Security control for nonlinear systems under quantization and Round-Robin protocol subject to deception attacks
This paper is concerned with the security control problem for the nonlinear systems with the effects of quantization, communication protocol and deception attacks based on the Takagi–Sugeno (T–S) fuzzy model. The measurement output and control input signals are quantized by dynamic quantizers simult...
        Saved in:
      
    
          | Published in | ISA transactions Vol. 130; pp. 25 - 34 | 
|---|---|
| Main Authors | , | 
| Format | Journal Article | 
| Language | English | 
| Published | 
        United States
          Elsevier Ltd
    
        01.11.2022
     | 
| Subjects | |
| Online Access | Get full text | 
| ISSN | 0019-0578 1879-2022 1879-2022  | 
| DOI | 10.1016/j.isatra.2022.03.012 | 
Cover
| Abstract | This paper is concerned with the security control problem for the nonlinear systems with the effects of quantization, communication protocol and deception attacks based on the Takagi–Sugeno (T–S) fuzzy model. The measurement output and control input signals are quantized by dynamic quantizers simultaneously, and the quantized signals are transmitted through the communication channels scheduled by Round-Robin (RR) protocol. Moreover, two Bernoulli processes are utilized to characterize the deception attacks occurring on the different channels respectively. The mode-dependent observer-based controller and dynamic quantizers are designed such that the security in probability of the closed-loop system with the prescribed quadratic cost index can be guaranteed. Then, sufficient design conditions are obtained for the controller gains and quantizers’ parameters based on the linear matrix inequalities (LMIs) approach. In the end, a numerical example is carried out to demonstrate the validity of the proposed method.
•Security control problem is studied for nonlinear system based on T–S fuzzy method.•Dynamic quantization is considered for the measurement output and control input.•A novel framework is introduced for the impacts of RR protocol and deception attacks.•Sufficient LMIs-based conditions are established for the controller and quantizers. | 
    
|---|---|
| AbstractList | This paper is concerned with the security control problem for the nonlinear systems with the effects of quantization, communication protocol and deception attacks based on the Takagi–Sugeno (T–S) fuzzy model. The measurement output and control input signals are quantized by dynamic quantizers simultaneously, and the quantized signals are transmitted through the communication channels scheduled by Round-Robin (RR) protocol. Moreover, two Bernoulli processes are utilized to characterize the deception attacks occurring on the different channels respectively. The mode-dependent observer-based controller and dynamic quantizers are designed such that the security in probability of the closed-loop system with the prescribed quadratic cost index can be guaranteed. Then, sufficient design conditions are obtained for the controller gains and quantizers’ parameters based on the linear matrix inequalities (LMIs) approach. In the end, a numerical example is carried out to demonstrate the validity of the proposed method.
•Security control problem is studied for nonlinear system based on T–S fuzzy method.•Dynamic quantization is considered for the measurement output and control input.•A novel framework is introduced for the impacts of RR protocol and deception attacks.•Sufficient LMIs-based conditions are established for the controller and quantizers. This paper is concerned with the security control problem for the nonlinear systems with the effects of quantization, communication protocol and deception attacks based on the Takagi-Sugeno (T-S) fuzzy model. The measurement output and control input signals are quantized by dynamic quantizers simultaneously, and the quantized signals are transmitted through the communication channels scheduled by Round-Robin (RR) protocol. Moreover, two Bernoulli processes are utilized to characterize the deception attacks occurring on the different channels respectively. The mode-dependent observer-based controller and dynamic quantizers are designed such that the security in probability of the closed-loop system with the prescribed quadratic cost index can be guaranteed. Then, sufficient design conditions are obtained for the controller gains and quantizers' parameters based on the linear matrix inequalities (LMIs) approach. In the end, a numerical example is carried out to demonstrate the validity of the proposed method.This paper is concerned with the security control problem for the nonlinear systems with the effects of quantization, communication protocol and deception attacks based on the Takagi-Sugeno (T-S) fuzzy model. The measurement output and control input signals are quantized by dynamic quantizers simultaneously, and the quantized signals are transmitted through the communication channels scheduled by Round-Robin (RR) protocol. Moreover, two Bernoulli processes are utilized to characterize the deception attacks occurring on the different channels respectively. The mode-dependent observer-based controller and dynamic quantizers are designed such that the security in probability of the closed-loop system with the prescribed quadratic cost index can be guaranteed. Then, sufficient design conditions are obtained for the controller gains and quantizers' parameters based on the linear matrix inequalities (LMIs) approach. In the end, a numerical example is carried out to demonstrate the validity of the proposed method. This paper is concerned with the security control problem for the nonlinear systems with the effects of quantization, communication protocol and deception attacks based on the Takagi-Sugeno (T-S) fuzzy model. The measurement output and control input signals are quantized by dynamic quantizers simultaneously, and the quantized signals are transmitted through the communication channels scheduled by Round-Robin (RR) protocol. Moreover, two Bernoulli processes are utilized to characterize the deception attacks occurring on the different channels respectively. The mode-dependent observer-based controller and dynamic quantizers are designed such that the security in probability of the closed-loop system with the prescribed quadratic cost index can be guaranteed. Then, sufficient design conditions are obtained for the controller gains and quantizers' parameters based on the linear matrix inequalities (LMIs) approach. In the end, a numerical example is carried out to demonstrate the validity of the proposed method.  | 
    
| Author | Wu, Bo Chang, Xiao-Heng  | 
    
| Author_xml | – sequence: 1 givenname: Bo orcidid: 0000-0003-0844-8064 surname: Wu fullname: Wu, Bo email: lwym126@163.com – sequence: 2 givenname: Xiao-Heng surname: Chang fullname: Chang, Xiao-Heng email: changxiaoheng@sina.com  | 
    
| BackLink | https://www.ncbi.nlm.nih.gov/pubmed/35346484$$D View this record in MEDLINE/PubMed | 
    
