共查询到20条相似文献,搜索用时 31 毫秒
1.
The security control problem for a class of unknown nonlinear systems is considered in this paper. For the nonlinear system running in the network environment, the measurement channel is subjected to hybrid attacks. Intermittent denial of service attacks and false data injection attacks are modeled as the hybrid attacks. According to the characteristics of the repetitive system, a resilient iterative learning control (ILC) algorithm under hybrid attacks is devised. Subsequently, the stability of the system is proved by mathematical derivation and theoretical analysis in the sense of mathematical expectation. The theoretical analysis results indicate that the resilient ILC algorithm can ensure the stability of the system, and the tracking error converges with the increased number of iterations. Finally, the validity of the algorithm is illustrated by numerical simulation and mobile robot simulation. 相似文献
2.
Huan Yang;Li Dai;Huahui Xie;Pushen Cai;Yuanqing Xia; 《国际强度与非线性控制杂志
》2024,34(8):5364-5383
》2024,34(8):5364-5383
In this article, a resilient model predictive control algorithm incorporating a dual-mode control strategy is proposed for a class of cyber-physical systems subject to state and input constraints, additive disturbances and denial-of-service (DoS) attacks. An adversary aims to disrupt the controller-to-actuator channel by deploying adversarial jamming signals. By exploring the prediction uncertainty between a nominal model and an actual model and utilizing a constraint tightening technique, a novel set of constraints is developed, which guarantees robust constraint satisfaction in open-loop mode caused by DoS attacks. A robust positive invariant set is designed, which allows the control mode to switch from rolling optimization to a state-feedback control law when the state enters its interior, thus saving computational resources. We explicitly determine a critical duration for DoS attacks and, through theoretical analysis, establish that when the duration of DoS attacks falls below this critical value, the proposed algorithm ensures guaranteed recursive feasibility and robust asymptotic stability. Finally, some comparisons are provided to illustrate the effectiveness of the proposed approach. 相似文献
3.
Giuseppe Franzè Francesco Tedesco Domenico Famularo 《IEEE/CAA Journal of Automatica Sinica》2021,8(3):628-640
In this paper,a resilient distributed control scheme against replay attacks for multi-agent networked systems subject to input and state constraints is proposed.The methodological starting point relies on a smart use of predictive arguments with a twofold aim:1)Promptly detect malicious agent behaviors affecting normal system operations;2)Apply specific control actions,based on predictive ideas,for mitigating as much as possible undesirable domino effects resulting from adversary operations.Specifically,the multi-agent system is topologically described by a leader-follower digraph characterized by a unique leader and set-theoretic receding horizon control ideas are exploited to develop a distributed algorithm capable to instantaneously recognize the attacked agent.Finally,numerical simulations are carried out to show benefits and effectiveness of the proposed approach. 相似文献
4.
Control algorithms of networked multiagent systems are generally computed distributively without having a centralised entity monitoring the activity of agents; and therefore, unforeseen adverse conditions such as uncertainties or attacks to the communication network and/or failure of agent-wise components can easily result in system instability and prohibit the accomplishment of system-level objectives. In this paper, we study resilient coordination of networked multiagent systems in the presence of misbehaving agents, i.e. agents that are subject to exogenous disturbances that represent a class of adverse conditions. In particular, a distributed adaptive control architecture is presented for directed and time-varying graph topologies to retrieve a desired networked multiagent system behaviour. Apart from the existing relevant literature that make specific assumptions on the graph topology and/or the fraction of misbehaving agents, we show that the considered class of adverse conditions can be mitigated by the proposed adaptive control approach that utilises a local state emulator – even if all agents are misbehaving. Illustrative numerical examples are provided to demonstrate the theoretical findings. 相似文献
5.
本文讨论了一类线性时变信息物理系统(CPS)在有限时域内受到混合攻击的H∞控制问题.上述提到的混合攻击,包括对传感器和控制器之间通信通道发起的拒绝服务(DoS)攻击和对传感器和执行器发起的数据注入(FDI)攻击,其目的在于破坏测量数据和控制数据,从而危及闭环系统的功能.本文的目的在于研究攻击注入信号和被控输出的关系,来设计控制器增益以使闭环系统在有限时域内具有H∞性能;与此同时,减少最坏情况下攻击输入信号对线性二次性能的影响.为了解决以上问题,本文用了随机分析方法和配方法来建立所需的控制器存在的充分条件,并且通过求解一些设定条件下的两个耦合的倒向递推黎卡提差分方程(RDEs),提出了一个有限时域控制器设计算法.最后,本文给出了数值仿真和实验结果,来证明该方法的有效性. 相似文献
6.
