JCD 2024年第4期新鲜出炉!

文摘   2024-12-04 11:05   辽宁  

点击蓝字 

关注我们

Journal of Control and Decision(JCD) 2024年第11卷第4期现已发布。您可点击微信平台主页下方“JCD-当期目次”查阅本期文章,也可点击下方“阅读原文”登陆官方网站http://www.tandfonline.com/toc/tjcd20/current浏览详细信息。


JCD 2024年第4期



Articles

01

Adaptive event-triggered path following control for networked autonomous vehicles under aperiodic denial-of-service attacks

Tengfei Zhang, Heng Wang, Weiwei Che & Qing Li

Abstract

This paper studies the adaptive event-triggered (AET)-based path following control problem for networked autonomous vehiclessubjectto aperiodic denial-of-service (DoS) attacks. Firstly, considering the strong dependence between scheduling parameters, a polytopic linear parameter varying system is established to representthe nonlinear path following system. Secondly,to save limited communication bandwidth and guarantee a desired path following control performance effectively, a novel AET mechanism with nonmonotonic characteristics is designed, and a compensation strategy is presented to tackle the effect of packet losses caused by DoS attacks on the system. Thirdly, sufficient conditions are developed for the output feedback controller gain matrix and the AET mechanism weighting matrix such that the closed-loop system is guaranteed to be stable and an H∞ performance is satisfied. Finally, simulation results verify the proposed control strategy.


02

Quadratic stability of uncertain large-scale networked systems

Jun-Xiao Song, Jun-Wei Gao, Hai-Sheng Yu & Hua-Bo Liu

Abstract

In this paper, the quadratic stability of continuous-time uncertain large-scale networked systems is considered. The systems are composed of many subsystems distributed in differentlocationsin space and interconnected according to a certain network topology. A computationally efficient sufficient condition for the quadratic stability of large-scale networked systems is established, utilising effectively the block diagonal structure of the system parameter matrix and the sparseness of the subsystem connection matrix (SCM). Furthermore, a stability condition is presented, which is entirely contingent on the parameters of each subsystem. The simulation results show that the obtained conditions have obvious advantages in analysing the quadratic stability of large-scale networked systems.


03

Unified optimality criteria for the Target–Attacker– Defender game

Kamal Mammadov, Cheng-Chew Lim & Peng Shi

ABSTRACT

The game consists of two teams, team A (Attacker) and team T/D (Target and Defender). The Attacker aims to minimise the separation between itself and the Target at time tf ; and team T/D aims to maximise the separation distance. Previous works in the literature identified three distinct optimality criteria to characterise the state-feedback Nash equilibrium. We introduce a new unifying paradigm given by the Critical Escape Trajectories Theorem, which simultaneously characterises the Target’s escape set and the value function of the game in all regions, highlighting a deep underlying geometric connection between the differential game of kind and the differential game of degree. Leveraging previous results in the literature, the Critical Escape Trajectories Theorem is proved to be equivalent and is utilised to develop an efficient algorithm for the computation of the state-feedback Nash equilibrium.


04

Non-parametric fractional-order controller design for stable process based on modified relay

K. Gnaneshwar, Vinay Kumar, Sudeep Sharma & Prabin Kumar Padhy

ABSTRACT

The relay feedback approach is an effective approach for real-time process control. However, it requires accurate limit cycle data. This paper proposes a novel relay feedback approach for fractional-order (FO) controller design to regulate the stable process performance. The proposed methodology does not require prior knowledge of the process and assures accurate limit cycle. Accurate limit cycle parameters are first estimated using the proposed relay. Then, the FO controller is designed based on the output of the limit cycle obtained through the proposed relay, phase, andNyquiststability criteria. Further,the accuracy ofthe proposed relay is verified analytically through harmonic analysis. Various performance parameters and indices are estimated and compared with recently published techniques to assess the effectiveness. Additionally, disturbance and parametric uncertainty analyses are conducted to examine the disturbance rejection capacity and robustness. The efficacy of the proposed methodology is further validated on a real-time liquid-level control four-tank process.


05

Reinforcement learning based sliding mode control for two-time-scale multi-agent systems with malicious attacks

Rongsheng Xia, Han Jiang & Lei Su

ABSTRACT

The optimal consensus problem for linear two-time-scale multi-agent systems under malicious attacks is studied in this paper. Firstly, an integral sliding mode function is devised to guide the system trajectory towards the sliding mode surface and the impact of attacks can be eliminated. Then, the optional consensus problem is reformulated as a zero-sum game problem between each agent and its neighbouring agents. Thus, the game algebraic Riccati equation with singularly perturbed parameter is formulated. Furthermore, to avoid the requirement of the system dynamics information, an integral reinforcement learning algorithm is presented to obtain the optimal control policy for multi-agent systems. Compared with existing learning methods, the obtained reinforcement learning algorithm is devoid of potential calculation error issues from singularly perturbed parameter. Meanwhile, the convergence of the proposed algorithm is verified. Finally, a simulation example is provided to demonstrate the efficacy of the proposed control method.