| BookMark | eNqFkc1q3DAUhUVJaSZp3yAELbuxqz-PpSwCJaRJIVBI27WQ5SvQ1CNNJDkwffpo6qSLLNqV4Oo7517OOUFHIQZA6IySlhK6_rRpfTYlmZYRxlrCW0LZG7SislfNYXSEVoRQ1ZCul8foJOcNIYR1Sr5Dx7zjYi2kWKH4HeycfNljG0NJccIuJlxXTT6ASTjvc4FtxnMYIeGH2YTif5viY8AmjPg-1o_mPg4-4F2KJdrqkOdhA7bgEvEIFnYLXYqxv_J79NaZKcOH5_cU_fxy_ePqtrn7dvP16vNdY5lipeEDd5aOXJpBMNNxI5zjQMXA-h56JbjtCO2EdEY55UC6taKCsGFw0FEpCT9FHxffetXDDLnorc8WpskEiHPWbC2E4r1kB_T8GZ2HLYx6l_zWpL1-CakCYgFsijkncH8RSvShC73RSxf6ELwmXNcuquzilcz68ie6Svrpf-LLRQw1pEcPSWfrIVgYfarZ6jH6fxs8AVLJqYo | 
    
| CitedBy_id | crossref_primary_10_1007_s12555_024_0423_1 crossref_primary_10_1016_j_jfranklin_2025_107526 crossref_primary_10_1002_rnc_7934 crossref_primary_10_1016_j_isatra_2024_04_013 crossref_primary_10_1016_j_measurement_2025_116874 crossref_primary_10_1109_TSIPN_2024_3375596 crossref_primary_10_1016_j_jfranklin_2025_107529 crossref_primary_10_1002_rnc_6919 crossref_primary_10_1007_s11432_022_3817_5 crossref_primary_10_1016_j_isatra_2022_12_019 crossref_primary_10_1080_00207721_2023_2301037 crossref_primary_10_1016_j_isatra_2023_04_018 crossref_primary_10_1002_rnc_7389 crossref_primary_10_1109_TFUZZ_2023_3269786 crossref_primary_10_1016_j_jfranklin_2024_107502  | 
    
| Cites_doi | 10.1002/rnc.5172 10.1016/j.jfranklin.2013.05.024 10.1109/TSMC.2018.2867213 10.1109/TAC.2017.2713353 10.1109/TII.2012.2219540 10.1016/j.automatica.2014.08.032 10.1109/TCYB.2016.2635122 10.1109/TCYB.2019.2941870 10.1109/TCYB.2017.2739754 10.1002/rnc.5040 10.1016/j.ins.2017.08.057 10.1109/TCYB.2018.2827037 10.1109/TCST.2009.2035611 10.1109/TFUZZ.2004.825085 10.1016/j.automatica.2016.07.025 10.1109/TAC.2019.2910167 10.1016/j.ins.2018.02.008 10.1109/TCYB.2019.2897366 10.1002/rnc.3598 10.1016/j.isatra.2016.09.026 10.1002/rnc.5251 10.1109/TSMC.2016.2616544 10.1109/TCYB.2018.2799929 10.1016/j.automatica.2004.12.011 10.1109/TAC.2009.2020638 10.1109/TAC.2019.2953210 10.1109/TAC.2018.2867340 10.1016/j.fss.2014.10.023 10.1016/j.jfranklin.2020.08.001 10.1016/j.sysconle.2014.05.001 10.1016/j.isatra.2019.04.017 10.1109/TII.2019.2916146 10.1002/rnc.5135 10.1109/TCYB.2019.2903817 10.1109/TAC.2010.2040497 10.1109/TIE.2016.2539259 10.1002/rnc.4672 10.1016/j.jfranklin.2015.05.035 10.1016/j.automatica.2019.108557  | 
    
| ContentType | Journal Article | 
    
| Copyright | 2022 ISA Copyright © 2022 ISA. Published by Elsevier Ltd. All rights reserved.  | 
    
| Copyright_xml | – notice: 2022 ISA – notice: Copyright © 2022 ISA. Published by Elsevier Ltd. All rights reserved.  | 
    
| DBID | AAYXX CITATION NPM 7X8  | 
    
| DOI | 10.1016/j.isatra.2022.03.012 | 
    
| DatabaseName | CrossRef PubMed MEDLINE - Academic  | 
    
| DatabaseTitle | CrossRef PubMed MEDLINE - Academic  | 
    
| DatabaseTitleList | MEDLINE - Academic PubMed  | 
    
| Database_xml | – sequence: 1 dbid: NPM name: PubMed url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed sourceTypes: Index Database  | 
    
| DeliveryMethod | fulltext_linktorsrc | 
    
| Discipline | Engineering Sciences (General)  | 
    
| EISSN | 1879-2022 | 
    
| EndPage | 34 | 
    
| ExternalDocumentID | 35346484 10_1016_j_isatra_2022_03_012 S001905782200132X  | 
    
| Genre | Journal Article | 
    
| GrantInformation_xml | – fundername: National Nature Science Foundation of China grantid: 61773298; 62173261 funderid: http://dx.doi.org/10.13039/501100001809  | 
    
| GroupedDBID | --- --K --M -~X .DC .~1 0R~ 1B1 1~. 1~5 29J 4.4 457 4G. 53G 5GY 5VS 6P2 7-5 71M 8P~ 9JN AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO ABFNM ABFRF ABJNI ABMAC ABNEU ABTAH ABXDB ABYKQ ACDAQ ACFVG ACGFO ACNNM ACRLP ADBBV ADEZE ADMUD ADTZH AEBSH AECPX AEFWE AEKER AENEX AFDAS AFFNX AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHJVU AIEXJ AIKHN AITUG AIVDX AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ ASPBG AVWKF AXJTR AZFZN BJAXD BKOJK BLXMC CS3 DU5 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 F5P FDB FEDTE FGOYB FIRID FNPLU FYGXN G-2 GBLVA HVGLF HZ~ IHE J1W JJJVA KOM LY7 M41 MO0 N9A O-L O9- OAUVE OGIMB OZT P-8 P-9 P2P PC. Q38 R2- ROL RPZ SDF SDG SES SET SEW SPC SPCBC SPD SSQ SST SSZ T5K T9H TAE TN5 UHS UNMZH WUQ XPP ZMT ZY4 ~G- AATTM AAXKI AAYWO AAYXX ABWVN ACLOT ACRPL ACVFH ADCNI ADNMO AEIPS AEUPX AFJKZ AFPUW AGQPQ AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP CITATION EFKBS ~HD AFXIZ AGCQF AGRNS BNPGV NPM SSH 7X8  | 
    