针对在欺骗攻击下自触发模型预测控制系统的安全控制问题, 本文提出一种基于关键数据保护的弹性自 触发模型预测控制(MPC)策略. 对比现有的自触发MPC, 该方法仅需对少量关键控制样本进行保护, 则可保证闭环 系统稳定运行, 从而有效节省系统资源. 首先, 基于自触发MPC和欺骗攻击的特征推导标称系统与被攻击系统状态之间的误差上界, 从而定量分析出欺骗攻击对系统的损害. 然后, 通过所获得误差上界和李雅普诺夫定理建立关键数据的选取条件并对其实施保护. 最后, 严格证明了在仅对关键控制样本实施保护后, 被控系统仍可在欺骗攻击下保持稳定. 此外, 基于移动机器人和弹簧小车系统对所提算法进行了仿真实验, 结果表明所提算法能够显著节省保护资源, 验证了算法的有效性 相似文献
7.
Giuseppe Franzè Domenico Famularo Walter Lucia Francesco Tedesco 《IEEE/CAA Journal of Automatica Sinica》2020,7(5):1204-1214
Multi-agent systems are usually equipped with open communication infrastructures to improve interactions efficiency, reliability and sustainability. Although technologically cost-effective, this makes them vulnerable to cyber-attacks with potentially catastrophic consequences. To this end, we present a novel control architecture capable to deal with the distributed constrained regulation problem in the presence of time-delay attacks on the agents’ communication infrastructure. The basic idea consists of orchestrating the interconnected cyber-physical system as a leader-follower configuration so that adequate control actions are computed to isolate the attacked unit before it compromises the system operations. Simulations on a multi-area power system confirm that the proposed control scheme can reconfigure the leader-follower structure in response to denial of-service (DoS) attacks. 相似文献
8.
The similarities are pointed out between the variable forgetting factor given in the paper by Fortescue, Kershenbaum and Ydstie and that given in Wellstead and Sanoff. Moreover, it is shown that the method of Fortescue, Kershenbaum and Ydstie can be made significantly more efficient, computationally, than is indicated. 相似文献
9.
Adaptive control using input matching can avoid the identifiability and/or exact model-matching constraints of the bulk of existing adaptive control methods. The focus on input matchability allows the use of general controller structures capable of controlling a plant whose structure may vary arbitrarily within an allowable class. The applicability of this technique is demonstrated for two simulated plants: a MIMO linear network increasing its complexity due to component failure and an unstable SISO plant controlled by an actuator which gradually develops a nonlinearity. The sole need for pre-specification of an allowable plant structure re-focuses the thrust of system identification from parameter estimation to structure determination. 相似文献
10.
This paper studies event-triggered containment control problem of multi-agent systems (MASs) under deception attacks and denial-of-service (DoS) attacks. First, to save limited network resources, an event-triggered mechanism is proposed for MASs under hybrid cyber attacks. Different from the existing event-triggered mechanisms, the negative influences of deception attacks and DoS attacks are considered in the proposed triggering function. The communication frequencies between agents are reduced. Then, based on the proposed event-triggered mechanism, a corresponding control protocol is proposed to ensure that the followers will converge to the convex hull formed by the leaders under deception attacks and DoS attacks. Compared with the previous researches about containment control, in addition to hybrid cyber attacks being considered, the nonlinear functions related to the states of the agents are applied to describe the deception attack signals in the MAS. By orthogonal transformation of deception attack signals, the containment control problem under deception attacks and DoS attacks is reformulated as a stability problem. Then, the sufficient conditions on containment control can be obtained. Finally, a set of simulation example is used to verify the effectiveness of the proposed method. 相似文献
11.
12.
13.
Many control applications, including feedforward and learning control, involve the inverse of a dynamical system. For nonminimum-phase systems, the response of the inverse system is unbounded. For linear time-invariant (LTI), nonminimum-phase systems, a bounded, noncausal inverse response can be obtained through an exponential dichotomy. For generic linear time-varying (LTV) systems, such a dichotomy does not exist in general. The aim of this paper is to develop an inversion approach for an important class of LTV systems, namely linear periodically time-varying (LPTV) systems, which occur in, e.g. position-dependent systems with periodic tasks and non-equidistantly sampled systems. The proposed methodology exploits the periodicity to determine a bounded inverse for general LPTV systems. Conditions for existence are provided. The method is successfully demonstrated in several application cases, including position-dependent and non-equidistantly sampled systems. 相似文献
14.
