Skip to main content
Log in

Security Control of Networked T–S Fuzzy System Under Intermittent DoS Jamming Attack with Event-Based Predictor

  • Published:
International Journal of Fuzzy Systems Aims and scope Submit manuscript

Abstract

In this paper, the security issue of networked T–S fuzzy system (NTFS) is investigated under intermittent DoS jamming attack (I-DoS-JA). This kind attack often causes the hiatus of control input and output feedback in communication channels. In order to compensate the missing data caused by attacks, a model-based predictive control framework is proposed by embedding predictors within the closed-loop NTFS, in which: (1) a T–S fuzzy model is formulated with the consideration of I-DoS-JA. Based on this model, a fuzzy observer is constructed to estimate the unmeasurable system states; (2) the predictors embedded in remote plant and local controller are modeled as a synchronous T–S fuzzy system; and (3) an event-trigger mechanism is integrated in the observer-based predictor, which would take great advantages in saving bandwidth sources. Finally, a nonlinear system is given as an example to substantiate the work of this paper.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Derler, P., Lee, E.A., Vincentelli, A.S.: Modeling cyber-physical systems. Proc. IEEE 100(1), 13–28 (2012)

    Article  Google Scholar 

  2. Poovendran, R.: Cyber–physical systems: close encounters between two parallel worlds [point of view]. Proc. IEEE 98(8), 1363–1366 (2010)

    Article  Google Scholar 

  3. Hauser, J., Sastry, S., Kokotovic, P.: Nonlinear control via approximate input-output linearization: the ball and beam example. IEEE Trans. Autom. Control 37(3), 392–398 (1989)

    Article  MathSciNet  Google Scholar 

  4. Ma, H., Liang, H., Zhou, Q., Ahn, C.K.: Adaptive dynamic surface control design for uncertain nonlinear strict-feedback systems with unknown control direction and disturbances. IEEE Trans. Syst. Man Cybern. Syst. 16, 1–10 (2018)

    Google Scholar 

  5. Takagi, T., Sugeno, M.: Fuzzy identification of systems and its applications to modeling and control. IEEE Trans. Syst. Man Cybern. Syst. 15, 116–132 (1985)

    Article  MATH  Google Scholar 

  6. Ma, H., Zhou, Q., Bai, L., Liang, H.: Observer-based adaptive fuzzy fault-tolerant control for stochastic nonstrict-feedback nonlinear systems with input quantization. IEEE Trans. Syst. Man Cybern. Syst. PP(99), 1–12 (2018)

    Google Scholar 

  7. Lam, H.K., Narimani, M.: Stability analysis and performance design for fuzzy-model-based control system under imperfect premise matching. IEEE Trans. Fuzzy Syst. 17(4), 949–961 (2009)

    Article  Google Scholar 

  8. Peng, C., Wu, M., Xie, X., Wang, Y.: Event-triggered predictive control for networked nonlinear systems with imperfect premise matching. IEEE Trans. Fuzzy Syst. PP(99), 1–1 (2018)

    Google Scholar 

  9. Zhang, Y., Liang, H., Ma, H., Zhou, Q., Yu, Z.: Distributed adaptive consensus tracking control for nonlinear multi-agent systems with state constraints. Appl. Math. Comput. 326, 16–32 (2018)

    MathSciNet  Google Scholar 

  10. Xie, X., Ma, H., Zhao, Y., Ding, D.W., Wang, Y.: Control synthesis of discrete-time TCS fuzzy systems based on a novel non-PDC control scheme. IEEE Trans. Fuzzy Syst. 21(1), 147–157 (2013)

    Article  Google Scholar 

  11. Peng, C., Ma, S., Xie, X.: Observer-based non-PDC control for networked T–S fuzzy systems with an event-triggered communication. IEEE Trans. Cybern. PP(99), 1–9 (2017)

    Google Scholar 

  12. Wang, L., Lam, H.-K.: Local stabilization for continuous-time Takagi–Sugeno fuzzy systems with time delay. IEEE Trans. Fuzzy Syst. 26(1), 379–385 (2018)

