186
Views
2
CrossRef citations to date
0
Altmetric
Research Article

Backstepping control for stochastic nonlinear strict-feedback systems based on observer with incomplete measurements

, , , , &
Pages 3211-3225 | Received 12 Jan 2021, Accepted 31 Jul 2021, Published online: 13 Aug 2021

References

  • An, L., & Yang, G. H. (2018). Decentralized adaptive fuzzy secure control for nonlinear uncertain interconnected systems against intermittent DoS attacks. IEEE Transactions on Cybernetics, 49(3), 1–12. https://doi.org/10.1109/TCYB.2017.2787740
  • Antsaklis, P. (2014). Goals and challenges in cyber-physical systems research editorial of the editor in chief. IEEE Transactions on Automatic Control, 59(12), 3117–3119. https://doi.org/10.1109/TAC.2014.2363897
  • De Persis, C., & Tesi, P. (2015). Input-to-state stabilizing control under denial-of-service. IEEE Transactions on Automatic Control, 60(11), 2930–2944. https://doi.org/10.1109/TAC.2015.2416924
  • Diwadkar, A., & Vaidya, U. (2019). Synchronization in large-scale nonlinear network systems with uncertain links. Automatica, 100, 194–199. https://doi.org/10.1016/j.automatica.2018.06.002
  • Dolk, V. S., Tesi, P., De Persis, C., & Heemels, W. P. M. H. (2017). Event-triggered control systems under denial-of-service attacks. IEEE Transactions on Control of Network Systems, 4(1), 93–105. https://doi.org/10.1109/TCNS.2016.2613445
  • Garcia, H. E., Lin, W. C., Meerkov, S. M., & Ravichandran, M. T. (2014). Resilient monitoring systems: Architecture, design, and application to boiler/turbine plant. IEEE Transactions on Cybernetics, 44(11), 2010–2023. https://doi.org/10.1109/TCYB.2014.2316003
  • Guan, X., Yang, B., Chen, C., Dai, W. B., & Wang, Y. Y. (2016). A comprehensive overview of cyber-physical systems: From perspective of feedback system. IEEE/CAA Journal of Automatica SINICA, 3(1), 1–14. https://doi.org/10.1109/JAS.2016.7373757
  • Guo, Z., Shi, D., Johansson, K. H., & Shi, L. (2017). Optimal linear cyber-attack on remote state estimation. IEEE Transactions on Control of Network Systems, 4(1), 4–13. https://doi.org/10.1109/TCNS.2016.2570003
  • Hu, J., Liang, J., Chen, D., Ji, D., & Du, J. (2015). A recursive approach to non-fragile filtering for networked systems with stochastic uncertainties and incomplete measurements. Journal of The Franklin Institute, 352(5), 1946–1962. https://doi.org/10.1016/j.jfranklin.2015.02.002
  • Jiao, T., Park, J. H., & Zong, G. (2019). Stability criteria of stochastic nonlinear systems with asynchronous impulses and switchings. Nonlinear Dynamics, 97(1), 135–149. https://doi.org/10.1007/s11071-019-04960-4.
  • Kwon, C., & Hwang, I. (2018). Reachability analysis for safety assurance of cyber-physical systems against cyber attacks. IEEE Transactions on Automatic Control, 63(7), 2272–2279. https://doi.org/10.1109/TAC.2017.2761762
  • Li, Y., Ma, Z., & Tong, S. (2018). Adaptive fuzzy fault-tolerant control of nontriangular structure nonlinear systems with error constraint. IEEE Transactions on Fuzzy Systems, 26(4), 2062–2074. https://doi.org/10.1109/TFUZZ.91
  • Li, Y., Sun, K., & Tong, S. (2019). Observer-based adaptive fuzzy fault-tolerant optimal control for SISO nonlinear systems. IEEE Transactions on Cybernetics, 49(2), 649–661. https://doi.org/10.1109/TCYB.2017.2785801
  • Liang, Y., Chen, T., & Pan, Q. (2010). Multi-rate stochastic H∞ filtering for networked multi-sensor fusion. Automatica, 46(2), 437–444. https://doi.org/10.1016/j.automatica.2009.11.019
  • Liu, L., Liu, Y. J., & Tong, S. (2018). Neural networks-based adaptive finite-time fault-tolerant control for a class of strict-feedback switched nonlinear systems. IEEE Transactions on Cybernetics, 49(7), 1–10. https://doi.org/10.1109/TCYB.2018.2828308
  • Lu, A. Y., & Yang, G. H. (2017). Event-triggered secure observer-based control for cyber-physical systems under adversarial attacks. Information Sciences, 420, 96–109. https://doi.org/10.1016/j.ins.2017.08.057
