access icon free Observer-based stability of switched system under jamming attack and random packet loss

This study investigates the cyber-security control problem of a networked switched system. Firstly, a joint probabilistic model is utilised to characterise the communication failure caused by the jamming attack and random packet loss. Then the attention is focused on designing an observer based controller that can generate the control input using the last successfully received system output. After that, with the average dwell time scheme, sufficient conditions are derived to ensure the almost sure asymptotical stability of the overall-system with stable and unstable subsystems. In addition, an approach is developed to obtain the feasible solution of state feedback and observer gains. Finally, a simulation example implies the effectiveness of the authors' methods.

Inspec keywords: Lyapunov methods; nonlinear control systems; control system synthesis; asymptotic stability; observers; state feedback; switching systems (control); probability

Other keywords: networked switched system; joint probabilistic model; observer based controller; system output; observer gains; asymptotical stability; jamming attack; random packet loss; communication failure; observer-based stability; cyber-security control problem; control input

Subjects: Nonlinear control systems; Time-varying control systems; Control system analysis and synthesis methods; Other topics in statistics; Stability in control theory

References

    1. 1)
      • 24. Branicky, M.S.: ‘Multiple Lyapunov functions and other analysis tools for switched and hybrid systems’, IEEE Trans. Autom. Control, 1998, 43, (4), pp. 475482.
    2. 2)
      • 1. Khaitan, S.K., McCalley, J.D.: ‘Design techniques and applications of cyberphysical systems: a survey’, IEEE Syst. J., 2014, 9, (2), pp. 350365.
    3. 3)
      • 22. Ye, X., Liu, S., Liu, P.X.: ‘Modelling and stabilisation of networked control system with packet loss and time-varying delays’, IET Control Theory Appl., 2010, 4, (6), pp. 10941100.
    4. 4)
      • 9. Li, Y.Z., Shi, L., Cheng, P., et al: ‘Jamming attacks on remote state estimation in cyber-physical systems: a game-theoretic approach’, IEEE Trans. Autom. Control, 2015, 60, (10), pp. 28312836.
    5. 5)
      • 20. Lemmon, M.D., Hu, X.S.: ‘Almost sure stability of networked control systems under exponentially bounded bursts of dropouts’. Proc. of the 14th ACM Int. Conf. Hybrid Systems Computation Control, Chicago, USA, April 2011, pp. 301310.
    6. 6)
      • 11. Xu, W.Y., Ma, K., Trappe, W., et al: ‘Jamming sensor networks: attack and defense strategies’, IEEE Netw., 2006, 20, (3), pp. 4147.
    7. 7)
      • 23. Persis, C.D., Tesi, P.: ‘Networked control of nonlinear systems under denial-of-service’, Syst. Control Lett., 2016, 96, pp. 124131.
    8. 8)
      • 4. Carl, G., Kesidis, G., Brooks, R.R., et al: ‘Denial-of-service attack-detection techniques’, IEEE Internet Comput., 2006, 10, (1), pp. 8289.
    9. 9)
      • 5. Hu, S.L., Yue, D., Xie, X.P., et al: ‘Resilient event-triggered controller synthesis of networked control systems under periodic DoS jamming attacks’, IEEE Trans. Cybern., 2018, 49, (12), pp. 42714281.
    10. 10)
      • 10. Hespanha, J., Naghshtabrizi, P., Xu, Y.: ‘A survey of recent results in networked control systems’, Proc. IEEE, 2007, 95, (1), pp. 138162.
    11. 11)
      • 28. He, S., Ai, Q., Ren, C., et al: ‘Finite-time resilient controller design of a class of uncertain nonlinear systems with time-delays under asynchronous switching’, IEEE Trans. Syst. Man Cybern., Syst., 2018, 49, (2), pp. 281286.
    12. 12)
      • 17. Persis, C.D., Tesi, P.: ‘Input-to-state stabilizing control under denial-of-service’, IEEE Trans. Autom. Control, 2015, 60, (11), pp. 29302944.
    13. 13)
      • 7. Pasqualetti, F., Dorfler, F., Bullo, F.: ‘Attack detection and identification in cyber-physical systems’, IEEE Trans. Autom. Control, 2013, 58, (11), pp. 27152729.
    14. 14)
      • 26. Hespanha, J.P., Morse, A.S.: ‘Stability of switched systems with average dwell-time’. Proc. of 38th IEEE Conf. on Decision and Control, Phonenix, USA, pp. December 1999, vol. 3, pp. 26552660.
    15. 15)
