H∞ Control for Time-Varying Cyber-Physical System Under Randomly Occurring Hybrid Attacks: The Output Feedback Case
In this paper, the H ∞ control problem for a class of linear time-varying cyber-physical system (CPS) under randomly occurring hybrid attacks in a finite horizon is investigated. The hybrid attacks, including denial of service (DoS) attacks on both sensor-to-controller and controller-to-actuator com...
Saved in:
Published in: | IEEE access Vol. 8; pp. 60780 - 60789 |
---|---|
Main Authors: | , , , |
Format: | Journal Article |
Language: | English |
Published: |
Piscataway
IEEE
2020
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Abstract | In this paper, the H ∞ control problem for a class of linear time-varying cyber-physical system (CPS) under randomly occurring hybrid attacks in a finite horizon is investigated. The hybrid attacks, including denial of service (DoS) attacks on both sensor-to-controller and controller-to-actuator communication channels and false data injection (FDI) attacks on sensors and actuators, aim to destroy the measurement data and control data in order to endanger the functionality of the closed-loop system. The purpose of this paper is to study the relationship between the attack injected signals and the controlled output, and to design the output feedback controller gains so that the H ∞ performance of the closed-loop system is guaranteed over a given finite horizon, meanwhile, the impact of attack signals in the worst case on the linear quadratic performance can be reduced. In order to solve the above problems, both the methods of stochastic analysis and completing squares are utilized to establish the sufficient conditions for the existence of the desired controller, and a finite-horizon controller design algorithm is presented by solving two coupled backward recursive Riccati difference equations (RDEs) subject to some scheduled conditions. At last, the numerical simulation and experimental results are given out to demonstrate the effectiveness of the proposed approach. |
---|---|
AbstractList | In this paper, the H∞ control problem for a class of linear time-varying cyber-physical system (CPS) under randomly occurring hybrid attacks in a finite horizon is investigated. The hybrid attacks, including denial of service (DoS) attacks on both sensor-to-controller and controller-to-actuator communication channels and false data injection (FDI) attacks on sensors and actuators, aim to destroy the measurement data and control data in order to endanger the functionality of the closed-loop system. The purpose of this paper is to study the relationship between the attack injected signals and the controlled output, and to design the output feedback controller gains so that the H∞ performance of the closed-loop system is guaranteed over a given finite horizon, meanwhile, the impact of attack signals in the worst case on the linear quadratic performance can be reduced. In order to solve the above problems, both the methods of stochastic analysis and completing squares are utilized to establish the sufficient conditions for the existence of the desired controller, and a finite-horizon controller design algorithm is presented by solving two coupled backward recursive Riccati difference equations (RDEs) subject to some scheduled conditions. At last, the numerical simulation and