{"title":"Passivity-Based Asynchronous Control of 2-D Roesser Markovian Jump Systems and Stabilization Under DoS Attacks.","authors":"Yifang Zhang,Zheng-Guang Wu,Xinyu Lv,Yong Xu,James Lam,Ka-Wai Kwok","doi":"10.1109/tcyb.2025.3600968","DOIUrl":null,"url":null,"abstract":"The passivity-based asynchronous control is tackled for 2-D Roesser Markovian jump systems (MJSs) and stabilization is guaranteed when 2-D MJSs are susceptible to Denial-of-Service (DoS) attacks. A novel jump model is proposed in this article, where the switching law of subsystems is regulated by the sum of the horizontal and vertical coordinates' values. This differs from the conventional jump model, which presumes that the transition probabilities are identical in both directions. The proposed jump model can avoid the mode ambiguity problem. Given the openness and sharing nature of communication networks, they are susceptible to malicious cyber-attacks that impair system performance. The concept of global time is introduced to help characterize the jump law and construct DoS attack model. Besides, a hidden Markov model (HMM) is utilized to manage the inevitable mismatched mode problem induced by any delay or data dropouts. With the above considerations, several conditions are established for ensuring passivity performance of 2-D MJSs and stabilization when facing DoS attacks. Several equivalent solvable conditions are derived via decoupling strategy and matrix inequality technique. Finally, two simulation examples are provided to demonstrate the validity of the established theoretical results.","PeriodicalId":13112,"journal":{"name":"IEEE Transactions on Cybernetics","volume":"9 1","pages":""},"PeriodicalIF":10.5000,"publicationDate":"2025-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Cybernetics","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1109/tcyb.2025.3600968","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
The passivity-based asynchronous control is tackled for 2-D Roesser Markovian jump systems (MJSs) and stabilization is guaranteed when 2-D MJSs are susceptible to Denial-of-Service (DoS) attacks. A novel jump model is proposed in this article, where the switching law of subsystems is regulated by the sum of the horizontal and vertical coordinates' values. This differs from the conventional jump model, which presumes that the transition probabilities are identical in both directions. The proposed jump model can avoid the mode ambiguity problem. Given the openness and sharing nature of communication networks, they are susceptible to malicious cyber-attacks that impair system performance. The concept of global time is introduced to help characterize the jump law and construct DoS attack model. Besides, a hidden Markov model (HMM) is utilized to manage the inevitable mismatched mode problem induced by any delay or data dropouts. With the above considerations, several conditions are established for ensuring passivity performance of 2-D MJSs and stabilization when facing DoS attacks. Several equivalent solvable conditions are derived via decoupling strategy and matrix inequality technique. Finally, two simulation examples are provided to demonstrate the validity of the established theoretical results.
期刊介绍:
The scope of the IEEE Transactions on Cybernetics includes computational approaches to the field of cybernetics. Specifically, the transactions welcomes papers on communication and control across machines or machine, human, and organizations. The scope includes such areas as computational intelligence, computer vision, neural networks, genetic algorithms, machine learning, fuzzy systems, cognitive systems, decision making, and robotics, to the extent that they contribute to the theme of cybernetics or demonstrate an application of cybernetics principles.