Observer-based H∞ PID control for discrete-time systems under hybrid cyber attacks
In this paper, the observer-based $ H_{\infty } $ PID control problem is studied for linear discrete-time systems subject to hybrid cyber attacks. Two sets of Bernoulli distributed stochastic variables are utilized to characterize the random nature of the false data injection attack and the replay a...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Taylor & Francis Group
2021-01-01
|
Series: | Systems Science & Control Engineering |
Subjects: | |
Online Access: | http://dx.doi.org/10.1080/21642583.2021.1895004 |
id |
doaj-808dbd9fcc1b4ea7928388bc2e3d3e6f |
---|---|
record_format |
Article |
spelling |
doaj-808dbd9fcc1b4ea7928388bc2e3d3e6f2021-03-18T15:46:31ZengTaylor & Francis GroupSystems Science & Control Engineering2164-25832021-01-019123224210.1080/21642583.2021.18950041895004Observer-based H∞ PID control for discrete-time systems under hybrid cyber attacksPengyu Wen0Nan Hou1Yuxuan Shen2Jiahui Li3Yi Zhang4Northeast Petroleum UniversityNortheast Petroleum UniversityNortheast Petroleum UniversityNortheast Petroleum UniversityOil & Gas Administration Center of National Petroleum and Natural Gas Pipeline Network Group Co., LtdIn this paper, the observer-based $ H_{\infty } $ PID control problem is studied for linear discrete-time systems subject to hybrid cyber attacks. Two sets of Bernoulli distributed stochastic variables are utilized to characterize the random nature of the false data injection attack and the replay attack. A sector-like bounded condition is exploited to constrain the malicious signal in the false data injection attack which reflects the certain tolerable bound on the difference between the attack signal and the true signal. Sufficient conditions for the existence of the expected observer-based $ H_{\infty } $ PID controller are given to ensure the exponential mean-square stability and the $ H_{\infty } $ performance. Then, the controller parameters are calculated by solving a matrix inequality. Finally, a simulation example is employed to demonstrate the effectiveness of the proposed control algorithm.http://dx.doi.org/10.1080/21642583.2021.1895004pid controlobserver-based controlhybrid cyber attacksfalse data injection attackreplay attack |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Pengyu Wen Nan Hou Yuxuan Shen Jiahui Li Yi Zhang |
spellingShingle |
Pengyu Wen Nan Hou Yuxuan Shen Jiahui Li Yi Zhang Observer-based H∞ PID control for discrete-time systems under hybrid cyber attacks Systems Science & Control Engineering pid control observer-based control hybrid cyber attacks false data injection attack replay attack |
author_facet |
Pengyu Wen Nan Hou Yuxuan Shen Jiahui Li Yi Zhang |
author_sort |
Pengyu Wen |
title |
Observer-based H∞ PID control for discrete-time systems under hybrid cyber attacks |
title_short |
Observer-based H∞ PID control for discrete-time systems under hybrid cyber attacks |
title_full |
Observer-based H∞ PID control for discrete-time systems under hybrid cyber attacks |
title_fullStr |
Observer-based H∞ PID control for discrete-time systems under hybrid cyber attacks |
title_full_unstemmed |
Observer-based H∞ PID control for discrete-time systems under hybrid cyber attacks |
title_sort |
observer-based h∞ pid control for discrete-time systems under hybrid cyber attacks |
publisher |
Taylor & Francis Group |
series |
Systems Science & Control Engineering |
issn |
2164-2583 |
publishDate |
2021-01-01 |
description |
In this paper, the observer-based $ H_{\infty } $ PID control problem is studied for linear discrete-time systems subject to hybrid cyber attacks. Two sets of Bernoulli distributed stochastic variables are utilized to characterize the random nature of the false data injection attack and the replay attack. A sector-like bounded condition is exploited to constrain the malicious signal in the false data injection attack which reflects the certain tolerable bound on the difference between the attack signal and the true signal. Sufficient conditions for the existence of the expected observer-based $ H_{\infty } $ PID controller are given to ensure the exponential mean-square stability and the $ H_{\infty } $ performance. Then, the controller parameters are calculated by solving a matrix inequality. Finally, a simulation example is employed to demonstrate the effectiveness of the proposed control algorithm. |
topic |
pid control observer-based control hybrid cyber attacks false data injection attack replay attack |
url |
http://dx.doi.org/10.1080/21642583.2021.1895004 |
work_keys_str_mv |
AT pengyuwen observerbasedhpidcontrolfordiscretetimesystemsunderhybridcyberattacks AT nanhou observerbasedhpidcontrolfordiscretetimesystemsunderhybridcyberattacks AT yuxuanshen observerbasedhpidcontrolfordiscretetimesystemsunderhybridcyberattacks AT jiahuili observerbasedhpidcontrolfordiscretetimesystemsunderhybridcyberattacks AT yizhang observerbasedhpidcontrolfordiscretetimesystemsunderhybridcyberattacks |
_version_ |
1724215584503103488 |