This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
1. Introduction
Since the Takagi–Sugeno (T-S) fuzzy model is first proposed in [1], it has received considerable research attention in the past few decades. In practical applications, systems with complex structures usually have nonlinearities, which make analysis and synthesis difficult. As one of the effective methods to deal with nonlinear systems, T-S fuzzy system technology is able to approximate nonlinear systems by a set of local linear systems and a group of if-then rules. Therefore, many stability and synchronization analysis methods of linear systems can be easily extended to the study of nonlinear systems. To cope with nonlinearity, the T-S fuzzy model has been extensively studied in the processing of complex nonlinear systems, and a lot of results have been proposed in the literature [2–5]. For instance, the T-S fuzzy technology has been utilized in [2] to construct a new system model with distributed DETM and multisensor saturations. In [3], by combining the fuzzy control with the sliding mode control, a new fuzzy sliding mode control law is designed to ensure the desired
In the industrial processes, proportional-integral-derivative (PID) control is extensively utilized owing to its simple structure, high reliability, and convenience of parameter adjustment [6]. However, with the controlled plants in modern industry becoming more and more complex, traditional PID control mechanisms may not be able to provide satisfactory control performance for complex systems. As such, many researchers have devoted to combined traditional PID control methods with other advanced control schemes to improve PID control performance [7–10]. It should be pointed out that due to the effectiveness of T-S fuzzy technology in processing nonlinear systems, much effort has been devoted to the research of nonlinear system performance under the framework of the combination of T-S fuzzy control and PID control. For example, in [7], the T-S fuzzy PID control problem is tackled in the framework of time domain, which greatly simplifies the description of the closed-loop system. Based on the T-S fuzzy PID control method, a novel multiloop fuzzy PID-like controller has been designed in [10] to improve the fault tolerance rate of the overall system. In addition, most articles on PID are based on state feedback. In practice, however, due to the existence of economic limitations or technological constraints, the system states might be immeasurable. Therefore, the observer-based PID control scheme has important research significance, and a great number of results have been available in the literature [11–14].
Different from traditional control systems, network control systems (NCSs) have significant advantages in terms of simpler installation, lower cost, and convenient maintainability. In this way, network control systems have been widely applied in various fields such as the Internet, power grids, and transportation networks. However, the communication capacity and computing resources of the network control system are usually limited, and various network-induced phenomena have inevitably appeared, such as time-varying delays [15–17], channel fading [18, 19], and actuator saturations [20]. As is well known, if handled improperly, the network-induced phenomenon may cause the decline of the performance of the entire network control system. In this case, various communication protocols have been proposed to reduce the burden of network transmission. Some rather favorable communication protocols are event-triggered protocol (ETP) [21, 22], redundant channel transmission protocol (RCTP) [23, 24], round-robin (RR) protocol [25, 26], weighted try-once-discard (WTOD) protocol [3, 27], and stochastic communication protocol (SCP) [28, 29]. In particular, under the event-triggered mechanism (ETM), the control information will be transmitted only when the measurement error value exceeds the threshold, thereby greatly reducing the data release rate and the burden on the network. It should be pointed out that the above articles are almost focused on the ETM under the nonlinear continuous systems, while the dynamic event-triggered mechanism (DETM) under the nonlinear discrete systems has not gained sufficient research attention so far despite the great practical significance. This is one of the research motivations of this article.
Moreover, as network systems become more and more open, networks security has attracted widespread attention. In particular, network attacks have become a major threat to network security, which aimed to affect control performance by destroying/modifying some important data transmitted on the network. In general, cyber-attacks include three main types, mainly, denial of service (DoS) attacks [30–32], repeated attacks [33, 34], and deception attacks [35–37]. Under the replay attacks, the attacker forces the target to receive data repeatedly. DoS attacks primarily intend to hinder the transmission over the communication networks, while deception attacks inject malicious and falsified data into the sensor or control data transmission channels. Among them, deception attacks have been widely studied for their great destructiveness to the system stability. For example, the ISS problems of the discrete-time linear PID control systems under deception attacks have been addressed [11]. Both system state saturation and deception attacks are considered for a class of time-varying stochastic nonlinear systems [35]. Unfortunately, when it comes to the observer-based PID control issues via deception attacks, only a fraction of results have been achieved in existing articles. This is another motivation of our research.
