
This paper addressed the problem of observer-based memory state feedback control design for semi-Markovian jump systems subject to input delays and external disturbances, where the measurement output was vulnerable to randomly occurring cyber attacks. To facilitate analysis, the cyber attacks were described by a nonlinear function that meets Lipschitz continuity and the possible attack scenarios were represented by a stochastic parameter that follows the Bernoulli distribution. Based on the information from the considered system and state observer, an augmented closed loop system was constructed. Then, by using the Lyapunov stability theory, an extended Wirtinger's integral inequality and stochastic analysis, the required stability criterion was proposed in the form of linear matrix inequalities. As a result, the control and observer gain matrices were efficiently derived, ensuring the stochastic stability of closed-loop systems with H∞ performance, regardless of cyber attacks. To demonstrate the effectiveness and theoretical value of the proposed robust memory state feedback control design, simulation results were presented.
Citation: Ramalingam Sakthivel, Palanisamy Selvaraj, Oh-Min Kwon, Seong-Gon Choi, Rathinasamy Sakthivel. Robust memory control design for semi-Markovian jump systems with cyber attacks[J]. Electronic Research Archive, 2023, 31(12): 7496-7510. doi: 10.3934/era.2023378
[1] | Yang Song, Beiyan Yang, Jimin Wang . Stability analysis and security control of nonlinear singular semi-Markov jump systems. Electronic Research Archive, 2025, 33(1): 1-25. doi: 10.3934/era.2025001 |
[2] | Xiaoming Wang, Yunlong Bai, Zhiyong Li, Wenguang Zhao, Shixing Ding . Observer-based event triggering security load frequency control for power systems involving air conditioning loads. Electronic Research Archive, 2024, 32(11): 6258-6275. doi: 10.3934/era.2024291 |
[3] | Xinchang Guo, Jiahao Fan, Yan Liu . Maximum likelihood-based identification for FIR systems with binary observations and data tampering attacks. Electronic Research Archive, 2024, 32(6): 4181-4198. doi: 10.3934/era.2024188 |
[4] | Majed Alowaidi, Sunil Kumar Sharma, Abdullah AlEnizi, Shivam Bhardwaj . Integrating artificial intelligence in cyber security for cyber-physical systems. Electronic Research Archive, 2023, 31(4): 1876-1896. doi: 10.3934/era.2023097 |
[5] | Hankang Ji, Yuanyuan Li, Xueying Ding, Jianquan Lu . Stability analysis of Boolean networks with Markov jump disturbances and their application in apoptosis networks. Electronic Research Archive, 2022, 30(9): 3422-3434. doi: 10.3934/era.2022174 |
[6] | Sida Lin, Dongyao Yang, Jinlong Yuan, Changzhi Wu, Tao Zhou, An Li, Chuanye Gu, Jun Xie, Kuikui Gao . A new computational method for sparse optimal control of cyber-physical systems with varying delay. Electronic Research Archive, 2024, 32(12): 6553-6577. doi: 10.3934/era.2024306 |
[7] | Yongtao Zheng, Jialiang Xiao, Xuedong Hua, Wei Wang, Han Chen . A comparative analysis of the robustness of multimodal comprehensive transportation network considering mode transfer: A case study. Electronic Research Archive, 2023, 31(9): 5362-5395. doi: 10.3934/era.2023272 |
[8] | Keqin Su, Rong Yang . Pullback dynamics and robustness for the 3D Navier-Stokes-Voigt equations with memory. Electronic Research Archive, 2023, 31(2): 928-946. doi: 10.3934/era.2023046 |
[9] | Rizhao Cai, Liepiao Zhang, Changsheng Chen, Yongjian Hu, Alex Kot . Learning deep forest for face anti-spoofing: An alternative to the neural network against adversarial attacks. Electronic Research Archive, 2024, 32(10): 5592-5614. doi: 10.3934/era.2024259 |
[10] | Shaochen Lin, Xuyang Liu, Xiujuan Ma, Hongliang Mao, Zijian Zhang, Salabat Khan, Liehuang Zhu . The impact of network delay on Nakamoto consensus mechanism. Electronic Research Archive, 2022, 30(10): 3735-3754. doi: 10.3934/era.2022191 |
This paper addressed the problem of observer-based memory state feedback control design for semi-Markovian jump systems subject to input delays and external disturbances, where the measurement output was vulnerable to randomly occurring cyber attacks. To facilitate analysis, the cyber attacks were described by a nonlinear function that meets Lipschitz continuity and the possible attack scenarios were represented by a stochastic parameter that follows the Bernoulli distribution. Based on the information from the considered system and state observer, an augmented closed loop system was constructed. Then, by using the Lyapunov stability theory, an extended Wirtinger's integral inequality and stochastic analysis, the required stability criterion was proposed in the form of linear matrix inequalities. As a result, the control and observer gain matrices were efficiently derived, ensuring the stochastic stability of closed-loop systems with H∞ performance, regardless of cyber attacks. To demonstrate the effectiveness and theoretical value of the proposed robust memory state feedback control design, simulation results were presented.