| ID | FETCH-LOGICAL-c292t-3b3fc1d38ab42a53a4ff3e14b277e7943c501548fa9f9fe8f691402bbfe518803 | 
    
| IEDL.DBID | .~1 | 
    
| ISSN | 0019-0578 1879-2022  | 
    
| IngestDate | Sat Sep 27 19:17:42 EDT 2025 Mon Jul 21 06:04:54 EDT 2025 Wed Oct 01 05:18:06 EDT 2025 Thu Apr 24 23:05:16 EDT 2025 Fri Feb 23 02:39:38 EST 2024  | 
    
| IsPeerReviewed | true | 
    
| IsScholarly | true | 
    
| Keywords | Quantization T–S fuzzy model Protocol Security control Deception attacks  | 
    
| Language | English | 
    
| License | Copyright © 2022 ISA. Published by Elsevier Ltd. All rights reserved. | 
    
| LinkModel | DirectLink | 
    
| MergedId | FETCHMERGED-LOGICAL-c292t-3b3fc1d38ab42a53a4ff3e14b277e7943c501548fa9f9fe8f691402bbfe518803 | 
    
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23  | 
    
| ORCID | 0000-0003-0844-8064 | 
    
| PMID | 35346484 | 
    
| PQID | 2644937820 | 
    
| PQPubID | 23479 | 
    
| PageCount | 10 | 
    
| ParticipantIDs | proquest_miscellaneous_2644937820 pubmed_primary_35346484 crossref_primary_10_1016_j_isatra_2022_03_012 crossref_citationtrail_10_1016_j_isatra_2022_03_012 elsevier_sciencedirect_doi_10_1016_j_isatra_2022_03_012  | 
    
