Back to Search Start Over

Probabilistic-Constrained H ∞ Tracking Control for a Class of Stochastic Nonlinear Systems Subject to DoS Attacks and Measurement Outliers.

Authors :
Wei, Bin
Tian, Engang
Zhang, Tao
Zhao, Xia
Source :
IEEE Transactions on Circuits & Systems. Part I: Regular Papers. Oct2021, Vol. 68 Issue 10, p4381-4392. 12p.
Publication Year :
2021

Abstract

In this study, the probabilistic-constrained $\mathcal {H}_{\infty }$ tracking control problem is addressed for a class of stochastic nonlinear systems subject to measurement outliers, stochastic nonlinearities and DoS attacks. The considered systems have the following characters: 1) an unequal redundant-channel communication protocol is adopted to resist the DoS attacks and enhance the reliability of packet transmission. Different from some existing redundant-channel approaches, the considered two channels have different transmission abilities. 2) The measurement outliers (e.g., some unexpected large amplitude disturbances) are concerned and a saturation-function-based observer is proposed to avert the side effects from measurement outliers. 3) The DoS jamming attacks are considered in this paper, and an aperiodic DoS model is utilized. 4) Both sector-bounded nonlinear function and stochastic nonlinear function are involved in the considered systems, which makes the considered systems more general. To compensate the negative effect of the DoS jamming attacks and enhance the reliability of the packet transmission, a novel redundant-channel-based switching protocol is proposed to schedule data transmission when the plant suffers malicious cyber attacks. The primary objective of the present study is to design tracking controller such that the prescribed $\mathcal {H}_{\infty }$ control performance is reached and probabilistic constraints on the tracking error are satisfied simultaneously. To achieve this objective, a probabilistic-constrained $\mathcal {H}_{\infty }$ tracking control algorithm is established to obtain tracking controller gains and minimize the prescribed set of the constraint. Finally, two simulation examples are used to validate the practicability of our devised strategy. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
15498328
Volume :
68
Issue :
10
Database :
Academic Search Index
Journal :
IEEE Transactions on Circuits & Systems. Part I: Regular Papers
Publication Type :
Periodical
Accession number :
153763133
Full Text :
https://doi.org/10.1109/TCSI.2021.3097824