Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Event-triggered DOFF quantization controller design method under spoofing attack

A spoofing attack and event-triggered technology, applied in the direction of adaptive control, general control system, control/regulation system, etc., can solve the problem of unstable T-S fuzzy system, save network bandwidth, and relieve the effect of assumption limitation.

Pending Publication Date: 2021-12-17
HENAN AGRICULTURAL UNIVERSITY
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The purpose of the present invention is to provide a method for designing an event-triggered DOFF quantization controller under spoofing attacks, which can solve the problem that the existing T-S fuzzy system cannot be stable under the influence of spoofing attacks, data quantization and network-induced delay, and effectively save network bandwidth and other system-constrained resources, and can remove the assumption that the system state is completely measurable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Event-triggered DOFF quantization controller design method under spoofing attack
  • Event-triggered DOFF quantization controller design method under spoofing attack
  • Event-triggered DOFF quantization controller design method under spoofing attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] Below in conjunction with accompanying drawing and embodiment the present invention is described in detail:

[0075] The event-triggered output feedback control of T-S fuzzy system under spoofing attack is as follows: figure 1 As shown in , the sensor periodically samples the measurement output of the T-S fuzzy object, the sensor sampled data is sent to the discrete event trigger, and the discrete event trigger judges whether the trigger condition is met: if it is satisfied, the sampled data is sent; otherwise, the sampled data is discarded. The quantizer quantifies the data sent by the discrete event trigger, and the quantized data is sent to the zero-order keeper through the communication network. The communication network is affected by spoofing attacks. The DOFF quantization controller receives the zero-order keeper data and calculates the control signal, and the actuator Adjust the T-S fuzzy object state according to the control signal.

[0076] Such as figure ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for designing an event-triggered DOFF quantization controller under spoofing attack. The method comprises the following steps of: A, establishing a T-S fuzzy object model, a discrete event trigger model and a logarithmic quantizer model; B, establishing a spoofing attack model and a DOFF quantization controller model, and establishing a closed-loop T-S fuzzy system augmentation model organically fusing spoofing attack, a discrete event trigger, a logarithm quantizer and network induced delay parameters; and C, designing a DOFF quantization controller design condition organically fusing spoofing attack, a discrete event trigger, a logarithmic quantizer and network induced delay parameters, solving a positive definite matrix and a gain matrix, and obtaining a DOFF quantization controller suitable for the T-S fuzzy system under the influence of the spoofing attack and the event trigger by using a threshold parameter. According to the method, the problem that the existing T-S fuzzy system cannot be stable under the influence of spoofing attack, data quantization and network induced delay can be solved.

Description

technical field [0001] The invention relates to the field of networked control systems, in particular to a method for designing an event-triggered dynamic output feedback fuzzy (dynamic output feedback fuzzy, DOFF) quantitative controller of a T-S (Takagi-Sugeno) fuzzy system under deception attacks. Background technique [0002] The networked control system introduces the shared communication network into the control closed loop. It has the advantages of high flexibility, low cost, and convenient installation and maintenance. It is widely used in smart grids, smart transportation and other fields. Networked control systems usually adopt a well-developed periodic sampling control strategy. In order to ensure system performance in the worst case, the sampling rate is usually set higher. However, the worst case rarely occurs in practice. The large amount of redundant data generated by the high sampling rate leads to the waste of limited system resources such as network bandwid...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G05B13/04
CPCG05B13/042
Inventor 李富强郜丽赛贾树恒谷小青李宝方郑宝周
Owner HENAN AGRICULTURAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products