控制理论(社会学)
模糊逻辑
模糊控制系统
微电网
非线性系统
服务拒绝攻击
计算机科学
模型攻击
控制(管理)
计算机安全
人工智能
互联网
量子力学
物理
万维网
作者
Fuyi Yang,Songlin Hu,Xiangpeng Xie,Dong Yue,Jiayue Sun
出处
期刊:IEEE Transactions on Automation Science and Engineering
[Institute of Electrical and Electronics Engineers]
日期:2023-09-04
卷期号:: 1-10
被引量:3
标识
DOI:10.1109/tase.2023.3309983
摘要
In this article, the exponential stability (ES) and fuzzy control problem is addressed for DC microgrid (DC-MG) system based on T-S fuzzy model under denial-of-service (DoS) attacks. Considering that the time scale of networked T-S fuzzy model and parallel distributed compensation (PDC) fuzzy control rules is asynchronous, the T-S fuzzy model of the DC-MG system is established. More importantly, in order to reflect the effect of DoS attacks, a time-constrained DoS attack (TCDA) model, which only characterizes the duration of DoS attacks, is established compared with the classic DoS attack model. Then, a switched DC-MG fuzzy system model based on state-feedback control law and TCDA model is established. Furthermore, the time-varying Lyapunov function related to attack parameters is used to ensure the ES of the system. Besides, a fuzzy-dependent switching control strategy is designed in terms of linear matrix inequalities (LMIs). Finally, through a simulation example, the effectiveness of the proposed control strategy is verified Note to Practitioners —As a typical example of cyber-physical systems, nonlinear DC-MG system is vulnerable to malicious cyber attacks (such as DoS attack). The existing DoS attack models are usually characterized by the duration and frequency of attacks. In this paper, we adopt a new approach to describe the DoS attack model using only attack duration characteristics. This makes the DoS attack model more general. We then propose a switching fuzzy control algorithm subject to intermittent DoS attacks and derive sufficient conditions for tolerable duration of attack. This can allow practitioners to know under what conditions the ES of the attacked system can still be guaranteed. The effectiveness of theoretical analysis results is verified by simulation experiments. In the future research, we will address the design of fuzzy control algorithms for DC-MG under various cyber attacks.
科研通智能强力驱动
Strongly Powered by AbleSci AI