IEEE/CAA Journal of Automatica Sinica
Citation: | Xin Huang and Jiuxiang Dong, "Learning-Based Switched Reliable Control of Cyber-Physical Systems With Intermittent Communication Faults," IEEE/CAA J. Autom. Sinica, vol. 7, no. 3, pp. 711-724, May 2020. doi: 10.1109/JAS.2020.1003141 |
[1] |
J. L. Liu, Z. G. Wu, D. Yue, and J. H. Park, “Stabilization of networked control systems with hybrid-driven mechanism and probabilistic cyber attacks,” IEEE Trans. Syst., Man, Cybern.: Syst., DOI: 10.1109/tsmc. 2018.2888633. Jan. 2019.
|
[2] |
T. Liu, B. Tian, Y. F. Ai, and F.-Y. Wang, “Parallel reinforcement learning-based energy efficiency improvement for a cyber-physical system,” IEEE/CAA J. Autom. Sinica, vol. 7, no. 2, pp. 617–626, Mar. 2020. doi: 10.1109/jas.2019.1911633
|
[3] |
D. R. Ding, Q. L. Han, Y. Xiang, X. H. Ge, and X. M. Zhang, “A survey on security control and attack detection for industrial cyber-physical systems,” Neurocomputing, vol. 275, pp. 1674–1683, Jan. 2018. doi: 10.1016/j.neucom.2017.10.009
|
[4] |
J. L. Liu, L. L. Wei, X. P. Xie, E. G. Tian, and S. M. Fei, “Quantized stabilization for T-S fuzzy systems with hybrid-triggered mechanism and stochastic cyber-attacks,” IEEE Trans. Fuzzy Syst., vol. 26, no. 6, pp. 3820–3834, Dec. 2018. doi: 10.1109/TFUZZ.2018.2849702
|
[5] |
W. Sun, S. F. Su, J. W. Xia, and V. T. Nguyen, “Adaptive fuzzy tracking control of flexible-joint robots with full-state constraints,” IEEE Trans. Syst.,Man,Cybern.:Syst., vol. 49, no. 11, pp. 2201–2209, Nov. 2019. doi: 10.1109/TSMC.2018.2870642
|
[6] |
J. B. Qiu, H. J. Gao, and S. X. Ding, “Recent advances on fuzzy-model-based nonlinear networked control systems: a survey,” IEEE Trans. Ind. Electron., vol. 63, no. 2, pp. 1207–1217, Feb. 2016. doi: 10.1109/TIE.2015.2504351
|
[7] |
X. Z. Jin, G. H. Yang, and L. Peng, “Robust adaptive tracking control of distributed delay systems with actuator and communication failures,” Asian J. Control, vol. 14, no. 5, pp. 1282–1298, Sep. 2012. doi: 10.1002/asjc.389
|
[8] |
M. Al Janaideh, E. Hammad, A. Farraj, and D. Kundur, “Mitigating attacks with nonlinear dynamics on actuators in cyber-physical mechatronic systems,” IEEE Trans. Ind. Inform., vol. 15, no. 9, pp. 4845–4856, Sep. 2019. doi: 10.1109/TII.2019.2899933
|
[9] |
W. Sun, S. F. Su, Y. Q. Wu, J. W. Xia, and V. T. Nguyen, “Adaptive fuzzy control with high-order barrier Lyapunov functions for high-order Uncertain nonlinear systems with full-state constraints,” IEEE Trans. Cybern., DOI: 10.1109/tcyb.2018.2890256. Jan. 2019.
|
[10] |
M. S. Mahmoud, M. M. Hamdan, and U. A. Baroudi, “Modeling and control of cyber-physical systems subject to cyber attacks: a survey of recent advances and challenges,” Neurocomputing, vol. 338, pp. 101–115, Nov. 2019. doi: 10.1016/j.neucom.2019.01.099
|
[11] |
X. Huang and J. X. Dong, “On modeling and secure control of cyber-physical systems with attacks/faults changing system dynamics: an average dwell-time approach,” Int. J. Robust Nonlinear Control, vol. 29, no. 16, pp. 5481–5498, Nov. 2019. doi: 10.1002/rnc.4675
|
[12] |
H. Zhang, P. Cheng, L. Shi, and J. M. Chen, “Optimal denial-of-service attack scheduling with energy constraint,” IEEE Trans. Autom. Control, vol. 60, no. 11, pp. 3023–3028, Nov. 2015. doi: 10.1109/TAC.2015.2409905
|
[13] |
Y. Tang, D. D. Zhang, D. W. C. Ho, W. Yang, and B. Wang, “Event-based tracking control of mobile robot with denial-of-service attacks,” IEEE Trans. Syst., Man, Cybern.: Syst., DOI: 10.1109/tsmc.2018.28757 93. Nov. 2018.