Past few decades, Markovian jump systems (MJSs) have emerged as a powerful modeling tool for practical systems that undergo random changes due to component failures, repairs, sudden environmental disturbances, and alterations in subsystem interconnections [1,2,3,4,5,6,7]. Particularly, in [3], the dynamic-output-feedback control approach to uncertain singular systems has been designed for MJSs with time-varying delays. The delay-dependent stochastic stabilization of MJSs modeled by fractional Brownian motion via a quantized controller has been proposed in [4]. However, MJSs do have limitations in their application, particularly arising from the exponential distribution of jump times in Markov chains. This leads to constant transition rates and conservative results. To overcome these limitations, semi-Markovian jump systems (s-MJSs) have been introduced as a more practical alternative [8]. Unlike MJSs, s-MJSs permit more general probability distributions for sojourn time, without being constrained to exponential distributions. In s-MJSs, the transition rates depend on the jump time, providing a more realistic representation of practical dynamical systems [9]. This fundamental distinction makes s-MJSs less conservative and more applicable to various real-world scenarios. Notably, many results established for MJSs are seen as special cases of s-MJSs, considering that the transition rates in s-MJSs can be time-dependent rather than constant [10].
As control performance requirements continue to increase, the network-based communication mechanism has been widely adopted in real-time system design. Despite offering various benefits, the open and shared nature of these communication networks makes them susceptible to cyber attacks. In existing literature, three primary attack modes are often discussed: Denial-of-service attacks [11], deception attacks [12] and replay attacks [13]. Among these, deception attacks, also known as false-data injection attacks, are particularly concerning due to their secretive and destructive nature, posing a significant threat to network or internet security. These attacks transmit false information to the sensor or actuator by exploiting network transmission vulnerabilities, thereby altering the actual values of the sensor or controller [14,15,16,17,18]. As a result, system performance can be severely deteriorated. Consequently, developing effective control measures for s-MJS in the presence of deception attacks becomes a challenging task, especially as the adversaries often hide their attack strategies. This challenge forms the motivation for this work.
On the other hand, state feedback control synthesis problems for MJSs are typically classified into two types, delay-independent memoryless state feedback controllers and delay-dependent memory state feedback controllers. From the viewpoint of the stochastic nature of Markovian jump systems, memory controllers are natural state feedback controllers and memory controllers [19,20,21] achieve better performances than memoryless controllers can be expected. This strategy enhances the performance of control systems by enriching the dynamics of the controller. In [19], the robust H∞ tracking problem for stochastic time-delay systems was investigated using a memory state feedback control strategy. In [20], the authors developed a non-fragile memory H∞ control design for the discrete-time singular MJS with actuator saturation to explore its finite-time stability. A new aperiodic memory sampled-data control framework for a kind of fuzzy MJS with time-varying delay was proposed in [21]. The memory control strategy integrates memory into the controller's dynamics, offering numerous benefits, including improved control system performance, enhanced robustness, and adaptability to diverse operating conditions. It enables the controller to exhibit adaptive behaviors, refining its actions based on the system's evolution. However, accurate measurement of the system state information for control design can be difficult due to external disturbances and cyber attacks. As a result, recent control research communities have shown interest in the Luenberger state observer-based feedback control design [22,23]. Despite its practical significance, only a limited number of studies on observer-based memory state feedback control design have been published for s-MJSs in the existing literature, which motivates the present study.
Considering these aspects, this study is aimed at exploring the Luenberger state based memory state feedback control design for s-MJSs subject to external disturbance. The key contributions of this study can be summarized as follows.
1) The memory state feedback control problem of s-MJSs with external disturbances is studied based on the linear matrix inequality (LMI) technique. In order to reflect a more realistic environment, the concept of cyber attacks is considered in state estimation for s-MJSs.
2) A Luenberger-type state observer is designed to estimate unmeasured states. A novel effective control algorithm for selecting the gain matrices for the controllers and observers is developed and also takes the past state information into account.
3) By using Lyapunov function methods and an extended Wirtinger's integral inequality techniques, a new set of LMI-based sufficient conditions are derived to ensure the stochastic stability of the error system. Numerical simulations show that these conditions are computationally effective in the analysis and synthesis of s-MJSs with and without cyber attacks.
The remainder of this paper is structured as follows. Preliminary discussions of the problem are found in Section 2. Section 3 puts forth the primary theoretical findings. Section 4 employs numerical examples to verify the proposed theory. Lastly, conclusions are drawn in Section 5.
