Memory-based event-triggered control for networked control system under cyber-attacks

Noureddine Nafir, Abdel Mouneim Khemissat*, Mohamed Emag Farrag, Mohamed Rouamel

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

46 Downloads (Pure)

Abstract

This article focuses on the problem of stability for a class of linear networked control systems (NCSs) subjected to network communication delays and random deception attacks. A new memory event-triggered mechanism (METM) is proposed to reduce the unnecessary transmitted data through the communication channel and then enhance the network resources. In this context, a new memory stochastic state feedback controller is proposed to stabilize the closed-loop networked control system. A new randomly occurring deception attacks model is employed to deal with the security problem of NCSs. Sufficient stability conditions are derived based on a suitable Lyapunov-Krasovskii functional (LKF). The designed methodology is proposed in terms of linear matrix inequality to synthesize both event-triggered parameters and controller gains, and to reduce the conservatism of the system some integral lemma are exploited to bind the time derivative of the LKF. Finally, two numerical examples are presented to illustrate the effectiveness of the proposed method which provides a maximal upper bound value of the network-induced delay and less transmitted packet regarding the maximal value delay obtained in other works, so less conservatism results are obtained, compared to previous ones in the literature.
Original languageEnglish
Pages (from-to)1739-1750
Number of pages12
JournalIET Control Theory & Applications
Volume18
Issue number13
Early online date22 Jul 2024
DOIs
Publication statusPublished - Sept 2024

Keywords

  • cyber-physical systems
  • linear matrix inequalities
  • linear systems
  • networked control systems
  • stability
  • stochastic systems

ASJC Scopus subject areas

  • Engineering(all)

Fingerprint

Dive into the research topics of 'Memory-based event-triggered control for networked control system under cyber-attacks'. Together they form a unique fingerprint.

Cite this