亚洲免费av电影一区二区三区,日韩爱爱视频,51精品视频一区二区三区,91视频爱爱,日韩欧美在线播放视频,中文字幕少妇AV,亚洲电影中文字幕,久久久久亚洲av成人网址,久久综合视频网站,国产在线不卡免费播放

        ?

        Security control of Markovian jump neural networks with stochastic sampling subject to false data injection attacks★

        2023-10-11 08:35:22LanYaoXiaHuangZhenWangandMinXiao
        Communications in Theoretical Physics 2023年10期

        Lan Yao,Xia Huang,Zhen Wang and Min Xiao

        1 College of Electrical Engineering and Automation,Shandong University of Science and Technology,Qingdao 266590,China

        2 College of Automation,Nanjing University of Posts and Telecommunications,Nanjing 210003,China

        Abstract The security control of Markovian jumping neural networks(MJNNs)is investigated under false data injection attacks that take place in the shared communication network.Stochastic sampleddata control is employed to research the exponential synchronization of MJNNs under false data injection attacks (FDIAs) since it can alleviate the impact of the FDIAs on the performance of the system by adjusting the sampling periods.A multi-delay error system model is established through the input-delay approach.To reduce the conservatism of the results,a sampling-periodprobability-dependent looped Lyapunov functional is constructed.In light of some less conservative integral inequalities,a synchronization criterion is derived,and an algorithm is provided that can be solved for determining the controller gain.Finally,a numerical simulation is presented to confirm the efficiency of the proposed method.

        Keywords: Markovian jumping neural networks,stochastic sampling,looped-functional,false data injection attack

        1.Introduction

        The Markovian jump system (MJS) is a class of special switched systems,that can describe various emergencies that occur in industrial systems.An MJS has multiple working modes and it will switch among these modes based on a Markov chain.Because MJSs can reflect the characteristics of jump among different system modes,which greatly overcomes the limitations of a single system,it has great flexibility in simulating practical engineering systems.MJSs are widely used in satellite systems,image processing,security communications and other fields.Under this background and trend,the study of MJSs has important practical significance and practical value for modeling practical systems with finite modes.In the past decades,many outstanding achievements have been gained [1–3],including stability,synchronization,and filtering.In addition,chaotic synchronous communication is currently a hot research topic internationally [4,5].Markovian jumping neural networks (MJNNs) have broad application prospects in the fields of image encryption and audio encryption by utilizing the chaos synchronization of MJNNs,which has been widely discussed in [6–10].

        With the ongoing advancements in digital control technology,sampled-data control (SDC) has gained extensive development in [9–14],which can effectively solve the problem of data redundancy.However,due to the openness of communication networks,SDC systems are vulnerable to malicious cyber attacks [15–17],which may degrade the system performance or even compromise the stability of the SDC system.Therefore,the security control problem of SDC systems has been widely discussed by researchers.There are many types of cyber attacks,mainly including deception attacks [18–21],DoS attacks [22],and false data injection attacks(FDIA)[23–25].Therein,FDIA,as a common type of attack,can destroy the integrity of communication data by sending error information to the receiver,thus causing unpredictable damage to the SDC system.In[23],the security problem for the state estimation of the networked control system was discussed by proposing a specific algorithm of generating attacks to estimate the insecurity of the system.In[24],the stability of switched semi-MJSs was investigated under the FDIAs by using a reduced-order sliding mode control.Following this trend,it is a key issue to design appropriate mechanisms to alleviate the impact of attacks,which motivates our present research.

        On the other hand,non-ideal network environments can bring about unpredictable network phenomena,such as time delay and sampling errors,which will inevitably lead to the jitter of the sampling period.To address this problem,the stochastic sampled-data control (SSDC) method has been proposed in [26].SSDC allows the existence of multiple sampling periods with certain occurrence probability,that is,it allows the sampling period to jitter to a certain extent.Therefore,the SSDC can not only adjust the sampling period more flexibly to cope with the sampling error,but also alleviate the impact of cyber attacks on the performance of the controlled system.Hence,SSDC has attracted extensive attention [26–28].Unfortunately,there are few works on the study of security control of MJNNs under FDIA via SSDC,which motivates the research of this article.

        Recently,the looped Lyapunov functional (LLF) technique has been extensively employed for analyzing the stability of SDC systems [29–32].Unlike the traditional Lyapunov functional,LLFs replace the positive definitiveness restriction with a loop condition.That is to say,the LLF relaxes the requirement for the functional to be positively definite in the sampling interval.Therefore,the conservatism of the obtained results can be relaxed by using the LLF method.In addition,LLF has the ability to fully utilize the state information of the sampled data system.However,the construction of LLFs for MJNNs subject to cyber attacks and stochastic sampling is difficult.Hence,the primary objective of this article is to develop an LLF and the corresponding analysis method for exponential synchronization of MJNNs via stochastic sampling.