In this paper, an adaptive dynamic surface control scheme is proposed for a class of multi-input multi-output (MIMO) nonlinear time-varying systems. By fusing a bound estimation approach, a smooth function and a time-varying matrix factorisation, the obstacle caused by unknown time-varying parameters is circumvented. The proposed scheme is free of the problem of explosion of complexity and needs only one updated parameter at each design step. Moreover, all tracking errors can converge to predefined arbitrarily small residual sets with a prescribed convergence rate and maximum overshoot. Such features result in a simple adaptive controller which can be easily implemented in applications with less computational burden and satisfactory tracking performance. Simulation results are presented to illustrate the effectiveness of the proposed scheme. 相似文献
15.
管海娃 《计算机工程与应用》2020,56(14):231-239
研究任意初态下;机器人系统的有限时间自适应迭代学习控制方法。引入初始修正吸引子的概念;构造一个含有初始修正项的误差变量。针对定常机器人系统和时变机器人系统;采用Lyapunov-like方法;分别设计迭代学习控制器处理系统中不确定性。并且;采用未含/含限幅学习机制;保证闭环系统各变量的一致有界性和误差变量在整个作业区间一致收敛性。藉以实现跟踪误差在预先指定区间的完全跟踪。仿真结果验证所设计控制方法的有效性。 相似文献
16.
Schemes for system identification based on closed-loop experiments have attracted considerable interest lately. However, most of the existing approaches have been developed for discrete-time models. In this paper, the problem of continuoustime model identification is considered. A bias correction method without noise modelling associated with the Poisson moment functionals approach is presented for indirect identification of closed-loop systems. To illustrate the performances of the proposed method, the bias-eliminated least-squares algorithm is applied to the parameter estimation of a simulated system via Monte Carlo simulations. 相似文献
17.
Massoud Hemmasian Ettefagh Jose De Dona Farzad Towhidkhah 《International journal of systems science》2018,49(4):868-883
It is well known that some practical difficulties are involved in the implementation of stabilising model predictive control for time-varying systems. In order to address the difficulty of computational load, this paper extends the orthonormal function method for model predictive control to linear time-varying systems. We provide sufficient conditions for a sub-optimal model predictive controller to be stabilising for a time-varying system. It is also shown that the orthonormal parametrisation method enables us to reduce the number of decision variables significantly and with a satisfactory performance. In addition, it is shown that orthonormality and, the called for, long prediction horizons are not necessary for stability. Examples are provided, illustrating the effectiveness of the method for linear time-varying systems. 相似文献
18.
Martin Guay 《International journal of control》2017,90(8):1543-1554
This paper proposes a proportional-integral extremum-seeking control technique for a class of discrete-time nonlinear dynamical systems with unknown dynamics. The technique is a generalisation of existing time-varying extremum-seeking control (ESC) techniques that provides fast transient performance of the closed-loop system to the optimum equilibrium of a measured objective function. The main contribution of the proposed technique is the addition of a proportional action that can be used to minimise the impact of a time-scale separation on the transient performance of the ESC system. The integral action fulfils the role of standard ESC techniques to identify optimal equilibrium conditions. The effectiveness of the proposed approach is demonstrated using a simulation example. 相似文献
19.
时变机器人系统的重复学习控制:一种混合学习方案(英文) 总被引:1,自引:0,他引:1
Repetitive learning control is presented for finite- time-trajectory tracking of uncertain time-varying robotic sys- tems.A hybrid learning scheme is given to cope with the con- stant and time-varying unknowns in system dynamics,where the time functions are learned in an iterative learning way,without the aid of Taylor expression,while the conventional differential learning method is suggested for estimating the constant ones. It is distinct that the presented repetitive learning control avoids the requirement for initial repositioning at the beginning of each cycle,and the time-varying unknowns are not necessary to be periodic.It is shown that with the adoption of hybrid learning, the boundedness of state variables of the closed-loop system is guaranteed and the tracking error is ensured to converge to zero as iteration increases.The effectiveness of the proposed scheme is demonstrated through numerical simulation. 相似文献
20.
This correspondence is concerned with an iterative learning algorithm for MIMO linear time-varying systems. We provide a necessary and sufficient condition for the existence of a convergent algorithm. The result extends the main result in Saab (IEEE Trans. Automat. Control 40(6) (1995) 1138). 相似文献