| ProviderPackageCode | CITATION AAYXX  | 
    
| PublicationCentury | 2000 | 
    
| PublicationDate | 2022-11-01 | 
    
| PublicationDateYYYYMMDD | 2022-11-01 | 
    
| PublicationDate_xml | – month: 11 year: 2022 text: 2022-11-01 day: 01  | 
    
| PublicationDecade | 2020 | 
    
| PublicationPlace | United States | 
    
| PublicationPlace_xml | – name: United States | 
    
| PublicationTitle | ISA transactions | 
    
| PublicationTitleAlternate | ISA Trans | 
    
| PublicationYear | 2022 | 
    
| Publisher | Elsevier Ltd | 
    
| Publisher_xml | – name: Elsevier Ltd | 
    
| References | Lu, Yang (b9) 2017; 420 Zhang, Gao, Kaynak (b3) 2013; 9 Zhang, Shi, Wang, Yu (b4) 2017; 66 Liu, Fridman, Johansson, Xia (b29) 2016; 63 Ge, Han, Zhong, Zhang (b33) 2019; 109 Zou, Wang, Han, Zhou (b43) 2019; 64 Zhang, Yang, Yan, Chen (b19) 2015; 352 Cheng, Park, Wu, Yan (b35) 2021 Niu, Ho (b17) 2014; 50 Wu, Peng, Zhang, Yang, Zhang (b34) 2020; 104 Xiong, Chang, Park, Li (b18) 2020; 30 Shen, Huo, Cao, Huang (b30) 2019; 49 Zou, Wang, Gao (b20) 2016; 74 Li, Xiong (b13) 2021 Guan, Chen (b6) 2004; 12 Liu, Guo, Zhang, Xia (b37) 2020; 50 Chang, Huang, Park (b10) 2020; 16 Ding, Mei, Yu (b14) 2021 Wang, Yang, Xia, Wu, Shen (b24) 2021 Wu, Dong, Su, Li (b5) 2018; 48 Yue, Han, Lam (b1) 2005; 41 Ding, Wang, Han, Wei (b41) 2019; 49 Xu, Lu, Shi, Li, Xie (b28) 2018; 48 Shi, Yu (b7) 2009; 54 Chang, Zhang, Park (b39) 2015; 273 Coutinho, Fu, de Souza (b16) 2010; 55 Cao, Niu, Karimi (b26) 2020; 30 Zou, Wang, Han, Zhou (b22) 2017; 62 Zhai, Vamvoudakis (b32) 2021; 31 Zhang, Niu, Lam (b23) 2020; 50 Lu, Yang (b31) 2018; 439–440 Wang, Liu, Wang, Rees, Zhao (b2) 2010; 18 Song, Wang, Niu (b25) 2019; 64 Lu, Shi, Wu, Zhang (b38) 2020; 357 Xu, Su, Pan, Wu, Xu (b27) 2013; 350 Zong, Ren (b15) 2019; 29 Zhang, Han (b8) 2007; 27 Zhu, Zheng (b12) 2020; 65 Ugrinovskii, Fridman (b21) 2014; 69 Ding, Wang, Han, Wei (b36) 2018; 48 Min, Xu, Fei, Cui, Tan (b11) 2020; 30 Hu, Yue, Han, Xie, Chen, Dou (b42) 2020; 50 Chang, Yang, Xiong (b40) 2019; 49 Li (10.1016/j.isatra.2022.03.012_b13) 2021 Shen (10.1016/j.isatra.2022.03.012_b30) 2019; 49 Zhang (10.1016/j.isatra.2022.03.012_b4) 2017; 66 Min (10.1016/j.isatra.2022.03.012_b11) 2020; 30 Xiong (10.1016/j.isatra.2022.03.012_b18) 2020; 30 Zou (10.1016/j.isatra.2022.03.012_b20) 2016; 74 Chang (10.1016/j.isatra.2022.03.012_b39) 2015; 273 Zhang (10.1016/j.isatra.2022.03.012_b19) 2015; 352 Wu (10.1016/j.isatra.2022.03.012_b5) 2018; 48 Xu (10.1016/j.isatra.2022.03.012_b28) 2018; 48 Zhang (10.1016/j.isatra.2022.03.012_b23) 2020; 50 Wang (10.1016/j.isatra.2022.03.012_b24) 2021 Shi (10.1016/j.isatra.2022.03.012_b7) 2009; 54 Zhu (10.1016/j.isatra.2022.03.012_b12) 2020; 65 Zou (10.1016/j.isatra.2022.03.012_b22) 2017; 62 Zhang (10.1016/j.isatra.2022.03.012_b8) 2007; 27 Ding (10.1016/j.isatra.2022.03.012_b14) 2021 Zhang (10.1016/j.isatra.2022.03.012_b3) 2013; 9 Song (10.1016/j.isatra.2022.03.012_b25) 2019; 64 Zhai (10.1016/j.isatra.2022.03.012_b32) 2021; 31 Liu (10.1016/j.isatra.2022.03.012_b29) 2016; 63 Ding (10.1016/j.isatra.2022.03.012_b41) 2019; 49 Liu (10.1016/j.isatra.2022.03.012_b37) 2020; 50 Cao (10.1016/j.isatra.2022.03.012_b26) 2020; 30 Wu (10.1016/j.isatra.2022.03.012_b34) 2020; 104 Yue (10.1016/j.isatra.2022.03.012_b1) 2005; 41 Guan (10.1016/j.isatra.2022.03.012_b6) 2004; 12 Hu (10.1016/j.isatra.2022.03.012_b42) 2020; 50 Cheng (10.1016/j.isatra.2022.03.012_b35) 2021 Zou (10.1016/j.isatra.2022.03.012_b43) 2019; 64 Xu (10.1016/j.isatra.2022.03.012_b27) 2013; 350 Lu (10.1016/j.isatra.2022.03.012_b31) 2018; 439–440 Lu (10.1016/j.isatra.2022.03.012_b38) 2020; 357 Niu (10.1016/j.isatra.2022.03.012_b17) 2014; 50 Wang (10.1016/j.isatra.2022.03.012_b2) 2010; 18 Coutinho (10.1016/j.isatra.2022.03.012_b16) 2010; 55 Ugrinovskii (10.1016/j.isatra.2022.03.012_b21) 2014; 69 Chang (10.1016/j.isatra.2022.03.012_b40) 2019; 49 Lu (10.1016/j.isatra.2022.03.012_b9) 2017; 420 Ding (10.1016/j.isatra.2022.03.012_b36) 2018; 48 Chang (10.1016/j.isatra.2022.03.012_b10) 2020; 16 Zong (10.1016/j.isatra.2022.03.012_b15) 2019; 29 Ge (10.1016/j.isatra.2022.03.012_b33) 2019; 109  | 
    