Based on the above discussion, in this article, we are interested in investigating the observer-based PID control for discrete-time T-S fuzzy systems with multisensors under deception attacks and distributed DETM. The main contributions of this study are as follows: (1) in order to reduce the burden on the network, a distributed DETM is introduced. The event generator in the framework of the discrete-time T-S fuzzy system corresponding to each sensor can determine whether to transmit data based on local information; (2) in the presence of distributed DETM, communication delay, and stochastic cyber-attacks, the input-to-state stability and
The remainder of this study is arranged as follows. In Section 2, a controlled model is constructed for the discrete-time T-S fuzzy system with DETM and deception attacks. Some sufficient conditions which can guarantee the ISS and
Notations: the notation used in this study is fairly standard except where otherwise stated.
2. Problem Formulation and Preliminaries
Consider the discrete-time nonlinear systems modeled by the T-S fuzzy model:
Plant rule i: if
Assumption 1.
(See [12]). The discrete-time delay
By conducting the singleton fuzzifier, center-average defuzzifier, and product fuzzy inference, system (1) can be represented by the following compact form:
From Figure 1, we know that the measurement output y(k) is grouped into
We define the triggering time sequence of the
According to (6) and the use of the buffers, for all sensors, we can derive the following event-triggered condition:
Remark 1.
It should be noted that the measured data will be transmitted to the observer when the measured data satisfy the event-triggered condition (7). Moreover, a dynamical variable
Since the network communication channel may be attacked by opponents, in this article, we assume that the deception attacks occur randomly in the transmission channel between the sensors and the observer. Then, the actual observer input
Remark 2.
As is well known, cyber-attacks are inevitable in the network. Among various attacks, the deception attacks are considered to be the easiest to be sent by an attacker and the most destructive. Therefore, in this article, we consider that the transmission channel between the sensors and the observer is subject to deception attacks. Moreover, in engineering practice, since there exists security protection from the protection institution, the attacks launched by attackers might not be always successful. In this case, the attacks could occur in a random manner. Therefore, the randomly occurring deception attacks are described as a Bernoulli sequence in this study, and the attack information
Considering that in industrial practice, not all systems state can be measured directly, then a fuzzy observer is given as follows.
Observer rule i: if
In this study, for the discrete-time T-S fuzzy system (1), we adopt the following observer-based PID control law.
Controller rule i: if
The considered fuzzy PID control law can be rewritten as follows:
Remark 3.
In this study, we consider the observer-based PID controller for discrete-time T-S fuzzy systems. The PID controller consists of three parts. Specifically, the components
Denoting
Now, for simplicity to the following work, we introduce two augmentation vectors:
Then, based on estimation error system (17) and system (3), we can obtain the closed-loop system of the following form:
It follows from (2) and (11) and one has that
Remark 4.
Up to now, by considering the influences of time-varying delays and deception attacks, a novel observer-based PID security control model is established for the discrete-time T-S fuzzy system under distributed DETM.
Definition 1.
(See [11]). System (19) is said to be input-to-state stable (ISS) in mean-square sense if there exist functions
Definition 2.
(See [11]). Denote the desired safety level as
Lemma 1.
(See [38]). For positive definite matrix Z with suitable dimensions and any real-valued variables
Lemma 2.
(See [39]). Suppose the matrix M with appropriate dimensions; the following two items are equivalent:
(1) There exist two symmetric and positive-definitive matrices
(2) There exist two symmetric and positive-definitive matrices
Lemma 3.
(See [11]). For the DETC scheme consisting of (7) and (8) with the initial value
3. Main Results
We mainly consider the security performance of the controlled plant (1) in this section. First, the sufficient condition is given to guarantee that the closed-loop system (19) is ISS and
Theorem 1.
Let the scalars
Proof.
Consider the Lyapunov functional as follows:
First, calculating the difference and mathematical expectation of
Then, taking (7), (33)–(39) into account, we can obtain
According to Lemma 1, the term
By combining (40) and (41), the inequality (40) can be described as
Therefore, by using Schur complement and conditions (27)–(29), we know that
Next, we will discuss the ISS problem of the closed-loop system (19). According to (33), we obtain
For any
It can be checked that
Thus, it implies from (50) and (51) that
Since
Then, it is obvious that
Taking (53)–(55) into consideration, we have
Finally, considering the inequality (30), we can obtain
In Theorem 1, sufficient conditions which can guarantee the ISS and
Theorem 2.
