You are on page 1of 12

240 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 29, NO.

2, FEBRUARY 2021

Security Sliding Mode Control of Interval Type-2


Fuzzy Systems Subject to Cyber Attacks: The
Stochastic Communication Protocol Case
Zhina Zhang , Yugang Niu , Zhiru Cao , and Jun Song , Member, IEEE

Abstract—This article addresses the security control problem of and then maintain the state on it for all succeeding time. Taking
a class of interval type-2 fuzzy systems via the sliding mode control the advantages of the SMC approach, fruitful research outcomes
strategy. A stochastic communication scheduling protocol is uti- have been reported for different systems, e.g., linear systems [1],
lized to govern the transmission from the sensors to the controller,
by which only one sensor node has the chance to transmit its value switched systems [2], Markovian systems [3], [4], and so on.
at every instant. Meanwhile, cyber attacks from malicious adver- With the rapid advance of network technologies, a large
saries might be launched in vulnerable communication channels. number of signals (e.g., measurement output, control signal) in
To quantitatively analyze the effect of the stochastic communication feedback control systems are transmitted via shared wireless
protocol and cyber attacks, their mathematical model is first con-
networks. One key issue concerned by many researchers is
structed based on a compensation scheme. Since the scheduling sig-
nal may be unavailable once cyber attacks are activated, a desirable the finite communication capacity. Reducing the quantity of
sliding mode control law is synthesized with token-independent data transmission can effectively relieve the communication
control gains, whose membership functions are mismatched with burden. An effective method is to coordinate data transmissions
those of the fuzzy system. To deal with these mismatched member- according to some protocols, such as the round-robin (RR)
ship functions, the relations between the membership functions of
protocol [5], [6], stochastic communication protocol (SCP) [7],
the system and the control law are reconstructed. Consequently,
the favorable property of perfectly matched memberships could [8], try-once-discard (TOD) protocol [9], and so on. Under these
be employed. Sufficient conditions are derived so that the resultant protocols, only a part of sensor/actuator nodes can gain access
closed-loop interval type-2 fuzzy system is stochastically stable to the network at each transmission instant. For the SCP, which
and, at the same time, the state trajectories can be forced into a was first investigated in [10] for discrete-time systems and in [11]
small domain around the prescribed sliding surface. The proposed
for continuous-time cases, these nodes are allowed to transmit
control design approach is verified by two examples.
their values in random order. To date, some preliminary works
Index Terms—Cyber attack, interval type-2 fuzzy system, sliding have been reported concerning the control [12] and filtering [13]
mode control, stochastic communication protocol. problem based on the SCP scheduling.
Cyber security, another fatal issue, has aroused a noticeable
I. INTRODUCTION research interest, especially on how to guarantee the system
performance under cyber attacks, e.g., denial-of-service (DoS)
LIDING mode control (SMC) has received substantial at-
S tention in the past decades due to its attractive merits, such
as strong robustness, fast response, and so on. The key feature
attacks [2], replay attacks [14], and deception attacks [3], [15],
[16]. Replay attacks imply that useful signal transmission is
viciously repeated or delayed; deception attacks intentionally
of SMC is to utilize a discontinuous control law to drive the modify the data integrity of packets. For DoS attacks, the ad-
system states onto a prescribed sliding surface in finite time, versaries aim to prohibit the data transmission by occupying the
communication resources, such that system performance can be
Manuscript received September 5, 2019; revised December 20, 2019 and
greatly degraded. Up to now, some mathematical models have
January 27, 2020; accepted February 3, 2020. Date of publication February 10, been proposed to quantitatively analyze the performance deteri-
2020; date of current version February 3, 2021. This work was supported by oration, such as the queueing model [17], Bernoulli model [18],
the NNSF under Grants 61803255 and 61673174 from China. (Corresponding
author: Yugang Niu.)
Markov model [19], and so on. In practical applications, the
Zhina Zhang, Zhiru Cao, and Jun Song are with the Key Laboratory sensor/actuator nodes selected by SCP may also suffer from
of Advanced Control and Optimization for Chemical Process, East China stochastic cyber attacks as transmitting signals over an unse-
University of Science and Technology, Ministry of Education, Shanghai
200237, China (e-mail: zhina_zhang506@126.com; zhiru_cao@163.com;
cured communication channel. In such cases, it will be chal-
jun_song@ecust.edu.cn). lenging to model the cyber attacks and the SCP simultaneously
Yugang Niu is with the Key Laboratory of Advanced Control and Optimiza- as well as analyze their influences on control synthesis, which
tion for Chemical Process, East China University of Science and Technology,
Ministry of Education, Shanghai 200237, China, and also with the Shanghai
constitutes the first motivation of this article.
Institute of Intelligent Science and Technology, Tongji University, Shanghai As an effective tool for expressing complicated nonlinear
200092, China (e-mail: acniuyg@ecust.edu.cn). systems, Takagi–Sugeno (T–S) fuzzy technique has been widely
Color versions of one or more of the figures in this article are available online
at https://ieeexplore.ieee.org.
exploited in nonlinear system modeling and control [20]–[25].
Digital Object Identifier 10.1109/TFUZZ.2020.2972785 For the fuzzy systems controlled by traditional point-to-point
1063-6706 © 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.

Authorized licensed use limited to: Central South University. Downloaded on June 22,2022 at 12:51:42 UTC from IEEE Xplore. Restrictions apply.
ZHANG et al.: SECURITY SLIDING MODE CONTROL OF INTERVAL TYPE-2 FUZZY SYSTEMS SUBJECT TO CYBER ATTACKS 241

connection, the parallel distribution compensation (PDC)


approach is representative for fuzzy controller synthesis. The
main idea of PDC is to design a compensator for all rules
of the T–S fuzzy system so that the fuzzy controller and the
fuzzy model share the identical membership functions (MFs)
and fuzzy sets. In this case, the MFs were termed as perfectly
matched ones in [26], based on which the analysis techniques as
in [27]–[29] can be employed to obtain relaxed stability results.
In order to increase the design flexibility, some researchers
proposed the non-PDC control strategy in [30]–[35], where the
MFs were termed as mismatched MFs. For example, Lam and
Leung [32] studied the stability issue of a class of T–S fuzzy
systems with parameter uncertainties, in which the unmatched
MFs were handled by reconstructing the relations between Fig. 1. Network configuration with the SCP and DoS attacks.
the MFs of the controller and those of the fuzzy model. If a
T–S fuzzy system is closed via wireless networks, the MFs in
the fuzzy controller may be different from those used in the
system model, since state information obtained by the controller the controller and the controlled system, the relations between
might be changed. A key issue for this case is how to deal their MFs are reconstructed. As a consequence, the favorable
with these mismatched MFs. In [36], the authors summarized property (as discussed in paragraph 3 of the Introduction section)
the adopted MFs in the literature and synthesized two kinds offered by the perfectly matched MFs can be utilized to improve
of fuzzy controllers by using the so-called asynchronous and the stabilization of the IT2 fuzzy system. Sufficient conditions
synchronous MFs methods. It was shown in [36], that the are derived to ensure the stochastic stability of the resultant
asynchronous approach could yield a linear controller, i.e., the closed-loop fuzzy system and the reachability of the specified
fuzzy control gains will be identical if no additional methods are sliding surface.
applied to deal with the mismatched MFs; while the synchronous Notations: In this article, R is the set of reals and . is
method can successfully avoid this disadvantage. This the Euclidean norm. For a real symmetric matrix, P > 0(≥ 0)
synchronous method was then extended to the event-triggered represents that P is a positive definite (or positive semidefi-
H∞ control for a class of networked T–S fuzzy systems [37]. nite) matrix. I denotes an identity matrix with proper dimen-
It has been noted that, the MFs in T–S fuzzy systems may sions. The transpose of the matrix A is represented by AT .
be uncertain or there are parameter perturbations. This has λmin (W ) (λmax (W )) refers to the smallest (largest) eigen-
motivated the research interest on interval type-2 (IT2) fuzzy value of W . ⊗ denotes the Kronecker product of two matrices.
systems, in which the uncertain information can be absorbed E{a} is the expectation of stochastic variable a and E{a | b}
by the lower and upper MFs. As a result, the IT2 fuzzy sys- represents the conditional expectation of a on b. (∗) refers
tem can be considered as a set of infinite number of type-1 to an ellipsis that can be derived by symmetry in symmet-
fuzzy systems [38]–[44]. Construction analysis methods were ric matrices. The function sgn(·): Rm → Rm is defined as
proposed in [38] and [39] for IT2 fuzzy systems. Apparently, sgn(s) = [sgn(s1 ), sgn(s2 ), . . ., sgn(sm )] with
the IT2 fuzzy model and controller have mismatched MFs, since ⎧

