{"title":"Synchronization Control for Discrete-Time Delayed Complex Cyber-Physical Networks Under False Data Injection Attacks","authors":"Chaoqun Zhu, Xuan Jia, Pan Zhang","doi":"10.61416/ceai.v25i3.8360","DOIUrl":null,"url":null,"abstract":"This paper is concerned with the synchronization control problem for discrete-time complex cyber-physical networks with mixed delays and false data injection attacks. The polytopic model of closed-loop synchronization error dynamics is established by considering the pattern characteristics of false data injection attacks and input delays, which has essentially different from the traditional handling method. More specifically, the proposed polytopic model utilizes the current state of the closed-loop synchronization error dynamics, thereby facilitating the reduction of possible conservatism. In such a framework, a nonlinear synchronization control method is developed to eliminate the negative impact of cyber attacks, and sufficient conditions are derived to guarantee that the closed-loop error dynamics ultimately exponentially bounded. In the meanwhile, the design procedure of the synchronization controller is proposed for underlying complex cyber-physical networks subject to mixed delays and false data injection attacks. Finally, an illustrative example is delivered to demonstrate the effectiveness of the proposed method. DOI: 10.61416/ceai.v25i3.8360","PeriodicalId":50616,"journal":{"name":"Control Engineering and Applied Informatics","volume":null,"pages":null},"PeriodicalIF":0.4000,"publicationDate":"2023-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Control Engineering and Applied Informatics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.61416/ceai.v25i3.8360","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
This paper is concerned with the synchronization control problem for discrete-time complex cyber-physical networks with mixed delays and false data injection attacks. The polytopic model of closed-loop synchronization error dynamics is established by considering the pattern characteristics of false data injection attacks and input delays, which has essentially different from the traditional handling method. More specifically, the proposed polytopic model utilizes the current state of the closed-loop synchronization error dynamics, thereby facilitating the reduction of possible conservatism. In such a framework, a nonlinear synchronization control method is developed to eliminate the negative impact of cyber attacks, and sufficient conditions are derived to guarantee that the closed-loop error dynamics ultimately exponentially bounded. In the meanwhile, the design procedure of the synchronization controller is proposed for underlying complex cyber-physical networks subject to mixed delays and false data injection attacks. Finally, an illustrative example is delivered to demonstrate the effectiveness of the proposed method. DOI: 10.61416/ceai.v25i3.8360
期刊介绍:
The Journal is promoting theoretical and practical results in a large research field of Control Engineering and Technical Informatics. It has been published since 1999 under the Romanian Society of Control Engineering and Technical Informatics coordination, in its quality of IFAC Romanian National Member Organization and it appears quarterly.
Each issue has up to 12 papers from various areas such as control theory, computer engineering, and applied informatics. Basic topics included in our Journal since 1999 have been time-invariant control systems, including robustness, stability, time delay aspects; advanced control strategies, including adaptive, predictive, nonlinear, intelligent, multi-model techniques; intelligent control techniques such as fuzzy, neural, genetic algorithms, and expert systems; and discrete event and hybrid systems, networks and embedded systems. Application areas covered have been environmental engineering, power systems, biomedical engineering, industrial and mobile robotics, and manufacturing.