  • Lu, A. Y., & Yang, G. H. (2018). Input-to-state stabilizing control for cyber-physical systems with multiple transmission channels under denial-of-service. IEEE Transactions on Automatic Control, 63(6), 1813–1820. https://doi.org/10.1109/TAC.9
  • Lv, C., Liu, Y. H., Hu, X., Guo, H., Cao, D., & Wang, F. Y. (2018). Simultaneous observation of hybrid states for cyberphysical systems: A case study of electric vehicle powertrain. IEEE Transactions on Cybernetics, 48(8), 2357–2367. https://doi.org/10.1109/TCYB.2017.2738003
  • Lyshevski, S. E. (2017). Signal processing in cyber-physical MEMS sensors: Inertial measurement and navigation systems. IEEE Transactions on Industrial Electronics, 64(12), 9618–9625. https://doi.org/10.1109/TIE.2017.2701783
  • Miao, F., Zhu, Q., Pajic, M., & Pappas, G. J. (2017). Coding schemes for securing cyber-physical systems against stealthy data injection attacks. IEEE Transactions on Control of Network Systems, 4(1), 106–117. https://doi.org/10.1109/TCNS.2016.2573039
  • Pasqualetti, F., Dorfler, F., & Bullo, F. (2013). Attack detection and identification in cyber-physical systems. IEEE Transactions on Automatic Control, 58(11), 2715–2729. https://doi.org/10.1109/TAC.2013.2266831
  • Shoukry, Y., & Tabuada, P. (2016). Event-triggered state observers for sparse sensor noise/attacks. IEEE Transactions on Automatic Control, 61(8), 2079–2091. https://doi.org/10.1109/TAC.2015.2492159
  • Tang, Y., Zhang, D. D., Ho, D. W. C., & Qian, F. (2018). Tracking control of a class of cyber-physical systems via a FlexRay communication network. IEEE Transactions on Cybernetics, 49(4), 1–14. https://doi.org/10.1109/TCYB.2018.2794523
  • Teixeira, A., Shames, I., Sandberg, H., & Johansson, K. H. (2015). A secure control framework for resource-limited adversaries. Automatica, 51, 135–148. https://doi.org/10.1016/j.automatica.2014.10.067
  • Tong, S., Li, Y., Y. M. Li, & Liu, Y. (2011). Observer-based adaptive fuzzy backstepping control for a class of stochastic nonlinear strict-feedback systems. IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), 41(6), 1693–1704. https://doi.org/10.1109/TSMCB.2011.2159264
  • Tong, S., Min, X., & Li, Y. (2020). Observer-based adaptive fuzzy tracking control for strict-feedback nonlinear systems with unknown control gain functions. IEEE Transactions on Cybernetics, 50(9), 3903–3913. https://doi.org/10.1109/TCYB.6221036
  • Vorotnikov, V. I., & Martyshenko, Y. G. (2019). On the partial stability in probability of nonlinear stochastic systems. Automation and Remote Control, 80(5), 856–866. https://doi.org/10.1134/S0005117919050059
  • Yang, J., Zhou, C., Yang, S., Xu, H., & Hu, B. (2018). Anomaly detection based on zone partition for security protection of industrial cyber-physical systems. IEEE Transactions on Industrial Electronics, 65(5), 4257–4267. https://doi.org/10.1109/TIE.41
  • Yang, Y., Zhao, J., Xia, J., Zhuang, G., & Zhang, W. (2019). Multiobjective optimization control for uncertain nonlinear stochastic system with state-delay. International Journal of Fuzzy Systems, 21(1), 72–83. https://doi.org/10.1007/s40815-018-0541-0
  • Zhang, B., & Zheng, W. X. (2012). H∞ filter design for nonlinear networked control systems with uncertain packet-loss probability. Signal Processing, 92(6), 1499–1507. https://doi.org/10.1016/j.sigpro.2011.12.010
  • Zhang, D., Song, H., & Yu, L. (2017). Robust fuzzy-model-based filtering for nonlinear cyber-physical systems with multiple stochastic incomplete measurements. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 47(8), 1826–1838. https://doi.org/10.1109/TSMC.2016.2551200
  • Zhang, L., Gao, H., & Kaynak, O. (2013). Network-induced constraints in networked control systems – a survey. IEEE Transactions on Industrial Informatics, 9(1), 403–416. https://doi.org/10.1109/TII.2012.2219540

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.