|---|
AbstractList | In this article, we developed a novel preset-time adaptive fuzzy tracking control strategy to dispose of the preset-time tracking control issue for a family of nonlinear cyber-physical systems (CPSs), which are subject to spiteful actuator attacks occurring in controller-actuator (C-A) channel. Particularly, a new Gaussian radial basis function neural network (RBFNN) is designed as a neural estimator acting in an on-line pattern to estimate the vitriolic attacks. The designed control strategy can guarantee that the output tracking error enters a predefined small region around the equilibrium point, but also all the other states of the closed-loop system keep semi-globally practical finite-time stable (SGPFS), where the regulation time and tracking accuracy level remain prior known and could be preassigned. Significantly, the initial value of each system state is independent of the developed tracking controller and can be chosen in the constrained region specified by the designed finite-time performance function at random. Finally, a typical application instance is presented to attest the feasibility and effectiveness of the designed control approach. |
Author | Ren, Wang Zhu, Kaixiong Chen, Zhiliang Zhang, Wei Liu, Yijie Li, Shilin Yu, Ting |
Author_xml | – sequence: 1 givenname: Zhiliang orcidid: 0009-0005-8931-697X surname: Chen fullname: Chen, Zhiliang email: zhiliangchen001@163.com organization: CCTEG Coal Mining Research Institute, Beijing, China – sequence: 2 givenname: Wei surname: Zhang fullname: Zhang, Wei organization: China Coal Research Institute, Beijing, China – sequence: 3 givenname: Ting surname: Yu fullname: Yu, Ting organization: CCTEG Coal Mining Research Institute, Beijing, China – sequence: 4 givenname: Yijie orcidid: 0000-0003-4853-8515 surname: Liu fullname: Liu, Yijie organization: CCTEG Coal Mining Research Institute, Beijing, China – sequence: 5 givenname: Wang surname: Ren fullname: Ren, Wang organization: CCTEG Coal Mining Research Institute, Beijing, China – sequence: 6 givenname: Kaixiong surname: Zhu fullname: Zhu, Kaixiong organization: CCTEG Coal Mining Research Institute, Beijing, China – sequence: 7 givenname: Shilin surname: Li fullname: Li, Shilin organization: CCTEG Coal Mining Research Institute, Beijing, China |
BookMark | eNpNkMtOwzAQRS0EElD6BbDID6RM7DiOl1XEoxICpBaxtCbuuBjSGNnZ9O8JBCFmM6M7umdxztlxH3pi7LKARVGAvl42zc16veDA5UJIyUtRH7EzXlQ6F1JUx__uUzZP6R3GqcdIqjP2-hwp0ZBv_J6yTUT74ftd1oR-iKHLXIjZY-g73xPGrDm0FPPnt0PyFrtsfUgD7VO23KHv0zC9s-UwjJB0wU4cdonmv3vGXm5vNs19_vB0t2qWD7kVQgx5hdJSwZWqWiiRbE2la1ust1sOW9CAIAQCL9sKCmqdloRcucLVpSVdIRcztpq424Dv5jP6PcaDCejNTxDizmAcvO3IKAdlJTW4WlDZAmiUYKVQChFJl_XIEhPLxpBSJPfHK8B8qzaTavOt2vyqHltXU8sT0b-GFqAqJb4AwxR8uQ |
CODEN | IAECCG |
