File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/TFUZZ.2023.3239930
- Scopus: eid_2-s2.0-85147307325
- Find via
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Article: Security Interval Type-2 Fuzzy Sliding Mode Control Under Multistrategy Injection Attack: Design, Analysis, and Optimization
Title | Security Interval Type-2 Fuzzy Sliding Mode Control Under Multistrategy Injection Attack: Design, Analysis, and Optimization |
---|---|
Authors | |
Keywords | Interval type-2 (IT2) fuzzy system multistrategy attack optimization regional boundaries sliding mode control (SMC) |
Issue Date | 1-Sep-2023 |
Publisher | Institute of Electrical and Electronics Engineers |
Citation | IEEE Transactions on Fuzzy Systems, 2023, v. 31, n. 9, p. 2943-2955 How to Cite? |
Abstract | This article considers the security sliding mode control problem for interval type-2 (IT2) fuzzy systems, where the sensor–controller channel may be subject to the false data injection (FDI) attack with a multistrategy attack model. The different attack patterns at each instant are described via a random categorical distribution. It is noted that the injected false data may result in the system state to exceed the modeling domain. In order to handle the above phenomenon, a reconstruction method of the controller's membership functions (MFs) is proposed via analyzing the variation range of the attacked state, and then, a feasible IT2 fuzzy sliding mode security controller is designed. The explicit relation between the raw state signal and attacked state is established, based on which stability conditions dependent on the regional boundaries of MFs are obtained for the input-to-state stability in probability of the closed-loop system. Meanwhile, a framework of security performance optimization is established via searching a desirable sliding matrix, which may be solved via the particle swarm optimization algorithm. Furthermore, the proposed security control scheme is extended to imperfectly matched MFs case, where the controller does not demand the same fuzzy rules as the controlled fuzzy system. Finally, the simulation verification is carried out via numerical and practical examples. |
Persistent Identifier | http://hdl.handle.net/10722/344316 |
ISSN | 2023 Impact Factor: 10.7 2023 SCImago Journal Rankings: 4.204 |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Yang, Yekai | - |
dc.contributor.author | Niu, Yugang | - |
dc.contributor.author | Lam, James | - |
dc.date.accessioned | 2024-07-24T13:50:41Z | - |
dc.date.available | 2024-07-24T13:50:41Z | - |
dc.date.issued | 2023-09-01 | - |
dc.identifier.citation | IEEE Transactions on Fuzzy Systems, 2023, v. 31, n. 9, p. 2943-2955 | - |
dc.identifier.issn | 1063-6706 | - |
dc.identifier.uri | http://hdl.handle.net/10722/344316 | - |
dc.description.abstract | <p>This article considers the security sliding mode control problem for interval type-2 (IT2) fuzzy systems, where the sensor–controller channel may be subject to the false data injection (FDI) attack with a multistrategy attack model. The different attack patterns at each instant are described via a random categorical distribution. It is noted that the injected false data may result in the system state to exceed the modeling domain. In order to handle the above phenomenon, a reconstruction method of the controller's membership functions (MFs) is proposed via analyzing the variation range of the attacked state, and then, a feasible IT2 fuzzy sliding mode security controller is designed. The explicit relation between the raw state signal and attacked state is established, based on which stability conditions dependent on the regional boundaries of MFs are obtained for the input-to-state stability in probability of the closed-loop system. Meanwhile, a framework of security performance optimization is established via searching a desirable sliding matrix, which may be solved via the particle swarm optimization algorithm. Furthermore, the proposed security control scheme is extended to imperfectly matched MFs case, where the controller does not demand the same fuzzy rules as the controlled fuzzy system. Finally, the simulation verification is carried out via numerical and practical examples.<br></p> | - |
dc.language | eng | - |
dc.publisher | Institute of Electrical and Electronics Engineers | - |
dc.relation.ispartof | IEEE Transactions on Fuzzy Systems | - |
dc.subject | Interval type-2 (IT2) fuzzy system | - |
dc.subject | multistrategy attack | - |
dc.subject | optimization | - |
dc.subject | regional boundaries | - |
dc.subject | sliding mode control (SMC) | - |
dc.title | Security Interval Type-2 Fuzzy Sliding Mode Control Under Multistrategy Injection Attack: Design, Analysis, and Optimization | - |
dc.type | Article | - |
dc.identifier.doi | 10.1109/TFUZZ.2023.3239930 | - |
dc.identifier.scopus | eid_2-s2.0-85147307325 | - |
dc.identifier.volume | 31 | - |
dc.identifier.issue | 9 | - |
dc.identifier.spage | 2943 | - |
dc.identifier.epage | 2955 | - |
dc.identifier.eissn | 1941-0034 | - |
dc.identifier.issnl | 1063-6706 | - |