    Article  Google Scholar 

  13. Ren, Y., Li, Q., Ding, D., Xie, X.: Dissipativity-preserving model reduction for Takagi–Sugeno fuzzy systems. IEEE Trans. Fuzzy Syst. (2018). https://doi.org/10.1109/TFUZZ.2018.2866798

  14. Zhang, Z., Zhou, Q., Wu, C., Li, H.: Dissipativity-based reliable interval type-2 fuzzy filter design for uncertain nonlinear systems. Int. J. Fuzzy Syst. 20(2), 1–13 (2018)

    Article  MathSciNet  Google Scholar 

  15. Cardenas, A.A., Amin, S., Sastry, S.: Secure control: towards survivable cyber-physical systems. In: International Conference on Distributed Computing Systems Workshops, pp. 495–500 (2008)

  16. Xie, X., Yue, D., Zhang, H., Xue, Y.: Control synthesis of discrete-time T–S fuzzy systems via a multi-instant homogenous polynomial approach. IEEE Trans. Cybern 46(3), 630–640 (2016)

    Article  Google Scholar 

  17. Su, X., Zhou, H., Song, Y.D.: An optimal divisioning technique to stabilization synthesis of T–S fuzzy delayed systems. IEEE Trans. Cybern. 47(5), 1147–1156 (2016)

    Article  Google Scholar 

  18. Lam, H.K., Leung, F.H.F.: LMI-based stability and performance design of fuzzy control systems: fuzzy models and controllers with different premises. In: IEEE International Conference on Fuzzy Systems, pp. 2027–2034 (2006)

  19. Su, X., Peng, S., Wu, L., Basin, M.V.: Reliable filtering with strict dissipativity for T–S fuzzy time-delay systems. IEEE Trans. Cybern. 44(12), 2470–2483 (2017)

    Google Scholar 

  20. Wang, Y., Xia, Y., Ahn, C.K., Zhu, Y.: Exponential stabilization of Takagi–Sugeno fuzzy systems with aperiodic sampling: an aperiodic adaptive event-triggered method. IEEE Trans. Syst. Man Cybernet. Syst. PP(99), 1–11 (2018)

    Google Scholar 

  21. Amin, S., Sastry, S.S.: Safe and secure networked control systems under denial-of-service attacks. In: International Conference on Hybrid Systems: Computation and Control, pp. 31–45 (2009)

  22. Persis, C.D., Tesi, P.: Input-to-state stabilizing control under denial-of-service. IEEE Trans. Autom. Control 60(11), 2930–2944 (2015)

    Article  MathSciNet  MATH  Google Scholar 

  23. Smith, R.S.: Covert misappropriation of networked control systems: presenting a feedback structure. IEEE Control Syst. 35(1), 82–92 (2015)

    Article  MathSciNet  Google Scholar 

  24. Mo, Y., Weerakkody, S., Sinopoli, B.: Physical authentication of control systems: designing watermarked control inputs to detect counterfeit sensor outputs. IEEE Control Syst. 35(1), 93–109 (2015)

    Article  MathSciNet  Google Scholar 

  25. Liu, J., Wei, L., Xie, X., Tian, E., Fei, S.: Quantized stabilization for T–S fuzzy systems with hybrid-triggered mechanism and stochastic cyber-attacks. IEEE Trans. Fuzzy Syst. 26, 3820 (2018). https://doi.org/10.1109/TFUZZ.2018.2849702

    Article  Google Scholar 

  26. He, X., Wang, Z., Zhou, D.H.: Robust fault detection for networked systems with communication delay and data missing. Automatica 45(11), 2634–2639 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  27. Zhang, W.A., Yu, L.: Output feedback stabilization of networked control systems with packet dropouts. IEEE Trans. Autom. Control 52(9), 1705–1710 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  28. Sakthivel, R., Ahn, C.K., Joby, M.: Fault-tolerant resilient control for fuzzy fractional order systems. IEEE Trans. Syst. Man Cybern. Syst. PP(99), 1–9 (2018)