06

A novel secure aware privacy preserved data sharing framework in an E-government system based on a consortium blockchain

S. Suganthi & T. Sree Kala

ABSTRACT

Electronic government (E-government) utilises information and communication techniques for delivering servicesto individuals. Itistermed a complicated modelthatrequiresto be distributed, privacy-preserved and secured. The failure of these can lead to economic and social loss. The blockchain method facilitates the execution of a secured and privacy-preserved model wherein transactions are done securely. This paper presents a privacy-protected model forsharing of data in an e-governance system considering consortium blockchain. The proposed privacy-protected model involves eight different phases, namely initialisation, new node creation, delegates and witnesses voting, user registration, authentication, data protection, validation and data sharing. This method helps to facilitate the security of information and privacy and concurrently increases trust in the public sector. The proposed privacy-protected model provided enhanced performance with a small computational time of 40.422s and memory usage of 38.800MB.


07

Event-triggered H∞ control of complex dynamical networks subject to stochastic cyber-attacks by new two-sided delay-dependent LKF functional

Bandana Priya, M. Mubeen Tajudeen, M. Syed Ali, Grienggrai Rajchakit & Ganesh Kumar Thakur

ABSTRACT

This article deals with the problem of event-triggered control of complex dynamical networks (CDNs) subject to stochastic cyber-attacks and random coupling delays. Hackers may abuse the system by injecting malicious activity into communication networks. Two types of non-linear functions for cyber-attacks, time-varying coupling delays, respectively, and a set of random variables satisfying the Bernoulli distribution are proposed. Against complex dynamical networks, an attacker has the capacity to change the transmitted data. So the traditional control method can be a major challenge, and it is essential to respond to cyber-attacks of this kind. An eventtriggered mechanism (ETM)wasimplemented to avoid losing limitedbandwidth. The input delay method is then used to build a time-varying sample under stochastic cyber-attacks. The stability criterion of the developed system model and the display expression of control parameters are then established using a new two-sided delay-dependent Lyapunov–Krasovskii functional (LKF) and linear matrix inequality (LMI) techniques. Lastly, two numerical examples, including the inverted pendulum application, are presented to illustrate the effectiveness and feasibility of the derived theoretical results.


08

False data injection attacks on networked control systems

Syed Ahmed Pasha, Rijha Safdar & Syed Taha Ali

ABSTRACT

The integration of cyber (network) with physical world is a big step in cyber-physical systems. This has revolutionised many industries. But this transformation has made cyber-physical systems vulnerable to attacks. One particular type of attack is the adversarial false data injection which injects false data in either the sensor measurements or the corresponding communication channel. A better understanding of how false data injection (FDI) attacks are constructed is crucial for developing strategies to protect against such attacks. In this paper, we consider two models for networked control systems and present an algorithm for constructing FDI attacks in each case and compare with an existing approach. The conditions for the attack to remain stealthy for systems equipped with a χ2 failure detector and the design of attack vectors that satisfy these conditions are discussed in detail. The algorithms are demonstrated by developing FDI attacks for two real-world examples.


09

Robust control allocation method for uncertain systems based on the algorithms of maximum– minimum and improved fish swarm

Xingyuan Yang, Xi Tong & Yangwang Fang

ABSTRACT

In this paper, a novelrobust control allocation method for a controlsystem with uncertain parameters is proposed based on the algorithms of maximum–minimum and improved fish swarm. Based on the algorithm of maximum–minimum, the control allocation problem with an uncertain allocation matrix is transformed into the definite control allocation problem; then by using an improved fish swarm algorithm, the resultant control allocation problem issolved. Finally, the simulation results show that the proposed robust control allocation method has better robustness to system modelling uncertainty and possesses stronger anti-interference ability than the existing control allocation methods.


10

Equilibrium analysis for multi-defender Stackelberg security games under a logit tie-breaking rule

Ling Chen & Mingchu Li

ABSTRACT

We introduce a general multi-defender Stackelberg security game where multiple independent defenders jointly protect a same set of targets from being attacked by a common attacker. In the game, Strong Stackelberg Equilibrium isfundamentally problematic, because the notion of ‘breaking ties in defender’s favour’ is no longer well defined, as we must specify which defender will receive the favour. To address this issue, we define a new equilibrium concept under a newly defined tie-breaking rule. We characterise Logit Stackelberg Multi-Defender Equilibrium, corresponding to a logit tie-breaking rule, as well as an equivalent Nash Equilibrium among defenders, and exhibit algorithms for computing the equilibrium solutions. We find that Logit Stackelberg Multi-Defender Equilibrium and its’ equivalent Nash Equilibrium may not exist, which motivates us to find an approximate equilibrium. We design a revised exclusion algorithm to find the approximate ε-Nash Equilibrium in which no defender gains more than ε by deviating.


