H Control for IT2 Fuzzy-Model-Based Systems Subject to Randomly Occurred Cyber Attacks and Packet Dropouts

Xiuying Li, Lei Zhang, Shuai Yin, Baojun Wang

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The H-{\infty} controller is designed for nonlinear systems where the information is communicated over unreliable network connection. The uncertainties not only exist in the system but also exist in the network transmission. An interval type-2 (IT2) fuzzy model is used to represent the characteristics of nonlinearities and uncertainties of the system. During the measurement outputs transmitted through the network, the cyber attacks occurred randomly as well as the packet dropouts are considered. Lyapunov stability theory is applied to design a type of IT2 controller, where the membership function and the number of the fuzzy rules need not to be the same between the controller and the plant. The desired controller is derived in linear matrix inequality (LMI) framework such that the closed-loop control system is guaranteed to be stochastically stable (SS) with prescribed H-{\infty} performance. Finally, an example is utilized to illustrate the effectiveness of the algorithm.

Original languageEnglish
Title of host publicationProceedings - 2019 Chinese Automation Congress, CAC 2019
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages5251-5256
Number of pages6
ISBN (Electronic)9781728140940
DOIs
StatePublished - Nov 2019
Event2019 Chinese Automation Congress, CAC 2019 - Hangzhou, China
Duration: 22 Nov 201924 Nov 2019

Publication series

NameProceedings - 2019 Chinese Automation Congress, CAC 2019

Conference

Conference2019 Chinese Automation Congress, CAC 2019
Country/TerritoryChina
CityHangzhou
Period22/11/1924/11/19

Keywords

  • H∞ controller
  • cyber attacks
  • interval type-2 (IT2) fuzzy system
  • packet dropouts

Fingerprint

Dive into the research topics of 'H Control for IT2 Fuzzy-Model-Based Systems Subject to Randomly Occurred Cyber Attacks and Packet Dropouts'. Together they form a unique fingerprint.

Cite this