    Article  Google Scholar 

  29. Ge, H., Yue, D., Xie, X.: Observer-based fault diagnosis of nonlinear systems via an improved homogeneous polynomial technique. Int. J. Fuzzy Syst. 20(2), 403–415 (2018)

    Article  MathSciNet  Google Scholar 

  30. Xiong, J., Lam, J.: Stabilization of linear systems over networks with bounded packet loss. Automatica 43(1), 80–87 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  31. Knapp, E.D.: Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems. Syngress, New York (2014)

    Google Scholar 

  32. Falliere, N., Murchu, L.O., Chien, E.: W32.stuxnet dossier. White Paper (2011)

  33. Peng, T., Leckie, C., Ramamohanarao, K.: Survey of Network-Based Defense Mechanisms Countering the DoS and DDoS Problems. ACM, Oxford (2007)

    Book  Google Scholar 

  34. Ambrosin, M., Conti, M., Gaspari, F.D., Devarajan, N.: Amplified distributed denial of service attack in software defined networking. In: IFIP International Conference on New Technologies, Mobility and Security, pp. 1–4 (2016)

  35. Zhang, J., Xia, Y., Shi, P.: Design and stability analysis of networked predictive control systems. IEEE Trans. Control Syst. Technol. 21(4), 1495–1501 (2013)

    Article  Google Scholar 

  36. Yin, X., Yue, D., Hu, S., Peng, C., Xue, Y.: Model-based event-triggered predictive control for networked systems with data dropout. SIAM J. Control Optim. 54(2), 567–586 (2016)

    Article  MathSciNet  MATH  Google Scholar 

  37. Dong, Y., Tian, E., Han, Q.L.: A delay system method for designing event-triggered controllers of networked control systems. IEEE Trans. Autom. Control 58(2), 475–481 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  38. Wang, L., Lam, H.K.: A new approach to stability and stabilization analysis for continuous-time Takagi–Sugeno fuzzy systems with time delay. IEEE Trans. Fuzzy Syst. 26(4), 2460–2465 (2018)

    Article  Google Scholar 

  39. Zhang, Y., Sun, J., Liang, H., Li, H.: “Event-triggered adaptive tracking control for multiagent systems with unknown disturbances,” IEEE transactions on cybernetics, (2018)

  40. Zhou, Q., Li, H., Wu, C., Wang, L., Ahn, C.K.: Adaptive fuzzy control of nonlinear systems with unmodeled dynamics and input saturation using small-gain approach. IEEE Trans. Syst. Man Cybern. Syst. PP(99), 1–11 (2017)

    Google Scholar 

  41. Hespanha, J.P., Morse, A.S.: Stability of switched systems with average dwell-time. Proc. IEEE Conf. Decis. Control 1999 3, 2655–2660 (2002)

    Article  Google Scholar 

  42. Hu, S., Yue, D., Peng, C., Xie, X., Yin, X.: Event-triggered controller design of nonlinear discrete-time networked control systems in T–S fuzzy model. Appl. Soft Comput. 30, 400–411 (2015)

    Article  Google Scholar 

  43. Peng, C., Han, Q.L.: A novel event-triggered transmission scheme and \(\cal{L}_{\in }\) control co-design for sampled-data control systems. IEEE Trans. Autom. Control 58(10), 2620–2626 (2013)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgements

This work is supported by National Natural Science Foundation (NNSF) of China under Grant 61633016, 61533010, 61833008, 61374055 and 61503194. The authors would like to thank the anonymous reviewers for many helpful comments and suggestions that certainly contributed to improve this paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiangpeng Xie.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ge, H., Yue, D., Xie, X. et al. Security Control of Networked T–S Fuzzy System Under Intermittent DoS Jamming Attack with Event-Based Predictor. Int. J. Fuzzy Syst. 21, 700–714 (2019). https://doi.org/10.1007/s40815-018-0593-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s40815-018-0593-1

Keywords

Navigation