Let the scalars
Furthermore, the observer gains
Proof.
The inequality (27) is equivalent to
According to the Young inequality, there exists a positive definite matrix
Define
Based on Lemma 2, we can obtain
Then, by utilizing the Schur complement lemma, we can obtain that (60) can be ensured by (69). So far, the proof is completed.
Remark 5.
It is worth emphasizing that the linearization method adopted in this study can directly calculate the variable Y matrix in the LMI, thereby, quickly obtaining the PID controller gains, which greatly reduces the computational complexity.
Remark 6.
Until now, we have addressed the observer-based PID security control issues for the discrete-time T-S fuzzy system with DETM and deception attacks and proposed the desired PID controllers under the designed closed-loop system. Compared with existing articles on the performance of T-S fuzzy systems, this article has two distinctions: (1) the problem solved is new as the security problem for the discrete-time T-S fuzzy system is first constructed under multisensor and deception attacks; (2) the PID control scheme is new in the sense that the influence of discrete-time delay, distributed DETM, and deception attacks on the PID controller are considered at the same time. It is worth mentioning that the main results derived in Theorems 1-2 can be utilized to the fuzzy PID control problem for other systems, such as large-scale systems, multiagent systems, and neural networks.
4. Numerical Examples
For the purpose of illustrating the effectiveness of the designed fuzzy PID controller, we cite a simulation example in this section. Consider system (1) as follows:
The model parameters are provided as follows:
Assume the upper and lower bounds on the time delay as
Therefore, according to Theorem 2, the desired PID controller gains and observer gains can be derived as follows:
Set the initial states as
The simulation results are shown in Figures 2–4. To be specific, Figure 2 shows the state trajectories of x(k) for discrete-time fuzzy system (1) under the distributed DETM and the deception attacks with PID control. Obviously, the proposed system (19) with observer-based PID control scheme is ISS and valid. Figures 3-4 and Table 1 show the impact of deception attacks on PID control performance. Specifically, Figures 3 and 4 show the trajectories of control input
[figure omitted; refer to PDF]
Table 1
The minimum security level under different
| (0.5 mm) | Security level |
| 0.3 | 0.2828 |
| 0.4 | 0.3186 |
| 0.5 | 0.3552 |
| 0.6 | 0.4269 |
| 0.7 | 0.4662 |
| 0.8 | 0.4719 |
| 0.9 | 0.5058 |
For the purpose to show the advantages of the DETM adopted in this study compared to the static event-triggered mechanism (SETM), we derive the comparison results shown in Figures 5-6. The dynamic triggering instants of three distributed DETM are shown in Figure 5 and the static triggering instants are shown in Figure 6, from which we can know that the number of triggering time of the DETM are 24, 12, and 27 and the number of triggering time of the DETM are 37, 39, and 37. At this point, we can conclude that the triggering time of the DETM is much less than the STEM. Furthermore, we can draw that compared with the SETM, the DETM can save networked resources more effectively.
[figure omitted; refer to PDF][figure omitted; refer to PDF]Remark 7.
Based on the above discussion, it can be summarized that (1) under the observer-based PID control law proposed in this study, the closed-loop system (19) can achieve the expected stability; (2) system performance may be destroyed by deception attacks, and the security performance of the system decreases as the probability of the attack increases; (3) compared with the SETM, the DETM has more stringent trigger conditions, so the dynamic event-triggered mechanism can more effectively reduce pressure on the network bandwidth.
5. Conclusion
In this study, by considering DETM and deception attacks, the observer-based PID security control problem has been investigated for the discrete-time T-S fuzzy system. The distributed DETM has been employed to reduce the pressure of network bandwidth. Based on the designed T-S fuzzy model, sufficient conditions for the ISS of the closed-loop system have been derived. Moreover, the desired fuzzy controller gains have been obtained. Finally, the effectiveness of the proposed methods has been demonstrated by a numerical example. In future work, we will continue to pay attention to the observer-based PID control problem for discrete T-S fuzzy systems and combine this framework with various communication protocols, such as redundant channel transmission protocol, round-robin protocol, and stochastic communication protocol.
