期刊文献+

Adaptive output regulation for cyber-physical systems under time-delay attacks

原文传递
导出
摘要 In this paper,we present an output regulation method for unknown cyber-physical systems(CPSs)under time-delay attacks in both the sensor-to-controller(S-C)channel and the controller-to-actuator(C-A)channel.The proposed approach is designed using control inputs and tracking errors which are accessible data.Reinforcement learning is leveraged to update the control gains in real time using policy or value iterations.A thorough stability analysis is conducted and it is found that the proposed controller can sustain the convergence and asymptotic stability even when two channels are attacked.Finally,comparison results with a simulated CPS verify the effectiveness of the proposed output regulation method.
出处 《Control Theory and Technology》 EI CSCD 2022年第1期20-31,共12页 控制理论与技术(英文版)
基金 the National Natural Science Foundation of China(Nos.61973277,62073292) the Zhejiang Provincial Natural Science Foundation of China(No.LR20F030004).
  • 相关文献

参考文献5

二级参考文献44

  • 1Zhang, Shijie, Duan, Guangren.Consensus seeking in multiagent cooperative control systems with bounded control input[J].控制理论与应用(英文版),2011,9(2):210-214. 被引量:5
  • 2樊卫华,蔡骅,陈庆伟,胡维礼.时延网络控制系统的稳定性[J].控制理论与应用,2004,21(6):880-884. 被引量:83
  • 3A. Teixeira, H. Sandberg, K. H. Johansson. Networked control systems under cyber attacks with applications to power networks. Proceedings of the American Control Conference, Maryland: IEEE, 2010:3690 - 3696.
  • 4S. Sundaram, M. Pajic, C. N. Hadjicostis, et al. The wireless control network: Monitoring for malicious behavior. IEEE Conference on Decision and Control, Atlanta: IEEE, 2010:5979 - 5984.
  • 5R. Chabukswar, Y. Mo, B. Sinopoli. Detecting integrity attacks on SCADA systems. Proceedings of the 18th IFAC World Congress, Milano: IEEE, 2014:11239 - 11244.
  • 6T. T. Kim, H. V. Poor. Strategic protection against data injection attacks on power grids. IEEE Transactions on Smart Grid, 2011, 2(2): 326 - 333.
  • 7B. Tang, L. D. Alvergue, G. Gu. Secure networked control systems against replay attacks without injecting authentication noise. Proceedings of the American Control Conference, Montreal: IEEE, 2012:60280 - 6036.
  • 8Y. Mo, R. Chabukswar, B. Sinopoli. Detecting integrity attacks on SCADA systems. IEEE Transactions on Control Systems Technology, 2013, 22 (4): 1396 - 1407.
  • 9F. Pasqualetti, F. Dorfler, F. Bullo. Attack detection and identification in cyber-physical systems. IEEE Transactions on Automatic Control, 2013, 22 (4): 1396 - 1407.
  • 10A. N. Bishop, A. V. Savkin. Set-valued state estimation and attack detection for uncertain descriptor systems. IEEE Signal Processing Letters, 2015, 20(11): 1102 - 1105.

共引文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部