Adaptive Event-Triggered Control of Networked Fuzzy PDE Systems Under Hybrid Cyber Attacks

Xiaona Song, Renzhi Zhang, Choon Ki Ahn, Shuai Song

Research output: Contribution to journalArticlepeer-review

18 Citations (Scopus)

Abstract

This study focuses on the security control problem of networked fuzzy partial differential equation (PDE) systems under hybrid cyber attacks. First, the nonlinear parabolic PDE system is exactly represented by a Takagi-Sugeno fuzzy PDE model. Second, with taking the insecure transmission network into consideration, a more practical stochastic hybrid cyber attacks model for PDE-based networked control systems is introduced. This model contains both denial-of-service attacks and deception attacks in a unified framework. Then, based on spatially pointwise nonuniform sampled-data measurements, an adaptive event-triggered control scheme with an adjustable threshold is newly designed to counter the hybrid cyber attacks' impact while saving communication resources. Moreover, by constructing a novel Lyapunov-Krasovskii functional and employing some inequality techniques, stability conditions with less conservatism are derived. Finally, the developed method is applied to the Fisher equation to demonstrate its viability and superiority.

Original languageEnglish
Pages (from-to)4211-4223
Number of pages13
JournalIEEE Transactions on Fuzzy Systems
Volume30
Issue number10
DOIs
Publication statusPublished - 2022 Oct 1

Bibliographical note

Publisher Copyright:
© 1993-2012 IEEE.

Keywords

  • Event-triggered mechanism
  • hybrid stochastic cyber attacks
  • networked control systems
  • parabolic partial differential equation (PDE) systems
  • security control

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Computational Theory and Mathematics
  • Artificial Intelligence
  • Applied Mathematics

Fingerprint

Dive into the research topics of 'Adaptive Event-Triggered Control of Networked Fuzzy PDE Systems Under Hybrid Cyber Attacks'. Together they form a unique fingerprint.

Cite this