Security-Based Resilient Robust Model Predictive Control for Polytopic Uncertain Systems Subject to Deception Attacks and RR Protocol.
Saved in:
| Title: | Security-Based Resilient Robust Model Predictive Control for Polytopic Uncertain Systems Subject to Deception Attacks and RR Protocol. |
|---|---|
| Authors: | Wang, Jianhua, Song, Yan, Wei, Guoliang |
| Source: | IEEE Transactions on Systems, Man & Cybernetics. Systems; Aug2022, Vol. 52 Issue 8, p4772-4783, 12p |
| Subject Terms: | DECEPTION, PREDICTION models, STOCHASTIC analysis, CLOSED loop systems, RESILIENT design, FUZZY neural networks |
| Abstract: | This article is concerned with the security-based resilient robust model predictive control (RMPC) problem for a class of discrete-time polytopic uncertain systems with deception attacks and the round-robin (RR) protocol. The well-known RR protocol is adopted with the hope to reduce the communication burden, where the control signal is transmitted only at the given transmission instant. By means of the concept of bounded energy and the independent Bernoulli-distributed (BD) white sequences, a representative attack model is given. A definition of mean-square (MS) security in H2-sense is employed to reasonably explain the dynamics process of the controlled systems. We aim at designing a set of resilient RMPC controllers so as to make the closed-loop system state under consideration of deception attacks and the RR protocol enter and stay in a certain bounded region. Furthermore, with the aid of stochastic analysis methods and inequality analysis techniques, sufficient conditions are obtained to satisfy the desirable security requirements. To tackle the nonconvex obstacles resulting from attacks and the RR protocol, the cone complementary linearization (CCL) method is exploited to cast them into a convex optimization problem (OP) for its solvability. Then, an online OP regarding a certain upper bound of the concerned objective is provided for the solvability and resilient RMPC-based controller gains are obtained. Finally, two examples, including a high-purity distillation one and a numerical one, are used to demonstrate the effectiveness and the validity of the proposed techniques. [ABSTRACT FROM AUTHOR] |
| Copyright of IEEE Transactions on Systems, Man & Cybernetics. Systems is the property of IEEE and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.) | |
| Database: | Complementary Index |
Be the first to leave a comment!
Full Text Finder
Nájsť tento článok vo Web of Science