| References_xml | – volume: 273 start-page: 87 year: 2015 end-page: 104 ident: b39 article-title: Robust static output feedback publication-title: Fuzzy Sets Syst – volume: 69 start-page: 103 year: 2014 end-page: 110 ident: b21 article-title: A round-robin type protocol for distributed estimation with publication-title: Syst Control Lett – volume: 439–440 start-page: 95 year: 2018 end-page: 107 ident: b31 article-title: Distributed consensus control for multi-agent systems under denial-of-service publication-title: Inf Sci – volume: 62 start-page: 6582 year: 2017 end-page: 6588 ident: b22 article-title: Ultimate boundedness control for networked systems with try-once-discard protocol and uniform quantization effects publication-title: IEEE Trans Automat Control – volume: 66 start-page: 376 year: 2017 end-page: 392 ident: b4 article-title: Analysis and synthesis of networked control systems: A survey of recent advances and challenges publication-title: ISA Trans – volume: 65 start-page: 3714 year: 2020 end-page: 3721 ident: b12 article-title: Observer-based control for cyber–physical systems with periodic DoS attacks via a cyclic switching strategy publication-title: IEEE Trans Automat Control – volume: 109 year: 2019 ident: b33 article-title: Distributed krein space-based attack detection over sensor networks under deception attacks publication-title: Automatica – volume: 352 start-page: 3476 year: 2015 end-page: 3488 ident: b19 article-title: Distributed event-triggered control for consensus of multi-agent systems publication-title: J Franklin Inst – volume: 16 start-page: 319 year: 2020 end-page: 327 ident: b10 article-title: Robust guaranteed cost control under digital communication channels publication-title: IEEE Trans Ind Inform – volume: 48 start-page: 2426 year: 2018 end-page: 2436 ident: b5 article-title: Asynchronous dissipative control for fuzzy Markov jump systems publication-title: IEEE Trans Cybern – volume: 48 start-page: 336 year: 2018 end-page: 345 ident: b28 article-title: Finite-time distributed state estimation over sensor networks with round-robin protocol and fading channels publication-title: IEEE Trans Cybern – volume: 357 start-page: 9834 year: 2020 end-page: 9852 ident: b38 article-title: Event-triggered interval type-2 T-S fuzzy control for nonlinear networked systems publication-title: J Franklin Inst – volume: 50 start-page: 1952 year: 2020 end-page: 1964 ident: b42 article-title: Observer-based event-triggered control for networked linear systems subject to denial-of-service attacks publication-title: IEEE Trans Cybern – volume: 27 start-page: 679 year: 2007 end-page: 700 ident: b8 article-title: Event-triggered publication-title: Internat J Robust Nonlinear Control – volume: 420 start-page: 96 year: 2017 end-page: 109 ident: b9 article-title: Event-triggered secure observer-based control for cyber–physical systems under adversarial attacks publication-title: Inf Sci – volume: 49 start-page: 1292 year: 2019 end-page: 1301 ident: b30 article-title: Generalized state estimation for markovian coupled networks under round-robin protocol and redundant channels publication-title: IEEE Trans Cybern – volume: 41 start-page: 999 year: 2005 end-page: 1007 ident: b1 article-title: Network-based robust publication-title: Automatica – volume: 31 start-page: 1817 year: 2021 end-page: 1833 ident: b32 article-title: A data-based private learning framework for enhanced security against replay attacks in cyber–physical systems publication-title: Internat J Robust Nonlinear Control – volume: 54 start-page: 1668 year: 2009 end-page: 1674 ident: b7 article-title: Output feedback stabilization of networked control systems with random delays modeled by Markov chains publication-title: IEEE Trans Automat Control – volume: 9 start-page: 403 year: 2013 end-page: 416 ident: b3 article-title: Network-induced constraints in networked control systems–A survey publication-title: IEEE Trans Ind Inform – volume: 74 start-page: 341 year: 2016 end-page: 348 ident: b20 article-title: Set-membership filtering for time-varying systems with mixed time-delays under round-robin and weighted try-once-discard protocols publication-title: Automatica – volume: 48 start-page: 779 year: 2018 end-page: 789 ident: b36 article-title: Security control for discrete-time stochastic nonlinear systems subject to deception attacks publication-title: IEEE Trans Syst Man Cybern – volume: 30 start-page: 7307 year: 2020 end-page: 7325 ident: b26 article-title: Dynamic output feedback sliding mode control for Markovian jump systems under stochastic communication protocol and its application publication-title: Internat J Robust Nonlinear Control – volume: 29 start-page: 5251 year: 2019 end-page: 5273 ident: b15 article-title: Guaranteed cost finite-time control for semi-Markov jump systems with event-triggered scheme and quantization input publication-title: Internat J Robust Nonlinear Control – year: 2021 ident: b13 article-title: Event-triggered fuzzy filtering for nonlinear networked systems with dynamic quantization and stochastic cyber attacks publication-title: ISA Trans – year: 2021 ident: b14 article-title: Adaptive second-order sliding mode control: A Lyapunov approach publication-title: IEEE Trans Automat Control – volume: 104 start-page: 84 year: 2020 end-page: 92 ident: b34 article-title: Guaranteed cost control of hybrid-triggered networked systems with stochastic cyber-attacks publication-title: ISA Trans – volume: 64 start-page: 5191 year: 2019 end-page: 5198 ident: b43 article-title: Moving horizon estimation for networked time-delay systems under round-robin protocol publication-title: IEEE Trans Automat Control – volume: 64 start-page: 2174 year: 2019 end-page: 2181 ident: b25 article-title: On publication-title: IEEE Trans Automat Control – volume: 350 start-page: 2013 year: 2013 end-page: 2027 ident: b27 article-title: Stability analysis of networked control systems with round-robin scheduling and packet dropouts publication-title: J Franklin Inst – volume: 49 start-page: 2372 year: 2019 end-page: 2384 ident: b41 article-title: Neural-network-based output-feedback control under round-robin scheduling protocols publication-title: IEEE Trans Cybern – volume: 30 start-page: 8485 year: 2020 end-page: 8502 ident: b11 article-title: Observer-based tracking control for constrained nonlinear systems with mismatching disturbances and its application publication-title: Internat J Robust Nonlinear Control – year: 2021 ident: b24 article-title: Observer-based sliding mode control for networked fuzzy singularly perturbed systems under weighted try-once-discard protocol