Abstract
In the following contribution, the control design of CPSs (Cyber Physical Systems) usually consists of an observer to estimate the state of the physical system and a controller to compute the control commands based on the state estimation studied. Our objective is to design control methods that are robust against attacks in the model, attenuating their effect and ensuring at the same time a reliable state and attack estimation allowing their detection and isolation while maintaining the system stability, integrity, and performance. The considered approach is based on the Lyapunov theory and LMI resolution approach in order to deduce the observers-controller gains. A robust output H∞ control and quadratic stabilization for nonlinear systems subject to actuator and sensor data deception attacks (cyber-physical-attacks) is proposed. The detection & identification issues are also reconsidered since the system states and the malicious signals will be reconstructed via a Polytopic-based T-S (Takagi-Sugeno) observer. An innovative design method where the attacked system is presented as an uncertain one subject to external disturbances is developed. A robust polytopic state feedback stabilizing controller based on a polytopic observer with disturbances attenuation for the resulting uncertain system is considered. To illustrate our proposed approach, we present a numerical example. An algorithm based on a robust polytopic controller ensuring asymptotic stability despite data deception attacks and external perturbations attenuation guaranteed by the H∞ norm will be given. Indeed, a PDC (Parallel Distributed Compensation) controller coupled with a polytopic observer to estimate the unmeasurable state variables and actuator/sensor attack signals will be designed for nonlinear systems subjected to data deception attacks.
Publisher
Academic Publishing Pte. Ltd.
Reference22 articles.
1. Bezzaoucha Rebai S. A Cyber-Security Contribution to Estimation and Event-Based Control Scheduling Co-Design for Polytopic and T-S Fuzzy Models Using a Lyapunov Approach. Springer Nature; 2022.
2. Wang R, Sun Q, Ma D, Hu X. Line impedance cooperative stability region identification method for grid-tied inverters under weak grids. IEEE Transactions on Smart Grid 2020; 11(4): 2856–2866.
3. Housh M, Kadosh N, Haddad J. Detecting and localizing cyber-physical attacks in water distribution systems without records of labeled attacks. Sensors 2022; 22(16): 6035. doi: 10.3390/s22166035
4. Taheri M, Khorasani K, Shames I, Meskin N. Cyber attack and machine induced fault detection and isolation methodologies for cyber-physical systems. arXiv 2009; arXiv:2009.06196. doi: 10.48550/arXiv.2009.06196
5. Ye L, Zhu F, Zhang J. Sensor attack detection and isolation based on sliding mode observer for cyber-physical systems. International Journal of Adaptive Control and Signal Processing 2020; 34(4): 469–483.