International Journal of Fuzzy Systems

, Volume 21, Issue 3, pp 700–714 | Cite as

Security Control of Networked T–S Fuzzy System Under Intermittent DoS Jamming Attack with Event-Based Predictor

  • Hui Ge
  • Dong Yue
  • Xiangpeng XieEmail author
  • Song Deng
  • Songlin Hu


In this paper, the security issue of networked T–S fuzzy system (NTFS) is investigated under intermittent DoS jamming attack (I-DoS-JA). This kind attack often causes the hiatus of control input and output feedback in communication channels. In order to compensate the missing data caused by attacks, a model-based predictive control framework is proposed by embedding predictors within the closed-loop NTFS, in which: (1) a T–S fuzzy model is formulated with the consideration of I-DoS-JA. Based on this model, a fuzzy observer is constructed to estimate the unmeasurable system states; (2) the predictors embedded in remote plant and local controller are modeled as a synchronous T–S fuzzy system; and (3) an event-trigger mechanism is integrated in the observer-based predictor, which would take great advantages in saving bandwidth sources. Finally, a nonlinear system is given as an example to substantiate the work of this paper.


T–S fuzzy Security control Predictive control Event-based predictor Intermittent DoS jamming attack 



This work is supported by National Natural Science Foundation (NNSF) of China under Grant 61633016, 61533010, 61833008, 61374055 and 61503194. The authors would like to thank the anonymous reviewers for many helpful comments and suggestions that certainly contributed to improve this paper.