⎨1 if si > 0
the system MFs are unknown. Although the synchronous MFs
method in [32], [36], and [37] for type-1 fuzzy systems provide sgn(si ) = 0 if si = 0


references for IT2 fuzzy systems with unmatched MFs, it cannot −1 if si < 0
be directly extended to the IT2 case. Then, how to tackle the
mismatched MFs for networked IT2 fuzzy system under the for i = 1, 2, . . ., m.
SCP and DoS attacks is a nontrivial task that constitutes the
second motivation of the present study. II. PROBLEM DESCRIPTION
Responding to the above discussions, this article investigates
the security control problem of a class of IT2 fuzzy systems A. Mathematic Model of SCP and DoS Attacks
under cyber attacks via a sliding mode control approach. The Consider the system configuration in Fig. 1, where n sensors
data transmission from sensors to the controller is scheduled by will transmit their values toward the controller side via a shared
the SCP, meanwhile, cyber attacks are stochastically launched vulnerable network suffered from possible cyber attacks. To
by malicious adversaries. Both DoS attacks and SCP are first simplify, it is assumed in this article that the control signals
modeled via a compensation scheme. As the scheduling signal can always be received by the actuators. In order to relieve
may be unavailable for the controller once cyber attacks happen, the communication burden, SCP scheduling is utilized to rule
a desirable SMC law with token-independent control gains, the transmission of the sensor nodes. Under this protocol, at
instead of the token-dependent ones as in [7], is synthesized any transmission time, only one sensor has the opportunity
in this article. This just reflects the effect of DoS attacks on to transmit its value via the network. The stochastic schedul-
controller synthesis. To handle these mismatched MFs between ing signal τ (k), also termed as token τ (k), is governed by a

Authorized licensed use limited to: Central South University. Downloaded on June 22,2022 at 12:51:42 UTC from IEEE Xplore. Restrictions apply.
242 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 29, NO. 2, FEBRUARY 2021

Markovian chain. A Markov chain is a stochastic model de- the SMC law designed in Section III will not depend on the
scribing a sequence of possible events, where the probability of token τ (k).
each event is only dependent on the state obtained in the previ-
ous event. In this article, the stochastic scheduling signal τ (k) B. System Description
takes values in a finite set N = {1, 2, . . ., n}, whose transition
Consider a class of IT2 fuzzy systems with the ith rule given
probabilities are defined by
as follows [38], [39]:
πμν  P {τ (k + 1) = ν|τ (k) = μ} (1) Rule i: If χ1 (x(k)) is N1i , and . . ., χα (x(k)) is Nαi , then
n
with 0 ≤ πμν ≤ 1, μ, ν ∈ N and ν=1 πμν = 1. x(k + 1) = Ai x(k) + Bi (u(k) + d(k, x(k))), i = 1, 2, · · ·,
Denote x(k) = [x1 (k), x2 (k), . . ., xn (k)]T as the system (5)
state, Ωq  diag{δq1 , δq2 , . . ., δqp } as the matrix of indicators,
q = 1, 2, . . ., n, δcd = δ(c − d), with δ(c − d) = 1 for c = d where χj (x(k)) refers to the premise variable, Nji stands for the
and δ(c − d) = 0 for otherwise. Then, according to the SCP IT2 fuzzy set; x(k) ∈ Rn is the state vector, and u(k) ∈ Rm
scheduling, the signal to be transmitted is x̆(k) = Ωτ (k) x(k), denotes the control input; Ai ∈ Rn×n , Bi ∈ Rn×m are
Ωτ (k) ∈ {Ω1 , Ω2 , . . ., Ωn }. For τ (k) = q, we have x̆(k) = known system matrices; the disturbance d(k, x(k)) satisfies
[0, . . ., 0, xq (k), 0, . . ., 0]T , i.e., only the qth component of the d(k, x(k)) ≤ x(k) with being a given positive scalar.
system state x(k) is transmitted at instant k. The firing strength corresponding to the ith fuzzy rule is
In practical applications, the DoS attackers may maliciously described by the interval sets as follows:
destroy the transmitted data in a random way according to the Wi (x(k)) = [mi (x(k)), m̄i (x(k))]
probability distribution given as follows: 
where mi (x(k)) = α j=1 μN i (χj (x(k))) ≥ 0, m̄i (x(k)) =
P {β(k) = 1} = β̂, P {β(k) = 0} = 1 − β̂ (2) α j

j=1 μ̄Nji (χj (x(k))) ≥ 0, μN i (χj (x(k))) ≤ μ̄Nji (χj (x(k)))


where β(k) ∈ {0, 1} is a Bernoulli process. A Bernoulli process j
with μN i (χj (x(k))) ∈ [0, 1] and μ̄Nji (χj (x(k))) ∈ [0, 1] being
is a discrete-time stochastic process composed of a sequence of j

binary random variables taking only two values 0 and 1. The the lower and upper grade of membership, respectively.
given constant β̂ refers to the probability that the DoS attacks The global model of the fuzzy system (5) is formulated by
may happen. Generally, it is reasonable to assume that β̂ ∈ [0, 1) 
due to resources constraints of attackers [45]. x(k + 1) = mi (x(k))[Ai x(k) + Bi (u(k) + d(k, x(k)))]
In summary, under the SCP scheduling, only one selected i=1
sensor node, indicated by Ωτ (k) x(k), has the opportunity to (6)
transmit its measurement value at each instant via an unreliable
communication channel, where DoS attacks are stochastically with
activated. To alleviate the effect of the DoS attacks and SCP,
mi (x(k)) = mi (x(k))v i (x(k)) + m̄i (x(k))v̄i (x(k)) (7)
the following compensator is proposed to generate available
information for the controller v i (x(k)), v̄i (x(k)) ∈ [0, 1], v i (x(k)) + v̄i (x(k)) = 1 (8)
x(k) = (1 − β(k))Ωτ (k) x(k) + β(k)Ωτ (k) x(k − 1) 
mi (x(k)) = 1. (9)
+ (I − Ωτ (k) )x(k − 1), τ (k) = 1, 2, . . ., n (3) i=1

which exhibits the following relation for τ (k) = q: It is easily obtained from (7)–(8) that mi (x(k)) ≤ mi (x(k)) ≤
m̄i (x(k)).
x(k) =
 Definition 1: In [46] the IT2 fuzzy system (6) subject to DoS
[x1 (k − 1), . . ., xq (k − 1), . . ., xn (k−1)]T , for β(k) = 1 attacks and SCP scheduling is stochastically stable if
∞
[x1 (k − 1), . . ., xq (k), . . ., xn (k − 1)]T , for β(k) = 0.
E x(k)2 | x(0), τ (0) <∞ (10)
(4)
k=0
Remark 1: In the first term of (3), Ωτ (k) x(k) refers to the holds for any x(0) ∈ Rn , τ (0) ∈ {1, 2, . . ., n}.
measurement value of the stochastically selected sensor by Now, the purpose of this article is to attain the stochastic
the SCP scheduling. The second term β(k)Ωτ (k) x(k − 1) and stability for the IT2 fuzzy system (6) via a sliding mode control
the third term (I − Ωτ (k) )x(k − 1) are used to compensate the scheme.
effect of DoS attacks and the SCP scheduling, respectively. In
practical applications, a channel marker word can be utilized III. CONTROLLER DESIGN
to stamp the scheduling signal τ (k). When the network works
under normal status, i.e., the DoS attacks are not activated, In this article, the following sliding variable is constructed:
the selected state x̆(k) and the scheduling signal τ (k) can be s(k) = (1 − β̂)Gx(k) − β̂Gx(k − 1) (11)
received by the controller; otherwise, x̆(k) and τ (k) will be
unavailable for the controller. Therefore, the control gains of where G is a given matrix.