experimental results are given out to demonstrate the effectiveness of the proposed approach. In this paper, the H ∞ control problem for a class of linear time-varying cyber-physical system (CPS) under randomly occurring hybrid attacks in a finite horizon is investigated. The hybrid attacks, including denial of service (DoS) attacks on both sensor-to-controller and controller-to-actuator communication channels and false data injection (FDI) attacks on sensors and actuators, aim to destroy the measurement data and control data in order to endanger the functionality of the closed-loop system. The purpose of this paper is to study the relationship between the attack injected signals and the controlled output, and to design the output feedback controller gains so that the H ∞ performance of the closed-loop system is guaranteed over a given finite horizon, meanwhile, the impact of attack signals in the worst case on the linear quadratic performance can be reduced. In order to solve the above problems, both the methods of stochastic analysis and completing squares are utilized to establish the sufficient conditions for the existence of the desired controller, and a finite-horizon controller design algorithm is presented by solving two coupled backward recursive Riccati difference equations (RDEs) subject to some scheduled conditions. At last, the numerical simulation and experimental results are given out to demonstrate the effectiveness of the proposed approach. |
Author | Li, Shanbin Liu, Shan Xu, Bugong Liu, Yonggui |
Author_xml | – sequence: 1 givenname: Shan orcidid: 0000-0003-3399-7081 surname: Liu fullname: Liu, Shan organization: College of Automation Science and Technology, South China University of Technology, Guangzhou, China – sequence: 2 givenname: Yonggui orcidid: 0000-0001-6560-1593 surname: Liu fullname: Liu, Yonggui email: auygliu@scut.edu.cn organization: College of Automation Science and Technology, South China University of Technology, Guangzhou, China – sequence: 3 givenname: Shanbin orcidid: 0000-0003-4989-7392 surname: Li fullname: Li, Shanbin organization: College of Automation Science and Technology, South China University of Technology, Guangzhou, China – sequence: 4 givenname: Bugong orcidid: 0000-0002-7241-8639 surname: Xu fullname: Xu, Bugong organization: College of Automation Science and Technology, South China University of Technology, Guangzhou, China |
BookMark | eNpNUctu2zAQJIoUaJrmC3Ih0LNcUqQksjdDSOoAAVzUTq8EH8tEriy6pHTQH_Qr-nH9ktJVEHQvuxjMDLk779HFEAZA6IaSFaVEflq37e1utypJSValFEQ24g26LGktC1ax-uK_-R26TulAcokMVc0lmjZ_fv3GbRjGGHrsQ8T77gjFdx3nbnjC7WwgFl-f59RZ3ePdnEY44sfBQcTf9ODCsZ_x1topxjN9M5vYObweR21_pM94_wx4O42nacR3AM5kFLc6wQf01us-wfVLv0KPd7f7dlM8bL_ct-uHwrKSicIQ2uhKesGYpKVgwnsPtmLcNWUtnDZV2ZCK0sZ4Sxx3RlJZgSYaiHeaeXaF7hdfF_RBnWJ3zHupoDv1DwjxSek4drYH1UhfE-mZtMJxY0BIRjljGri03BGSvT4uXqcYfk6QRnUIUxzy91XJ821lvn-VWWxh2RhSiuBfX6VEneNSS1zqHJd6iSurbhZVBwCvCkk4rxllfwEqjJMk |
CODEN | IAECCG |
CitedBy_id | crossref_primary_10_1080_00207721_2020_1837287 crossref_primary_10_1109_ACCESS_2021_3063229 crossref_primary_10_1016_j_ins_2021_02_023 crossref_primary_10_1007_s00034_021_01744_3 crossref_primary_10_1109_ACCESS_2020_3044147 crossref_primary_10_1109_TSG_2021_3118801 crossref_primary_10_1109_ACCESS_2023_3337814 crossref_primary_10_1007_s12555_022_0242_1 |