Cites_doi | 10.1109/ACCESS.2022.3206830 10.1109/TNNLS.2021.3107600 10.1016/S0167-6911(00)00089-X 10.1109/TIE.2022.3174289 10.1016/j.neucom.2017.10.009 10.1109/TFUZZ.2020.2988849 10.1016/j.automatica.2017.02.005 10.1109/TNNLS.2020.2985417 10.1109/TCYB.2017.2749511 10.1109/ACCESS.2020.3028222 10.1109/TNNLS.2021.3085324 10.1016/j.fss.2018.12.015 10.1109/ACCESS.2020.3032717 10.1109/TFUZZ.2017.2717804 10.1109/ACCESS.2020.2992475 10.1109/TSMCA.2004.824870 10.1049/iet-cta.2016.0947 10.1109/TPEL.2017.2724580 10.1080/00207721003770569 10.1109/ACCESS.2024.3384413 10.1109/TFUZZ.2020.2981917 10.1109/TCYB.2020.2977175 10.1109/TCYB.2020.2986008 10.1109/TSMC.2019.2961927 10.1109/ACCESS.2022.3191430 10.1109/MED.2008.4601971 10.1016/j.sysconle.2020.104704 10.1109/TFUZZ.2021.3106674 10.1137/S0363012997321358 10.1016/j.automatica.2005.07.001 10.1016/j.automatica.2017.04.024 10.1007/s40815-023-01598-8 10.1109/TFUZZ.2020.3048518 10.1109/TFUZZ.2021.3133903 10.1109/ACCESS.2024.3376682 10.1109/TCYB.2018.2828308 10.1109/ACCESS.2020.2989743 10.1109/TCYB.2024.3429649 10.1016/j.automatica.2004.11.036 10.1109/TAC.2016.2535102 10.3182/20080706-5-KR-1001.00416 10.1109/TII.2019.2956474 10.1080/00207179.2018.1450524 10.1016/j.neucom.2017.10.038 |
ContentType | Journal Article |
DBID | 97E ESBDL RIA RIE AAYXX CITATION DOA |
DOI | 10.1109/ACCESS.2025.3552438 |
DatabaseName | IEEE Xplore (IEEE) IEEE Xplore Open Access Journals IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef DOAJ Directory of Open Access Journals |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 2169-3536 |
EndPage | 55103 |
ExternalDocumentID | oai_doaj_org_article_7f046590f83e4b009a50c5377aaae948 10_1109_ACCESS_2025_3552438 10930767 |
Genre | orig-research |
GrantInformation_xml | – fundername: National Natural Science Foundation of China grantid: 52304140; 52304172 – fundername: Tiandi Science and Technology Company Ltd., Science and Technology Innovation Venture Capital Special Project grantid: 2023-TD-ZD011-003; 2023-TD-ZD011-004 funderid: 10.13039/501100001809 – fundername: National Key Research and Development Program of China grantid: 2023YFC2907600; 2022YFB4703604 |
GroupedDBID | 0R~ 4.4 5VS 6IK 97E AAJGR ABAZT ABVLG ACGFS ADBBV AGSQL ALMA_UNASSIGNED_HOLDINGS BCNDV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD ESBDL GROUPED_DOAJ IPLJI JAVBF KQ8 M43 M~E O9- OCL OK1 RIA RIE RNS AAYXX CITATION RIG |
ID | FETCH-LOGICAL-c333t-6a5ce12776b04aec8e4fbba8dd20d090a033a024b601ebf95ea27f1f84ce96a23 |
IEDL.DBID | RIE |
ISSN | 2169-3536 |
IngestDate | Wed Aug 27 01:25:34 EDT 2025 Tue Jul 01 05:08:36 EDT 2025 Wed Aug 27 02:05:00 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Language | English |
License | https://creativecommons.org/licenses/by/4.0/legalcode |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c333t-6a5ce12776b04aec8e4fbba8dd20d090a033a024b601ebf95ea27f1f84ce96a23 |
ORCID | 0009-0005-8931-697X 0000-0003-4853-8515 |
OpenAccessLink | https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/document/10930767 |
PageCount | 10 |
ParticipantIDs | doaj_primary_oai_doaj_org_article_7f046590f83e4b009a50c5377aaae948 crossref_primary_10_1109_ACCESS_2025_3552438 ieee_primary_10930767 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 20250000 2025-00-00 2025-01-01 |
