已入深夜,您辛苦了!由于当前在线用户较少,发布求助请尽量完整的填写文献信息,科研通机器人24小时在线,伴您度过漫漫科研夜!祝你早点完成任务,早点休息,好梦!

Resilient Fuzzy Control Synthesis of Nonlinear DC Microgrid via a Time-Constrained DoS Attack Model

控制理论(社会学) 模糊逻辑 模糊控制系统 微电网 非线性系统 服务拒绝攻击 计算机科学 模型攻击 控制(管理) 计算机安全 人工智能 互联网 量子力学 物理 万维网
作者
Fuyi Yang,Songlin Hu,Xiangpeng Xie,Dong Yue,Jiayue Sun
出处
期刊:IEEE Transactions on Automation Science and Engineering [Institute of Electrical and Electronics Engineers]
卷期号:: 1-10 被引量:3
标识
DOI:10.1109/tase.2023.3309983
摘要

In this article, the exponential stability (ES) and fuzzy control problem is addressed for DC microgrid (DC-MG) system based on T-S fuzzy model under denial-of-service (DoS) attacks. Considering that the time scale of networked T-S fuzzy model and parallel distributed compensation (PDC) fuzzy control rules is asynchronous, the T-S fuzzy model of the DC-MG system is established. More importantly, in order to reflect the effect of DoS attacks, a time-constrained DoS attack (TCDA) model, which only characterizes the duration of DoS attacks, is established compared with the classic DoS attack model. Then, a switched DC-MG fuzzy system model based on state-feedback control law and TCDA model is established. Furthermore, the time-varying Lyapunov function related to attack parameters is used to ensure the ES of the system. Besides, a fuzzy-dependent switching control strategy is designed in terms of linear matrix inequalities (LMIs). Finally, through a simulation example, the effectiveness of the proposed control strategy is verified Note to Practitioners —As a typical example of cyber-physical systems, nonlinear DC-MG system is vulnerable to malicious cyber attacks (such as DoS attack). The existing DoS attack models are usually characterized by the duration and frequency of attacks. In this paper, we adopt a new approach to describe the DoS attack model using only attack duration characteristics. This makes the DoS attack model more general. We then propose a switching fuzzy control algorithm subject to intermittent DoS attacks and derive sufficient conditions for tolerable duration of attack. This can allow practitioners to know under what conditions the ES of the attacked system can still be guaranteed. The effectiveness of theoretical analysis results is verified by simulation experiments. In the future research, we will address the design of fuzzy control algorithms for DC-MG under various cyber attacks.

科研通智能强力驱动
Strongly Powered by AbleSci AI
更新
大幅提高文件上传限制,最高150M (2024-4-1)

科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
bing完成签到 ,获得积分10
刚刚
周mm完成签到,获得积分10
1秒前
1秒前
传奇3应助daizao采纳,获得10
2秒前
上官若男应助中中采纳,获得10
3秒前
原始动物研究者协会完成签到 ,获得积分10
3秒前
红枫没有微雨怜完成签到 ,获得积分10
3秒前
顾矜应助liu采纳,获得10
4秒前
典雅葶完成签到 ,获得积分10
6秒前
6秒前
陈静发布了新的文献求助10
6秒前
yyymmma应助__采纳,获得10
8秒前
9秒前
风止完成签到,获得积分10
9秒前
9秒前
End完成签到,获得积分20
11秒前
现代小笼包完成签到,获得积分10
12秒前
12秒前
End发布了新的文献求助10
14秒前
17秒前
CcXiXi完成签到 ,获得积分10
18秒前
科研通AI2S应助End采纳,获得10
18秒前
谁猪沉浮完成签到,获得积分10
19秒前
22秒前
msk完成签到,获得积分10
22秒前
24秒前
Ken完成签到,获得积分10
24秒前
B612小行星完成签到 ,获得积分10
26秒前
小蘑菇应助紫荆采纳,获得10
29秒前
科研通AI2S应助科研通管家采纳,获得30
31秒前
爱静静应助科研通管家采纳,获得10
32秒前
Orange应助科研通管家采纳,获得10
32秒前
32秒前
隐形曼青应助康康采纳,获得10
32秒前
Wan完成签到,获得积分20
33秒前
大个应助要减肥金针菇采纳,获得10
38秒前
汤汤完成签到 ,获得积分10
40秒前
小蘑菇应助Wan采纳,获得10
40秒前
阿紫吖完成签到 ,获得积分10
44秒前
45秒前
高分求助中
The Young builders of New china : the visit of the delegation of the WFDY to the Chinese People's Republic 1000
юрские динозавры восточного забайкалья 800
English Wealden Fossils 700
麻省总医院内科手册(原著第8版) (美)马克S.萨巴蒂尼 500
Chen Hansheng: China’s Last Romantic Revolutionary 500
宽禁带半导体紫外光电探测器 388
COSMETIC DERMATOLOGY & SKINCARE PRACTICE 388
热门求助领域 (近24小时)
化学 医学 生物 材料科学 工程类 有机化学 生物化学 物理 内科学 纳米技术 计算机科学 化学工程 复合材料 基因 遗传学 催化作用 物理化学 免疫学 量子力学 细胞生物学
热门帖子
关注 科研通微信公众号,转发送积分 3142628
求助须知:如何正确求助?哪些是违规求助? 2793439
关于积分的说明 7806660
捐赠科研通 2449725
什么是DOI,文献DOI怎么找? 1303403
科研通“疑难数据库(出版商)”最低求助积分说明 626861
版权声明 601309