Acknowledgments
This work was supported in part by the National Natural Science Foundation of China (11661028) and the Natural Science Foundation of Guangxi, PR China (2020GXNSFAA159141).
[1] T. Takagi, M. Sugeno, "Fuzzy identification of systems and its applications to modeling and control," IEEE Transactions on Systems, Man, and Cybernetics, vol. SMC-15 no. 1, pp. 116-132, DOI: 10.1109/tsmc.1985.6313399, 1985.
[2] L. Zha, J. Liu, J. Cao, "Security control for T-S fuzzy systems with multi-sensor saturations and distributed event-triggered mechanism," Journal of the Franklin Institute, vol. 357 no. 5, pp. 2851-2867, DOI: 10.1016/j.jfranklin.2020.02.013, 2020.
[3] J. Wang, C. Yang, J. Xia, Z.-G. Wu, H. Shen, "Observer-based sliding mode control for networked fuzzy singularly perturbed systems under weighted try-once-discard protocol," IEEE Transactions on Fuzzy Systems, vol. 1,DOI: 10.1109/TFUZZ.2021.3070125, 2021.
[4] G. Wu, G.-H. Yang, H. Wang, "ISS control synthesis of T-S fuzzy systems with multiple transmission channels under denial of service," Journal of the Franklin Institute, vol. 358 no. 6, pp. 3010-3032, DOI: 10.1016/j.jfranklin.2021.02.014, 2021.
[5] M. Gao, L. Zhang, W. Qi, J. Cao, J. Cheng, Y. Kao, Y. Wei, X. Yan, "SMC for semi-Markov jump T-S fuzzy systems with time delay," Applied Mathematics and Computation, vol. 374,DOI: 10.1016/j.amc.2019.125001, 2020.
[6] K. H. Ang, G. Chong, Y. Li, "PID control system analysis, design, and technology," IEEE Transactions on Control Systems Technology, vol. 13 no. 4,DOI: 10.1109/tcst.2005.847331, 2005.
[7] Y. Wang, L. Zou, Z. Zhao, X. Bai, "H ∞ fuzzy PID control for discrete time-delayed T-S fuzzy systems," Neurocomputing, vol. 332 no. MAR.7, pp. 91-99, DOI: 10.1016/j.neucom.2018.12.002, 2019.
[8] S. Du, Q. Yan, J. Qiao, "Event-triggered PID control for wastewater treatment plants," Journal of Water Process Engineering, vol. 38,DOI: 10.1016/j.jwpe.2020.101659, 2020.
[9] F. Wallam, C. P. Tan, "Output feedback cross-coupled nonlinear PID based MIMO control scheme for pressurized heavy water reactor," Journal of the Franklin Institute, vol. 356 no. 15, pp. 8012-8048, DOI: 10.1016/j.jfranklin.2019.06.029, 2019.
[10] Y. Wang, Z. Wang, L. Zou, H. Dong, "Multiloop decentralized H ∞ fuzzy PID-like control for discrete time-delayed fuzzy systems under dynamical event-triggered schemes," IEEE Transactions on Cybernetics,DOI: 10.1109/TCYB.2020.3025251, 2020.
[11] D. Zhao, Z. Wang, G. Wei, Q.-L. Han, "A dynamic event-triggered approach to observer-based PID security control subject to deception attacks," Automatica, vol. 120 no. 4,DOI: 10.1016/j.automatica.2020.109128, 2020.
[12] D. Zhao, Z. Wang, D. W. C. Ho, G. Wei, "Observer-based PID security control for discrete time-delay systems under cyber-attacks," IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 51 no. 6, pp. 3926-3938, DOI: 10.1109/tsmc.2019.2952539, 2021.
[13] X. Wen, L. Guo, "Attenuation and rejection for multiple disturbances of nonlinear robotic systems using nonlinear observer and PID controller," Proceedings of the 2010 8th World Congress on Intelligent Control and Automation, pp. 2512-2517, .