Consider the continuous-time s-MJSs with external disturbances:
˙x(t)=A(q(t))x(t)+B(q(t))u(t)+C(q(t))ω(t),y(t)=D(q(t))x(t), | (2.1) |
where x(t)∈ℜn, u(t)∈ℜm, and y(t)∈ℜw represent the state, the control input and the measured output, respectively; ω(t) is the external disturbance that belongs to L2[0,∞); A(q(t)), B(q(t)), C(q(t)) and D(q(t)) are given matrices with appropriate dimensions. The process {q(t),t>0} is a semi-Markov process taking values as P{q(t+ϰ)=s|q(t)=r}={Πrs(ϰ)ϰ+o(ϰ),if r≠s,1+Πrr(ϰ)ϰ+o(ϰ),if r=s, where ϰ>0 is the sojourn time, limϰ→0(o(ϰ)/ϰ)=0 and Πrs(ϰ)≥0 for r≠s is the transition rate from mode r at time t to mode s at time t+ϰ and Πrr(ϰ)=−∑Ns=1,s≠rΠrs(ϰ).
For the dynamics (2.1), we construct the below state estimator with cyber attacks:
˙ˆx(t)=A(q(t))ˆx(t)+B(q(t))u(t)+L(q(t))(˜y(t)−ˆy(t)),˜y(t)=(1−β(t))y(t)+β(t)D(q(t))g(x(t)),ˆy(t)=D(q(t))ˆx(t), | (2.2) |
where ˆx(t) and ˆy(t) are the estimates of x(t) and y(t), respectively; L(q(t)) are the estimator gain matrices to be determined; g(x(t)) denotes the cyber attacks; β(t) is the stochastic variable which satisfies the Bernoulli distribution [16].
In this study, we are designing a memory controller of the below form:
u(t)=K1(q(t))ˆx(t)+K2(q(t))ˆx(t−τ), | (2.3) |
where K1(q(t)) and K2(q(t)) are the control gain matrices to be designed; τ denotes the constant time delay. For representation convenience, hereafter we denote the semi-Markov process parameter q(t) by subscript r that is, A(q(t)) is denoted by Ar.
By substituting the memory control law (2.3) in (2.2), we have
˙ˆx(t)=(Ar+BrK1r)ˆx(t)+BrK2rˆx(t−τ)+(1−β(t))LrDrx(t)+β(t)LrDrg(x(t))−LrDrˆx(t). | (2.4) |
Denote e(t)=x(t)−ˆx(t) and z(t)=y(t)−ˆy(t), then the error dynamics are described as
˙x(t)=(Ar+BrK1r)x(t)−BrK1re(t)+BrK2rx(t−τ)−BrK2re(t−τ)+Crω(t). | (2.5) |
˙e(t)=(Ar+LrDr)e(t)+Crω(t)−(1−β(t))LrDrx(t)−β(t)LrDrg(x(t))−LrDrx(t). | (2.6) |
z(t)=Dre(t). | (2.7) |
Further, by defining Φ(t)=[xT(t)eT(t)]T, g(Φ(t))=[gT(x(t))gT(e(t))]T, and combining Eqs (2.5) and (2.6), the following augmented s-MJSs can be written as
˙Φ(t)=˜ArΦ(t)+˜BrΦ(t−τ)+˜Crg(Φ(t))+˜Drω(t),˜z(t)=˜ErΦ(t), | (2.8) |
where
˜Ar=[Ar+BrK1r−BrK1rΓrAr+LrDr], ˜Br=[BrK2r−BrK2r00], ˜Cr=[00νr0], ˜Dr=[CrCr], ˜Er=[0Dr],νr=−ˉβLrDr−(β(t)−ˉβ)LrDr, Γr=−(1−ˉβ)LrDr−(ˉβ−β(t))LrDr−LrDr and g(e(t))=g(x(t))−g(ˆx(t)). |
In order to derive the main results of this paper, consider the below assumption, lemma and definition.
Assumption 1. The nonlinear function g(⋅) satisfies the Lipschitz condition such that ||g(Φ(t))||≤‖GΦ(t)‖, where G>0 is a known diagonal matrix.
Lemma 1. [24] For any positive matrix G=GT, the below inequality holds
(s−h)∫sh˙ΦT(q)G˙Φ(q)dq≥ΘT1GΘ1+3ΘT2GΘ2+5ΘT3GΘ3, |
where Θ1=Φ(s)−Φ(h),Θ2=Φ(s)+Φ(h)−2s−h∫shΦ(r)dr,Θ3= Φ(s)−Φ(h)−6s−h∫shΦ(r)dr+12(s−h)2∫shdq∫qhΦ(r)dr.
Definition 1. [21] The augmented s-MJSs (2.8) are stochastically stable with an H∞ performance level δ>0. If it is stable and the response ˜z(t) under zero initial condition satisfies, then
E{∫tm0˜zT(t)˜z(t)dt}≤E{δ2∫tm0ωT(t)ω(t)dt}, | (2.9) |
for all t>0 and any nonzero ω(t)∈L2[0,∞).
The memory control issue of the augmented s-MJSs (2.8) is addressed by employing the Lyapunov functions method.
Theorem 1. Let Assumption 1 hold. For given scalars τ>0, α>0, σ,ˉβ∈[0,1], diagonal matrix G, known gain matrices K1r, K2r and Lr, the considered augmented s-MJSs (2.8) are stochastically stable with an H∞ performance index δ>0, if there exists symmetric matrices Pr>0, Q>0, R>0 and a scalar γ>0 such that the following matrix inequality holds:
[ˉΓrsΘrˉΣ∗−αPr0∗∗−ˉη]<0, | (3.1) |
N∑s=1πrs(ϰ)αPs−αR≤0, | (3.2) |
where
ˉΓrs=[Ω]6×6rs, [Ω]1,1rs=Pr˜Ar+˜ATrPr+Q+N∑r=1πrr(ϰ)Pr−9αPr+˜ET˜E+γGTG, [Ω]1,2rs=Pr˜Br+3αPr,[Ω]1,3rs=18αPr, [Ω]1,4rs=−2αPr, [Ω]1,5rs=Pr˜Cr, [Ω]1,6rs=Pr˜Dr, [Ω]2,2rs=−Q−9αPr, [Ω]2,3rs=−15αPr,[Ω]2,4rs=5αPr, [Ω]3,3rs=−48αPr, [Ω]3,4rs=15αPr, [Ω]4,4rs=−5αPr, [Ω]5,5rs=−γI, [Ω]6,6rs=−δ2I,Θr=[ταPr˜ArταPr˜Br00ταPr˜CrταPr˜Dr]T, ˉη=diag{P1,…,Pr−1,Pr+1,…,PN},ˉΣ=[√πr1(ϰ)PTr,…,√πr(r+1)(ϰ)PTr,…,√πrN(ϰ)PTr], |
and the remaining parameters of Ωrs are zero.
Proof. Choose a Lyapunov-Krasovskii functional candidate for the augmented s-MJSs (2.8) as follows:
M(r,Φ(t))=ΦT(t)PrΦ(t)+∫tt−τΦT(s)QΦ(s)ds+τ∫tt−τ∫tθ˙ΦT(s)αPr˙Φ(s)dsdθ, | (3.3) |
where Pr=diag{P1r,P2r} and Q=diag{Q1,Q2}. Further, the infinitesimal operator of the semi-Markovian process is denoted by £. By applying infinitesimal operator on (3.3) and taking mathematical expectation, we get
E{£M(r,Φ(t))}=E{ΦT(t)Pr˙Φ(t)+˙ΦT(t)PrΦ(t)+ΦT(t)N∑s=1πrs(ϰ)PsΦ(t)+ΦT(t)QΦ(ℓ)−ΦT(ℓ−τ)QΦ(ℓ−τ),+˙ΦT(t)τ2αPr˙Φ(t)−τ∫tt−τ˙ΦT(s)αPr˙Φ(s)ds+τ∫tt−τ∫tθ˙ΦT(s)N∑s=1πrs(ϰ)αPs˙Φ(s)dsdθ}. | (3.4) |
Further, by using Lemma 1 to the integral term in Eq (3.4), we can get
−τ∫tt−τ˙ΦT(s)αPr˙Φ(s)ds≤[Φ(t)Φ(t−τ)2τ∫tt−τΦ(s)ds12τ2∫tt−τ∫θt−τΦ(s)dsdθ]T[−9αPr3αPr18αPr−2αPr∗−9αPr−15αPr5αPr∗∗−48αPr15αPr∗∗∗−5αPr][Φ(t)Φ(t−τ)2τ∫tt−τΦ(s)ds12τ2∫tt−τ∫θt−τΦ(s)dsdθ]. | (3.5) |
From (3.2), it is clear that
τ∫tt−τ∫tθ˙ΦT(s)N∑r=1πrs(ϰ)αPr˙Φ(s)dsdθ≤τ∫tt−τ∫tθ˙ΦT(s)αR˙Φ(s)dsdθ. | (3.6) |
For any scalar γ>0, we can get from Assumption 1 that
γΦT(t)GTGΦ(t)−γgT(Φ(t))g(Φ(t))≥0. | (3.7) |
Now, by adding H∞ performance attenuation to M(r,Φ(t)) and associating (3.4)–(3.7), it is easy to obtain that
E{£M(r,Φ(t))+˜zT(t)˜z(t)−δ2ωT(t)ω(t)}≤E{ξT(t)Γrsξ(t)}, | (3.8) |
where ξ(t)=[ΦT(t)ΦT(t−τ)2τ∫tt−τΦT(s)ds12τ2∫tt−τ∫θt−τΦT(s)dsdθgT(Φ(t))ωT(t)]T and Γrs=[Ω]6×6rs+˙ΦT(t)τ2αPr˙Φ(t)+∇T∇+ΦT(t)N∑s=1πrs(ϰ)PsΦ(t). By using the Schur complement, we have Γrs can be equivalently written as ˉΓrs which is defined in the theorem statement. Thus, it can be observed that E{£M(r,Φ(t))+˜zT(t)˜z(t)−δ2ωT(t)ω(t)}<0 if the LMI (3.1) holds. Thus, by Definition 1, it is concluded that the augmented s-MJSs (2.8) are stochastically stable with an H∞ performance index δ>0. This completes the proof of the theorem.
Control synthesis conditions are established by LMIs on the basis of Theorem 1, which are presented as follows.
Theorem 2. Let Assumption 1 hold. For given scalars τ>0, α>0, κ>0, σ,ˉβ∈[0,1], and known diagonal matrix G, the considered augmented s-MJSs (2.8) are stochastically stable with an H∞ performance index δ>0, if there exists symmetric matrices Pr>0, Q>0, any matrices Xr, W1r, W2r, Tr, and a scalar γ>0 such that LMI (3.2) and the below matrix inequality holds:
[ˉΓrsˆΘrˉΣ∗−αPr0∗∗−ˉη]<0, | (3.9) |
[−κI(BrXr−P1rBr)T∗−κI]<0, | (3.10) |
where
ˆΓrs=[ˉΩ]6×6rs, [ˉΩ]1,1rs=ˆAr+ˆATr+Q+N∑r=1πrr(ϰ)Pr−9αPr+˜ET˜E+γGTG,[ˉΩ]1,2rs=ˆBr+3αPr, [ˉΩ]1,5rs=ˆCr, [ˉΩ]1,6rs=ˆDr, ˆAr=[P1rAr+BrW1r−BrW1r−(1−ˉβ)TrDr+TrDrP2rAr−TrDr], ˆBr=[BrW2r−BrW2r00], ˆCr=[00−ˉβTrDr0], ˆDr=[P1rCrP2rCr], ˆΘr=[ταˆArταˆBr00ταˆCrταˆDr]T and the other elements of [ˉΩ]rs are defined as [Ω]rs, which are given in the Theorem 1. Further, the gain matrices can be obtained by the below conditions: K1r=X−1rW1r, K2r=X−1rW2r and Lr=P−12rTr.
Proof. Let us assume that the linear congruence transformations (LCTs) are as follows: P1rBr=BrXr, W1r=XrK1r, W2r=XrK2r and Tr=P2rLr. Then, by utilizing LCTs, the inequality in (3.1) can be the same as (3.9). It is noted that the assumption P1rBr=BrXr is equally constraining. So it could not be directly solved via the LMI Toolbox. To deal with this issue, we replace the condition P1rBr=BrXr by the constraint trace[(BrX−P1rBr)T(BrX−P1rBr)]<κI, for known scalar κ>0. Now, by using the Schur complement, the inequality constraint can be converted to the LMI in (3.10). This completes the proof of the theorem.
Remark 1. In recent years, cyber attacks have threatened information security, such as file confidentiality, communication integrity, and data transmission effectiveness. Cyber attacks have gradually become the main issuse hindering the effective communication of MJSs. Very recently, some interesting results on state estimation for MJSs under cyber attacks have been discussed in [16,17,18]. For example, Zha et al. [16] addressed the analysis and synthesis of state estimation for MJSs subject to cyber attacks by utilizing the finite‐time adaptive event‐triggered method. In [18], an observer‐based sliding control law was designed, which guarantees the MJSs under actuator attacks to be reliable. Moreover, so far in the literature, no work has been reported on memory control problem of s-MJSs with cyber attacks and input delays. Thus, the main contribution of this paper is to fill such a gap through employing an observer-based memory control law for achieving stochastic stabilization in s-MJSs against cyber attacks.
To illustrate the effectiveness of the designed controller, we consider two simulation studies in this section.
Example 1.
Consider the s-MJSs in the form of (2.1) with two modes and associated matrices are given as follows.
Mode 1:
A1=[−2.401.40.1−0.4−0.30.700.3], B1=[0.1200.130.40.10.1], C1=[0.50.05−0.01], and D1=[−0.1010.15−2−0.10.10.20.1]. |
Mode 2:
A2=[−3.602.20.3−0.4−0.70.10−0.4], B2=[0.1100.140.40.20.1], C2=[0.40.03−0.02], and D2=[−0.2010.16−1−0.10.20.30.1]. |
Further, the external disturbances and cyber attacks function are taken as ω(t)=0.3sin(5πt) and g(x(t))=[−0.45tanh(x1(t))−0.25tanh(x2(t))−0.15tanh(x3(t))]T. Moreover, the transition rates Π12(ϰ) and Π21(ϰ) can be represented as Π12(ϰ)=∑2k=1ψkΠ12,k and ∑2k=1ψk=1 with Π12(ϰ)∈[0.1 0.3] and Π21(ϰ)∈[0.2 0.4]. Moreover, the other parameters are chosen as τ=2, α=0.001, σ=0.5, ˉβ=0.4 and G=diag{0.45,0.25,0.15}.