      • 27. Zhao, X., Yin, Y., Liu, L., et al: ‘Stability analysis and delay control for switched positive linear systems’, IEEE Trans. Autom. Control, 2017, 63, (7), pp. 21842190.
    16. 16)
      • 18. Cetinkaya, A., Ishii, H., Hayakawa, T.: ‘Networked control under random and malicious packet losses’, IEEE Trans. Autom. Control, 2016, 62, (5), pp. 24342449.
    17. 17)
      • 32. Liberzon, D.: ‘Switching in systems and control’ (Birkhäuser, Boston, 2003).
    18. 18)
      • 31. Ma, D., Zhao, J.: ‘Stabilization of networked switched linear systems: an asynchronous switching delay system approach’, Syst. Control Lett., 2015, 77, pp. 4654.
    19. 19)
      • 29. Zhao, X., Wang, X., Zong, G., et al: ‘Adaptive neural tracking control for switched high-order stochastic nonlinear systems’, IEEE Trans. Cybern., 2017, 47, (10), pp. 30883099.
    20. 20)
      • 21. Gupta, V., Martins, N.C., Baras, J.S.: ‘Optimal output feedback control using two remote sensors over erasure channels’, IEEE Trans. Autom. Control, 2009, 54, (7), pp. 14631476.
    21. 21)
      • 14. Wei, G.L., Alsaadi, F.E., Ding, D.R., et al: ‘Event-based security control for discrete-time stochastic systems’, IET Control Theory Appl., 2016, 10, (15), pp. 18081815.
    22. 22)
      • 35. Cetinkaya, A., Ishii, H., Hayakawa, T.: ‘Event-triggered output feedback control resilient against jamming attacks and random packet losses’, IFAC-PapersOnLine, 2015, 48, (22), pp. 270275.
    23. 23)
      • 30. Zhai, G.S., Hu, B., Yasuda, K., et al: ‘Stability analysis of switched systems with stable and unstable subsystems: an average dwell time approach’, Int. J. Syst. Sci., 2001, 32, (8), pp. 10551061.
    24. 24)
      • 34. Zhang, D., Xu, Z., Karimi, H.R., et al: ‘Distributed filtering for switched linear systems with sensor networks in presence of packet dropouts and quantization’, IEEE Trans. Circuits Syst. I, Regul. Pap., 2017, 64, (10), pp. 27832796.
    25. 25)
      • 2. Wen, S.X., Guo, G.: ‘Control and resource allocation of cyber-physical systems’, IET Control Theory Appl., 2016, 10, (16), pp. 20382048.
    26. 26)
      • 15. Befekadu, G.K., Gupta, V., Antsaklis, P.J.: ‘Risk-sensitive control under Markov modulated denial-of-service attack strategies’, IEEE Trans. Autom. Control, 2015, 60, (12), pp. 32993304.
    27. 27)
      • 3. Ericsson, G.N.: ‘Toward a framework for managing information security for an electric power utility - CIGRE experiences’, IEEE Trans. Power Deliv., 2007, 22, (3), pp. 14611469.
    28. 28)
      • 25. Ren, C., Li, L., He, S.: ‘Finite-time non-fragile controller design for a class of switching linear parameter varying systems based on linear matrix inequalities’, Proc. IMechE, Part I: J. Syst. Control Eng., 2019, 233, (1), pp. 5866.
    29. 29)
      • 13. Long, M., Wu, C.H., Hung, J.Y.: ‘Denial of service attacks on network-based control systems: impact and mitigation’, IEEE Trans. Ind. Inf., 2005, 1, (2), pp. 8596.
    30. 30)
      • 8. Zhao, T.H., He, X., Zhou, D.H.: ‘Optimal joint control and triggering strategies against denial of service attacks: a zero-sum game’, IET Control Theory Appl., 2017, 11, (14), pp. 23522360.
    31. 31)
      • 12. Cao, R., Wu, J., Long, C.N., et al: ‘Stability analysis for networked control systems under denial-of-service attacks’. Proc. of the 54th IEEE Conf. on Decision and Control, Osaka, Japan, December 2015, pp. 74767481.
    32. 32)
      • 16. Ishii, H.: ‘Limitations in remote stabilization over unreliable channels without acknowledgements’, Automatica, 2009, 45, (10), pp. 22782285.
    33. 33)
      • 19. Hristu, D., Morgansen, K.: ‘Limited communication control’, Syst. Control Lett., 1999, 37, (4), pp. 193205.
    34. 34)
      • 33. Eqtami, A., Dimarogonas, D.V., Kyriakopoulos, K.J.: ‘Event-triggered control for discrete-time systems’. Proc. of the 2010 American Control Conf., Baltimore, USA, June 2010, pp. 47194724.
    35. 35)
      • 6. Yang, C., Yang, W., Shi, H.: ‘DoS attack in centralized sensor network against state estimation’, IET Control Theory Appl., 2018, 12, (9), pp. 12441253.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-cta.2019.0796
Loading

Related content

content/journals/10.1049/iet-cta.2019.0796
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading