Event-Based Security Control for State-Dependent Uncertain Systems Under Hybrid-Attacks and Its Application to Electronic Circuits

2019 ◽  
Vol 66 (12) ◽  
pp. 4817-4828 ◽  
Author(s):  
Jinliang Liu ◽  
Meng Yang ◽  
Engang Tian ◽  
Jie Cao ◽  
Shumin Fei
Author(s):  
Dandan Li ◽  
Zhiqiang Zuo ◽  
Yijing Wang

Using an event-based switching law, we address the stability issue for continuous-time switched affine systems in the network environment. The state-dependent switching law in terms of the region function is firstly developed. We combine the region function with the event-triggering mechanism to construct the switching law. This can provide more candidates for the selection of the next activated subsystem at each switching instant. As a result, it is possible for us to activate the appropriate subsystem to avoid the sliding motion. The Zeno behavior for the switched affine system can be naturally ruled out by guaranteeing a positive minimum inter-event time between two consecutive executions of the event-triggering threshold. Finally, two numerical examples are given to demonstrate the effectiveness of the proposed method.


2020 ◽  
Vol 50 (11) ◽  
pp. 4643-4654 ◽  
Author(s):  
Huaicheng Yan ◽  
Jiangning Wang ◽  
Hao Zhang ◽  
Hao Shen ◽  
Xisheng Zhan

2021 ◽  
Author(s):  
Zhaoyang Cuan ◽  
Dawei Ding ◽  
Heng Wang

Abstract This paper is concerned with the event-based control problem for nonlinear cyber-physical systems (CPSs) with state constraints. A novel security control strategy consisting of a self-triggered mechanism is developed to decrease the network communication loads to the most extent on the basis of ensuring system safety and stability. The maximum capability of the designed self-triggered mechanism to resist denial-of-service (DoS) attacks occurring in controller-actuator (C-A) and sensor-controller (S-C) channels synchronously is also analyzed. In particular, we prove that the security control strategy guarantees the system safety and stability without resulting in Zeno behavior. Finally, a numerical example is provided to demonstrate the prominent effectiveness and the advantages over the existing results.


Sign in / Sign up

Export Citation Format

Share Document