Based on these values, the memory control and observer gain parameter are computed as below:
K11=[−93.583419.1919−46.985343.4856−67.59937.9646],K12=[−26.9227−11.1151−24.639115.8148−8.363013.1298],K21=[0.0026−0.0115−0.0030−0.00120.02090.0043],K22=[0.0019−0.0024−0.0012−0.00210.00830.0012],L1=[−1.581329.4874333.34840.16773.111235.91422.35181.536419.9485], and L2=[18.313627.9459114.75211.82612.370310.36301.62281.10227.2568]. |
We apply these gains to the system results of simulation under initial conditions x(t)=[1.1−4.2−2.2]T and ˆx(t)=[1.5−5.1−3.3]T as shown in Figures 1–6. The state curves of addressed system (2.1) with and without control are plotted in Figure 1(a, b), respectively. It can be seen that the state curves with control in Figure 1(a) converge to zero, which shows the efficiency of the proposed control strategy. Furthermore, the estimated state curves of s-MJSs (2.2) with and without cyber attacks are given in Figure 2(a, b), and it can be seen that the convergence speed of the estimated state curves in Figure 2(b) are faster than that in Figure 2(a), which indicates that cyber attacks can affect the estimate performance of the system state. Moreover, the corresponding error state curves of s-MJSs (2.7) with and without cyber attacks are displayed in Figure 3(a, b). Lastly, Figures 4–6 show the mode transitions, the occurrence probability of cyber attacks and the function of cyber attacks, respectively. However, these figures are provided to demonstrate the validity and applicability of the proposed control scheme.
Example 2.
An F-404 aircraft engine model is borrowed from [25], which is considered the s-MJSs in the form of (2.1) with two modes. The associated matrices are given as follows:
Mode 1:
A1=[−1.4602.428−0.3357−1.4−0.37880.31070−2.23], B1=[0.0550.050.1−10.075−0.05], C1=[0.1−0.2−0.5], and D1=[−0.1010.15−2−0.10.10.20.1]. |
Mode 2:
A2=[−1.4602.428−0.8357−2.4−0.37880.31070−2.23], B2=[0.0550.050.075−10.05−0.05], C2=[0.4−0.3−0.2], and D2=[−0.1010.15−2−0.10.10.20.1]. |
Moreover, the external disturbances and cyber attacks function are selected as ω(t)=0.5sin(2πt) and g(x(t))=[−0.65tanh(x1(t))−0.25tanh(x2(t))−0.35tanh(x3(t))]T. Furthermore, the transition rates Π12(ϰ) and Π21(ϰ) are given in Example 1. Therefore, the remaining parameters are taken as τ=1, α=0.01, σ=0.2, ˉβ=0.6 and G=diag{0.65,0.25,0.35}.
Based on the above values, the memory controller and observer gain matrices are computed as follows:
K11=[−15.2057−0.83663.3212−1.7014−0.0061−0.2313],K12=[−23.30561.2995−1.2568−2.4397−0.0248−0.3595],K21=[−0.0237−0.0045−0.0282−0.00230.0051−0.0020],K22=[−0.0489−0.0040−0.0244−0.00370.0073−0.0003],L1=[2.5444−0.55620.97560.1376−0.07870.1280−7.16610.16020.8970], and L2=[2.7831−1.23683.64110.0473−0.3510−1.8192−7.15240.29813.1258]. |
Based on these gains values of simulation results under initial conditions x(t)=[2.2−6.3−3.1]T and ˆx(t)=[2.6−7.5−4.2]T as shown in Figures 7–9. Which depict the dynamics of the system states and their estimations, it is clear that the proposed method can estimate states well if the states are immeasurable. The state curves x(t) and its estimates ˆx(t) with and without cyber attacks are showed in Figures 7(a, b), 8(a, b) and 9(a, b), respectively. By contrast, it can be seen that the convergence speed of the estimated state curves in Figures 7(b), 8(b) and 9(b) are faster than that in Figures 7(a), 8(a) and 9(a), which indicates that cyber attacks can affect the stability and estimate performance of the system state. Thus, from these simulation results, we can conclude that the proposed controller effectively estimated states of the F-404 aircraft engine system even in the presence of cyber attacks.
The observer-based memory state feedback control design problem for S-MJSs subject to external disturbance and randomly occurring cyber attacks has been addressed in this paper. First, the cyber attacks have been represented by the Lipschitz continuous nonlinear function, with the randomness phenomenon denoted by the Bernoulli distributed stochastic parameter. Next, on the basis of measurement output, the state observer was constructed for the addressed system. By using the Lyapunov stability theory and matrix integral inequality, sufficient conditions ensuring the desired stability and observer design of the addressed system have been obtained. To reduce conservatism, an extended Wirtinger's integral inequality has been employed in the proof of stability criterion. Finally, two numerical examples have been provided to illustrate the feasibility and potential value of the proposed observer-based memory state feedback control design approach.
The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this article.
This research was supported by "Regional Innovation Strategy (RIS)" through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (MOE) (2021RIS-001).
The authors declare that there is no conflict of interest.