11

Stability of conformable fractional time-varying linear systems

Abdellaziz Binid, Toufik Ennouari & Bouchra Abouzaid

ABSTRACT

In this paper, we investigate the exponential and asymptotic stability analysis of conformable fractional linear time-varying systems. We propose sufficient conditions for testing the asymptotic and exponential stability of conformable differential systems by using the notion of stable functions and differential Lyapunov inequalities. Furthermore,we apply the developed approach to the problem of conformable stabilisation and observer design for conformable fractional linear time-varying systems.


12

Fault-tolerant adaptive fractional order sliding mode control for a quadrotor using disturbance observer

Amir Mohammad Aghazamani & Mahdi Khodabandeh

ABSTRACT

An adaptive fractional-order sliding mode control method using a disturbance observer is proposed forposition tracking of a quadrotor. The mathematical model ofthe quadrotor considering disturbance is derived using the Euler–Lagrange equations. The model is divided into two fully actuated and underactuated subsystems. The proposed controller as the result of combining fractional calculus and the sliding mode method is designed for both subsystemsseparately. Furthermore, a disturbance observer is designed which deals with actuator fault, uncertainty, and wind disturbance. The stability of the closed-loop system is proved using Lyapunov theory and finite-time convergence ofthe variablesto the desired valuesis guaranteed. In the numericalsimulation, position tracking despite the actuator faults and effects of load and wind disturbance are investigated. Finally, the simulation results validate the superior performance and robustness of the proposed controller against actuatorfault and wind disturbance and the results of controllers are compared.


13

Application of gap metric for model selection in linear parameter varying model-based predictive control

Ayorinde Bamimore

ABSTRACT

Selecting the minimum number of linear models required to characterize a nonlinear dynamic system in the local approach to linear parameter varying (LPV) model identification remains a challenge. This study proposes the use of the gap metric for such selection. Subsequently, the identified LPV model is proposed for use in the design of LPV-based model predictive control (MPC). The results of the validation experiment reveal that the identified gap-based local and global LPV models provide a good fit, which is superior to that of any individual linear model, as measured by the computed mean squared error values. Furthermore, the closed-loop results show that the performance of the LPV-MPC closely matchesthat of the full-blown nonlinear MPC and multi-MPC, while LPV-MPC clearly outperforms Linear MPC. Additionally, the proposed LPVMPC is found to be robust to process model mismatches and measurement noise, and is much less computationally intensive than nonlinear MPC.


14

A secure authentication and collaborative datasharing model based on a blockchain network in the cloud

B. Samuel & K. Kasturi

ABSTRACT

In cloud computing, various organisations store their confidential information in private or public cloud platforms. The data sharing through the various cloud platforms increases the risk of security. To attain data sharing while sustaining data confidentiality, a secure sharing platform and collaboration model is needed. Hence, this paper introduces the novel secure authentication and collaborative data sharing (SecAuth_CDS) scheme for sharing data on blockchain. The entities involved in the SecAuth_CDS are third parties, data owners, smart contracts and blockchain networks. The security of the authentication process can be boosted by applying various security operations, such as Exclusive OR (EXOR), hashing, encryption and so on. The proposed method assures that the sharing is secure and trustworthy by blockchain. The experimental result reveals that the SecAuth_CDS performed effectively in terms of revenue, memory usage and computation cost with the values of 27, 62.20 MB and 0.003 sec.


15

Secure intrusion detection system for IOT sensor data using LR-ECC and FY-SFL-DLNN algorithm

Majjaru Chandrababu & K Senthilkumar

ABSTRACT

Identification and prevention of intrusions is the primary challenge in high-speed networks like IoT. Many Intrusion Detection Systems (IDSs) have been developed already by researchers; but, they are notfully capable of protecting the network. Conventional methods do not optimise their learning models and ignore feature reduction. This negatively impacts the accuracy, efficiency, computation time, and security ofthe conventional IDS. Hence,this paper proposed a Secure IDS by utilising LR-ECC and FY-SFL-DLNN. Initially, the input dataset is preprocessed and the features are extracted from the data. Utilising the EK-LDA, the features are decreased. After that, utilising the BM-KMA, the data separation occurs. Lastly, by employing FY-SFL-DLNN, data classification is performed. Thus, the IoT sensor data is safely transmitted by utilising the LR-ECC algorithm after detection. Grounded on the experimental outcomes, the proposed work’s performance is analogised with the conventional techniquesfor validating the proposed system’s effectiveness.