|
[14] |
Y. Liu, P. Ning, and M. K. Reiter, “False data injection attacks against state estimation in electric power grids,” ACM Trans. Inf. Syst. Secur., vol. 14, no. 1, pp. 13, Jun. 2011.
|
[15] |
G. Y. Wu, J. Sun, and J. Chen, “Optimal data injection attacks in cyber-physical systems,” IEEE Trans. Cybern., vol. 48, no. 12, pp. 3302–3312, Dec. 2018. doi: 10.1109/TCYB.2018.2846365
|
[16] |
Y. L. Mo, S. Weerakkody, and B. Sinopoli, “Physical authentication of control systems: Designing watermarked control inputs to detect counterfeit sensor outputs,” IEEE Control Syst., vol. 35, no. 1, pp. 93–109, Feb. 2015. doi: 10.1109/MCS.2014.2364724
|
[17] |
A. Hoehn and P. Zhang, “Detection of replay attacks in cyber-physical systems, ” in Proc. American Control Conf. (ACC), Boston, USA, 2016, pp. 290−295.
|
[18] |
X. Jin, W. M. Haddad, and T. Yucelen, “An adaptive control architecture for mitigating sensor and actuator attacks in cyber-physical systems,” IEEE Trans. Autom. Control, vol. 62, no. 11, pp. 6058–6064, Nov. 2017. doi: 10.1109/TAC.2017.2652127
|
[19] |
Z. Y. Guo, D. W. Shi, K. H. Johansson, and L. Shi, “Optimal linear cyber-attack on remote state estimation,” IEEE Trans. Control Network Syst., vol. 4, no. 1, pp. 4–13, Mar. 2017. doi: 10.1109/TCNS.2016.2570003
|
[20] |
X. J. Li and X. Y. Shen, “A data-driven attack detection approach for DC servo motor systems based on mixed optimization strategy,” IEEE Trans. Ind. Inform., DOI: 10.1109/tii.2019.2960616. Dec. 2019.
|
[21] |
F. Pasqualetti, F. Dörfler, and F. Bullo, “Attack detection and identification in cyber-physical systems,” IEEE Trans. Autom. Control, vol. 58, no. 11, pp. 2715–2729, Nov. 2013. doi: 10.1109/TAC.2013.2266831
|
[22] |
K. G. Vamvoudakis, J. P. Hespanha, B. Sinopoli, and Y. L. Mo, “Detection in adversarial environments,” IEEE Trans. Autom. Control, vol. 59, no. 12, pp. 3209–3223, Dec. 2014. doi: 10.1109/TAC.2014.2351671
|
[23] |
H. Fawzi, P. Tabuada, and S. Diggavi, “Secure estimation and control for cyber-physical systems under adversarial attacks,” IEEE Trans. Autom. Control, vol. 59, no. 6, pp. 1454–1467, Jun. 2014. doi: 10.1109/TAC.2014.2303233
|
[24] |
A. Teixeira, I. Shames, H. Sandberg, and K. H. Johansson, “A secure control framework for resource-limited adversaries,” Automatica, vol. 51, pp. 135–148, Jan. 2015. doi: 10.1016/j.automatica.2014.10.067
|
[25] |
Y. Chen, S. Kar, and J. M. F. Moura, “Dynamic attack detection in cyber-physical systems with side initial state information,” IEEE Trans. Autom. Control, vol. 62, no. 9, pp. 4618–4624, Sep. 2017. doi: 10.1109/TAC.2016.2626267
|
[26] |
J. X. Dong, Y. Wu, and G. H. Yang, “A new sensor fault isolation method for T-S fuzzy systems,” IEEE Trans. Cybern., vol. 47, no. 9, pp. 2437–2447, Sep. 2017. doi: 10.1109/TCYB.2017.2707422
|
[27] |
W. Ao, Y. D. Song, and C. Y. Wen, “Adaptive cyber-physical system attack detection and reconstruction with application to power systems,” IET Control Theory Appl., vol. 10, no. 12, pp. 1458–1468, Aug. 2016. doi: 10.1049/iet-cta.2015.1147
|
[28] |
J. Yang, C. J. Zhou, S. H. Yang, H. Z. Xu, and B. W. Hu, “Anomaly detection based on zone partition for security protection of industrial cyber-physical systems,” IEEE Trans. Ind. Electron., vol. 65, no. 5, pp. 4257–4267, May 2018. doi: 10.1109/TIE.2017.2772190
|
[29] |
M. S. Mahmoud and Y. Q. Xia, Networked Control Systems: Cloud Control and Secure Control. Kidlington, UK: Butterworth-Heinemann, 2019.