[1] |
C. E. de Souza, Robust stability and stabilization of uncertain discrete-time Markovian jump linear systems, IEEE Trans. Autom. Control, 51 (2006), 836–841. https://doi.org/10.1109/TAC.2006.875012 doi: 10.1109/TAC.2006.875012
![]() |
[2] |
X. Li, R. Rakkiyappan, N. Sakthivel, Non‐fragile synchronization control for Markovian jumping complex dynamical networks with probabilistic time‐varying coupling delays, Asian J. Control, 17 (2015), 1678–1695. https://doi.org/10.1002/asjc.984 doi: 10.1002/asjc.984
![]() |
[3] |
W. Chen, F. Gao, S. Xu, Y. Li, Y. Chu, Robust stabilization for uncertain singular Markovian jump systems via dynamic output-feedback control, Syst. Control Lett., 171 (2023), 105433. https://doi.org/10.1016/j.sysconle.2022.105433 doi: 10.1016/j.sysconle.2022.105433
![]() |
[4] |
X. Xu, L. Wang, Z. Du, Y. Kao, Stochastic stabilization of Markovian jump neutral systems with fractional Brownian motion and quantized controller, J. Franklin Inst., 358 (2021), 9449–9466. https://doi.org/10.1016/j.jfranklin.2021.09.005 doi: 10.1016/j.jfranklin.2021.09.005
![]() |
[5] |
W. Xia, S. Xu, J. Lu, Y. Li, Y. Chu, Z. Zhang, Event-triggered filtering for discrete-time Markovian jump systems with additive time-varying delays, Appl. Math. Comput., 391 (2021), 125630. https://doi.org/10.1016/j.amc.2020.125630 doi: 10.1016/j.amc.2020.125630
![]() |
[6] |
J. Wang, H. Zhang, J. Fu, H. Liang, Q. Meng, Dissipativity-based consensus tracking control of nonlinear multiagent systems with generally uncertain Markovian switching topologies and event-triggered strategy, IEEE Trans. Cybern., 53 (2023), 4763–4778. https://doi.org/10.1109/TCYB.2022.3141599 doi: 10.1109/TCYB.2022.3141599
![]() |
[7] |
B. Jiang, Z. Wu, H. R. Karimi, A traverse algorithm approach to stochastic stability analysis of Markovian jump systems with unknown and uncertain transition rates, Appl. Math. Comput., 422 (2022), 126968. https://doi.org/10.1016/j.amc.2022.126968 doi: 10.1016/j.amc.2022.126968
![]() |
[8] |
D. Ding, J. Liu, H. Yang, Robust non-fragile control of positive semi-Markovian jump systems with actuator saturation, IEEE Access, 7 (2019), 86758–86768. https://doi.org/10.1109/ACCESS.2019.2922715 doi: 10.1109/ACCESS.2019.2922715
![]() |
[9] |
F. Li, P. Shi, L. Wu, M. V. Basin, C. C. Lim, Quantized control design for cognitive radio networks modeled as nonlinear semi-Markovian jump systems, IEEE Trans. Ind. Electron., 62 (2015), 2330–2340. https://doi.org/10.1109/TIE.2014.2351379 doi: 10.1109/TIE.2014.2351379
![]() |
[10] |
Y. Tian, H. Yan, H. Zhang, S. X. Yang, Z. Li, Observed-based finite-time control of nonlinear semi-Markovian jump systems with saturation constraint, IEEE Trans. Syst. Man Cybern.: Syst., 51 (2021), 6639–6649. https://doi.org/10.1109/TSMC.2019.2962318 doi: 10.1109/TSMC.2019.2962318
![]() |
[11] |
H. Ye, P. Cheng, X. Zhang, S. He, W. Zhang, Event-triggered-based control for Markov jump cyber-physical systems against denial-of-service attacks, Appl. Math. Comput., 451 (2023), 128030. https://doi.org/10.1016/j.amc.2023.128030 doi: 10.1016/j.amc.2023.128030
![]() |
[12] |
R. Sakthivel, O. M. Kwon, M. J. Park, S. M. Lee, R. Sakthivel, Disturbance rejection for multi-weighted complex dynamical networks with actuator saturation and deception attacks via hybrid-triggered mechanism, Neural Networks, 162 (2023), 225–239. https://doi.org/10.1016/j.neunet.2023.02.031 doi: 10.1016/j.neunet.2023.02.031
![]() |
[13] |
X. Li, X. Xu, L. Chen, H. Zhang, Z. Ju, W. Guo, Longitudinal speed tracking control for an electric connected vehicle with actuator saturation subject to a replay attack, Nonlinear Dyn., 111 (2023), 1369–1383. https://doi.org/10.1007/s11071-022-07898-2 doi: 10.1007/s11071-022-07898-2
![]() |
[14] |
H. He, W. Qi, H. Yan, J. Cheng, K. Shi, Adaptive fuzzy resilient control for switched systems with state constraints under deception attacks, Inf. Sci., 621 (2023), 596–610. https://doi.org/10.1016/j.ins.2022.11.074 doi: 10.1016/j.ins.2022.11.074