PublicationDateYYYYMMDD | 2025-01-01 |
PublicationDate_xml | – year: 2025 text: 20250000 |
PublicationDecade | 2020 |
PublicationTitle | IEEE access |
PublicationTitleAbbrev | Access |
PublicationYear | 2025 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
References | ref13 ref35 ref12 ref34 ref15 ref37 ref14 ref36 ref31 ref30 ref11 ref33 ref10 ref32 ref2 ref1 ref17 ref39 ref16 ref38 ref19 ref18 ref24 ref23 ref26 ref25 ref20 ref42 ref41 ref22 ref44 ref21 ref43 ref28 ref27 ref29 ref8 ref7 ref9 ref4 ref3 ref6 ref5 ref40 |
References_xml | – ident: ref6 doi: 10.1109/ACCESS.2022.3206830 – ident: ref35 doi: 10.1109/TNNLS.2021.3107600 – ident: ref39 doi: 10.1016/S0167-6911(00)00089-X – ident: ref15 doi: 10.1109/TIE.2022.3174289 – ident: ref1 doi: 10.1016/j.neucom.2017.10.009 – ident: ref26 doi: 10.1109/TFUZZ.2020.2988849 – ident: ref32 doi: 10.1016/j.automatica.2017.02.005 – ident: ref44 doi: 10.1109/TNNLS.2020.2985417 – ident: ref29 doi: 10.1109/TCYB.2017.2749511 – ident: ref2 doi: 10.1109/ACCESS.2020.3028222 – ident: ref34 doi: 10.1109/TNNLS.2021.3085324 – ident: ref42 doi: 10.1016/j.fss.2018.12.015 – ident: ref7 doi: 10.1109/ACCESS.2020.3032717 – ident: ref28 doi: 10.1109/TFUZZ.2017.2717804 – ident: ref3 doi: 10.1109/ACCESS.2020.2992475 – ident: ref24 doi: 10.1109/TSMCA.2004.824870 – ident: ref40 doi: 10.1049/iet-cta.2016.0947 – ident: ref16 doi: 10.1109/TPEL.2017.2724580 – ident: ref21 doi: 10.1080/00207721003770569 – ident: ref13 doi: 10.1109/ACCESS.2024.3384413 – ident: ref25 doi: 10.1109/TFUZZ.2020.2981917 – ident: ref27 doi: 10.1109/TCYB.2020.2977175 – ident: ref4 doi: 10.1109/TCYB.2020.2986008 – ident: ref33 doi: 10.1109/TSMC.2019.2961927 – ident: ref11 doi: 10.1109/ACCESS.2022.3191430 – ident: ref30 doi: 10.1109/MED.2008.4601971 – ident: ref41 doi: 10.1016/j.sysconle.2020.104704 – ident: ref14 doi: 10.1109/TFUZZ.2021.3106674 – ident: ref19 doi: 10.1137/S0363012997321358 – ident: ref38 doi: 10.1016/j.automatica.2005.07.001 – ident: ref23 doi: 10.1016/j.automatica.2017.04.024 – ident: ref5 doi: 10.1007/s40815-023-01598-8 – ident: ref31 doi: 10.1109/TFUZZ.2020.3048518 – ident: ref36 doi: 10.1109/TFUZZ.2021.3133903 – ident: ref12 doi: 10.1109/ACCESS.2024.3376682 – ident: ref37 doi: 10.1109/TCYB.2018.2828308 – ident: ref8 doi: 10.1109/ACCESS.2020.2989743 – ident: ref10 doi: 10.1109/TCYB.2024.3429649 – ident: ref20 doi: 10.1016/j.automatica.2004.11.036 – ident: ref43 doi: 10.1109/TAC.2016.2535102 – ident: ref22 doi: 10.3182/20080706-5-KR-1001.00416 – ident: ref18 doi: 10.1109/TII.2019.2956474 – ident: ref9 doi: 10.1080/00207179.2018.1450524 – ident: ref17 doi: 10.1016/j.neucom.2017.10.038 |
SSID | ssj0000816957 |
Score | 2.3337295 |
Snippet | In this article, we developed a novel preset-time adaptive fuzzy tracking control strategy to dispose of the preset-time tracking control issue for a family of... |
SourceID | doaj crossref ieee |
SourceType | Open Website Index Database Publisher |
StartPage | 55094 |
