FlexRay Protocol-Based Event-Triggered Secure Filtering for IT-2 Fuzzy Systems With Fading Measurements Over High-Rate Communication Networks: The Finite-Horizon Case

被引:0
|
作者
Liu, Jian [1 ]
Wang, Shuailong [1 ]
Liu, Jinliang [2 ]
Xie, Xiangpeng [3 ]
Tian, Engang [4 ]
机构
[1] Nanjing Univ Finance & Econ, Coll Informat Engn, Nanjing 210023, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Sch Comp Sci, Nanjing 210044, Peoples R China
[3] Nanjing Univ Posts & Telecommun, Inst Adv Technol, Nanjing 210023, Peoples R China
[4] Univ Shanghai Sci & Technol, Sch Opt Elect & Comp Engn, Shanghai 200093, Peoples R China
基金
中国国家自然科学基金;
关键词
Cyber attacks; dynamic event-triggered (DET) scheme; fading measurements; flexray (FR) protocol; high-rate communication (HRC) network;
D O I
10.1109/TSMC.2024.3416900
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article investigates the FlexRay (FR) protocol-based dynamic event-triggered (DET) secure filtering problem with the high-rate communication (HRC) network for the interval type-2 (IT-2) fuzzy networked system. For fear of data collisions and preempting limited communication resources, a novel DET-FR (DETFR) protocol is adopted to schedule sensor nodes. Different sensors are employed for distinct protocols and data-holding strategies to reinforce the efficiency of network transmission. Moreover, considering the random occurrence of cyber attacks and fading measurements in the HRC channel, the attack parameters are represented by the Bernoulli process, and measurement attenuation coefficients are expressed by the random variables of equidistribution on a fixed interval. Based on this, to ensure that the error dynamics meet the disturbance attenuation level, several sufficient conditions are given. Subsequently, the DETFR protocol-based secure filtering algorithm is developed to acquire the fuzzy filter parameters. Eventually, the validity of our designed secure filtering algorithm is proved through two examples.
引用
收藏
页码:6055 / 6067
页数:13
相关论文
共 2 条
  • [1] Secure Event-Triggered Control for IT-2 Fuzzy Networked Systems With Stochastic Communication Protocol and FDI Attacks
    Liu, Jian
    Ke, Jiachen
    Liu, Jinliang
    Xie, Xiangpeng
    Tian, Engang
    [J]. IEEE TRANSACTIONS ON FUZZY SYSTEMS, 2024, 32 (03) : 1167 - 1180
  • [2] On H∞ Finite-Horizon Filtering Under Stochastic Protocol: Dealing With High-Rate Communication Networks
    Zou, Lei
    Wang, Zidong
    Hu, Jun
    Gao, Huijun
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2017, 62 (09) : 4884 - 4890