        Summarizing the aforementioned considerations,the security control of MJNNs under the FDIAs is investigated by using LLF,and the main contributions are threefold:

        (1) To alleviate the impact of FDIA on the performance of the MJNNs,SSDC is developed to investigate the security control of the controlled system;

        (2) The model of the error system with multi-delays is established.Associated with it,a sampling-period-probability-dependent LLF is constructed to reduce the conservatism of the main results.

        (3) A less conservative exponential synchronization criterion and a design algorithm for determining the controller gain are given,respectively.

        Notations:DenotenR be the n-dimensional Euclidean space.Let* and In(0n) be the symmetric entries in a symmetric matrix and n-dimension identity (zero) matrix,respectively.QT,Q-1,Sym{Q} and Q>0 denote the transpose,inverse of matrix Q,Q+QTand the symmetric and positive definite matrix,respectively.diag{…} and col{·}denote the diagonal matrix and column vector.Prob{X} and E {·}denote the probability and the mathematical expectation of event,respectively.λmin(λmax)and max {m,n}refer to the maximum (minimum) eigenvalue and the largest value of m and n,respectively.(Ω,F,P) represents the complete probability space.

        2.Problem description

        The schematic diagram of the security control of MJNNs under FDIAs occurred in the communication network channel is shown in figure 1.In figure 1,the sensor transmits the sampled data by stochastic sampling.

        In figure 1,the time-varying delayed master-slave MJNNs can be described as:

        Let r(t)=s(t)-m(t) be the state error of the master and slave system,then the corresponding error system can be represented as:

        where ?(r(t))=χ(s(t))-χ(m(t)),?(r(t-τ(t)))=χ(s(t-τ(t)))-χ(m(t-τ(t))) and

        Represent the set of sampling instants as{tk}k?N.For t ?[tk,tk+1),the SSDC-based controller is designed:

        where K represents the gain matrix of the controller that requires designing later.

        Thus,the occurrence probability of the event hj-1≤d(t)

        To quantify the above events,for j=1,…,m,total 2m random variables satisfying Bernoulli distribution introduce:

        Then,we can calculate that

        Because the FDIAs occurred in the network channel randomly,the random attack can be described by introducing the random variable α(t):

        In addition,due to the attack signal g(t) is limited by the attack energy,Assumption 2 is needed.

        Assumption 2.For g(t),suppose there exists constant matrix G satisfying

        Then,the signal transmitted to the controller can be rewritten:

        Thus,the control input under the FDIAs is expressed as

        Combining (2) with (5),the closed-loop system (2) can be represented:

        Remark 1.Note that different from the deterministic SDC,SSDC has multiple sampling periods,which can reflect the inherent characteristics of the sampling error.Hence,the SSDC system can not only ensure the system achieves the desired performance in a nonideal environment,but also reduce the redundancy of communication transmission.In light of the characteristics of SSDC,the position of dj(t) can be described by introducing a series of random variablesγ j(t),which follow the Bernoulli distribution.

        Remark 2.In an unsatisfactory network environment,attackers tamper with the transmission data by launching FDIAs to destroy system performance.In view of the randomness of the cyber attack,the data transmitted to the controller can be given byε(t) with random variableα(t).Under the FDIAs,SSDC can alleviate the impact of the attacks on the performance of the controlled system by adjusting the occurrence probability of the sampling periods.

        3.Main results

        For simplicity,The following symbols will be utilized:

        Proof.The time-dependent LLF is constructed as follows:

        For V4(t) and V5(t),through analyzing the characteristic of (tk+1-t)-terms,V4(t) and V5(t) can be expressed with multi-delays as

        Calculating LV j(t) (j=1,2,…,5) along the trajectories of the error system (6),we have

        For V2(t),we have

        Combining with the less-conservative integral inequality[32],we have

        Then,combining the above inequality,we have

        Combining with the Jensen?s inequality and the reciprocally convex inequality [34],the second integral term inLV3(t) is estimated:

        where φ(t)=col{r(t-τ1)-r(t-τ(t)),r(t-τ(t))-r(t-τ2)}.

        Thus,LV3(t) can be estimated as

        For the activation function ?j(·),the following two inequalities hold:

        this means that for Λ1>0 and Λ2>0,the two inequalities hold:

        The inequalities (13) and (14) are equivalent to

        Additionally,combining with the error system (6),for matrices M1,M2,the following equation holds:

        Then,for t ?[tk,tk+1),i? R,combining inequalities(10)–(17),we obtain that

        Integrating the error system (6) from tkto t,we have

        Thus,combining with the Gronwall-Bellman inequality[36],we can conclude

        Furthermore,based on the inequalities (13)–(14),we obtain

        From the inequality given above,we can conclude

        Hence,the master-slave MJNNs (1) achieve exponential synchronization via controller (5) under FDIAs.That completes the proof.

