2022
DOI: 10.1002/asjc.2754
|View full text |Cite
|
Sign up to set email alerts
|

Mixed H and passive event‐triggered control for Markovian jump systems with sensor saturation under cyber‐attacks

Abstract: This paper addresses the mixed H ∞ and passive event-triggered control problem for a class of Markovian jump systems subject to sensor saturation and cyber-attacks. By taking the effects of sensor saturation and randomly occurring cyber-attacks into consideration, a closed-loop output feedback Markovian jump system model is established under the proposed event-triggered mechanism.Then, based on Lyapunov stability theory and integral inequalities technique, some sufficient conditions are obtained to guarantee t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 34 publications
(60 reference statements)
0
5
0
Order By: Relevance
“…Remark 1. Zero dynamics attacks, covert attacks, and replay attacks are all stealthy cyber-attacks under observer-based residual detector (2). Whereas zero dynamics attacks and covert attacks require perfect model knowledge to reduce the probability of being detected, replay attacks are stealthy only if the system in steady-state conditions but will be detected by the dynamic watermarking.…”
Section: Preliminariesmentioning
confidence: 99%
See 1 more Smart Citation
“…Remark 1. Zero dynamics attacks, covert attacks, and replay attacks are all stealthy cyber-attacks under observer-based residual detector (2). Whereas zero dynamics attacks and covert attacks require perfect model knowledge to reduce the probability of being detected, replay attacks are stealthy only if the system in steady-state conditions but will be detected by the dynamic watermarking.…”
Section: Preliminariesmentioning
confidence: 99%
“…Cyber-physical systems (CPSs) pertain to the regulation of physical space through embedded network communication, where functions like external communication, data processing, logic judgment, and policy enforcement are integrated [1][2][3][4]. CPSs employ networks for the communal transmission of system data, which facilitates cost-effective and prompt data transfer among controllers, sensors, and actuators.…”
Section: Introductionmentioning
confidence: 99%
“…For the state observer (8), by proposing the sliding surface function (10), then the sliding surface s(t) = 0 can be arrived and maintain of sliding motion can be ensured in finite-time by the following SMC law: (15) in which 𝜖 is a small tuning scalar. The computing algorithm for compensator v(t) is defined in (28), and 𝜚(t) is designed as follows:…”
Section: Observer-based Smc Designmentioning
confidence: 99%
“…On the other hand, with the development and advancement of information technology for intelligent systems, the security issue for cyber-physical systems becomes an important challenge due to various cyber-attacks, that is, the deception attacks [28], the replay attacks [29], and the denial-of-service attacks [30]. Such malicious attacks pose serious security threats to national industries and economy.…”
Section: Introductionmentioning
confidence: 99%
“…In order to reduce the waste of resources and data redundancy in modern industrial control applications, event‐triggered control was introduced [31]. Therefore, the majority of scholars were dedicated to the research of event‐triggered control, and many important results of event‐triggered control were presented [32–37]. By considering two coupling cases between the mode switching signal and the event‐triggered signal, a sufficient finite‐time H$$ {H}_{\infty } $$ performance analysis criterion was provided based on the average dwell time method in [37].…”
Section: Introductionmentioning
confidence: 99%