Cites_doi | 10.1109/TAC.2016.2612818 10.1109/MSP.2011.67 10.1049/iet-cta.2016.1226 10.1109/TAC.2017.2691310 10.1109/TCYB.2017.2707590 10.1109/SP.2010.34 10.1016/j.jfranklin.2014.06.010 10.1109/MCS.2014.2364710 10.1109/JPROC.2017.2780172 10.1109/TAC.2014.2303233 10.1109/TCST.2011.2160543 10.1109/CDC.2012.6426811 10.1049/iet-cta.2016.0601 10.1109/TAC.2015.2409905 10.1109/JPROC.2015.2512235 10.1007/978-3-642-00602-9_3 10.1109/TSP.2006.874349 10.1109/ACCESS.2019.2922272 10.1109/ICDCS.Workshops.2008.21 10.1109/TAC.2017.2751999 10.1109/ICDCS.Workshops.2008.40 10.1016/j.automatica.2015.02.024 10.1016/j.jfranklin.2017.12.011 10.1016/j.automatica.2012.06.079 10.1109/TAC.2014.2380671 10.1049/iet-cta.2014.1013 10.1109/TSMC.2017.2758381 10.1016/j.automatica.2015.10.045 10.1016/j.sysconle.2011.08.009 10.1002/rnc.1361 10.1109/ACCESS.2018.2856520 10.1017/S0305004100030929 10.1109/ACCESS.2019.2900551 10.1109/TAC.2017.2652127 10.1109/MCOM.2017.1600292CM |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020 |
DBID | 97E ESBDL RIA RIE AAYXX CITATION 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D DOA |
DOI | 10.1109/ACCESS.2020.2980978 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005-present IEEE Open Access Journals IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library Online CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Engineered Materials Abstracts METADEX Technology Research Database Materials Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Directory of Open Access Journals |
DatabaseTitle | CrossRef Materials Research Database Engineered Materials Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace METADEX Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Materials Research Database |
Database_xml | – sequence: 1 dbid: DOA name: Directory of Open Access Journals url: http://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: ESBDL name: IEEE Open Access Journals url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 2169-3536 |
EndPage | 60789 |
ExternalDocumentID | oai_doaj_org_article_79f609f39c8d4bbe8931433ae49c4d00 10_1109_ACCESS_2020_2980978 9044631 |
Genre | orig-research |
GrantInformation_xml | – fundername: Special Application Project of Guangdong Province grantid: 2016B090927007 – fundername: National Natural Science Foundation of China grantid: 61973128; 61573153; 61703167; 61104107 funderid: 10.13039/501100001809 – fundername: Natural Science Foundation of Guangdong Province grantid: 2019A1515011807 funderid: 10.13039/501100003453 |
GroupedDBID | 0R~ 4.4 5VS 6IK 97E AAJGR ABVLG ACGFS ADBBV ALMA_UNASSIGNED_HOLDINGS BCNDV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD ESBDL GROUPED_DOAJ IFIPE IPLJI JAVBF KQ8 M43 M~E O9- OCL OK1 RIA RIE RIG RNS AAYXX CITATION 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c3238-b017a59f833912838fffec534d7268dab52705117bfc0d4db9195ea0ae0fda3f3 |
IEDL.DBID | ESBDL |
ISSN | 2169-3536 |
IngestDate | Tue Oct 22 15:08:19 EDT 2024 Thu Oct 10 17:03:24 EDT 2024 Fri Aug 23 03:24:41 EDT 2024 Wed Jun 26 19:26:40 EDT 2024 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c3238-b017a59f833912838fffec534d7268dab52705117bfc0d4db9195ea0ae0fda3f3 |
ORCID | 0000-0003-3399-7081 0000-0002-7241-8639 0000-0003-4989-7392 0000-0001-6560-1593 |
OpenAccessLink | https://ieeexplore.ieee.org/document/9044631 |
PQID | 2453690205 |
PQPubID | 4845423 |
PageCount | 10 |