Authorized licensed use limited to: Central South University. Downloaded on June 22,2022 at 12:51:42 UTC from IEEE Xplore. Restrictions apply.
ZHANG et al.: SECURITY SLIDING MODE CONTROL OF INTERVAL TYPE-2 FUZZY SYSTEMS SUBJECT TO CYBER ATTACKS 243

As discussed in Sections I and II, the system state x(k) may one can easily obtain that minx(k) mi (x(k)) > 0. Moreover, ac-
be unavailable at the controller side, except for the available cording to the relation (4), x(k) and x(k) share the same domain
compensating information x(k) in (3). Therefore, we design the of definition. Therefore, the lower bound of mi (x(k)) > 0 is
following SMC law based on compensator (3): also the one of mi (x(k)). So, 0 < mi (x(k)) ≤ hi (x(k)), i.e.,

minx(k) hi (x(k)) > 0.
1 To guarantee mi (x(k)) > 0, one can refer to the method
u(k) = hi (x(k))Fi x(k) − x(k − 1)sgn(s(k))
(1 − β̂) i=1
proposed in [32], where the analysis problem of type-1 fuzzy
(12) system has been investigated. The main idea in [32] is to con-
sider a larger operating domain than the actual one during the
where s(k) is obtained by replacing x(k) in (11) with x(k), modeling process. For example, according to the standard sector
Fi is the control gain to be determined later. Since the system nonlinear modeling process, mi (x(k)) are usually expressed as
MFs mi (x(k)) are unknown, we construct the following MFs mi (x(k)) = f f(x(k))−f min
(or mi (x(k)) = fmax −f (x(k))
max −fmin fmax −fmin ), where
hi (x(k)) for the controller:
fmin and fmax are the minimum and maximum value of f (x(k)),
hi (x(k)) = mi (x(k))αi (x(k)) + m̄i (x(k))ᾱi (x(k)) respectively. Thus, in the larger operating domain, the con-
sidered MFs will take values between [0,1]. As mi (x(k)) is

linear and monotonically increasing/decreasing with respect to
hi (x(k)) = 1 (13)
f (x(k)), the boundary value, i.e., mi (x(k)) = 0 or mi (x(k)) =
i=1
1, will be achieved at the left or right end of the larger operating
where αi (x(k)) and ᾱi (x(k)) can be selected according to domain. Therefore, the boundary values of mi (x(k)) will be
actual demand satisfying ai (τ (t)), āi (τ (t)) ∈ [0, 1], ai (τ (t)) + excluded in its actual domain. This idea will also be employed
āi (τ (t)) = 1, i = 1, 2, . . ., . in the simulation examples later.
Remark 2: As discussed in Remark 1, the scheduling signal Remark 3: In this article, the equality (14) relating to the MFs
τ (k) may be unavailable for the controller when the attack is of the controller and the fuzzy model is introduced to handle the
activated. This implies that we can not utilize τ (k) to design mismatched MFs. This approach is motivated by [32]. To guar-
the control parameter Fi . On the other hand, the available state hi (x(k))
antee 0 < m i (x(k))
< ∞, this article requires mi (x(k)) > 0
x(k) is dependent on the token τ (k) when DoS attacks are absent instead of minx(k) mi (x(k)) > 0 and minx(k) hi (x(k)) > 0 as
according to this proposed compensating scheme (3). So, in this in [32]. Thus, the existing method cannot directly be generalized
sense, this controller (12) is implicitly dependent on this token. to the system in this article because of the special structure of
This is just the effect of DoS attacks integrating with the SCP IT2 MFs expressed in (7). Apparently, this structure reveals
scheduling. that mi (x(k)) may be nonlinear and not monotonic function,
Note that the MFs mi (x(k)) of the fuzzy system (6) are so mi (x(k)) might be 0 or 1 at some points in its actual domain.
different from those hi (x(k)) of the sliding mode controller (12). Therefore, minx(k) mi (x(k)) > 0 cannot be directly ensured
To handle these mismatched MFs, we construct the following based on the method in [32].
relations between mi (x(k)) and hi (x(k)): Substituting (3) and (14) into the SMC law (12) and rewriting
hi (x(k)) = ξi (x(k), x(k))mi (x(k)), i = 1, 2, . . . , (14) ξi (x(k), x(k)) as ξi (k) yield that

and 1
u(k) = ξi (k)mi (x(k)) Fi [(1 − β(k))Ωτ (k) x(k)
minx(k) hi (x(k)) hi (x(k)) (1 − β̂)
0 < ξi1  ξimin = = min i=1
maxx(k) mi (x(k)) x(k),x(k) mi (x(k))
+ β(k)Ωτ (k) x(k − 1) + (I − Ωτ (k) )x(k − 1)]
hi (x(k)) hi (x(k))
≤ ξi (x(k), x(k)) = ≤ max − x(k − 1)sgn(s(k)). (16)
mi (x(k)) x(k),x(k) mi (x(k))
By means of (6) and (16), the resultant closed-loop system can
maxx(k) hi (x(k))
= = ξimax  ξi2 < ∞, i = 1, 2, . . . , be obtained as
minx(k) mi (x(k))
 
(15) x(k + 1) = ξj (k)mi (x(k))mj (x(k))
where maxx(k) (·) and minx(k) (·) refer to the maximum i=1 j=1

and minimum values of the arguments for all x(k) 


1
with x(k) ∈ {x(k), x(k), (x(k), x(k))}, respectively, satisfying × Ai + (1 − β(k))Bi Fj Ωτ (k) x(k)
minx(k) (·) ≤ maxx(k) (·). (1 − β̂)
hi (x(k))
To guarantee 0 < m i (x(k))
< ∞ as required in (15), one 1
+ Bi Fj (β(k)Ωτ (k) +I − Ωτ (k) )x(k−1)
should ensure minx(k) mi (x(k)) > 0 and minx(k) hi (x(k)) > 0. (1 − β̂)
Since the IT2 MFs mi (x(k)) and hi (x(k)) lie in the area
between the lower and upper MFs, it is easily seen that − x(k − 1)Bi sgn(s(k)) + Bi d(k, x(k)) .
minx(k) mi (x(k)) > 0 and minx(k) hi (x(k)) > 0 will be at-
tained by mi (x(k)) > 0. In fact, as 0 < mi (x(k)) ≤ mi (x(k)), (17)

Authorized licensed use limited to: Central South University. Downloaded on June 22,2022 at 12:51:42 UTC from IEEE Xplore. Restrictions apply.
244 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 29, NO. 2, FEBRUARY 2021

IV. STOCHASTIC STABILITY ANALYSIS  E{V1 (z(k + 1), τ (k + 1) | z(k), τ (k))−V1 (z(k), τ (k))}
In the sequel, the stochastic stability of the resultant closed-  μ x(k + 1) | z(k), τ (k)}
= E{xT (k + 1)P
2 system (17) will be analyzed. To this end, denote ξi (k) =
loop
l=1 il ξil with ξil (l = 1, 2) defined in (15), and i1 =  μ x(k) | z(k), τ (k)}
+ E{xT (k)R
ξi −ξi2 ξi1 −ξi 2
ξi1 −ξi2 ≥ 0, i2 = ξi1 −ξi2 ≥ 0 satisfying l=1 il = 1.
Theorem 1: Given these scalars ξjl and ξir for the IT2 fuzzy − xT (k)Pμ x(k) − xT (k − 1)Rμ x(k − 1). (23)
system (6) with DoS attacks and SCP scheduling, if there exist
Noting that 1 − β(k) = 1 − β̂ + (β̂ − β(k)) and β(k) = β̂ −
scalar ζ1 > 0 and matrices Pμ > 0 and Rμ > 0 satisfying
(β̂ − β(k)) and utilizing (17), one has
 μ B i ≤ ζ1 I
BiT P (18)
 μ x(k + 1) | z(k), τ (k)}
E{xT (k + 1)P
Γiiμ < 0 (19) 
 
ξjl Γijμ + ξir Γjiμ < 0, for i < j (20) ≤ ξj (k)mi (x(k))mj (x(k)) 3 (Ai +Bi Fj Ωμ )x(k)
i=1 j=1
with
n n T
μ  μ  1
P πμν Pμ , R πμν Rμ (21) + Bi Fj (β̂Ωμ + I − Ωμ )x(k − 1)
ν=1 ν=1 (1 − β̂)
and
 μ (Ai + Bi Fj Ωμ )x(k)
×P
Γ11
ijμ ∗ Mj11 ∗
Γijμ  , Mj 
Γ21 22
ijμ Γijμ Mj21 Mj22
1
+ Bi Fj (β̂Ωμ + I − Ωμ )x(k − 1)
(1 − β̂)
Γ11
ijμ
 μ (Ai + Bi Fj Ωμ ) + 3ζ1
 3(Ai + Bi Fj Ωμ ) P T 2
I
β̂
β̂  μ Bi Fj Ωμ + [Bi Fj Ωμ (x(k) − x(k − 1))]T
+ (Bi Fj Ωμ )T P (1 − β̂)
(1 − β̂)
 μ Bi Fj Ωμ (x(k) − x(k − 1))
×P
 μ Ωμ − Pμ
+ (1 − β̂)Ωμ R
6
Γ21
ijμ 
 μ (Ai + Bi Fj Ωμ )
[Bi Fj (β̂Ωμ + I − Ωμ )]T P + 3ζ1 m 2 xT (k − 1)x(k − 1) + 3ζ1 2 T
x (k)x(k) (24)
(1 − β̂)
2β̂  μ Bi Fj Ωμ
in which the expression (18) is utilized. By using (3), one can
− (Bi Fj Ωμ )T P obtain
(1 − β̂)
 μ Ωμ  μ x(k) | z(k), τ (k)}
E{xT (k)R
+ 2(1 − β̂)(β̂Ωμ + I − Ωμ )R
 μ Ωμ , μ
= [(1 − β̂)Ωμ x(k) + (β̂Ωμ + I − Ωμ )x(k − 1)]T R
− 2β̂(1 − β̂)Ωμ R
3 × [(1 − β̂)Ωμ x(k) + (β̂Ωμ + I − Ωμ )x(k − 1)]
Γ22
ijμ 