[14] M. Hong, W. Yao, Z. Zhu, Y. Guo, "A hybrid PID controller for flexible joint manipulator based on state observer and singular perturbation approach," Proceedings of the 2020 39th Chinese Control Conference (CCC), pp. 3599-3603, DOI: 10.23919/ccc50068.2020.9189446, .
[15] Z.-H. Pang, G.-P. Liu, D. Zhou, D. Sun, "Data-driven control with input design-based data dropout compensation for networked nonlinear systems," IEEE Transactions on Control Systems Technology, vol. 25 no. 2, pp. 628-636, DOI: 10.1109/tcst.2016.2557278, 2017.
[16] D. Mao, Y. Ma, "Dissipativity analysis for Takagi-Sugeno fuzzy system with time-varying delays and stochastic packet dropouts," Information Sciences, vol. 587, pp. 535-555, DOI: 10.1016/j.ins.2021.12.038, 2022.
[17] Z. Xu, X. Li, P. Duan, "Synchronization of complex networks with time-varying delay of unknown bound via delayed impulsive control," Neural Networks, vol. 125, pp. 224-232, DOI: 10.1016/j.neunet.2020.02.003, 2020.
[18] Y. Yang, Y. Niu, Z. Zhang, "Dynamic event-triggered sliding mode control for interval Type-2 fuzzy systems with fading channels," ISA Transactions, vol. 110, pp. 53-62, DOI: 10.1016/j.isatra.2020.10.035, 2021.
[19] M. Hedayati, M. Rahmani, "H ∞ filtering for nonlinearly coupled complex networks subjected to unknown varying delays and multiple fading measurements," ISA Transactions, vol. 120, pp. 43-54, DOI: 10.1016/j.isatra.2021.03.008, 2022.
[20] J. Liu, M. Yang, L. Zha, X. Xie, E. Tian, "Multi-sensors-based security control for T-S fuzzy systems over resource-constrained networks," Journal of the Franklin Institute, vol. 357 no. 7, pp. 4286-4315, DOI: 10.1016/j.jfranklin.2020.01.017, 2020.
[21] Q. Lei, Y. Luo, "Event-triggered-based external consensus protocol of RBF-ARX-model-based networked multiagent systems with nonlinear dynamics and communication delays," Discrete Dynamics in Nature and Society, vol. 2021,DOI: 10.1155/2021/5530878, 2021.
[22] C. Nowzari, E. Garcia, J. Cortés, "Event-triggered communication and control of networked systems for multi-agent consensus," Automatica, vol. 105,DOI: 10.1016/j.automatica.2019.03.009, 2019.
[23] J. Song, Y. Niu, H.-K. Lam, "Reliable sliding mode control of fast sampling singularly perturbed systems: a redundant channel transmission Protocol Approach," IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 66 no. 11, pp. 4490-4501, DOI: 10.1109/tcsi.2019.2929554, 2019.
[24] L. Shuai, S. Yan, G. Wei, D. Derui, L. Yurong, "Event-triggered dynamic output feedback RMPC for polytopic systems with redundant channels: the input-to-state stability," Journal of the Franklin Institute, vol. 354 no. 7, pp. 2871-2892, 2017.
[25] D. Li, J. Liang, F. Wang, "H ∞ state estimation for two-dimensional systems with randomly occurring uncertainties and round-robin protocol," Neurocomputing, vol. 349 no. JUL.15, pp. 2019248-2019260, 2019.
[26] J. Zhang, J. Sun, H. Lin, "Optimal DoS attack schedules on remote state estimation under multi-sensor round-robin protocol," Automatica, vol. 127,DOI: 10.1016/j.automatica.2021.109517, 2021.
[27] Y. Dong, Y. Song, "Model predictive control for interval type-2 T-S fuzzy systems under round-robin protocol," IFAC-PapersOnLine, vol. 53 no. 5, pp. 368-373, DOI: 10.1016/j.ifacol.2021.04.114, 2020.
[28] H. Fu, J. Li, F. Han, N. Hou, H. Dong, "Outlier-resistant observer-based H∞ PID control under stochastic communication protocol," Applied Mathematics and Computation, vol. 411,DOI: 10.1016/j.amc.2021.126535, 2021.
[29] S. Chen, L. Ma, Y. Ma, "Distributed set-membership filtering for nonlinear systems subject to Round-Robin protocol and stochastic communication protocol over sensor networks," Neurocomputing, vol. 385, pp. 13-21, DOI: 10.1016/j.neucom.2019.11.056, 2020.