ParticipantIDs | crossref_primary_10_1109_ACCESS_2020_2980978 doaj_primary_oai_doaj_org_article_79f609f39c8d4bbe8931433ae49c4d00 proquest_journals_2453690205 ieee_primary_9044631 |
PublicationCentury | 2000 |
PublicationDate | 20200000 2020-00-00 20200101 2020-01-01 |
PublicationDateYYYYMMDD | 2020-01-01 |
PublicationDate_xml | – year: 2020 text: 20200000 |
PublicationDecade | 2020 |
PublicationPlace | Piscataway |
PublicationPlace_xml | – name: Piscataway |
PublicationTitle | IEEE access |
PublicationTitleAbbrev | Access |
PublicationYear | 2020 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref35 ref13 ref34 ref12 ref15 ref14 ref31 ref30 ref33 ref11 ref32 ref10 ref2 ref1 ref17 ref16 ref19 ref18 ref24 ref23 ref26 ref25 ref20 ref22 ref21 ref28 ref27 ref29 ref8 ref7 ref9 ref4 ref3 ref6 ref5 |
References_xml | – ident: ref30 doi: 10.1109/TAC.2016.2612818 – ident: ref3 doi: 10.1109/MSP.2011.67 – ident: ref7 doi: 10.1049/iet-cta.2016.1226 – ident: ref24 doi: 10.1109/TAC.2017.2691310 – ident: ref25 doi: 10.1109/TCYB.2017.2707590 – ident: ref5 doi: 10.1109/SP.2010.34 – ident: ref8 doi: 10.1016/j.jfranklin.2014.06.010 – ident: ref29 doi: 10.1109/MCS.2014.2364710 – ident: ref9 doi: 10.1109/JPROC.2017.2780172 – ident: ref11 doi: 10.1109/TAC.2014.2303233 – ident: ref28 doi: 10.1109/TCST.2011.2160543 – ident: ref16 doi: 10.1109/CDC.2012.6426811 – ident: ref6 doi: 10.1049/iet-cta.2016.0601 – ident: ref27 doi: 10.1109/TAC.2015.2409905 – ident: ref4 doi: 10.1109/JPROC.2015.2512235 – ident: ref12 doi: 10.1007/978-3-642-00602-9_3 – ident: ref20 doi: 10.1109/TSP.2006.874349 – ident: ref14 doi: 10.1109/ACCESS.2019.2922272 – ident: ref2 doi: 10.1109/ICDCS.Workshops.2008.21 – ident: ref13 doi: 10.1109/TAC.2017.2751999 – ident: ref10 doi: 10.1109/ICDCS.Workshops.2008.40 – ident: ref23 doi: 10.1016/j.automatica.2015.02.024 – ident: ref32 doi: 10.1016/j.jfranklin.2017.12.011 – ident: ref22 doi: 10.1016/j.automatica.2012.06.079 – ident: ref19 doi: 10.1109/TAC.2014.2380671 – ident: ref15 doi: 10.1049/iet-cta.2014.1013 – ident: ref33 doi: 10.1109/TSMC.2017.2758381 – ident: ref26 doi: 10.1016/j.automatica.2015.10.045 – ident: ref21 doi: 10.1016/j.sysconle.2011.08.009 – ident: ref35 doi: 10.1002/rnc.1361 – ident: ref17 doi: 10.1109/ACCESS.2018.2856520 – ident: ref34 doi: 10.1017/S0305004100030929 – ident: ref31 doi: 10.1109/ACCESS.2019.2900551 – ident: ref18 doi: 10.1109/TAC.2017.2652127 – ident: ref1 doi: 10.1109/MCOM.2017.1600292CM |
SSID | ssj0000816957 |
Score | 2.2486022 |
Snippet | In this paper, the H ∞ control problem for a class of linear time-varying cyber-physical system (CPS) under randomly occurring hybrid attacks in a finite... In this paper, the H∞ control problem for a class of linear time-varying cyber-physical system (CPS) under randomly occurring hybrid attacks in a finite... |
SourceID | doaj proquest crossref ieee |
SourceType | Open Website Aggregation Database Publisher |
StartPage | 60780 |
SubjectTerms | <italic xmlns:ali="http://www.niso.org/schemas/ali/1.0/" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">H ∞ control Actuators Algorithms Closed loop systems Control data (computers) Control systems design Controllers Cyber-physical system Denial of service attacks Difference equations Feedback control H-infinity control Horizon hybrid attacks Hybrid systems Output feedback Riccati equations Security Sensor systems Stochastic processes Time-varying systems |