publication-title: IEEE Trans Fuzzy Syst – volume: 63 start-page: 4461 year: 2016 end-page: 4471 ident: b29 article-title: Quantized control under round-robin communication protocol publication-title: IEEE Trans Ind Electron – volume: 49 start-page: 2005 year: 2019 end-page: 2015 ident: b40 article-title: Quantized fuzzy output feedback publication-title: IEEE Trans Syst Man Cybern – volume: 50 start-page: 2665 year: 2014 end-page: 2671 ident: b17 article-title: Control strategy with adaptive quantizer’s parameters under digital communication channels publication-title: Automatica – volume: 18 start-page: 1226 year: 2010 end-page: 1232 ident: b2 article-title: Guaranteed cost control for networked control systems based on an improved predictive control method publication-title: IEEE Trans Control Syst Technol – volume: 12 start-page: 236 year: 2004 end-page: 249 ident: b6 article-title: Delay-dependent guaranteed cost control for T-S fuzzy systems with time delays publication-title: IEEE Trans Fuzzy Syst – volume: 50 start-page: 4972 year: 2020 end-page: 4982 ident: b23 article-title: Sliding-mode control of T-S fuzzy systems under weighted try-once-discard protocol publication-title: IEEE Trans Cybern – volume: 50 start-page: 3571 year: 2020 end-page: 3580 ident: b37 article-title: Distributed secure filtering for discrete-time systems under round-robin protocol and deception attacks publication-title: IEEE Trans Cybern – volume: 55 start-page: 761 year: 2010 end-page: 766 ident: b16 article-title: Input and output quantized feedback linear systems publication-title: IEEE Trans Automat Control – volume: 30 start-page: 6720 year: 2020 end-page: 6743 ident: b18 article-title: Nonfragile fault-tolerant control of suspension systems subject to input quantization and actuator fault publication-title: Internat J Robust Nonlinear Control – year: 2021 ident: b35 article-title: Ultimate boundedness control for networked singularly perturbed systems with deception attacks: A Markovian communication protocol approach publication-title: IEEE Trans Netw Sci Eng – volume: 30 start-page: 7307 issue: 17 year: 2020 ident: 10.1016/j.isatra.2022.03.012_b26 article-title: Dynamic output feedback sliding mode control for Markovian jump systems under stochastic communication protocol and its application publication-title: Internat J Robust Nonlinear Control doi: 10.1002/rnc.5172 – volume: 350 start-page: 2013 issue: 8 year: 2013 ident: 10.1016/j.isatra.2022.03.012_b27 article-title: Stability analysis of networked control systems with round-robin scheduling and packet dropouts publication-title: J Franklin Inst doi: 10.1016/j.jfranklin.2013.05.024 – volume: 49 start-page: 2005 issue: 10 year: 2019 ident: 10.1016/j.isatra.2022.03.012_b40 article-title: Quantized fuzzy output feedback H∞ control for nonlinear systems with adjustment of dynamic parameters publication-title: IEEE Trans Syst Man Cybern doi: 10.1109/TSMC.2018.2867213 – volume: 62 start-page: 6582 issue: 12 year: 2017 ident: 10.1016/j.isatra.2022.03.012_b22 article-title: Ultimate boundedness control for networked systems with try-once-discard protocol and uniform quantization effects publication-title: IEEE Trans Automat Control doi: 10.1109/TAC.2017.2713353 – volume: 9 start-page: 403 issue: 1 year: 2013 ident: 10.1016/j.isatra.2022.03.012_b3 article-title: Network-induced constraints in networked control systems–A survey publication-title: IEEE Trans Ind Inform doi: 10.1109/TII.2012.2219540 – volume: 50 start-page: 2665 issue: 10 year: 2014 ident: 10.1016/j.isatra.2022.03.012_b17 article-title: Control strategy with adaptive quantizer’s parameters under digital communication channels publication-title: Automatica doi: 10.1016/j.automatica.2014.08.032 – volume: 48 start-page: 336 issue: 1 year: 2018 ident: 10.1016/j.isatra.2022.03.012_b28 article-title: Finite-time distributed state estimation over sensor networks with round-robin protocol and fading channels publication-title: IEEE Trans Cybern doi: 10.1109/TCYB.2016.2635122 – volume: 50 start-page: 4972 issue: 12 year: 2020 ident: 10.1016/j.isatra.2022.03.012_b23 article-title: Sliding-mode control of T-S fuzzy systems under weighted try-once-discard protocol publication-title: IEEE Trans Cybern doi: 10.1109/TCYB.2019.2941870 – volume: 48 start-page: 2426 issue: 8 year: 2018 ident: 10.1016/j.isatra.2022.03.012_b5 article-title: Asynchronous dissipative control for fuzzy Markov jump systems publication-title: IEEE Trans Cybern doi: 10.1109/TCYB.2017.2739754 – volume: 31 start-page: 1817 issue: 6 year: 2021 ident: 10.1016/j.isatra.2022.03.012_b32 article-title: A data-based private learning framework for enhanced security against replay attacks in cyber–physical systems publication-title: Internat J Robust Nonlinear Control doi: 10.1002/rnc.5040 – volume: 420 start-page: 96 year: 2017 ident: 10.1016/j.isatra.2022.03.012_b9 article-title: Event-triggered secure observer-based control for cyber–physical systems under adversarial attacks publication-title: Inf Sci doi: 10.1016/j.ins.2017.08.057 – volume: 49 start-page: 2372 issue: 6 year: 2019 ident: 10.1016/j.isatra.2022.03.012_b41 article-title: Neural-network-based output-feedback control under round-robin scheduling protocols publication-title: IEEE Trans Cybern doi: 10.1109/TCYB.2018.2827037 – year: 2021 ident: 10.1016/j.isatra.2022.03.012_b24 article-title: Observer-based sliding mode control for networked fuzzy singularly perturbed systems under weighted try-once-discard protocol publication-title: IEEE Trans Fuzzy Syst – volume: 18 start-page: 1226 issue: 5 year: 2010 ident: 10.1016/j.isatra.2022.03.012_b2 article-title: Guaranteed cost control for networked control systems based on an improved predictive control method publication-title: IEEE Trans Control Syst Technol doi: 10.1109/TCST.2009.2035611 – volume: 12 start-page: 236 issue: 2 year: 2004 ident: 10.1016/j.isatra.2022.03.012_b6 article-title: Delay-dependent guaranteed cost control for T-S fuzzy systems with time delays publication-title: IEEE Trans Fuzzy Syst doi: 10.1109/TFUZZ.2004.825085 – volume: 74 start-page: 341 year: 2016 ident: 10.1016/j.isatra.2022.03.012_b20 article-title: Set-membership filtering for time-varying systems with mixed time-delays under round-robin and weighted try-once-discard protocols publication-title: Automatica doi: 10.1016/j.automatica.2016.07.025 – volume: 64 start-page: 5191 issue: 12 year: 2019 ident: 10.1016/j.isatra.2022.03.012_b43 article-title: Moving horizon estimation for networked time-delay systems under round-robin protocol publication-title: IEEE Trans Automat Control doi: 10.1109/TAC.2019.2910167 – volume: 439–440 start-page: 95 year: 2018 ident: 10.1016/j.isatra.2022.03.012_b31 article-title: Distributed consensus control for multi-agent systems under denial-of-service publication-title: Inf Sci doi: 10.1016/j.ins.2018.02.008 – volume: 50 start-page: 3571 issue: 8 year: 2020 ident: 10.1016/j.isatra.2022.03.012_b37 article-title: Distributed secure filtering for discrete-time systems under round-robin protocol and deception attacks publication-title: IEEE Trans Cybern doi: 10.1109/TCYB.2019.2897366 – volume: 27 start-page: 679 issue: 4 year: 2007 ident: 10.1016/j.isatra.2022.03.012_b8 article-title: Event-triggered H∞ control for a class of nonlinear networked control systems using novel integral inequalities publication-title: Internat J Robust Nonlinear Control doi: 10.1002/rnc.3598 – volume: 66 start-page: 376 year: 2017 ident: 10.1016/j.isatra.2022.03.012_b4 article-title: Analysis and synthesis of networked control systems: A survey of recent advances and challenges publication-title: ISA Trans doi: 10.1016/j.isatra.2016.09.026 – volume: 30 start-page: 8485 issue: 18 year: 2020 ident: 10.1016/j.isatra.2022.03.012_b11 article-title: Observer-based tracking control for constrained nonlinear systems with mismatching disturbances and its application publication-title: Internat J Robust Nonlinear Control doi: 10.1002/rnc.5251 – volume: 48 start-page: 779 issue: 5 year: 2018 ident: 10.1016/j.isatra.2022.03.012_b36 article-title: Security control for discrete-time stochastic nonlinear systems subject to deception attacks publication-title: IEEE Trans Syst Man Cybern doi: 10.1109/TSMC.2016.2616544 – year: 2021 ident: 10.1016/j.isatra.2022.03.012_b35 article-title: Ultimate boundedness control for networked singularly perturbed systems with deception attacks: A Markovian communication protocol approach publication-title: IEEE Trans Netw Sci Eng – volume: 49 start-page: 1292 issue: 4 year: 2019 ident: 10.1016/j.isatra.2022.03.012_b30 article-title: Generalized state estimation for markovian coupled networks under round-robin protocol and redundant channels publication-title: IEEE Trans Cybern doi: 10.1109/TCYB.2018.2799929 – volume: 41 start-page: 999 issue: 6 year: 2005 ident: 10.1016/j.isatra.2022.03.012_b1 article-title: Network-based robust H∞ control of systems with uncertainty publication-title: Automatica doi: 10.1016/j.automatica.2004.12.011 – volume: 54 start-page: 1668 issue: 7 year: 2009 ident: 10.1016/j.isatra.2022.03.012_b7 article-title: Output feedback stabilization of networked control systems with random delays modeled by Markov chains publication-title: IEEE Trans Automat Control doi: 10.1109/TAC.2009.2020638 – volume: 65 start-page: 3714 issue: 8 year: 2020 ident: 10.1016/j.isatra.2022.03.012_b12 article-title: Observer-based control for cyber–physical systems with periodic DoS attacks via a cyclic switching strategy publication-title: IEEE Trans Automat Control doi: 10.1109/TAC.2019.2953210 – volume: 64 start-page: 2174 issue: 5 year: 2019 ident: 10.1016/j.isatra.2022.03.012_b25 article-title: On H∞ sliding mode control under stochastic communication protocol publication-title: IEEE Trans Automat Control doi: 10.1109/TAC.2018.2867340 – volume: 273 start-page: 87 year: 2015 ident: 10.1016/j.isatra.2022.03.012_b39 article-title: Robust static output feedback H∞ control for uncertain fuzzy systems publication-title: Fuzzy Sets Syst doi: 10.1016/j.fss.2014.10.023 – volume: 357 start-page: 9834 issue: 14 year: 2020 ident: 10.1016/j.isatra.2022.03.012_b38 article-title: Event-triggered interval type-2 T-S fuzzy control for nonlinear networked systems publication-title: J Franklin Inst doi: 10.1016/j.jfranklin.2020.08.001 – volume: 69 start-page: 103 year: 2014 ident: 10.1016/j.isatra.2022.03.012_b21 article-title: A round-robin type protocol for distributed estimation with H∞ consensus publication-title: Syst Control Lett doi: 10.1016/j.sysconle.2014.05.001 – volume: 104 start-page: 84 year: 2020 ident: 10.1016/j.isatra.2022.03.012_b34 article-title: Guaranteed cost control of hybrid-triggered networked systems with stochastic cyber-attacks publication-title: ISA Trans doi: 10.1016/j.isatra.2019.04.017 – volume: 16 start-page: 319 issue: 1 year: 2020 ident: 10.1016/j.isatra.2022.03.012_b10 article-title: Robust guaranteed cost control under digital communication channels publication-title: IEEE Trans Ind Inform doi: 10.1109/TII.2019.2916146 – volume: 30 start-page: 6720 issue: 16 year: 2020 ident: 10.1016/j.isatra.2022.03.012_b18 article-title: Nonfragile fault-tolerant control of suspension systems subject to input quantization and actuator fault publication-title: Internat J Robust Nonlinear Control doi: 10.1002/rnc.5135 – year: 2021 ident: 10.1016/j.isatra.2022.03.012_b14 article-title: Adaptive second-order sliding mode control: A Lyapunov approach publication-title: IEEE Trans Automat Control – volume: 50 start-page: 1952 issue: 5 year: 2020 ident: 10.1016/j.isatra.2022.03.012_b42 article-title: Observer-based event-triggered control for networked linear systems subject to denial-of-service attacks publication-title: IEEE Trans Cybern doi: 10.1109/TCYB.2019.2903817 – year: 2021 ident: 10.1016/j.isatra.2022.03.012_b13 article-title: Event-triggered fuzzy filtering for nonlinear networked systems with dynamic quantization and stochastic cyber attacks publication-title: ISA Trans – volume: 55 start-page: 761 issue: 3 year: 2010 ident: 10.1016/j.isatra.2022.03.012_b16 article-title: Input and output quantized feedback linear systems publication-title: IEEE Trans Automat Control doi: 10.1109/TAC.2010.2040497 – volume: 63 start-page: 4461 issue: 7 year: 2016 ident: 10.1016/j.isatra.2022.03.012_b29 article-title: Quantized control under round-robin communication protocol publication-title: IEEE Trans Ind Electron doi: 10.1109/TIE.2016.2539259 – volume: 29 start-page: 5251 issue: 15 year: 2019 ident: 10.1016/j.isatra.2022.03.012_b15 article-title: Guaranteed cost finite-time control for semi-Markov jump systems with event-triggered scheme and quantization input publication-title: Internat J Robust Nonlinear Control doi: 10.1002/rnc.4672 – volume: 352 start-page: 3476 issue: 9 year: 2015 ident: 10.1016/j.isatra.2022.03.012_b19 article-title: Distributed event-triggered control for consensus of multi-agent systems publication-title: J Franklin Inst doi: 10.1016/j.jfranklin.2015.05.035 – volume: 109 year: 2019 ident: 10.1016/j.isatra.2022.03.012_b33 article-title: Distributed krein space-based attack detection over sensor networks under deception attacks publication-title: Automatica doi: 10.1016/j.automatica.2019.108557  | 
    
