多策略虚假数据注入攻击下切换系统滑模控制的安全设计
CSTR:
作者:
作者单位:

青岛理工大学

作者简介:

通讯作者:

中图分类号:

TP273

基金项目:

国家自然科学基金项目(青年项目)


Secure sliding mode control of switched systems under multi-strategy false data injection attacks
Author:
Affiliation:

Qingdao University of Technology

Fund Project:

The National Natural Science Foundation of China (Youth Program)

  • 摘要
  • |
  • 图/表
  • |
  • 访问统计
  • |
  • 参考文献
  • |
  • 相似文献
  • |
  • 引证文献
  • |
  • 资源附件
  • |
  • 文章评论
    摘要:

    本文研究了网络攻击下切换系统的滑模控制问题.在传感器传输信息至控制器的通道中,遭受到多策略的 虚假数据注入 (False Date Injection, FDI) 攻击,与传统的FDI攻击不同,多策略FDI攻击会根据攻击时刻选择不同 攻击策略,在这种攻击中,不同的攻击策略会根据不同时间选择通信通道.多策略FDI攻击造成系统传输信息的损 坏,进而导致切换系统状态不稳定甚至发散.为解决这一问题,本文应用滑模控制方法保证切换系统的依概率输入- 状态稳定性能.应用Lyapunov函数方法得到了闭环切换系统稳定性的充分条件.另外,建立了系统状态与受损状态 信息之间的数学模型,基于可用的受损状态,设计滑模控制律,所设计的滑模控制律保证了系统状态的可达性,系统 状态轨迹在有限时间内被驱动到指定滑模面内.最后,数值仿真验证了该方法的有效性.

    Abstract:

    In this paper, we consider the sliding mode control problem for switching systems under cyber attack. In the channel where the sensor transmits information to the controller, it suffers from the multi-strategy False Date Injection (FDI) attack. Different from the traditional FDI attack, the multi-strategy FDI attack selects different attack strategies according to the attacking moment. The multi-strategy FDI attack causes damage to system transmission information, which leads to an unstable state or even dispersion of the switching system. To solve this problem, this paper applies the sliding mode control method to ensure the probabilistic input-state stability performance of the switching system. A sufficient condition for the stability of the closed-loop switching system is obtained by applying the Lyapunov function method. In addition, a mathematical model between the system state and the damaged state information is established, and a sliding mode control law is designed based on the available damaged states. The designed sliding mode control law ensures the accessibility of the system state, and the system state trajectory is driven to the specified sliding mode surface within a finite time. Finally, numerical simulation verifies the effectiveness of the method.

    参考文献
    相似文献
    引证文献
引用本文
分享
文章指标
  • 点击次数:
  • 下载次数:
  • HTML阅读次数:
  • 引用次数:
历史
  • 收稿日期:2023-08-30
  • 最后修改日期:2024-06-20
  • 录用日期:2024-03-05
  • 在线发布日期: 2024-04-08
  • 出版日期:
文章二维码