Security event-triggered control for Markovian jump neural networks against actuator saturation and hybrid cyber attacks

This paper studies the problem of event-triggered control for the class of Markovian jump neural networks (MJNNs) under actuator saturation and hybrid cyber attacks. In order to save the limited network bandwidth, the event-triggered mechanism (ETM) is introduce to determine whether the signal of sa...

Full description

Saved in:
Bibliographic Details
Published inJournal of the Franklin Institute Vol. 358; no. 14; pp. 7096 - 7118
Main Authors Deng, Yahan, Lu, Hongqian, Zhou, Wuneng
Format Journal Article
LanguageEnglish
Published Elmsford Elsevier Ltd 01.09.2021
Elsevier Science Ltd
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:This paper studies the problem of event-triggered control for the class of Markovian jump neural networks (MJNNs) under actuator saturation and hybrid cyber attacks. In order to save the limited network bandwidth, the event-triggered mechanism (ETM) is introduce to determine whether the signal of sampler is transmitted to the remote controller through the communication network. With the aid of two sets of Bernoulli distributed random variables (BDRVs), the mathematical model of randomly occurring deception attacks (RODAs) is presented. Due to the limitations of security and technology factors and the complex network environment in practice, actuator saturation and denial-of-service (DoS) attack are also considered. In summary, the MJNNs, ETM, actuator saturation and hybrid cyber attacks are incorporated into a unified construction, and a augmented system under this construction is modeled for the first time. For this system, the existence conditions of event-triggered control are derived through LyapunovKrasovskii functional (LKF). Based on this sufficient condition, the linear matrix inequality (LMI) technique is utilized to obtain the control gain of the controller and the weight matrix of the trigger. Finally, a numerical example is given to verify the effectiveness of the proposed method in this paper.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:0016-0032
1879-2693
0016-0032
DOI:10.1016/j.jfranklin.2021.07.022