Observer-based H∞ PID control for discrete-time systems under hybrid cyber attacks

In this paper, the observer-based $ H_{\infty } $ PID control problem is studied for linear discrete-time systems subject to hybrid cyber attacks. Two sets of Bernoulli distributed stochastic variables are utilized to characterize the random nature of the false data injection attack and the replay a...

Full description

Bibliographic Details
Main Authors: Pengyu Wen, Nan Hou, Yuxuan Shen, Jiahui Li, Yi Zhang
Format: Article
Language:English
Published: Taylor & Francis Group 2021-01-01
Series:Systems Science & Control Engineering
Subjects:
Online Access:http://dx.doi.org/10.1080/21642583.2021.1895004
id doaj-808dbd9fcc1b4ea7928388bc2e3d3e6f
record_format Article
spelling doaj-808dbd9fcc1b4ea7928388bc2e3d3e6f2021-03-18T15:46:31ZengTaylor & Francis GroupSystems Science & Control Engineering2164-25832021-01-019123224210.1080/21642583.2021.18950041895004Observer-based H∞ PID control for discrete-time systems under hybrid cyber attacksPengyu Wen0Nan Hou1Yuxuan Shen2Jiahui Li3Yi Zhang4Northeast Petroleum UniversityNortheast Petroleum UniversityNortheast Petroleum UniversityNortheast Petroleum UniversityOil & Gas Administration Center of National Petroleum and Natural Gas Pipeline Network Group Co., LtdIn this paper, the observer-based $ H_{\infty } $ PID control problem is studied for linear discrete-time systems subject to hybrid cyber attacks. Two sets of Bernoulli distributed stochastic variables are utilized to characterize the random nature of the false data injection attack and the replay attack. A sector-like bounded condition is exploited to constrain the malicious signal in the false data injection attack which reflects the certain tolerable bound on the difference between the attack signal and the true signal. Sufficient conditions for the existence of the expected observer-based $ H_{\infty } $ PID controller are given to ensure the exponential mean-square stability and the $ H_{\infty } $ performance. Then, the controller parameters are calculated by solving a matrix inequality. Finally, a simulation example is employed to demonstrate the effectiveness of the proposed control algorithm.http://dx.doi.org/10.1080/21642583.2021.1895004pid controlobserver-based controlhybrid cyber attacksfalse data injection attackreplay attack
collection DOAJ
language English
format Article
sources DOAJ
author Pengyu Wen
Nan Hou
Yuxuan Shen
Jiahui Li
Yi Zhang
spellingShingle Pengyu Wen
Nan Hou
Yuxuan Shen
Jiahui Li
Yi Zhang
Observer-based H∞ PID control for discrete-time systems under hybrid cyber attacks
Systems Science & Control Engineering
pid control
observer-based control
hybrid cyber attacks
false data injection attack
replay attack
author_facet Pengyu Wen
Nan Hou
Yuxuan Shen
Jiahui Li
Yi Zhang
author_sort Pengyu Wen
title Observer-based H∞ PID control for discrete-time systems under hybrid cyber attacks
title_short Observer-based H∞ PID control for discrete-time systems under hybrid cyber attacks
title_full Observer-based H∞ PID control for discrete-time systems under hybrid cyber attacks
title_fullStr Observer-based H∞ PID control for discrete-time systems under hybrid cyber attacks
title_full_unstemmed Observer-based H∞ PID control for discrete-time systems under hybrid cyber attacks
title_sort observer-based h∞ pid control for discrete-time systems under hybrid cyber attacks
publisher Taylor & Francis Group
series Systems Science & Control Engineering
issn 2164-2583
publishDate 2021-01-01
description In this paper, the observer-based $ H_{\infty } $ PID control problem is studied for linear discrete-time systems subject to hybrid cyber attacks. Two sets of Bernoulli distributed stochastic variables are utilized to characterize the random nature of the false data injection attack and the replay attack. A sector-like bounded condition is exploited to constrain the malicious signal in the false data injection attack which reflects the certain tolerable bound on the difference between the attack signal and the true signal. Sufficient conditions for the existence of the expected observer-based $ H_{\infty } $ PID controller are given to ensure the exponential mean-square stability and the $ H_{\infty } $ performance. Then, the controller parameters are calculated by solving a matrix inequality. Finally, a simulation example is employed to demonstrate the effectiveness of the proposed control algorithm.
topic pid control
observer-based control
hybrid cyber attacks
false data injection attack
replay attack
url http://dx.doi.org/10.1080/21642583.2021.1895004
work_keys_str_mv AT pengyuwen observerbasedhpidcontrolfordiscretetimesystemsunderhybridcyberattacks
AT nanhou observerbasedhpidcontrolfordiscretetimesystemsunderhybridcyberattacks
AT yuxuanshen observerbasedhpidcontrolfordiscretetimesystemsunderhybridcyberattacks
AT jiahuili observerbasedhpidcontrolfordiscretetimesystemsunderhybridcyberattacks
AT yizhang observerbasedhpidcontrolfordiscretetimesystemsunderhybridcyberattacks
_version_ 1724215584503103488