SummonAdditionalLinks | – databaseName: Directory of Open Access Journals dbid: DOA link: http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1BbxQhFCa1p3ow1WrcWg2HHotlBhjA2zp2syfbtGq8ERjgpNtmO3PYf-Cv8Mf1l_jeMN1s4sGLcyQTBt4HfDyG9z1CTqNIPsHGldkUPZNRdMyYrJkyGZ7EY1IYjby80Z-_m08XKJOzTfWFd8KKPHAx3Lm2ueE2C9uZKENIwK9A8cInaTsZefHWebPjTI1rsKkaq_QkM1Rxez5vW-gROIQ1f19bw8fEajtUNCr2TylW_lqXR7JZHJJn0y6RzkvrnpO9tHpBnu5oBx6RYfnw6zdty01zCltPitEc7JtfY-ASbTchrdnVhAItwuR0zHJEr_0q3v78saEoMbzG6uhyg5FbdN73GHP_gcLooZdDfzf0dAH8FqCUtkB4L8nXxcWXdsmmHAqsE8DGLMCM88pmI4QFKhIIQeqUkFHXjYk-qFrDvKx0yB2PMgZbWZU894nn6EUWr8j-6naVXhNa1TqZCP6V6VDEL3mpedbZeJ5EUFrOyNmjOd1dkcpwo4vBrSvWd2h9N1l_Rj6iybevos71WADouwl99y_0Z-QIAdtWYvH_tKhm5OQRQDfNyXtXSyUaCy1Qx__j02_IAXanHMeckP1-PaS35Ml9HN6NY_EPB7nhwA priority: 102 providerName: Directory of Open Access Journals |
Title | H∞ Control for Time-Varying Cyber-Physical System Under Randomly Occurring Hybrid Attacks: The Output Feedback Case |
URI | https://ieeexplore.ieee.org/document/9044631 https://www.proquest.com/docview/2453690205 https://doaj.org/article/79f609f39c8d4bbe8931433ae49c4d00 |
Volume | 8 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NbtQwELZge4EDfwWxpax84Fi33jhe29y26a72gABRQNwiJx6fym61TQ77BjxFH44nYcZxV5XgQk6RlViOPzszY_v7hrF3QYEHdFyFg-BFGVQrrI1GaBvxAhlAExt5dWk-_rAXC5LJOdlzYQAgHT6DU7pNe_lh0_a0VHbmaPeRSNMHhUG_ecQOFpfnFx_2ayqURMJpk8WFptKdzasKvwPDwEKeFs7KlE7tngFKOv05scpff-NkYpZP_69xz9iT7Ery-YD9c_YA1i_Y43sCg4esX_3-dcur4Tg6R_-UE-VDfPdbYjfxatfAVnzOUPFBvZynVEj8i1-Hzc-rHScd4i1Vx1c7onfxedcRMf89xyHGP_Xddd_xJRrBBkt5hVbxJfu2XHytViInWhCtQpMtGpyWXrtolXJorxThBK1WZTDFzAbf6MLg5J2aJrYylKFxU6fBSw8yBq-iesVG680aXjM-LQzYgEGYbUnpD3xpZDTRegmq0aYcs5O73q-vBz2NOsUh0tUDWDWBVWewxuycENo_SmLYqQC7vs5zqzYuzqSLyrU2lE0D6IKhF6g8lK4tg5Rjdkhw7SvJSI3Z8R3edZ64N3VRajVz2AJ99O-33rBH1MBhFeaYjbptD2_Zw5vQT1I8P8mDcpKohH8AWFfiaw |
link.rule.ids | 315,782,786,798,866,2106,4028,27642,27932,27933,27934,54767,54942 |
linkProvider | IEEE |
linkToHtml | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NbtQwELZgewAO_BXEQgEfONatN7bXNrdtuqsgloJoQdwsJx6fYLfaJod9A56Ch-NJ8CTuqhJcyCmyEsvx58n82PMNIW-CAA_JcGUWgmcyiIYZEzVTJqYLeACF2cjVuT77Zk7nSJNzuMuFAYD-8Bkc4W2_lx_WTYehsmOLu4-YNL2XvBpZjMje_PzkdLmLqWARCat0JheacHs8K8v0HckNLPhRYQ3vy6ndUEA9T38urPLX37hXMYsH_ze4h-R-NiXpbMD-EbkFq8fk3g2CwX3SVb9__qLlcBydJvuUYsoH--o3mN1Ey20NG_YpQ0UH9nLal0Kin_0qrH9831LkId5gd7TaYnoXnbUtJua_pWmJ0Y9de9m1dJGUYJ1aaZm04hPyZTG_KCuWCy2wRiSVzeokll7ZaISwSV8JxAkaJWTQxdQEX6tCJ-Gd6Do2PMhQ24lV4LkHHoMXUTwlo9V6Bc8InRQaTEhOmGmQ6Q-81DzqaDwHUSstx-Twevbd5cCn4Xo_hFs3gOUQLJfBGpMTRGj3KJJh9w1p6l2WLadtnHIbhW1MkHUNyQRLVqDwIG0jA-djso9w7TrJSI3JwTXeLgvulSukElObRqCe__ut1-ROdfFh6Zbvzt6_IHdxsENE5oCM2k0HL8ntq9C9ykvzD3eO42I |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=H%E2%88%9E+Control+for+Time-Varying+Cyber-Physical+System+Under+Randomly+Occurring+Hybrid+Attacks%3A+The+Output+Feedback+Case&rft.jtitle=IEEE+access&rft.au=Liu%2C+Shan&rft.au=Liu%2C+Yonggui&rft.au=Li%2C+Shanbin&rft.au=Xu%2C+Bugong&rft.date=2020&rft.pub=IEEE&rft.eissn=2169-3536&rft.volume=8&rft.spage=60780&rft.epage=60789&rft_id=info:doi/10.1109%2FACCESS.2020.2980978&rft.externalDocID=9044631 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2169-3536&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2169-3536&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2169-3536&client=summon |