欺骗攻击下网络化自主飞行器控制系统的自适应事件触发$H\infty$控制

IF 9.9 1区 计算机科学 Q1 AUTOMATION & CONTROL SYSTEMS
Ya-Li Zhi;Xu Liu;Shuping He;Wenjuan Lin;Wenbin Chen
{"title":"欺骗攻击下网络化自主飞行器控制系统的自适应事件触发$H\\infty$控制","authors":"Ya-Li Zhi;Xu Liu;Shuping He;Wenjuan Lin;Wenbin Chen","doi":"10.1109/TII.2025.3528560","DOIUrl":null,"url":null,"abstract":"This article investigates a new <inline-formula><tex-math>$H\\infty$</tex-math></inline-formula> control method for networked control systems (NCSs) under deception attacks, and applies it to autonomous aerial vehicles (AAVs). First, a novel adaptively event-triggered strategy (AETS) is proposed for reducing the transmitted data packets. Compared with existing ETS, the proposed AETS can adaptively adjust the event-triggered threshold and save limited networked resources in light of weighted average error. Second, a networked closed-loop system model is constructed by considering AETS, deception attacks, and network-induced delays. Then, the expected <inline-formula><tex-math>$H\\infty$</tex-math></inline-formula> control performance can be ensured in parallel with saving limited communication resources through the derived stability criterion. Finally, the validity and advantage of the presented approach are proved by a AAV system.","PeriodicalId":13301,"journal":{"name":"IEEE Transactions on Industrial Informatics","volume":"21 4","pages":"3458-3465"},"PeriodicalIF":9.9000,"publicationDate":"2025-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Adaptively Event-Triggered $H\\\\infty$ Control for Networked Autonomous Aerial Vehicles Control Systems Under Deception Attacks\",\"authors\":\"Ya-Li Zhi;Xu Liu;Shuping He;Wenjuan Lin;Wenbin Chen\",\"doi\":\"10.1109/TII.2025.3528560\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This article investigates a new <inline-formula><tex-math>$H\\\\infty$</tex-math></inline-formula> control method for networked control systems (NCSs) under deception attacks, and applies it to autonomous aerial vehicles (AAVs). First, a novel adaptively event-triggered strategy (AETS) is proposed for reducing the transmitted data packets. Compared with existing ETS, the proposed AETS can adaptively adjust the event-triggered threshold and save limited networked resources in light of weighted average error. Second, a networked closed-loop system model is constructed by considering AETS, deception attacks, and network-induced delays. Then, the expected <inline-formula><tex-math>$H\\\\infty$</tex-math></inline-formula> control performance can be ensured in parallel with saving limited communication resources through the derived stability criterion. Finally, the validity and advantage of the presented approach are proved by a AAV system.\",\"PeriodicalId\":13301,\"journal\":{\"name\":\"IEEE Transactions on Industrial Informatics\",\"volume\":\"21 4\",\"pages\":\"3458-3465\"},\"PeriodicalIF\":9.9000,\"publicationDate\":\"2025-01-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Industrial Informatics\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10856706/\",\"RegionNum\":1,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Industrial Informatics","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10856706/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

本文研究了网络控制系统(ncs)在欺骗攻击下的一种新的$H\infty$控制方法,并将其应用于自主飞行器(aav)。首先,提出了一种新的自适应事件触发策略(AETS)来减少传输数据包。与现有ETS相比,本文提出的AETS能够根据加权平均误差自适应调整事件触发阈值,节省有限的网络资源。其次,考虑AETS、欺骗攻击和网络延迟,构建网络化闭环系统模型。然后,通过导出的稳定性判据,可以在节省有限通信资源的同时,保证预期的$H\infty$控制性能。最后,通过AAV系统验证了该方法的有效性和优越性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Adaptively Event-Triggered $H\infty$ Control for Networked Autonomous Aerial Vehicles Control Systems Under Deception Attacks
This article investigates a new $H\infty$ control method for networked control systems (NCSs) under deception attacks, and applies it to autonomous aerial vehicles (AAVs). First, a novel adaptively event-triggered strategy (AETS) is proposed for reducing the transmitted data packets. Compared with existing ETS, the proposed AETS can adaptively adjust the event-triggered threshold and save limited networked resources in light of weighted average error. Second, a networked closed-loop system model is constructed by considering AETS, deception attacks, and network-induced delays. Then, the expected $H\infty$ control performance can be ensured in parallel with saving limited communication resources through the derived stability criterion. Finally, the validity and advantage of the presented approach are proved by a AAV system.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
IEEE Transactions on Industrial Informatics
IEEE Transactions on Industrial Informatics 工程技术-工程:工业
CiteScore
24.10
自引率
8.90%
发文量
1202
审稿时长
5.1 months
期刊介绍: The IEEE Transactions on Industrial Informatics is a multidisciplinary journal dedicated to publishing technical papers that connect theory with practical applications of informatics in industrial settings. It focuses on the utilization of information in intelligent, distributed, and agile industrial automation and control systems. The scope includes topics such as knowledge-based and AI-enhanced automation, intelligent computer control systems, flexible and collaborative manufacturing, industrial informatics in software-defined vehicles and robotics, computer vision, industrial cyber-physical and industrial IoT systems, real-time and networked embedded systems, security in industrial processes, industrial communications, systems interoperability, and human-machine interaction.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信