[Bi Fj (β̂Ωμ + I − Ωμ )]T P
(1 − β̂)2 + β̂(1 − β̂)[Ωμ (x(k) − x(k − 1))]T
 μ Ωμ
× [Bi Fj (β̂Ωμ + I − Ωμ )] + β̂(1 − β̂)Ωμ R  μ Ωμ (x(k) − x(k − 1)).
×R (25)
β̂  μ (Bi Fj Ωμ ) + 3ζ1 m 2 I
+ (Bi Fj Ωμ )T P Combining (23), (24), and (25) yields
(1 − β̂)
E{ΔV1 (z(k), τ (k)) | z(k), τ (k)}
 μ (β̂Ωμ + I − Ωμ ) − Rμ
+ (β̂Ωμ + I − Ωμ )R
 
for μ = 1, 2, . . ., n, i, j = 1, 2, . . . , , l, r = 1, 2, the resultant ≤ mi (x(k))mj (x(k))z T (k)ξj (k)Γijμ z(k)
closed-loop system (17) is stochastically stable. i=1 j=1
Proof: Consider the following Lyapunov function: 
V1 (z(k), τ (k)) = m2i (x(k))z T (k)ξi (k)Γiiμ z(k)
i=1
= xT (k)Pτ (k) x(k) + xT (k − 1)Rτ (k) x(k − 1) (22)

with z(k) = (x (k), x (k − 1)) . Letting τ (k) = μ, τ (k +
T T T + mi (x(k))mj (x(k))z T (k)
1) = ν, we have i=1 j>i

E{ΔV1 (z(k), τ (k)) | z(k), τ (k)} × [ξj (k)Γijμ + ξi (k)Γjiμ ]z(k). (26)

Authorized licensed use limited to: Central South University. Downloaded on June 22,2022 at 12:51:42 UTC from IEEE Xplore. Restrictions apply.
ZHANG et al.: SECURITY SLIDING MODE CONTROL OF INTERVAL TYPE-2 FUZZY SYSTEMS SUBJECT TO CYBER ATTACKS 245

2 2
Recalling that l=1 il = 1 and ξi (k) = l=1 il ξil , one has
Remark 4: It should be pointed out that the fuzzy controller
(12) and the IT2 fuzzy system (6) have unmatched MFs, under
2
which the analyzing techniques for matched MFs cannot be ap-
ξi (k)Γiiμ = il ξil Γiiμ . (27) plied. Based on (14) relating the MFs of both system model and
l=1
sliding mode controller, the unmatched MFs can be converted to
On the other hand, we have the matched case as shown in (17). Consequently, the stability
analysis method in [27]–[29] under perfect matched MFs could
ξj (k)Γijμ + ξi (k)Γjiμ
be utilized to facilitate the stability analysis. However, it should
2 be pointed out that this method is valid only for the case that the
= [ jl ξjl Γijμ + il ξil Γjiμ ] controller and the fuzzy model share the same number of fuzzy
l=1 rules. For the case that the fuzzy model and the controller have
2
 2 2 different MFs and different number of fuzzy rules, this method
= ir jl ξjl Γijμ + jr il ξil Γjiμ will be infeasible.
l=1 r=1 r=1
2 2 2 2 V. REACHABILITY ANALYSIS
= ir jl ξjl Γijμ + jr il ξil Γjiμ In this section, the reachability criterions are provided. It is
l=1 r=1 l=1 r=1 shown that the system states can be driven into a small region
2 2 2 2 around the prescribed sliding surface s(k) = 0.
= ir jl ξjl Γijμ + jl ir ξir Γjiμ Theorem 2: Given these scalars ξjl and ξir for the IT2 fuzzy
l=1 r=1 r=1 l=1 system (6) under DoS attacks and SCP scheduling with the
2 2 sliding mode controller (12), if there exist scalars ζ1 , ζ2 and
= ir jl [ξjl Γijμ + ξir Γjiμ ]. (28) matrices Pμ > 0, Rμ > 0, Wμ > 0, Fi satisfying (18) and the
l=1 r=1 following matrix inequalities:
It is easily obtained from (27)–(28) that  μ GBi ≤ ζ2 I
BiT GT W (33)

E{ΔV1 (z(k), τ (k)) | z(k), τ (k)} Γ̂iiμ < 0 (34)


  2
ξjl Γ̂ijμ + ξir Γ̂jiμ < 0, for i < j (35)
≤ z T (k) m2i (x(k)) il ξil Γiiμ
i=1 l=1 with
Γ̂11
n
 2 2
μ  ijμ ∗
W πμν Wμ , Γ̂ijμ 
+ mi (x(k))mj (x(k)) ir jl Γ̂21 22
ijμ Γ̂ijμ
ν=1
i=1 j>i l=1 r=1
and
× [ξjl Γijμ + ξir Γjiμ ] z(k). (29) Γ̂11 11
ijμ  Γijμ + 3[(1 − β̂)(GAi + GBi Fj Ωμ ) − β̂G]
T

 μ [(1 − β̂)(GAi + GBi Fj Ωμ ) − β̂G]


×W
By means of (19)–(20), one has
 μ GBi Fj Ωμ
+ β̂(1 − β̂)(GBi Fj Ωμ )T W
E{ΔV1 (z(k), τ (k)) | z(k), τ (k)} ≤ −σz(k)2 < 0 (30)
Γ̂21 21
ijμ  Γijμ + 6[GBi Fj (β̂Ωμ + I − Ωμ )]
T
with σ = mini,μ,l λmin { − ξil Γiiμ } + mini,j,μ,l,r λmin {−[ξjl
Γijμ + ξir Γjiμ ]} > 0. Taking expectation for both sides of (30)  μ [(1 − β̂)(GAi + GBi Fj Ωμ ) − β̂G]
×W
yields E{ΔV1 (z(k), τ (k))} ≤ −σE{z(k)2 }. By taking sum
on both sides of the above inequalities with respect to k from 0  μ GBi Fj Ωμ
− 2β̂(1 − β̂)(GBi Fj Ωμ )T W
to N for any integer N > 0, we have
Γ̂22 22
ijμ  Γijμ + 3[GBi Fj (β̂Ωμ + I − Ωμ )]
T

E{V1 (z(N + 1), τ (N + 1))} − E{V1 (z(0), τ (0))}  μ [GBi Fj (β̂Ωμ + I − Ωμ )]


N ×W

≤ −σE z(k)2 . (31)  μ GBi Fj Ωμ


+ β̂(1 − β̂)(GBi Fj Ωμ )T W
k=0
for μ = 1, 2, . . ., n, i, j = 1, 2, . . . , , l, r = 1, 2, the states of
Thus, we obtain the closed-loop fuzzy system (17) can be forced into the region
N given as
E{V1 (z(0), τ (0)) 
E z(k)2 ≤ < ∞. (32) ℵ(k)
σ D  s(k) | s(k) ≤
k=0
minμ λmin (Wμ )
Taking N → ∞, the stochastic stability of the closed-loop IT2
fuzzy system (17) can be ensured by (32) and Definition 1.  with ℵ(k)  3ζ2 (1 − β̂)2 2
(mx(k − 1)2 + x(k)2 ).

