Sliding Mode Control for Fuzzy Networked Semi-Markov Switching Models Under Cyber Attacks

Wenhai Qi, Caiyu Lv, Guangdeng Zong, Choon Ki Ahn

Research output: Contribution to journalArticlepeer-review

20 Citations (Scopus)

Abstract

Sliding mode control (SMC) is investigated for nonlinear networked stochastic switching systems subject to semi-Markov parameters, in which the model is formulated based on the Takagi-Sugeno (T-S) fuzzy strategy. The occurrences of actuator failures and deception attacks are considered within the framework of networked semi-Markov switching systems. A common sliding surface is designed to prevent instability caused by repeated jumps. Based on the generally uncertain transition rate, sufficient conditions for stochastic stability of the corresponding system are presented. Moreover, in the consideration of actuator failures and deception attacks, the feasibility of the SMC law drives the states toward the specified sliding region. The presented single link robot arm model demonstrates the effectiveness of the theoretical findings.

Original languageEnglish
Pages (from-to)5034-5038
Number of pages5
JournalIEEE Transactions on Circuits and Systems II: Express Briefs
Volume69
Issue number12
DOIs
Publication statusPublished - 2022 Dec 1

Bibliographical note

Funding Information:
This work was supported in part by the National Natural Science Foundation of China under Grant 62073188, Grant 61773235, Grant 61773236, and Grant 61873331; in part by the Natural Science Foundation of Shandong under Grant ZR2019YQ29; and in part by the National Research Foundation of Korea (NRF) Grant funded by the Korea Government (Ministry of Science and ICT) under Grant NRF-2020R1A2C1005449.

Publisher Copyright:
© 2004-2012 IEEE.

Keywords

  • Deception attacks
  • actuator failures
  • uncertain transition rates

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Sliding Mode Control for Fuzzy Networked Semi-Markov Switching Models Under Cyber Attacks'. Together they form a unique fingerprint.

Cite this