Security Control for a Fuzzy System under Dynamic Protocols and Cyber-Attacks with Engineering Applications

被引:0
|
作者
Kchaou, Mourad [1 ]
Castro, Cecilia [2 ]
Abbassi, Rabeh [1 ]
Leiva, Victor [3 ]
Jerbi, Houssem [4 ]
机构
[1] Univ Hail, Coll Engn, Dept Elect Engn, Hail 2440, Saudi Arabia
[2] Univ Minho, Ctr Math, P-4710057 Braga, Portugal
[3] Pontificia Univ Catolica Valparaiso, Sch Ind Engn, Valparaiso 2362807, Chile
[4] Univ Hail, Coll Engn, Dept Ind Engn, Hail 2440, Saudi Arabia
关键词
dynamic event-triggering mechanism; interval type-2 fuzzy logic; Markov jump systems; MATLAB software; singularly perturbed systems; SINGULARLY PERTURBED SYSTEMS; DESIGN;
D O I
10.3390/math12132112
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
The objective of this study is to design a security control for ensuring the stability of systems, maintaining their state within bounded limits and securing operations. Thus, we enhance the reliability and resilience in control systems for critical infrastructure such as manufacturing, network bandwidth constraints, power grids, and transportation amid increasing cyber-threats. These systems operate as singularly perturbed structures with variables changing at different time scales, leading to complexities such as stiffness and parasitic parameters. To manage these complexities, we integrate type-2 fuzzy logic with Markov jumps in dynamic event-triggered protocols. These protocols handle communications, optimizing network resources and improving security by adjusting triggering thresholds in real-time based on system operational states. Incorporating fractional calculus into control algorithms enhances the modeling of memory properties in physical systems. Numerical studies validate the effectiveness of our proposal, demonstrating a 20% reduction in network load and enhanced stochastic stability under varying conditions and cyber-threats. This innovative proposal enables real-time adaptation to changing conditions and robust handling of uncertainties, setting it apart from traditional control strategies by offering a higher level of reliability and resilience. Our methodology shows potential for broader application in improving critical infrastructure systems.
引用
收藏
页数:34
相关论文
共 50 条
  • [31] Observer-Based PID Security Control for Discrete Time-Delay Systems Under Cyber-Attacks
    Zhao, Di
    Wang, Zidong
    Ho, Daniel W. C.
    Wei, Guoliang
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2021, 51 (06): : 3926 - 3938
  • [32] Communications Network Analysis in a SCADA System Testbed Under Cyber-Attacks
    Miciolino, Estefania Etcheves
    Bernieri, Giuseppe
    Pascucci, Federica
    Setola, Roberto
    2015 23RD TELECOMMUNICATIONS FORUM TELFOR (TELFOR), 2015, : 341 - 344
  • [33] Security Control for T-S Fuzzy Systems With Adaptive Event-Triggered Mechanism and Multiple Cyber-Attacks
    Liu, Jinliang
    Yin, Tingting
    Cao, Jie
    Yue, Dong
    Karimi, Hamid Reza
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2021, 51 (10): : 6544 - 6554
  • [34] Dynamic Event-Triggered Control for GSES of Memristive Neural Networks Under Multiple Cyber-Attacks
    Wang, Xin
    Park, Ju H.
    Liu, Zongcheng
    Yang, Huilan
    IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2024, 35 (06) : 7602 - 7611
  • [35] Modeling cyber-attacks on Industrial Control Systems
    Paliath, Vivin
    Shakarian, Paulo
    IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: CYBERSECURITY AND BIG DATA, 2016, : 316 - 318
  • [36] Detection of Cyber-Attacks in Collaborative Intersection Control
    Keijzer, Twan
    Jarmolowitz, Fabian
    Ferrari, Riccardo M. G.
    2021 EUROPEAN CONTROL CONFERENCE (ECC), 2021, : 62 - 67
  • [37] Safety securing approach against cyber-attacks for process control system
    Hashimoto, Yoshihiro
    Toyoshima, Takeshi
    Yogo, Shuichi
    Koike, Masato
    Hamaguchi, Takashi
    Jing, Sun
    Koshijima, Ichiro
    COMPUTERS & CHEMICAL ENGINEERING, 2013, 57 : 181 - 186
  • [38] Towards Distinguishing Between Faults and Cyber-Attacks in the Networked Control System
    Yaseen, Amer Atta
    Bayart, Mireille
    2016 WORLD CONGRESS ON INDUSTRIAL CONTROL SYSTEMS SECURITY (WCICSS), 2016, : 40 - 47
  • [39] Mathematically Modelling Cyber-Attacks Utilizing Engineering Techniques
    Easttom, Chuck
    PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2020), 2020, : 119 - 126
  • [40] Cyber-physical collaborative control for DC microgrid clusters under joint cyber-attacks *
    Jin, Bao
    Dou, Chunxia
    Zhang, Bo
    ELECTRIC POWER SYSTEMS RESEARCH, 2024, 234