Authorized licensed use limited to: Central South University. Downloaded on June 22,2022 at 12:51:42 UTC from IEEE Xplore. Restrictions apply.
246 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 29, NO. 2, FEBRUARY 2021


Proof: Choose the Lyapunov candidate function as Thus, when s(k) > minµ λℵ(k) min (Wµ )
, we have from (34)–(35)
that E{ΔV2 (z(k), τ (k)) | z(k), τ (k)} < 0. Taking expecta-
V2 (z(k), τ (k)) = V1 (z(k), τ (k)) + sT (k)Wμ s(k). (36)
tions with respect to both sides of the above inequalities results
Form (11) and (17), we can obtain in E{ΔV2 (z(k), τ (k))} < 0, which implies that system states
 μ s(k + 1) | z(k), τ (k)} will be forced into the sliding domain D. 
E{sT (k + 1)W
  VI. SOLVING ALGORITHM
≤ ξj (k)mi (x(k))mj (x(k))
i=1 j=1
In the sequel, a solving algorithm will be given to guarantee
   that the criterions in Theorems 1 and 2 hold simultaneously.
× 3 (1 − β̂)(GAi + GBi Fj Ωμ ) − β̂G x(k) Theorem 3: Given scalars ξjl and ξir for the systems con-
T sidered in Theorems 1 and 2, if there exist scalars ζ1 , ζ2 and
+ GBi Fj (β̂Ωμ + I − Ωμ )x(k − 1) W μ matrices Pμ > 0, Rμ > 0, Wμ > 0, Fi satisfying the following
  matrix inequalities:
× (1 − β̂)(GAi + GBi Fj Ωμ ) − β̂G x(k)  
−ζ1 I ∗
 <0 (41)
+ GBi Fj (β̂Ωμ + I − Ωμ )x(k − 1) Φiμ −Λ
 
−ζ2 I ∗
+ β̂(1 − β̂)[GBi Fj Ωμ (x(k) − x(k − 1))]T <0 (42)
Θiμ −Υ
 μ [GBi Fj Ωμ (x(k) − x(k − 1))]
×W Γ̃iiμ < 0 (43)
2 2 T
+ 3mζ2 (1 − β̂) x (k − 1)x(k − 1) ξjl Γ̃ijμ + ξir Γ̃jiμ < 0, for i < j (44)

+ 3ζ2 (1 − β̂)2 2 xT (k)x(k) (37) with
⎡ ⎤
Γ̃11
ijμ ∗ ∗ ∗ ∗ ∗ ∗
in which the condition (33) is utilized. Note that ⎢ 21 ⎥
⎢ Γ̃ijμ − 13 Λ ∗ ∗ ∗ ∗ ∗ ⎥
E{ΔV2 (z(k), τ (k)) | z(k), τ (k)} ⎢ ⎥
⎢ Γ̃31 0 −Λ ∗ ∗ ∗ ∗ ⎥
⎢ ijμ ⎥
⎢ ⎥
= E{ΔV1 (z(k), τ (k))} − sT (k)Wμ s(k) Γ̃ijμ  ⎢ Γ̃41 0 0 −Σ ∗ ∗ ∗ ⎥
⎢ ijμ ⎥
⎢ Γ̃51 0 0 0 −Σ ∗ ∗ ⎥
 μ s(k + 1) | z(k), τ (k)}.
+ E{sT (k + 1)W (38) ⎢ ijμ ⎥
⎢ 61 ⎥
⎣ Γ̃ijμ 0 0 0 0 − 13 Υ ∗ ⎦
Utilizing (24), (25), (37) leads to
Γ̃71
ijμ 0 0 0 0 0 −Υ
⎡ 11 ⎤
E{ΔV2 (z(k), τ (k)) | z(k), τ (k)} M̄j · · · ∗
⎢ . .. ⎥

Mj  ⎢ ⎣ ..
..
. . ⎦

≤ m2i (x(k))z T (k)ξi (k)Γ̂iiμ z(k)
i=1 M̄j71 · · · M̄j77
 
 11 −Pμ−1 + 3ζ1 2 I ∗
Γ̃ijμ 
+ mi (x(k))mj (x(k))z T (k)[ξj (k)Γ̂ijμ 0 −Rμ + 3mζ1 2 I
i=1 j>i √ √ √
 Γ̃21
ijμ  [ πμ1 , πμ2 , . . ., πμn ]
T

+ ξi (k)Γ̂jiμ ]z(k) − sT (k)Wμ s(k)


1
  ⊗ Ai + Bi Fj Ωμ , Bi Fj (β̂Ωμ + I − Ωμ )
−3ζ2 (1 − β̂)2 2 mx(k − 1)2 + x(k)2 . (39) (1 − β̂)
√ √ √
Following the similar lines as in Theorem 1, we obtain Γ̃31
ijμ  [ πμ1 , πμ2 , . . ., πμn ]
T
⎡ ⎤
E{ΔV2 (z(k), τ (k)) | z(k), τ (k)} β̂ β̂
⊗⎣ Bi Fj Ωμ , − Bi Fj Ωμ ⎦
 2 1 − β̂ 1 − β̂
≤ z (k)
T
m2i (x(k)) il ξil Γ̂iiμ z(k) √ T
√ √
i=1 l=1 Γ̃41
ijμ  πμ1 R1 , πμ2 R2 , . . ., πμn Rn
 2 2
⊗ [(1 − β̂)Ωμ , − β̂(1 − β̂)Ωμ ]
+ z T (k) mi (x(k))mj (x(k)) ir jl
√ √ √
i=1 j>i l=1 r=1 Γ̃51
ijμ  [ πμ1 R1 , πμ2 R2 , . . ., πμn Rn ]T
  
× [ξjl Γ̂ijμ + ξir Γ̂jiμ ]z(k) − min λmin (Wμ )s(k)2 ⊗ β̂(1 − β̂)Ωμ , β̂Ωμ + I − Ωμ
μ
 √ √ √
2 2
 2 2
 Γ̃61
ijμ  [ πμ1 , πμ2 , . . ., πμn ] ⊗ [(1 − β̂)(GAi
T
− 3ζ2 (1 − β̂) mx(k − 1) + x(k) . (40)
+ GBi Fj Ωμ ) − β̂G, GBi Fj (β̂Ωμ + I − Ωμ )]

Authorized licensed use limited to: Central South University. Downloaded on June 22,2022 at 12:51:42 UTC from IEEE Xplore. Restrictions apply.
ZHANG et al.: SECURITY SLIDING MODE CONTROL OF INTERVAL TYPE-2 FUZZY SYSTEMS SUBJECT TO CYBER ATTACKS 247

√ √ √  2 
Γ̃71
ijμ  [ πμ1 , πμ2 , . . ., πμn ]
T
Γ11 −Xμ + 3ζ1 I ∗
  ijμ  2 .
0 −Rμ + 3mζ1 I
⊗ β̂(1 − β̂)GBi Fj Ωμ , − β̂(1 − β̂)GBi Fj Ωμ
VII. SIMULATION

and Φiμ  [ πμ1 BiT , . . ., √πµn BiT ]T , Λ = diag{P1 , . . . , Pn }, In this part, two examples are presented to exemplify the
Θiμ  [√πµ1 BiT GT , . . . , √πµn BiT GT ]T , Υ = diag{W1 , . . . , theoretical results derived in this article.
Wn }, Σ = diag{R1 , . . ., Rn } for μ = 1, 2, . . . , n, i, j = Example 1: Consider a mass-spring-damper system as
1, 2, . . . , , l, r = 1, 2, then the closed-loop IT2 fuzzy system
mẍ(t) + Ff (t) + Fs (t) = u(t)
(17) is stochastically stable, meanwhile, the system states can
be forced into the sliding domain D. where x(t) and m stand for the displacement and the mass,
Proof: It is easily verified that condition (18) and (33) can respectively; Fs is the spring restoring force and Ff is the
be ensured by (41) and (42), respectively. In the sequel, we force of friction; u(t) denotes the control input. Let Ff = cẋ(t)
need only prove that conditions (19)–(20), (34)–(35) can be and Fs = κ̄(1 + a2 x2 (t))x(t), where c > 0 is the friction coef-
guaranteed by (43)–(44). ficient, the elasticity coefficient κ̄ is an uncertain parameter and
Let Pμ = Pμ−1 , Wμ = Wμ−1 . By Schur complementary, we a is a auxiliary variable. Then, we have
have from (43)–(44) that inequalities (34)–(35) hold. Noting
that mẍ(t) + cẋ(t) + κ̄x(t) + κ̄a2 x2 (t)x(t) = u(t) (49)

(34) ⇒ which could be represented as


     
0 1 0
[(1 − β̂)(GAi + GBi Fi Ωμ ) − β̂G]T μ ẋ(t) = x(t) + u(t)
ξil Γiiμ + 3W −c
f (κ̄, t) m 1
(β̂(1 − β̂)GBi Fi Ωμ )T m

× [(1 − β̂)(GAi + GBi Fi Ωμ ) − β̂G with x(t)  [x1 (t) x2 (t)]T with x1 (t)  x(t), x2 (t)  ẋ(t),
−κ̄−κ̄a2 x21 (t)
and f (κ̄, t) = m .
β̂(1 − β̂)GBi Fi Ωμ ] < 0 Let a = 0.3 m−1 , m = 1 kg, c = 2 N.m/s. Assume that
x1 (t) ∈ [−2, 2], x2 (t) ∈ [−10, 10] and κ̄ ∈ [κ̄1 , κ̄2 ] with κ̄1 =
we have Γiiμ < 0 as W  μ > 0, that is, (19) holds. By following
5 N/m, κ̄2 = 8 N/m. Then, we can obtain that f (κ̄, t) ∈
similar derivation process to the one from (34) to (19), we can [fmin , fmax ] with fmax = −κ̄ −κ̄2 −4κ̄2 a2
m , fmin =
1
, where fmax
ensure (20) by (35).  and fmin are the maximum and minimum value of f (κ̄, t),
m