|
[30] |
H. H. Yuan, Y. Q. Xia, J. H. Zhang, H. J. Yang, and M. S. Mahmoud, “Stackelberg-game-based defense analysis against advanced persistent threats on cloud control system,” IEEE Trans. Ind. Inform., vol. 16, no. 3, pp. 1571–1580, Mar. 2020. doi: 10.1109/tii.2019.2925035
|
[31] |
A. Kanellopoulos and K. G. Vamvoudakis, “A moving target defense control framework for cyber-physical systems,” IEEE Trans. Autom. Control, vol. 65, no. 3, pp. 1029–1043, Mar. 2020. doi: 10.1109/tac.2019.2915746
|
[32] |
A. Y. Lu and G. H. Yang, “Event-triggered secure observer-based control for cyber-physical systems under adversarial attacks,” Inform. Sci., vol. 420, pp. 96–109, Dec. 2017. doi: 10.1016/j.ins.2017.08.057
|
[33] |
X. Huang and J. X. Dong, “Reliable control policy of cyber-physical systems against a class of frequency-constrained sensor and actuator attacks,” IEEE Trans. Cybern., vol. 48, no. 12, pp. 3432–3439, Dec. 2018. doi: 10.1109/TCYB.2018.2815758
|
[34] |
C. De Persis and P. Tesi, “Input-to-state stabilizing control under denial-of-service,” IEEE Trans. Autom. Control, vol. 60, no. 11, pp. 2930–2944, Nov. 2015. doi: 10.1109/TAC.2015.2416924
|
[35] |
S. Feng and P. Tesi, “Resilient control under denial-of-service: robust design,” Automatica, vol. 79, pp. 42–51, May 2017. doi: 10.1016/j.automatica.2017.01.031
|
[36] |
T. Yucelen, W. M. Haddad, and E. M. Feron, “Adaptive control architectures for mitigating sensor attacks in cyber-physical systems,” Cyber-Phys. Syst., vol. 2, no. 1−4, pp. 24–52, Oct. 2016. doi: 10.1080/23335777.2016.1244562
|
[37] |
L. W. An and G. H. Yang, “Improved adaptive resilient control against sensor and actuator attacks,” Inform. Sci., vol. 423, pp. 145–156, Jan. 2018. doi: 10.1016/j.ins.2017.09.042
|
[38] |
X. Huang, D. Zhai, and J. X. Dong, “Adaptive integral sliding-mode control strategy of data-driven cyber-physical systems against a class of actuator attacks,” IET Control Theory Appl., vol. 12, no. 10, pp. 1440–1447, Jul. 2018.
|
[39] |
S. Yin, H. J. Gao, S. Ding, and Z. Wang, “Date-based control and process monitoring with industrial applications,” IET Control Theory Appl., vol. 9, no. 7, pp. 997–999, Apr. 2015. doi: 10.1049/iet-cta.2014.1350
|
[40] |
Y. Jiang and Z. P. Jiang, “Computational adaptive optimal control for continuous-time linear systems with completely unknown dynamics,” Automatica, vol. 48, no. 10, pp. 2699–2704, Oct. 2012. doi: 10.1016/j.automatica.2012.06.096
|
[41] |
H. Modares, F. L. Lewis, and M. B. Naghibi-Sistani, “Adaptive optimal control of unknown constrained-input systems using policy iteration and neural networks,” IEEE Trans. Neural Networks Learn. Syst., vol. 24, no. 10, pp. 1513–1525, Oct. 2013. doi: 10.1109/TNNLS.2013.2276571
|
[42] |
M. Wang and A. L. Yang, “Dynamic learning from adaptive neural control of robot manipulators with prescribed performance,” IEEE Trans. Syst.,Man,Cybern.:Syst., vol. 47, no. 8, pp. 2244–2255, Aug. 2017. doi: 10.1109/TSMC.2016.2645942
|
[43] |
Y. Yuan, H. H. Yuan, Z. D. Wang, L. Guo, and H. J. Yang, “Optimal control for networked control systems with disturbances: a delta operator approach,” IET Control Theory Appl., vol. 11, no. 9, pp. 1325–1332, Jun. 2017. doi: 10.1049/iet-cta.2016.1279
|
[44] |
