Event-triggered adaptive compensation control for nonlinear cyber-physical systems under false data injection attacks

Pengbiao Wang, Xuemei Ren, Dongdong Zheng

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In this paper, we study the event-triggered adaptive compensate control problem for cyber-physical systems constructed by nonlinear systems with unknown parameters under false data injection attacks. First, a new adaptive event-triggered scheme (AETS) is designed to save limited network resources, and its threshold can be continuously adjusted according to the change of system state. In particular, the proposed adaptive event-triggered scheme can degenerate into the existing event-triggered scheme with the fixed threshold. Then, an adaptive controller and adaptive laws are designed to effectively compensate for false data injection attacks. Furthermore, it is proved that the tracking error of the system can be exponentially converged within a compact set with an adjustable radius. Finally, a simulation example shows the effectiveness of the proposed method.

Original languageEnglish
Title of host publicationProceedings of the 33rd Chinese Control and Decision Conference, CCDC 2021
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages702-707
Number of pages6
ISBN (Electronic)9781665440899
DOIs
Publication statusPublished - 2021
Event33rd Chinese Control and Decision Conference, CCDC 2021 - Kunming, China
Duration: 22 May 202124 May 2021

Publication series

NameProceedings of the 33rd Chinese Control and Decision Conference, CCDC 2021

Conference

Conference33rd Chinese Control and Decision Conference, CCDC 2021
Country/TerritoryChina
CityKunming
Period22/05/2124/05/21

Keywords

  • Cyber-physical systems
  • adaptive compensation control
  • adaptive event-triggered scheme
  • false data injection attacks

Fingerprint

Dive into the research topics of 'Event-triggered adaptive compensation control for nonlinear cyber-physical systems under false data injection attacks'. Together they form a unique fingerprint.

Cite this