It is noted that the conditions (41)–(44) are nonlinear due respectively. As analyzed in Section III, the lower MFs are
to the coexistence of variables Pμ and Pμ−1 . In the sequel, we required to be larger than 0, which can be achieved via the
employ cone complementary algorithm (CCL) algorithm [47] to method proposed in [32] by enlarging the operating domain
handle these nonlinearities via solving the following minimiza- of f (κ̄, t). Recalling that f (κ̄, t) ∈ [fmin , fmax ], we consider
tion problem: f (κ̄, t) ∈ [fˇmin , fˇmax ] with fˇmin = fmin − σ, fˇmax = fmax +
n σ, and σ = 0.02.
min tr Pμ X μ (45) According to the sector nonlinearity T–S fuzzy modeling
μ=1 approach [48], the MFs can be calculated as m1 (x1 (t)) =
−f (κ̄,t)+fˇmax fˇmin
subject to the inequalities (41), (42), and fˇmax −fˇmin
, m2 (x1 (t)) = ffˇ(κ̄,t)− ˇ . The lower and upper
max −fmin
MFs can be given by
Γiiμ < 0 (46)
−f (κ̄1 , t) + fˇmax
ξjl Γijμ + ξir Γjiμ < 0 m1 (x1 (t)) = , x1 (t) ∈ [−2, 2]
(47) fˇmax − fˇmin
 
Xμ I
≥0 (48) −f (κ̄2 , t) + fˇmax
I Pμ m̄1 (x1 (t)) = , x1 (t) ∈ [−2, 2]
fˇmax − fˇmin
with f (κ̄2 , t) − fˇmin
⎡ ⎤ m2 (x1 (t)) = , x1 (t) ∈ [−2, 2]
Γ11
ijμ ∗ ∗ ∗ ∗ ∗ ∗ fˇmax − fˇmin
⎢ 21 ⎥
⎢ Γ̃ijμ − 13 Λ ∗ ∗ ∗ ∗ ∗ ⎥ f (κ̄1 , t) − fˇmin
⎢ 31 ⎥ m̄2 (x1 (t)) = , x1 (t) ∈ [−2, 2].
⎢ Γ̃ijμ 0 −Λ ∗ ∗ ∗ ∗ ⎥ fˇmax − fˇmin
⎢ ⎥
⎢ 41 ⎥
Γijμ ⎢ Γ̃ijμ 0 0 −Σ ∗ ∗ ∗ ⎥
It is easily checked that mi (x1 (t)) > 0, i = 1, 2.
 ⎢ 51 ⎥
⎢ Γ̃ijμ 0 0 0 −Σ ∗ ∗ ⎥
⎢ ⎥ Name the fuzzy sets “Small” and “Big”. Thus, we construct
⎢ Γ̃61 0 0 0 0 − 13 Υ ∗ ⎥
⎢ ijμ ⎥ the following fuzzy rules:
⎢ 71 ⎥ Rule 1: If f (κ̄, t) is “Small,” then
⎣ Γ̃ijμ 0 0 0 0 0 −Υ ⎦
ẋ(t) = A1 x(t) + B1 u(t)

Authorized licensed use limited to: Central South University. Downloaded on June 22,2022 at 12:51:42 UTC from IEEE Xplore. Restrictions apply.
248 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 29, NO. 2, FEBRUARY 2021

Fig. 2. Scheduling signal τ (k). Fig. 3. State variable x(k) with different κ̄.

Rule 2: If f (κ̄, t) is “Big,” then

ẋ(t) = A2 x(t) + B2 u(t)

where
   
0 1 0 1
A1 = ˇ , A2 =
fmin −c
m fˇmax −c
m
 
0
B1 = B2 = 1 .
m

By discretizing the above matrices with sampling period 0.05 s,


we have
    Control signal u(k) with different κ̄.
0.9868 0.0474 0.0012 Fig. 4.
A1 = , B1 = B2 =
−0.5163 0.8921 0.0474
 
0.9940 0.0475 controller can always stabilize the nonlinear system (49) with
A2 = .
−0.2365 0.8990 uncertain parameter κ̄.
Example 2: Consider the IT2 fuzzy model (5) with three
Then, the nonlinear system (49) with disturbance d(k, x(k)) = rules and the following parameters:
2x1 (k)x2 (k) ( = 0.2) can be expressed by the following    
2-rule IT2 T–S fuzzy model: 0.1 0 −1
A1 = , B1 =
0.1 −0.1 1
2
   
x(k + 1) = mi (x1 (k))[Ai x(k) + Bi (u(k) + d(k, x(k)))] 0.1 0 1
A2 = , B2 =
i=1 −0.1 0.1 −1
   
with m1 (x1 (k)) = 0.6m1 (x1 (k)) + 0.4m̄1 (x1 (k)) and 1 1 1
m2 (x1 (k)) = 1 − m1 (x1 (k)). A3 = , B3 = .
−0.3 0.8 1
The MFs of the SMC law are given as h1 (x1 (k)) =
0.5m1 (x1 (k)) + 0.5m̄1 (x1 (k)), h2 (x1 (k)) = 1 − h1 (x1 (k)). Select the MFS in the system model (6) and the controller (12)
By calculation, the parameters in the minimization problem as m1 (x1 (k)) = (1 − sin2 (x1 (k)))m1 (x1 (k)) + sin2 (x1 (k))
(45) are given as ξ11 = 0.4403, ξ12 = 3.1639, ξ21 = 0.4383, m̄1 (x1 (k)), m2 (x1 (k)) = 0.4m2 (x1 (k)) + 0.6m̄2 (x1 (k)), m3
and ξ22 = 1.7828. (x1 (k)) = 1 − m1 (x1 (k)) − m2 (x1 (k)), h1 (x1 (k)) = 0.2m1
Suppose that the attack probability β̂ = 0.3, the transition (x1 (k)) + 0.8m̄1 (x1 (k)), h2 (x1 (k)) = cos2 (x1 (k))m2 (x1
probabilities π11 = 0.4, π12 = 0.6, π21 = 0.7, π22 = 0.3, and (k)) + (1 − cos2 (x1 (k)))m̄2 (x1 (k))h3 (x1 (k)) = 1 − h1 (x1
the sliding gain G = [1, −10]. Then, by solving the minimiza- (k)) − h2 (x1 (k)) with m1 (x1 (k)) = 1 − 1+e−(2x11 (k)+5) , m̄1 (x1
tion problem (45), the corresponding matrices can be computed (k)) = 1 − 1+e−(2x11 (k)+3) , m2 (x1 (k)) = 1+e−(2x11 (k)−5) , m̄2 (x1
as F1 = [ −9.6880 −3.0904 ], F2 = [ 4.4615 −2.9336 ]. (k)) = 1+e−(2x11 (k)−3) , x1 (k) ∈ [−1, 1]. Then, the parameters in
The simulation results are shown in Figs. 3 and 4 for initial the minimization problem (45) are calculated as ξ11 = 0.0271,
states x(0) = [2 − 1.5]T with the scheduling signal τ (k) in ξ12 = 40.1606, ξ21 = 0.11, ξ22 = 46.6367, ξ31 = 0.7969,
Fig. 2. It is shown from Figs. 3 and 4 that the proposed fuzzy ξ22 = 1.2144.

Authorized licensed use limited to: Central South University. Downloaded on June 22,2022 at 12:51:42 UTC from IEEE Xplore. Restrictions apply.
ZHANG et al.: SECURITY SLIDING MODE CONTROL OF INTERVAL TYPE-2 FUZZY SYSTEMS SUBJECT TO CYBER ATTACKS 249

TABLE I
VALUES OF INITIAL STATES

TABLE II
TRANSITION PROBABILITY MATRICES

Fig. 5. State evolutions of open-loop case.

Fig. 8. Case 1 in Table I.

Fig. 6. State evolutions with different β̂.

