{"title":"Security Control of Cyber-Physical Systems with Cyber Attacks and Mixed Time-Delays","authors":"Xuan Jia","doi":"10.23977/jeis.2022.070302","DOIUrl":null,"url":null,"abstract":": This article is concerned with the security control problem for discrete-time cyber-physical systems with both distributed state delay and time-varying input delay under false data injection attacks. Firstly, by introducing mixed delay and network attack, a polyhedron model is proposed to describe the nonlinear input caused by cyber attacks. Secondly, combined with a piecewise Lyapunov functional and some summation inequalities, sufficient conditions for the exponential stability of the closed-loop system are derived by using linear matrix inequality approach, and the design process of the security controller is given. Finally, an illustrative example is given to demonstrate the effectiveness of the proposed method.","PeriodicalId":32534,"journal":{"name":"Journal of Electronics and Information Science","volume":"1 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Electronics and Information Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23977/jeis.2022.070302","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
: This article is concerned with the security control problem for discrete-time cyber-physical systems with both distributed state delay and time-varying input delay under false data injection attacks. Firstly, by introducing mixed delay and network attack, a polyhedron model is proposed to describe the nonlinear input caused by cyber attacks. Secondly, combined with a piecewise Lyapunov functional and some summation inequalities, sufficient conditions for the exponential stability of the closed-loop system are derived by using linear matrix inequality approach, and the design process of the security controller is given. Finally, an illustrative example is given to demonstrate the effectiveness of the proposed method.