SubjectTerms | Actuators Artificial neural networks Asymptotic stability Backstepping Control design cyber attacks Cyber-physical systems Cyberattack exogenous interferences finite-time performance function Perturbation methods Stability analysis Tracking control Trajectory |
SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV09T8MwELUQEwyIjyLKlzwwYurETmyPJaKqkKgYqOgW2c4ZsRRUhYF_zzkOKEwsrEkUO-8c3z3r7h0hV6AahY47YwD4N0mhPXNONiyXDrhxXPqu1-HDopwv5f2qWA1afcWcsCQPnICbqIAMrjA8aAES14ixBfeFUMpaC0Z2Zb7c8AGZ6vZgnZWmUL3MUMbNZFpV-EVICPPiBn1sLmNFysAVdYr9v1qsdB5mtk_2-tCQTtOUDsgWrA_J7kAw8Ig8x4wJaFks3KDoZnw86KZVSjenGH_SRZK-sBtafTrYsMfeDrSXJqfTF_uKIWG6TadtG4vsR2Q5u3uq5qxvjcC8EKJlpS08ZLlSJcJpwWuQwTmrmybnDcJhuRAW3a9DvgUumAJsrkIWtPRgSpuLY7K9flvDCaHIUL3jGplPo2UArp3BMYIxMmucd35Mrr9Rqt-TAkbdMQdu6gRqHUGte1DH5DYi-fNolK_uLqBR696o9V9GHZNRtMNgPIN7UalO_-PlZ2QnTjido5yT7XbzARcYWbTusltEX1xFyKE priority: 102 providerName: Directory of Open Access Journals |
Title | Preset-Time Tracking Control for Nonlinear Cyber-Physical Systems Against Cyber Attacks |
URI | https://ieeexplore.ieee.org/document/10930767 https://doaj.org/article/7f046590f83e4b009a50c5377aaae948 |
Volume | 13 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NS8MwFA9uJz34OXF-jBw82i1r0qY5zuIYgsODw91Kkr6KCFNGd9C_3pekG1MQvJU0NGle0vd-r-_9HiHXIEuJinsYAeBpEjyzkTGijGJhgCnDhPW1Dh-m6WQm7ufJvElW97kwAOCDz6DvLv2__PLdrpyrbOCojxB3yxZp4T4LyVobh4qrIKES2TALYdfBKM_xJRADxkkf1WosXBLKlvbxJP0_qqp4pTI-INP1dEIsyVt_VZu-_frF1Pjv-R6S_ca8pKOwH47IDiyOyd4W6eAJeXZRF1BHLvmDoqqyzllO8xCyTtGGpdNAn6GXNP80sIweG1nSht6cjl70K5qV4TYd1bVL1O-Q2fjuKZ9ETXmFyHLO6yjViYVhLGWKItFgMxCVMTory5iVTDHNONeowg1iNjCVSkDHshpWmbCgUh3zU9JevC_gjFBEudawDNFTmYkKWGYUjlEpJYalscZ2yc162YuPwKJRePTBVBGkVDgpFY2UuuTWiWbT1VFg-wZc3aI5UYWsENonilUZB4EfD6UTZhMupdYalMCHdJxEtsYLwjj_o_2C7Lo5BPfKJWnXyxVcocFRm54H6j2_3b4BwDPUSw |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwELZ4DMDAG_HGAyMpbmzX8VgiqvKqGECwRbZzQQipRVU6wK_nbIeqICGxRY4VO_7s3CN33xFyCqpUKLjbCQCeJsEzl1gryiQVFpi2TLhQ6_Bu0Ok_iutn-dwkq4dcGAAIwWfQ8pfhX345chPvKjv31Edod6t5soiCX8iYrjV1qfgaElqqhlsIO5938xxfA63AVLZQsKbCp6HMyJ9A0_-jrkoQK701MvieUIwmeWtNattyn7-4Gv8943Wy2iiYtBt3xAaZg-EmWZmhHdwiTz7uAurEp39QFFbOu8tpHoPWKWqxdBAJNMyY5h8Wxsl9gyZtCM5p98W8omIZb9NuXftU_W3y2Lt8yPtJU2AhcZzzOukY6aCdKtVBUAy4DERlrcnKMmUl08wwzg0KcYtWG9hKSzCpqtpVJhzojkn5DlkYjoawSyjauc6yDO2nMhMVsMxqHKPSWrRL66zbI2ffy168Rx6NItgfTBcRpcKjVDQo7ZELD820qyfBDg24ukVzpgpVoXEvNasyDgI_H9pI5iRXyhgDWuBDtj0iM-NFMPb_aD8hS_2Hu9vi9mpwc0CW_Xyis-WQLNTjCRyh-lHb47DpvgADQdaj |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Preset-Time+Tracking+Control+for+Nonlinear+Cyber-Physical+Systems+Against+Cyber+Attacks&rft.jtitle=IEEE+access&rft.au=Chen%2C+Zhiliang&rft.au=Zhang%2C+Wei&rft.au=Yu%2C+Ting&rft.au=Liu%2C+Yijie&rft.date=2025&rft.pub=IEEE&rft.eissn=2169-3536&rft.volume=13&rft.spage=55094&rft.epage=55103&rft_id=info:doi/10.1109%2FACCESS.2025.3552438&rft.externalDocID=10930767 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2169-3536&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2169-3536&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2169-3536&client=summon |