Fig. 9. Case 2 in Table I.

case with attack probabilities β̂ = 0.1 and β̂ = 0.3. The control


performance will degrade even become unstable when the prob-
Fig. 7. Control signal u(k) with different β̂. abilities exceed 0.4. It is observed from Figs. 6 and 7 that the
convergence speed of the closed-loop system will slow down
Suppose that the attack probability β̂ = 0.1, the tran- with the increasing of attack probability, which may be due to
sition probabilities matrix ( 0.5 0.5
0.4 0.6 ) and the sliding ma-
the reduction of useful information for the controller. Besides,
trix G = [1, 2]. By solving the minimization problem (45), to illustrate the effect of initial states x(0) and scheduling
we obtain the control gains F1 = [ 0.0228 −0.0980 ], F2 = signal τ (k) on control performance, we consider different initial
[ −0.0512 −0.2100 ], F3 = [ −0.0472 −0.1811 ]. values and transition probability matrices as in Tables I and II,
In the simulation, the initial conditions are set as x(0) = respectively. Figs. 8 and 9 plot x(k) and u(k) for Cases 1 and 2 in
[1 − 1]T and the disturbance is d(k, x(k)) = (x21 (k) + x22 (k)) Table I with attack probability β̂ = 0.1 and transition probability
with = 0.02. Fig. 5 shows the state trajectories of the open- matrix ( 0.5 0.5
0.4 0.6 ). The evolutions of x(k) and u(k) for Cases a and
loop case with attack probability β̂ = 0.1. Figs. 6 and 7 show the b in Table II with attack probability β̂ = 0.1 and initial states
system states x(k) and the control signal u(k) of the closed-loop x(0) = [1 − 1]T are shown in Figs. 10 and 11. It is observed

Authorized licensed use limited to: Central South University. Downloaded on June 22,2022 at 12:51:42 UTC from IEEE Xplore. Restrictions apply.
250 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 29, NO. 2, FEBRUARY 2021

[3] Z. Cao, Y. Niu, and J. Song, “Finite-time sliding mode control


of Markovian jump cyber-physical systems against randomly occur-
ring injection attacks,” IEEE Trans. Autom. Control, to be published,
doi: 10.1109/TAC.2019.2926156.
[4] Z. Cao, Y. Niu, and Y. Zou, “Adaptive neural sliding mode con-
trol or singular semi-Markovian jump systems against actuator at-
tacks,” IEEE Trans. Syst., Man, Cybern. Syst., to be published,
doi: 10.1109/TSMC.2019.2898428.
[5] H. Shen, S. Huo, J. Cao, and T. Huang, “Generalized state estimation
for Markovian coupled networks under round-robin protocol and redun-
dant channels,” IEEE Trans. Cybern., vol. 49, no. 4, pp. 1292–1301,
Apr. 2019.
[6] H. Zhao, Y. Niu, and T. Jia, “Security control of cyber-physical switched
systems under round-robin protocol: Input-to-state stability in probability,”
Inf. Sci., vol. 508, pp. 121–134, 2020.
[7] J. Song, Z. Wang, and Y. Niu, “On H∞ sliding mode control under
stochastic communication protocol,” IEEE Trans. Autom. Control, vol. 64,
no. 5, pp. 2174–2181, May 2019.
Fig. 10. Case a in Table II. [8] X. Wan, Z. Wang, Q. Han, and M. Wu, “A recursive approach to quantized
H∞ state estimation for genetic regulatory networks under stochastic
communication protocols,” IEEE Trans. Neural Netw. Learn. Syst., vol. 30,
no. 9, pp. 2840–2852, Sep. 2019.
[9] G. C. Walsh, H. Ye, and L. G. Bushnell, “Stability analysis of networked
control systems,” IEEE Trans. Control Syst. Technol., vol. 10, no. 3,
pp. 438–446, May 2002.
[10] M. Tabbara and D. Nesic, “Input-output stability of networked control
systems with stochastic protocols and channels,” IEEE Trans. Autom.
Control, vol. 53, no. 5, pp. 1160–1175, Jun. 2008.
[11] M. Donkers, W. Heemels, D. Bernardini, A. Bemporad, and V. Shneer,
“Stability analysis of stochastic networked control systems,” Automatica,
vol. 48, no. 5, pp. 917–925, 2012.
[12] J. Zhang, C. Peng, M.-R. Fei, and Y.-C. Tian, “Output feedback control of
networked systems with a stochastic communication protocol,” J. Franklin
Inst., vol. 354, no. 9, pp. 3838–3853, 2017.
[13] L. Zou, Z. Wang, Q. Han, and D. Zhou, “Recursive filtering for time-
varying systems with random access protocol,” IEEE Trans. Autom. Con-
trol, vol. 64, no. 2, pp. 720–727, Feb. 2019.
[14] M. Zhu and S. Martinez, “On the performance analysis of resilient
Fig. 11. Case b in Table II. networked control systems under replay attacks,” IEEE Trans. Autom.
Control, vol. 59, no. 3, pp. 804–808, Mar. 2014.
[15] W. He, X. Gao, W. Zhong, and F. Qian, “Secure impulsive synchronization
control of multi-agent systems under deception attacks,” Inf. Sci., vol. 459,
that the proposed SMC law can always stabilize the controlled pp. 354–368, 2018.
[16] D. Ye and T. Zhang, “Summation detector for false data-injection at-
system. tack in cyber-physical systems,” IEEE Trans. Cybern., to be published,
doi: 10.1109/TCYB.2019.2915124.
VIII. CONCLUSION [17] Y. Wang, C. Lin, Q.-L. Li, and Y. Fang, “A queueing analysis for the denial
of service (DoS) attacks in computer networks,” Comput. Netw., vol. 51,
This article studied the synthesizing problem of sliding mode no. 12, pp. 3564–3573, 2007.
[18] S. Amin, G. A. Schwartz, and S. S. Sastry, “Security of interdependent and
control for a class of IT2 T–S fuzzy systems under the SCP identical networked control systems,” Automatica, vol. 49, no. 1, pp. 186–
scheduling and DoS attacks. The relations between the MFs of 192, 2013.
the fuzzy SMC law and those of the fuzzy model were explicitly [19] G. K. Befekadu, V. Gupta, and P. J. Antsaklis, “Risk-sensitive control
under Markov modulated denial-of-service (DoS) attack strategies,” IEEE
analyzed. By considering the effect of DoS attacks and the SCP Trans. Autom. Control, vol. 60, no. 12, pp. 3299–3304, Dec. 2015.
scheduling, a desirable sliding mode controller with the token- [20] D. W. C. Ho and Y. Niu, “Robust fuzzy design for nonlinear uncertain
independent control gains were designed so that the stochastic stochastic systems via sliding-mode control,” IEEE Trans. Fuzzy Syst.,
vol. 15, no. 3, pp. 350–358, Jun. 2007.
stability of the resultant closed-loop system and the reachability [21] J. Song, Y. Niu, J. Lam, and H. K. Lam, “Fuzzy remote tracking control
of the prescribed sliding surface can be guaranteed. Furthermore, for randomly varying local nonlinear models under fading and missing
the control method in this article can be also generalized to the measurements,” IEEE Trans. Fuzzy Syst., vol. 26, no. 3, pp. 1125–1137,
Jun. 2018.
case subject to weighted try-once-discard (WTOD) protocol. [22] W. Sun, S. Su, Y. Wu, J. Xia, and V. Nguyen, “Adaptive fuzzy control with
However, for the case with RR protocol, a token-dependent high-order barrier Lyapunov functions for high-order uncertain nonlinear
control law is implementable, since the scheduling signal are systems with full-state constraints,” IEEE Trans. Cybern., to be published,
doi: 10.1109/TCYB.2018.2890256.
predefined according to a circular order. [23] L. Liu, Y. Liu, and S. Tong, “Fuzzy-based multierror constraint control
for switched nonlinear systems and its applications,” IEEE Trans. Fuzzy
REFERENCES Syst., vol. 27, no. 8, pp. 1519–1531, Aug. 2019.
[24] W. Sun, S. Su, J. Xia, and Y. Wu, “Adaptive tracking control of wheeled
[1] J. Li and Y. Niu, “Sliding mode control subject to Rice channel fading,” inverted pendulums with periodic disturbances,” IEEE Trans. Cybern., to
IET Control Theory Appl., vol. 13, no. 16, pp. 2529–2537, Nov. 2019. be published, doi: 10.1109/TCYB.2018.2884707.
[2] H. Zhao, Y. Niu, and J. Zhao, “Event-triggered sliding mode control of [25] Z. Zhang, Y. Niu, and H. K. Lam, “Sliding-mode control of T-S fuzzy
uncertain switched systems under denial-of-service attacks,” J. Franklin systems under weighted try-once-discard protocol,” IEEE Trans. Cybern.,
Inst., vol. 356, no. 18, pp. 11 414–11 433, 2019. to be published, doi: 10.1109/TCYB.2019.2941870.

