Event-based adaptive compensation control of nonlinear cyber-physical systems under actuator failure and false data injection attack

Pengbiao Wang, Xuemei Ren, Shuangyi Hu, Yun Cheng

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Citations (Scopus)

Abstract

This paper studies the event-triggered adaptive compensation control problem of nonlinear cyber-physical systems under false data injection (FDI) attack and actuator failure. Firstly, in order to save the limited network resources, a new adaptive event triggering scheme (AETS) is presented, whose threshold can be adjusted according to the change of system state. Secondly, an observer based on neural networks is designed. Then, we design an event-triggered adaptive controller and adaptive laws to effectively compensate for FDI attack and actuator failure. Furthermore, through the system stability analysis, the result shows that the tracking error can converge exponentially to a compact set with an adjustable radius. Finally, the theoretical results are verified by the manipulator system example.

Original languageEnglish
Title of host publicationProceedings of the 40th Chinese Control Conference, CCC 2021
EditorsChen Peng, Jian Sun
PublisherIEEE Computer Society
Pages509-514
Number of pages6
ISBN (Electronic)9789881563804
DOIs
Publication statusPublished - 26 Jul 2021
Event40th Chinese Control Conference, CCC 2021 - Shanghai, China
Duration: 26 Jul 202128 Jul 2021

Publication series

NameChinese Control Conference, CCC
Volume2021-July
ISSN (Print)1934-1768
ISSN (Electronic)2161-2927

Conference

Conference40th Chinese Control Conference, CCC 2021
Country/TerritoryChina
CityShanghai
Period26/07/2128/07/21

Keywords

  • Adaptive event-triggered scheme
  • actuator failure
  • compensation control
  • cyber-physical systems
  • false data injection attacks

Fingerprint

Dive into the research topics of 'Event-based adaptive compensation control of nonlinear cyber-physical systems under actuator failure and false data injection attack'. Together they form a unique fingerprint.

Cite this