Networked Security Observer-Based Reference Tracking Control of Stochastic Quadrotor UAV System Under Cyber-Attack:T-S Fuzzy Approach
In this study, a robust <inline-formula> <tex-math notation="LaTeX">$H_{\infty }$ </tex-math></inline-formula> networked security observer-based reference tracking control scheme is proposed for the stochastic quadrotor unmanned aerial vehicle (UAV) system under mal...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2022-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9732354/ |
_version_ | 1818775347436453888 |
---|---|
author | Min-Yen Lee Han Chiu Bor-Sen Chen |
author_facet | Min-Yen Lee Han Chiu Bor-Sen Chen |
author_sort | Min-Yen Lee |
collection | DOAJ |
description | In this study, a robust <inline-formula> <tex-math notation="LaTeX">$H_{\infty }$ </tex-math></inline-formula> networked security observer-based reference tracking control scheme is proposed for the stochastic quadrotor unmanned aerial vehicle (UAV) system under malicious attacks on the actuator and sensor of network control system (NCS). To reduce the computational burden on UAV system, the UAV system is connected with a remote computing unit and the complicated tracking control command can be calculated by remote computing unit. By using the novel discrete smoothed model, the model of attack signals on actuator and sensor can be embedded in system state of UAV and thus the attack signals as well as the quadrotor system state can be simultaneously estimated through a conventional Luenberger observer. Further, the corruption of attack signals on state estimation of UAV is also avoided. To eliminate the effect of unavailable external disturbance and intrinsic fluctuation during the reference tracking control process, a robust <inline-formula> <tex-math notation="LaTeX">$H_{\infty }$ </tex-math></inline-formula> networked security observer-based reference tracking control scheme is introduced to attenuate their effects on the NCS of quadrotor UAV. By using the characteristic of convex Lyapunov function, the design condition of robust <inline-formula> <tex-math notation="LaTeX">$H_{\infty }$ </tex-math></inline-formula> networked security observer-based tracking control is derived in terms of the nonlinear functional inequalities. Since the nonlinear functional inequalities are not easy to be solved analytically or numerically, the Takagi-Sugeno (T-S) fuzzy interpolation technique is employed to interpolate the nonlinear stochastic quadrotor NCS by a set of linear local systems via fuzzy bases. In this case, the nonlinear functional inequalities can be converted to a set of linear matrix inequalities (LMIs) which can be easily solved by the MATLAB LMI TOOLBOX. Simulation results are provided to validate the effectiveness of the proposed method in comparison with conventional robust observer-based T-S fuzzy tracking control scheme. |
first_indexed | 2024-12-18T10:55:36Z |
format | Article |
id | doaj.art-4ccf08828dde4f80983aadc660784702 |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-12-18T10:55:36Z |
publishDate | 2022-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-4ccf08828dde4f80983aadc6607847022022-12-21T21:10:21ZengIEEEIEEE Access2169-35362022-01-0110302963032210.1109/ACCESS.2022.31583459732354Networked Security Observer-Based Reference Tracking Control of Stochastic Quadrotor UAV System Under Cyber-Attack:T-S Fuzzy ApproachMin-Yen Lee0https://orcid.org/0000-0002-0391-257XHan Chiu1https://orcid.org/0000-0002-3639-7666Bor-Sen Chen2https://orcid.org/0000-0003-1644-6106Department of Electrical Engineering, National Tsing Hua University, Hsinchu, TaiwanMediaTek Inc. (Headquarters), Hsinchu, TaiwanDepartment of Electrical Engineering, National Tsing Hua University, Hsinchu, TaiwanIn this study, a robust <inline-formula> <tex-math notation="LaTeX">$H_{\infty }$ </tex-math></inline-formula> networked security observer-based reference tracking control scheme is proposed for the stochastic quadrotor unmanned aerial vehicle (UAV) system under malicious attacks on the actuator and sensor of network control system (NCS). To reduce the computational burden on UAV system, the UAV system is connected with a remote computing unit and the complicated tracking control command can be calculated by remote computing unit. By using the novel discrete smoothed model, the model of attack signals on actuator and sensor can be embedded in system state of UAV and thus the attack signals as well as the quadrotor system state can be simultaneously estimated through a conventional Luenberger observer. Further, the corruption of attack signals on state estimation of UAV is also avoided. To eliminate the effect of unavailable external disturbance and intrinsic fluctuation during the reference tracking control process, a robust <inline-formula> <tex-math notation="LaTeX">$H_{\infty }$ </tex-math></inline-formula> networked security observer-based reference tracking control scheme is introduced to attenuate their effects on the NCS of quadrotor UAV. By using the characteristic of convex Lyapunov function, the design condition of robust <inline-formula> <tex-math notation="LaTeX">$H_{\infty }$ </tex-math></inline-formula> networked security observer-based tracking control is derived in terms of the nonlinear functional inequalities. Since the nonlinear functional inequalities are not easy to be solved analytically or numerically, the Takagi-Sugeno (T-S) fuzzy interpolation technique is employed to interpolate the nonlinear stochastic quadrotor NCS by a set of linear local systems via fuzzy bases. In this case, the nonlinear functional inequalities can be converted to a set of linear matrix inequalities (LMIs) which can be easily solved by the MATLAB LMI TOOLBOX. Simulation results are provided to validate the effectiveness of the proposed method in comparison with conventional robust observer-based T-S fuzzy tracking control scheme.https://ieeexplore.ieee.org/document/9732354/Network control systemsecurity observer-based tracking controllinear matrix inequalitiesUAV reference tracking controlT-S fuzzy interpolation technique |
spellingShingle | Min-Yen Lee Han Chiu Bor-Sen Chen Networked Security Observer-Based Reference Tracking Control of Stochastic Quadrotor UAV System Under Cyber-Attack:T-S Fuzzy Approach IEEE Access Network control system security observer-based tracking control linear matrix inequalities UAV reference tracking control T-S fuzzy interpolation technique |
title | Networked Security Observer-Based Reference Tracking Control of Stochastic Quadrotor UAV System Under Cyber-Attack:T-S Fuzzy Approach |
title_full | Networked Security Observer-Based Reference Tracking Control of Stochastic Quadrotor UAV System Under Cyber-Attack:T-S Fuzzy Approach |
title_fullStr | Networked Security Observer-Based Reference Tracking Control of Stochastic Quadrotor UAV System Under Cyber-Attack:T-S Fuzzy Approach |
title_full_unstemmed | Networked Security Observer-Based Reference Tracking Control of Stochastic Quadrotor UAV System Under Cyber-Attack:T-S Fuzzy Approach |
title_short | Networked Security Observer-Based Reference Tracking Control of Stochastic Quadrotor UAV System Under Cyber-Attack:T-S Fuzzy Approach |
title_sort | networked security observer based reference tracking control of stochastic quadrotor uav system under cyber attack t s fuzzy approach |
topic | Network control system security observer-based tracking control linear matrix inequalities UAV reference tracking control T-S fuzzy interpolation technique |
url | https://ieeexplore.ieee.org/document/9732354/ |
work_keys_str_mv | AT minyenlee networkedsecurityobserverbasedreferencetrackingcontrolofstochasticquadrotoruavsystemundercyberattacktsfuzzyapproach AT hanchiu networkedsecurityobserverbasedreferencetrackingcontrolofstochasticquadrotoruavsystemundercyberattacktsfuzzyapproach AT borsenchen networkedsecurityobserverbasedreferencetrackingcontrolofstochasticquadrotoruavsystemundercyberattacktsfuzzyapproach |