        Remark 3.In this paper,the time-dependent loopedfunctionalW(t) is constructed.FromW(t),we can easily see that the positive definiteness of the functional matricesUj,Vj,Xjare not required.That is,W(t) relaxes the positive definite constraint ofW(t) in the sampling interval,and only requires its positive definiteness at the sampling instants{tk},it contributes to relaxing the conservativeness of the stability conditions and to increasing the maximum allowable bound of the sampling intervals.

        Fig. 2.(a) The time response of r(t) and ε(t);(b) Markov jumping mode;(c) the control input;(d) the attack signal g(x(t)) and α(t).

        Table 1.The maximum value of h2 for different h1 with β1=0.6,β2=0.4,δ=0.5.

        Remark 4.Significantly,theβ j(t)-dependent LLFW(t)contains the information of occurrence probabilityβjfor different sampling periods,thus,the derived synchronization conditions areβj-dependent.When facing cyber attacks,we can adjustβjto obtain an appropriate control gain K.

        4.Numerical example

        Consider the system parameters of a MJNN proposed in[6]as follows: C1=diag{1,0.9},C2=diag{1,1},π12=0.5,

        Table 2.The maximum value of h2 for different β1 with δ=0.1,h1=0.1.

        Table 1 gives the maximum bound of h2for different h1and α with β1=0.6,β2=0.4,δ=0.5.From table 1,it is easy to see that the maximum value of h2becomes larger gradually with the decrease of h1.In addition,when h1is fixed,with the increase of the attack probability α,the maximum value of h2is smaller.Table 2 provides the maximum value of h2for different β1when h1and α are fixed.It is easy to see from table 2 that the maximum value of h2becomes smaller gradually with the decrease of β1.

        Specify the values of the parameters in theorem 2 as α=0.4,δ=0.1,β1=0.6,h1=0.1,h2=0.2,λ=0.3.The solution that satisfy the LMIs (23) of matrix K is solved via MATLAB LMI Toolbox as:

        By using the parameters mentioned above,the time response of the error system state r(t)and the transmitted data ε(t),the control input and the FDIA signal g(x(t)) with occurrence probability α(t) are demonstrated in figure 2.From figure 2(a),we can see that system (1) can reach exponentially synchronized by the SSDC (2),which demonstrates the effectiveness of the designed controller in mitigating the FDIAs.

        5.Conclusions

        The security control of master-slave MJNNs has been investigated via SSDC and LLF subject to FDIAs in this paper.SSDC can not only solve the problem of data redundancy,but also mitigate the impact of FDIAs on the system performance.An error system model is established with multi input-delays.Then,a βj(t)-dependent LLF is constructed to reduce the conservativeness of the synchronization condition(i.e.theorem 1).On this basis,an easy-to-solve design algorithm for SSDC is given (i.e.theorem 2).Finally,through a numerical example,it is verified that SSDC can realize the exponential synchronization of MJNNs under FDIAs,and this SSDC synchronization method has been applied to image encryption and decryption successfully.

        ORCID iDs

        久久久久久久综合日本| 丝袜美腿在线观看一区| 国产亚洲成性色av人片在线观| 久久精品国产亚洲av麻豆色欲| 亚洲国产欧美日韩欧美特级| 把插八插露脸对白内射| 国产精品熟妇视频国产偷人| 国产乱色国产精品免费视频| 国产精品亚洲综合色区丝瓜| 亚洲中文高清乱码av中文| 国产三级不卡一区不卡二区在线| 国产黄色av一区二区三区| 中文字幕乱码高清完整版| 亚洲av无码精品蜜桃| 国产一区二区三区av在线无码观看 | 一区二区三区中文字幕在线播放| 久久久久人妻精品一区二区三区 | 欧美成人小视频| 国产情侣一区在线| 国产精品亚洲综合色区丝瓜| 少妇隔壁人妻中文字幕| 日本一级二级三级不卡| 国产亚洲视频在线播放| 亚洲精品tv久久久久久久久久| 久久婷婷成人综合色| 日韩二三区| 亚洲情精品中文字幕有码在线| 开心五月激情五月天天五月五月天| 久久久国产精品123| 奇米影视第四色首页| 日韩精品中文字幕无码一区| 欧美日韩精品乱国产538| 精品久久久久久99人妻| 亚洲永久精品日韩成人av| 亚洲国产精品美女久久| 国产激情视频一区二区三区| 特级毛片a级毛片在线播放www| 伊人久久一区二区三区无码| 久久精品国产久精国产69| 国产午夜福利在线观看中文字幕| 亚洲中文字幕人妻av在线|