16

Attack on communication links analysis and detection over the clustered networks

Thiem V. Pham & Quynh T. T. Nguyen

ABSTRACT

This research focuses on the subject of attack analysis, detection, and mitigation in a network of MASs with linear dynamics. This network is divided into multiple clusters that are disconnected from one another. A leader is an agent that exists in each cluster and has the ability to interact with other leaders through a strongly connected directed graph at discrete instances. Firstly, we analyze the effect of communication link attacks on the consensus algorithm. We show that the consensus control law may be disturbed by a single attack on a communication channel using principles from matrix theory and graph theory. Then, a bank of impulsive unknown input observers is established to ensure each agent is able to detect the communication link attack. Moreover, a modification of the consensus algorithm of MASs based on an estimated attack is also given. Finally, the results of our research are illustrated using simulations.


17

Relative threshold event-triggered prescribed performance control for vehicle active suspension systems with uncertainty

Bao Jin, Chunxia Dou, Jiannan Chen & Victor Kuzin

ABSTRACT

This paper proposes a novel control strategy to solve the tracking problem for uncertain vehicle active suspension systems (VASS). Under the proposed control framework, the overall VASS is divided into two subsystems owing to its particularstructure: (1) forthe firstsubsystem,to ensure the importantstate variablewithin the given restrictive conditions allthe time, a novel prescribed performance control(PPC)-based intermediate controller is first designed; furthermore, a new relative threshold event-triggered controller is proposed based on the event-triggered control theory; Moreover, because the internal and external disturbances are inevitable in actual applications, system uncertainties are also considered. (2) for the second subsystem, which is regarded as zero dynamics of overall VASS, the corresponding zero dynamic stability analysis is presented; finally, the resulting closed-loop system is ensured to be stable in the sense of uniform ultimate boundedness. The effectiveness of the proposed approach is illustrated by simulation results.


18

Consensus tracking for first-order agent dynamics with distributed delay

Zhenhua Wang, Yanli Zhu & Ben Niu

ABSTRACT

This manuscript explores the consensus tracking problem for first-order continuous agent models over an undirected network, and two categories of distributed delays in the communication are addressedrespectively. When the delaypostponesthe relative information, apermitteddelay bound is provided to ensure consensus. Especially, conditions guaranteeing average consensus are provided for integrator systems. Furthermore, consensus conditions are also shown if the distributed delay impacts the neighbours’ transmitted information. In the end, two numerical experiments are supplemented to verify the correctness of the derived results.


19

Decentralised controller design for robust stabilisation and L2 gain of nonlinear interconnected systems

Heng Kang, Minqing Xiao & Guisheng Zhai

ABSTRACT

In this paper, a decentralised controller is extended for robust stabilisation and L2 gain analysis of a class of nonlinear interconnected systems via dynamic output feedback control within the LMI framework. This large-scale system is composed of linear subsystems coupled by nonlinear time-varying interconnections satisfying quadratic constraints. An LMI approach is sufficiently proposed as a feasibility problem of a BMI with respect to controller gains via dynamic output feedback structure. An example of inverted pendulums is used to illustrate the applicability of extended approach.


20

PIoT-blockchain-enabled security framework for strengthening IoT device identity and data access

Kariyappa Janani & Sriramulu Ramamoorthy

ABSTRACT

The Internet of Things (IoT) connects billions of devices, but concerns about data security and device identification have grown. This study introduces Proof of IoT (PIoT), a novel consensus method using blockchain-based smart contracts to ensure secure data transfer and device authentication in IoT networks. PIoT employs NuCypher-based security computations for authentication and data updating, ensuring only authorized parties access blockchain-recorded information. A reward-based filtering mechanism identifies malicious nodes, bolstering consensus integrity. Simulations demonstrate PIoT’s superior performance compared to conventional methods, showing a 74.7% and 96.8% improvement over LPBFT and DAC4SH Consensus, respectively. PIoT enhances blockchain security under IoT by 15% compared to DAC4SH. Beyond facilitating secure IoT device communication, this approach mitigates various IoT attacks, offering a comprehensive solution to emerging IoT security challenges.



-联系我们-

《控制与决策》

网站:http://kzyjc.alljournals.cn

电话:024-83687766

邮箱:kzyjc@mail.neu.edu.cn

《Journal of Control and Decision》

网站:

https://www.tandfonline.com/toc/tjcd20/current

邮箱:tengrong@ise.neu.edu.cn


控制与决策
该服务号旨在发布期刊、网刊动态和征文通知等内容
 最新文章