Y. Yuan, L. Guo, and Z. D. Wang, “Composite control of linear quadratic games in delta domain with disturbance observers,” J. Franklin Inst., vol. 354, no. 4, pp. 1673–1695, Mar. 2017. doi: 10.1016/j.jfranklin.2016.12.003
|
[45] |
Q. L. Wei, R. Z. Song, and P. F. Yan, “Data-driven zero-sum neuro-optimal control for a class of continuous-time unknown nonlinear systems with disturbance using ADP,” IEEE Trans. Neural Networks Learn. Syst., vol. 27, no. 2, pp. 444–458, Feb. 2016. doi: 10.1109/TNNLS.2015.2464080
|
[46] |
H. L. Li, D. R. Liu, and D. Wang, “Integral reinforcement learning for linear continuous-time zero-sum games with completely unknown dynamics,” IEEE Trans. Autom. Sci. Eng., vol. 11, no. 3, pp. 706–714, Jul. 2014. doi: 10.1109/TASE.2014.2300532
|
[47] |
B. Luo, D. R. Liu, H. N. Wu, D. Wang, and F. L. Lewis, “Policy gradient adaptive dynamic programming for data-based optimal control,” IEEE Trans. Cybern., vol. 47, no. 10, pp. 3341–3354, Oct. 2017. doi: 10.1109/TCYB.2016.2623859
|
[48] |
Y. F. Lv, J. Na, and X. M. Ren, “Online H∞ control for completely unknown nonlinear systems via an identifier-critic-based ADP structure,” Int. J. Control, vol. 92, no. 1, pp. 100–111, 2019. doi: 10.1080/00207179.2017.1381763
|
[49] |
K. G. Vamvoudakis and H. Ferraz, “Model-free event-triggered control algorithm for continuous-time linear systems with optimal performance,” Automatica, vol. 87, pp. 412–420, Jan. 2018. doi: 10.1016/j.automatica.2017.03.013
|
[50] |
X. Yang and H. B. He, “Adaptive critic designs for event-triggered robust control of nonlinear systems with unknown dynamics,” IEEE Trans. Cybern., vol. 49, no. 6, pp. 2255–2267, Jun. 2019. doi: 10.1109/TCYB.2018.2823199
|
[51] |
C. Y. Wu, C. S. Li, and J. Zhao, “Switching-based state tracking of model reference adaptive control systems in the presence of intermittent failures of all actuators,” Int. J. Adapt. Control Signal Process., vol. 28, no. 11, pp. 1094–1105, Nov. 2014. doi: 10.1002/acs.2430
|
[52] |
R. Wang, J. Zhao, G. M. Dimirovski, and G. P. Liu, “Output feedback control for uncertain linear systems with faulty actuators based on a switching method,” Int. J. Robust Nonlinear Control, vol. 19, no. 12, pp. 1295–1312, Aug. 2009. doi: 10.1002/rnc.1379
|
[53] |
A. Gelb and W. E. Velde, Multiple-Input Describing Functions and Nonlinear System Design. New York: McGraw-Hill, 1968.
|
[54] |
W. J. Rugh, Linear System Theory. 2nd ed. Upper Saddle River, USA: Prentice Hall, 1996.
|
[55] |
F. L. Lewis, D. L. Vrabie, and V. L. Syrmos, Optimal Control. New York, USA: John Wiley & Sons, 2012.
|
[56] |
J. Na, J. Yang, X. Wu, and Y. Guo, “Robust adaptive parameter estimation of sinusoidal signals,” Automatica, vol. 53, pp. 376–384, Mar. 2015. doi: 10.1016/j.automatica.2015.01.019
|
[57] |
M. Abu-Khalaf and F. L. Lewis, “Nearly optimal control laws for nonlinear systems with saturating actuators using a neural network HJB approach,” Automatica, vol. 41, no. 5, pp. 779–791, May 2005. doi: 10.1016/j.automatica.2004.11.034
|
[58] |
J. S. Wang and G. H. Yang, “Output-feedback control of unknown linear discrete-time systems with stochastic measurement and process noise via approximate dynamic programming,” IEEE Trans. Cybern., vol. 48, no. 7, pp. 1977–1988, Jul. 2018. doi: 10.1109/TCYB.2017.2726004
|