多策略虚假数据注入攻击下切换系统滑模控制的安全设计
CSTR:
作者:
作者单位:

1. 青岛理工大学 信息与控制工程学院,山东 青岛 266520;2. 安徽大学 信息材料与智能感知安徽省实验室,合肥 230601

作者简介:

通讯作者:

E-mail: zhj52108@163.com.

中图分类号:

TP273

基金项目:

国家自然科学基金项目(62103219);安徽大学信息材料与智能感知安徽省实验室开放基金项目(IMIS202115).


Secure sliding mode control of switched systems under multi-strategy false data injection attacks
Author:
Affiliation:

1. School of Information and Control Engineering,Qingdao University of Science and Technology,Qingdao 266520,China;2. Information Materials and Intelligent Sensing Laboratory of Anhui Province,Anhui University,Hefei 230601,China

Fund Project:

  • 摘要
  • |
  • 图/表
  • |
  • 访问统计
  • |
  • 参考文献
  • |
  • 相似文献
  • |
  • 引证文献
  • |
  • 资源附件
  • |
  • 文章评论
    摘要:

    研究在多策略网络攻击下切换系统的滑模控制问题.在传感器向控制器传输信息的通道中,系统遭受到多策略的虚假数据注入(false data injection,FDI)攻击.与传统的FDI攻击不同,多策略FDI攻击会根据攻击时刻选择不同攻击策略.多策略FDI攻击造成系统传输信息的损坏,进而导致切换系统状态不稳定甚至发散.为解决这一问题,应用滑模控制方法保证切换系统的依概率输入-状态稳定性能.应用Lyapunov函数方法得到了闭环切换系统稳定性的充分条件.另外,建立了系统状态与受损状态信息之间的数学模型,基于可用的受损状态,设计滑模控制律,所设计的滑模控制律保证了系统状态的可达性,系统状态轨迹在有限时间内被驱动到指定滑模面内.最后,通过数值仿真验证了所提方法的有效性.

    Abstract:

    Different from the traditional false data injection(FDI) attack, the multi-strategy FDI attack selects different attack strategies according to the attacking moment. The multi-strategy FDI attack causes damage to system transmission information, which leads to an unstable state or even dispersion of the switching system. To solve this problem, this paper applies the sliding mode control method to ensure the probabilistic input-state stability performance of the switching system. A sufficient condition for the stability of the closed-loop switching system is obtained by applying the Lyapunov function method. In addition, a mathematical model between the system state and the damaged state information is established, and a sliding mode control law is designed based on the available damaged states. The designed sliding mode control law ensures the accessibility of the system state, and the system state trajectory is driven to the specified sliding mode surface within a finite time. Finally, numerical simulation verifies the effectiveness of the method.

    参考文献
    相似文献
    引证文献
引用本文

马娟,赵海娟,徐勤琪.多策略虚假数据注入攻击下切换系统滑模控制的安全设计[J].控制与决策,2024,39(12):4093-4098

复制
分享
文章指标
  • 点击次数:
  • 下载次数:
  • HTML阅读次数:
  • 引用次数:
历史
  • 收稿日期:
  • 最后修改日期:
  • 录用日期:
  • 在线发布日期: 2024-11-20
  • 出版日期: 2024-12-20
文章二维码