[30] A. Lu, G. Yang, "Input-to-state stabilizing control for cyberphysical systems with multiple transmission channels under denial of service," IEEE Transactions on Automatic Control, vol. 63 no. 6,DOI: 10.1109/tac.2017.2751999, 2018.
[31] X. Shao, D. Ye, "Neural-network-based adaptive secure control for nonstrict-feedback nonlinear interconnected systems under DoS attacks," Neurocomputing, vol. 448, pp. 263-275, DOI: 10.1016/j.neucom.2021.03.087, 2021.
[32] D. Liu, D. Ye, "Pinning-observer-based secure synchronization control for complex dynamical networks subject to DoS attacks," IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 67 no. 12, pp. 5394-5404, DOI: 10.1109/tcsi.2020.3016994, 2020.
[33] S. Yoon, H. Yu, "Multiple points input for convolutional neural networks in replay attack detection," Proceedings of the 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 6444-6448, DOI: 10.1109/icassp40776.2020.9053303, .
[34] M. Zhou, Z. Zhang, L. Xie, "Permutation entropy based detection scheme of replay attacks in industrial cyber-physical systems," Journal of the Franklin Institute, vol. 358 no. 7, pp. 4058-4076, DOI: 10.1016/j.jfranklin.2021.02.024, 2021.
[35] L. Li, H. Yang, Y. Xia, C. Zhu, "Attack detection and distributed filtering for state-saturated systems under deception attack," IEEE Transactions on Control of Network Systems, vol. 8 no. 4, pp. 1918-1929, DOI: 10.1109/TCNS.2021.3089146, 2021.
[36] J. Wu, C. Peng, J. Zhang, B.-L. Zhang, "Event-triggered finite-time H∞ filtering for networked systems under deception attacks," Journal of the Franklin Institute, vol. 357 no. 6, pp. 3792-3808, DOI: 10.1016/j.jfranklin.2019.09.002, 2020.
[37] K. Wang, E. Tian, J. Liu, L. Wei, D. Yue, "Resilient control of networked control systems under deception attacks: a memory‐event‐triggered communication scheme," International Journal of Robust and Nonlinear Control, vol. 30 no. 4, pp. 1534-1548, DOI: 10.1002/rnc.4837, 2020.
[38] Y. Wang, L. Xie, C. E. D. Souza, "Robust control of a class of uncertain nonlinear systems," Systems & Control Letters, vol. 19 no. 2,DOI: 10.1016/0167-6911(92)90097-c, 1992.
[39] M. Shen, J. H. Park, D. Ye, "A separated approach to control of Markov jump nonlinear systems with general transition probabilities," IEEE Transactions on Cybernetics, vol. 46 no. 9, pp. 2010-2018, DOI: 10.1109/tcyb.2015.2459717, 2016.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Copyright © 2022 Sisi Lin et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0/
Abstract
This study addresses the observer-based proportional-integral-derivative (PID) security control problem for nonlinear discrete-time fuzzy systems subject to deception attacks. In order to reduce the burden of communication, a distributed dynamic event-triggered mechanism (DETM) is proposed, and each sensor node is equipped with an event-trigger generator. A new discrete-time Takagi–Sugeno (T-S) fuzzy model is established, in which both DETM and deception attacks are taken into consideration. Then, based on Lyapunov stability theory, the sufficient conditions for the input-to-state stability (ISS) are proposed, and the desired fuzzy PID controllers are given. Finally, a simulation example is provided to show the usefulness of the proposed approach.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Details
; Zhong, Shouming 3
; Shi, Kaibo 4
; Tan, Xingxu 1 1 College of Science, Guilin University of Technology, Guilin, Guangxi 541004, China
2 College of Science, Guilin University of Technology, Guilin, Guangxi 541004, China; Guangxi Colleges and Universities Key Laboratory of Applied Statistics, Guilin, Guangxi 541004, China
3 School of Mathematical Sciences, University of Electronic Science and Technology of China, Chengdu, Sichuan 611731, China
4 School of Information Science and Engineering, Chengdu University, Chengdu, Sichuan 610106, China