![]() |
[15] |
J. Yan, Y. Xia, X. Feng, Y. Zhang, Deception attack detection based on bandwidth allocation for switched systems with quantization, Automatica, 154 (2023), 111094. https://doi.org/10.1016/j.automatica.2023.111094 doi: 10.1016/j.automatica.2023.111094
![]() |
[16] |
L. Zha, R. Liao, J. Liu, X. Xie, J. Cao, L. Xiong, Finite‐time adaptive event‐triggered asynchronous state estimation for Markov jump systems with cyber‐attacks, Int. J. Robust Nonlinear Control, 32 (2022), 583–599. https://doi.org/10.1002/rnc.5836 doi: 10.1002/rnc.5836
![]() |
[17] |
X. Gao, F. Deng, H. Zhang, P. Zeng, Adaptive neural state estimation of Markov jump systems under scheduling protocols and probabilistic deception attacks, IEEE Trans. Cybern., 53 (2022), 1830–1842. https://doi.org/10.1109/TCYB.2022.3140415 doi: 10.1109/TCYB.2022.3140415
![]() |
[18] |
B. Jiang, D. Liu, H. R. Karimi, B. Li, Observer‐based event‐triggered H∞ sliding control of Markovian jump system suffer from actuator attacks, Asian J. Control, 25 (2023), 2975–2987. https://doi.org/10.1002/asjc.2998 doi: 10.1002/asjc.2998
![]() |
[19] |
J. Xia, J. H. Park, T. H. Lee, B. Zhang, H∞ tracking of uncertain stochastic time-delay systems: memory state-feedback controller design, Appl. Math. Comput., 249 (2014), 356–370. https://doi.org/10.1016/j.amc.2014.10.029 doi: 10.1016/j.amc.2014.10.029
![]() |
[20] |
Y. Ma, X. Jia, Q. Zhang, Robust finite-time non-fragile memory H∞ control for discrete-time singular Markovian jumping systems subject to actuator saturation, J. Franklin Inst., 354 (2017), 8256–8282. https://doi.org/10.1016/j.jfranklin.2017.10.019 doi: 10.1016/j.jfranklin.2017.10.019
![]() |
[21] |
J. Zhang, D. Liu, Y. Ma, P. Yu, Non-fragile H∞ memory sampled-data state-feedback control for continuous-time nonlinear Markovian jump fuzzy systems with time-varying delay, Inf. Sci., 577 (2021), 214–233. https://doi.org/10.1016/j.ins.2021.06.081 doi: 10.1016/j.ins.2021.06.081
![]() |
[22] |
R. Sakthivel, O. M. Kwon, S. G. Choi, R. Sakthivel, Observer-based state estimation for discrete-time semi-Markovian jump neural networks with round-robin protocol against cyber attacks, Neural Networks, 165 (2023), 611–624. https://doi.org/10.1016/j.neunet.2023.05.046 doi: 10.1016/j.neunet.2023.05.046
![]() |
[23] |
J. Cai, J. Wang, J. Feng, G. Chen, Y. Zhao, Observer-based consensus for multi-agent systems with semi-Markovian jumping via adaptive event-triggered SMC, IEEE Trans. Network Sci. Eng., 10 (2023), 1736–1751. https://doi.org/10.1109/TNSE.2023.3234168 doi: 10.1109/TNSE.2023.3234168
![]() |
[24] |
L. Zhang, L. He, Y. Song, New results on stability analysis of delayed systems derived from extended Wirtinger's integral inequality, Neurocomputing, 283 (2018), 98–106. https://doi.org/10.1016/j.neucom.2017.12.044 doi: 10.1016/j.neucom.2017.12.044
![]() |
[25] |
H. Li, P. Shi, D. Yao, Adaptive sliding-mode control of Markov jump nonlinear systems with actuator faults, IEEE Trans. Autom. Control, 62 (2016), 1933–1939. https://doi.org/10.1109/TAC.2016.2588885 doi: 10.1109/TAC.2016.2588885
![]() |
1. | Liang Zhang, Zhihao Shen, Ben Niu, Ning Zhao, Dynamic-Event-Based Reachable Set Synthesis for Nonlinear Delayed Hidden Semi-Markov Jump Systems Under Multiple Cyber-Attacks, 2025, 55, 2168-2216, 587, 10.1109/TSMC.2024.3485651 | |
2. | Yongxiao Tian, Zepeng Ning, Huaicheng Yan, Yan Peng, Time-Elapsed-Reliant Observer-Based Control of Semi-Markov Jump Linear Systems With Bilaterally Bounded Sojourn Time, 2025, 72, 1549-7747, 218, 10.1109/TCSII.2024.3491032 | |
3. | Suhuan Zhang, Fanglai Zhu, Asynchronous bumpless transfer control for stochastic hidden semi-Markovian jump systems against deception attacks, 2025, 506, 00963003, 129541, 10.1016/j.amc.2025.129541 |