| SSID | ssj0002598 | 
    
| Score | 2.4012132 | 
    
| Snippet | This paper is concerned with the security control problem for the nonlinear systems with the effects of quantization, communication protocol and deception... | 
    
| SourceID | proquest pubmed crossref elsevier  | 
    
| SourceType | Aggregation Database Index Database Enrichment Source Publisher  | 
    
| StartPage | 25 | 
    
| SubjectTerms | Deception attacks Protocol Quantization Security control T–S fuzzy model  | 
    
| Title | Security control for nonlinear systems under quantization and Round-Robin protocol subject to deception attacks | 
    
| URI | https://dx.doi.org/10.1016/j.isatra.2022.03.012 https://www.ncbi.nlm.nih.gov/pubmed/35346484 https://www.proquest.com/docview/2644937820  | 
    
| Volume | 130 | 
    
| hasFullText | 1 | 
    
| inHoldings | 1 | 
    
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Baden-Württemberg Complete Freedom Collection (Elsevier) customDbUrl: eissn: 1879-2022 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0002598 issn: 0019-0578 databaseCode: GBLVA dateStart: 20110101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVESC databaseName: Elsevier ScienceDirect customDbUrl: eissn: 1879-2022 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0002598 issn: 0019-0578 databaseCode: .~1 dateStart: 19950101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVESC databaseName: Elsevier SD Complete Freedom Collection [SCCMFC] customDbUrl: eissn: 1879-2022 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0002598 issn: 0019-0578 databaseCode: ACRLP dateStart: 19950301 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVESC databaseName: ScienceDirect Freedom Collection Journals customDbUrl: eissn: 1879-2022 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0002598 issn: 0019-0578 databaseCode: AIKHN dateStart: 19950301 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVLSH databaseName: Elsevier Journals customDbUrl: mediaType: online eissn: 1879-2022 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0002598 issn: 0019-0578 databaseCode: AKRWK dateStart: 19890101 isFulltext: true providerName: Library Specific Holdings  | 
    
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1La9wwEB5CekkPpXm03aYNKvSQHtSsJfmhY1gatq9Qkgb2JiRLgoSym-56r_ntnZHlpDmEQE7GRsJCM56HNd83AB8D6qxz5Zj7Ko65cqXm2qMxxFwj6jraICoCJ_88raYX6tusnG3AZMDCUFlltv29TU_WOj85yrt5dH15SRhfdGbExi7SgcGMEOyqpi4Gn2_uyjwwvM_WWHMaPcDnUo0XVcwsiX1IiER1WoiH3NND4WdyQycv4UWOH9lxv8Rt2AjzHXj-H6vgDmzn73XFDjOp9KddWJznRnUsF6czjFbZvCfKsEvWMzqvGGHKluzvGjc8IzSZnXt2Rt2XeAKLMaJ2WKD-sNXa0V8c1i2YD7k8htmuI9j-HlycfPk9mfLcbIG3QouOSydjW3jZWKeELaVVMcpQKCfqOhCLXFum9CZaHXUMTaw05mbCuRgSp5t8BZu46PAGGM70mCV510ShrGusd3XhhWwbP3a6sCOQwx6bNjORU0OMP2YoObsyvWQMScaMpUHJjIDfzrrumTgeGV8P4jP3NMqgs3hk5odB2gY_NjpBsfOwWK8MRY8Yz2HUNILXvRrcrkWWUlWqUW-f_N592KK7Hun4Dja75Tq8x5CncwdJpw_g2fHk7Mcvun79Pj39B8D0BGw | 
    
| linkProvider | Elsevier | 
    
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT9wwEB5Remg5VEBbWPpypR7ag8vGdrLxsUKgbQsceEh7s-zYlkBoF3azV347M45DywEhcU1sxZoZzyOe7zPAt4A261w55L6KQ65cqbn26Ayx1oh6FG0QFYGTj46r8bn6MyknK7DXY2GorTL7_s6nJ2-dn-xmae5eX1wQxheDGbGxi3RgMHkBL1UpRlSB_bz91-eB-X12x5rT8B4_l5q8qGVmTvRDQiSu00I8Fp8eyz9THDpYhzc5gWS_ujVuwEqYbsLaf7SCm7CRN-yCfc-s0j_ewuw031THcnc6w3SVTTumDDtnHaXzghGobM5ulijxDNFkdurZCV2_xBNajBG3wwwNiC2Wjn7jsHbGfMj9Mcy2LeH238H5wf7Z3pjn2xZ4I7RouXQyNoWXtXVK2FJaFaMMhXIo0kA0ck2Z6ptoddQx1LHSWJwJ52JIpG7yPaziosM2MJzpsUzyro5CWVdb70aFF7Kp_dDpwg5A9jI2TaYipxsxrkzfc3ZpOs0Y0owZSoOaGQC_n3XdUXE8MX7Uq888MCmD0eKJmV97bRvcbXSEYqdhtlwYSh8xocO0aQBbnRncr0WWUlWqVjvP_u4XeDU-Ozo0h7-P_36A1_Smgz1-hNV2vgyfMP9p3edk33ePaQRs | 
    
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Security+control+for+nonlinear+systems+under+quantization+and+Round-Robin+protocol+subject+to+deception+attacks&rft.jtitle=ISA+transactions&rft.au=Wu%2C+Bo&rft.au=Chang%2C+Xiao-Heng&rft.date=2022-11-01&rft.issn=1879-2022&rft.eissn=1879-2022&rft.volume=130&rft.spage=25&rft_id=info:doi/10.1016%2Fj.isatra.2022.03.012&rft.externalDBID=NO_FULL_TEXT | 
    
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0019-0578&client=summon | 
    
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0019-0578&client=summon | 
    
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0019-0578&client=summon |