Authorized licensed use limited to: Central South University. Downloaded on June 22,2022 at 12:51:42 UTC from IEEE Xplore. Restrictions apply.
ZHANG et al.: SECURITY SLIDING MODE CONTROL OF INTERVAL TYPE-2 FUZZY SYSTEMS SUBJECT TO CYBER ATTACKS 251

[26] H. K. Lam, “A review on stability analysis of continuous-time fuzzy- Zhina Zhang received the B.S. degree in mathemat-
model-based control systems: From membership-function-independent ics and applied mathematics from Anyang Normal
to membership-function-dependent analysis,” Eng. Appl. Artif. Intell., University, Anyang, China, in 2009, and received
vol. 67, pp. 390–408, 2018. the M.S. degree in operational research and cyber-
[27] K. Tanaka, T. Ikeda, and H. O. Wang, “Fuzzy regulators and fuzzy netics from Hangzhou Dianzi University, Hangzhou,
observers: Relaxed stability conditions and LMI-based designs,” IEEE China, in 2012. She is now working toward the Ph.D.
Trans. Fuzzy Syst., vol. 6, no. 2, pp. 250–265, May 1998. degree in control science and engineering with the
[28] E. Kim and H. Lee, “New approaches to relaxed quadratic stability East China University of Science and Technology,
condition of fuzzy control systems,” IEEE Trans. Fuzzy Syst., vol. 8, no. 5, Shanghai, China.
pp. 523–534, Oct. 2000. From August 2018 to September 2019, she was a
[29] A. Sala and C. Arino, “Asymptotically necessary and sufficient conditions Research Assistant with the Department of Electrical
for stability and performance in fuzzy control: Applications of Polya’s Engineering, Taiwan University of Science and Technology. Her current research
theorem,” Fuzzy Sets Syst., vol. 24, no. 158, pp. 2671–2686, 2007. interests are T–S fuzzy system and sliding mode control.
[30] T. M. Guerra and L. Vermeiren, “LMI-based relaxed nonquadratic stabi-
lization conditions for nonlinear systems in the Takagi-Sugeno’s form,”
Automatica, vol. 40, no. 5, pp. 823–829, 2004.
[31] H. K. Lam and M. Narimani, “Stability analysis and performance design
for fuzzy-model-based control system under imperfect premise matching,” Yugang Niu received the M.Sc. and Ph.D. degrees
IEEE Trans. Fuzzy Syst., vol. 17, no. 4, pp. 949–961, Aug. 2009. in control engineering from the Nanjing University
[32] H. K. Lam and F. H. F. Leung, “Stability analysis of fuzzy control systems of Science and Technology, Nanjing, China, in 1992
subject to uncertain grades of membership,” IEEE Trans. Syst., Man, and 2001, respectively.
Cybern., Part B, Cybern., vol. 35, no. 6, pp. 1322–1325, Dec. 2005. In 2003, he joined the School of Information Sci-
[33] H. K. Lam and M. Narimani, “Quadratic-stability analysis of fuzzy-model- ence and Engineering, East China University of Sci-
based control systems using staircase membership functions,” IEEE Trans. ence and Technology, Shanghai, China, where he is
Fuzzy Syst., vol. 18, no. 1, pp. 125–137, Feb. 2010. currently a Professor. In 2019, he also joined the
[34] X. Li, H. K. Lam, G. Song, and F. Liu, “Stability analysis of positive Shanghai Institute of Intelligent Science and Tech-
polynomial fuzzy-model-based control systems with time delay under nology, Tongji University, Shanghai. His current re-
imperfect premise matching,” IEEE Trans. Fuzzy Syst., vol. 26, no. 4, search interests include stochastic systems, sliding
pp. 2289–2300, Aug. 2018. mode control, Markovian jump systems, networked control systems, wireless
[35] X. Li and K. Mehran, “Model-based control and stability analysis of sensor networks, and smart grid.
discrete-time polynomial fuzzy systems with time delay and positivity Prof. Niu is a member of the Conference Editorial Board of IEEE Control
constraints,” IEEE Trans. Fuzzy Syst., vol. 27, no. 11, pp. 2090–2100, Systems Society. He is currently an Associate Editor for several international
Nov. 2019. journals, including Information Sciences, Neurocomputing, IET Control Theory
[36] C. Peng, D. Yue, and M. Fei, “Relaxed stability and stabilization conditions & Applications, Journal of The Franklin Institute, and International Journal of
of networked fuzzy control systems subject to asynchronous grades of System Sciences.
membership,” IEEE Trans. Fuzzy Syst., vol. 22, no. 5, pp. 1101–1112,
Oct. 2014.
[37] C. Peng, M. Yang, J. Zhang, M. Fei, and S. Hu, “Network-based H∞ con-
trol for T-S fuzzy systems with an adaptive event-triggered communication Zhiru Cao received the B.S. degree in building elec-
scheme,” Fuzzy Sets Syst., vol. 329, pp. 61–76, 2017. tricity and intelligence from Nanjing Tech University,
[38] H. K. Lam and L. D. Seneviratne, “Stability analysis of interval type-2 Nanjing, China, in 2016. She is currently working
fuzzy-model-based control systems,” IEEE Trans. Syst., Man, Cybern. B, toward the Ph.D. degree in control science and en-
Cybern., vol. 38, no. 3, pp. 617–628, Jun. 2008. gineering with East China University of Science and
[39] H. K. Lam, H. Li, C. Deters, E. L. Secco, and H. A. Wurdemann, “Control Technology, Shanghai, China.
design for interval type-2 fuzzy systems under imperfect premise match- From November 2018 to February 2019, she was a
ing,” IEEE Trans. Ind. Electron., vol. 61, no. 2, pp. 956–968, Feb. 2014. Research Assistant with the Department of Mechan-
[40] S. Zhou and Y. Chen, “Control design for Itô stochastic interval type-2 ical Engineering, University of Hong Kong, Hong
models with time-varying delays,” Neurocomputing, vol. 275, pp. 829– Kong. She is now a Visiting Ph.D. Student with the
844, 2018. Department of Electronic and Computer Engineering,
[41] Z. Zhang, Y. Niu, and J. Song, “Input-to-state stabilization of interval Brunel University London, Uxbridge, U.K. Her current research interests include
type-2 fuzzy systems subject to cyber attacks: An observer-based adaptive Markovian jump systems, sliding mode control, and finite-time control.
sliding mode approach,” IEEE Trans. Fuzzy Syst., vol. 28, no. 1, pp. 190–
203, Jan. 2020.
[42] B. Xiao, H. Lam, Y. Yu, and Y. Li, “Sampled-data output-feedback tracking
control for interval type-2 polynomial fuzzy systems,” IEEE Trans. Fuzzy
Syst., to be published, doi: 10.1109/TFUZZ.2019.2907503. Jun Song (Member, IEEE) received the B.E. degree
[43] B. Xiao, H. Lam, and H. Li, “Stabilization of interval type-2 polynomial- in electronic science and technology and the M.E.
fuzzy-model-based control systems,” IEEE Trans. Fuzzy Syst., vol. 25, degree in pattern recognition and intelligent system
no. 1, pp. 205–217, Feb. 2017. from Anhui University, Hefei, China, in 2011 and
[44] B. Xiao, H. Lam, Z. Zhong, and S. Wen, “Membership-function-dependent 2014, respectively, and the Ph.D. degree in control
stabilization of event-triggered interval type-2 polynomial fuzzy-model- science and engineering from the East China Univer-
based networked control systems,” IEEE Trans. Fuzzy Syst., to be pub- sity of Science and Technology, Shanghai, China, in
lished, doi: 10.1109/TFUZZ.2019.2957256. 2018.
[45] H. Zhang, P. Cheng, L. Shi, and J. Chen, “Optimal denial-of-service attack He is currently an Associate Professor with the East
scheduling with energy constraint,” IEEE Trans. Autom. Control, vol. 60, China University of Science and Technology. From
no. 11, pp. 3023–3028, Nov. 2015. October 2016 to October 2017, he was a Visiting
[46] O. L. V. Costa, M. D. Fragoso, and R. P. Marques, Discrete-Time Markov Ph.D. Student with the Department of Computer Science, Brunel University
Jump Linear Systems. London, U.K.: Springer, 2006. London, Uxbridge, U.K. He was also a Research Assistant or Research Fellow
[47] Y. S. Moon, P. Park, W. H. Kwon, and Y. S. Lee, “Delay-dependent robust with The University of Hong Kong, City University of Hong Kong and Western
stabilization of uncertain state-delayed systems,” Int. J. Control, vol. 74, Sydney University, Sydney, NSW, Australia. His current research interests
no. 14, pp. 1447–1455, 2001. including Markovian jump systems and optimal control, stochastic systems,
[48] K. Tanaka and H. O. Wang, Fuzzy Control Systems Design and Analysis: finite-time stability, and sliding mode control.
A Linear Matrix Inequality Approach. New York, NY, USA: Wiley, 2001. Dr. Song is a Member of Chinese Association of Automation (CAA).

Authorized licensed use limited to: Central South University. Downloaded on June 22,2022 at 12:51:42 UTC from IEEE Xplore. Restrictions apply.

You might also like