  1. 1.
    Derler, P., Lee, E.A., Vincentelli, A.S.: Modeling cyber-physical systems. Proc. IEEE 100(1), 13–28 (2012)CrossRefGoogle Scholar
  2. 2.
    Poovendran, R.: Cyber–physical systems: close encounters between two parallel worlds [point of view]. Proc. IEEE 98(8), 1363–1366 (2010)CrossRefGoogle Scholar
  3. 3.
    Hauser, J., Sastry, S., Kokotovic, P.: Nonlinear control via approximate input-output linearization: the ball and beam example. IEEE Trans. Autom. Control 37(3), 392–398 (1989)MathSciNetCrossRefGoogle Scholar
  4. 4.
    Ma, H., Liang, H., Zhou, Q., Ahn, C.K.: Adaptive dynamic surface control design for uncertain nonlinear strict-feedback systems with unknown control direction and disturbances. IEEE Trans. Syst. Man Cybern. Syst. 16, 1–10 (2018)Google Scholar
  5. 5.
    Takagi, T., Sugeno, M.: Fuzzy identification of systems and its applications to modeling and control. IEEE Trans. Syst. Man Cybern. Syst. 15, 116–132 (1985)CrossRefzbMATHGoogle Scholar
  6. 6.
    Ma, H., Zhou, Q., Bai, L., Liang, H.: Observer-based adaptive fuzzy fault-tolerant control for stochastic nonstrict-feedback nonlinear systems with input quantization. IEEE Trans. Syst. Man Cybern. Syst. PP(99), 1–12 (2018)Google Scholar
  7. 7.
    Lam, H.K., Narimani, M.: Stability analysis and performance design for fuzzy-model-based control system under imperfect premise matching. IEEE Trans. Fuzzy Syst. 17(4), 949–961 (2009)CrossRefGoogle Scholar
  8. 8.
    Peng, C., Wu, M., Xie, X., Wang, Y.: Event-triggered predictive control for networked nonlinear systems with imperfect premise matching. IEEE Trans. Fuzzy Syst. PP(99), 1–1 (2018)Google Scholar
  9. 9.
    Zhang, Y., Liang, H., Ma, H., Zhou, Q., Yu, Z.: Distributed adaptive consensus tracking control for nonlinear multi-agent systems with state constraints. Appl. Math. Comput. 326, 16–32 (2018)MathSciNetGoogle Scholar
  10. 10.
    Xie, X., Ma, H., Zhao, Y., Ding, D.W., Wang, Y.: Control synthesis of discrete-time TCS fuzzy systems based on a novel non-PDC control scheme. IEEE Trans. Fuzzy Syst. 21(1), 147–157 (2013)CrossRefGoogle Scholar
  11. 11.
    Peng, C., Ma, S., Xie, X.: Observer-based non-PDC control for networked T–S fuzzy systems with an event-triggered communication. IEEE Trans. Cybern. PP(99), 1–9 (2017)Google Scholar
  12. 12.
    Wang, L., Lam, H.-K.: Local stabilization for continuous-time Takagi–Sugeno fuzzy systems with time delay. IEEE Trans. Fuzzy Syst. 26(1), 379–385 (2018)CrossRefGoogle Scholar
  13. 13.
    Ren, Y., Li, Q., Ding, D., Xie, X.: Dissipativity-preserving model reduction for Takagi–Sugeno fuzzy systems. IEEE Trans. Fuzzy Syst. (2018).
  14. 14.
    Zhang, Z., Zhou, Q., Wu, C., Li, H.: Dissipativity-based reliable interval type-2 fuzzy filter design for uncertain nonlinear systems. Int. J. Fuzzy Syst. 20(2), 1–13 (2018)MathSciNetCrossRefGoogle Scholar
  15. 15.
    Cardenas, A.A., Amin, S., Sastry, S.: Secure control: towards survivable cyber-physical systems. In: International Conference on Distributed Computing Systems Workshops, pp. 495–500 (2008)Google Scholar
  16. 16.
    Xie, X., Yue, D., Zhang, H., Xue, Y.: Control synthesis of discrete-time T–S fuzzy systems via a multi-instant homogenous polynomial approach. IEEE Trans. Cybern 46(3), 630–640 (2016)CrossRefGoogle Scholar
  17. 17.
    Su, X., Zhou, H., Song, Y.D.: An optimal divisioning technique to stabilization synthesis of T–S fuzzy delayed systems. IEEE Trans. Cybern. 47(5), 1147–1156 (2016)CrossRefGoogle Scholar
  18. 18.
    Lam, H.K., Leung, F.H.F.: LMI-based stability and performance design of fuzzy control systems: fuzzy models and controllers with different premises. In: IEEE International Conference on Fuzzy Systems, pp. 2027–2034 (2006)Google Scholar
  19. 19.
    Su, X., Peng, S., Wu, L., Basin, M.V.: Reliable filtering with strict dissipativity for T–S fuzzy time-delay systems. IEEE Trans. Cybern. 44(12), 2470–2483 (2017)Google Scholar
  20. 20.
    Wang, Y., Xia, Y., Ahn, C.K., Zhu, Y.: Exponential stabilization of Takagi–Sugeno fuzzy systems with aperiodic sampling: an aperiodic adaptive event-triggered method. IEEE Trans. Syst. Man Cybernet. Syst. PP(99), 1–11 (2018)Google Scholar
  21. 21.
    Amin, S., Sastry, S.S.: Safe and secure networked control systems under denial-of-service attacks. In: International Conference on Hybrid Systems: Computation and Control, pp. 31–45 (2009)Google Scholar
  22. 22.
    Persis, C.D., Tesi, P.: Input-to-state stabilizing control under denial-of-service. IEEE Trans. Autom. Control 60(11), 2930–2944 (2015)MathSciNetCrossRefzbMATHGoogle Scholar
  23. 23.
    Smith, R.S.: Covert misappropriation of networked control systems: presenting a feedback structure. IEEE Control Syst. 35(1), 82–92 (2015)MathSciNetCrossRefGoogle Scholar
  24. 24.
    Mo, Y., Weerakkody, S., Sinopoli, B.: Physical authentication of control systems: designing watermarked control inputs to detect counterfeit sensor outputs. IEEE Control Syst. 35(1), 93–109 (2015)MathSciNetCrossRefGoogle Scholar
  25. 25.
    Liu, J., Wei, L., Xie, X., Tian, E., Fei, S.: Quantized stabilization for T–S fuzzy systems with hybrid-triggered mechanism and stochastic cyber-attacks. IEEE Trans. Fuzzy Syst. 26, 3820 (2018). CrossRefGoogle Scholar
  26. 26.
    He, X., Wang, Z., Zhou, D.H.: Robust fault detection for networked systems with communication delay and data missing. Automatica 45(11), 2634–2639 (2009)MathSciNetCrossRefzbMATHGoogle Scholar
  27. 27.
    Zhang, W.A., Yu, L.: Output feedback stabilization of networked control systems with packet dropouts. IEEE Trans. Autom. Control 52(9), 1705–1710 (2007)MathSciNetCrossRefzbMATHGoogle Scholar
  28. 28.
    Sakthivel, R., Ahn, C.K., Joby, M.: Fault-tolerant resilient control for fuzzy fractional order systems. IEEE Trans. Syst. Man Cybern. Syst. PP(99), 1–9 (2018)CrossRefGoogle Scholar
  29. 29.
    Ge, H., Yue, D., Xie, X.: Observer-based fault diagnosis of nonlinear systems via an improved homogeneous polynomial technique. Int. J. Fuzzy Syst. 20(2), 403–415 (2018)MathSciNetCrossRefGoogle Scholar
  30. 30.
    Xiong, J., Lam, J.: Stabilization of linear systems over networks with bounded packet loss. Automatica 43(1), 80–87 (2007)MathSciNetCrossRefzbMATHGoogle Scholar
  31. 31.
    Knapp, E.D.: Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems. Syngress, New York (2014)Google Scholar
  32. 32.
    Falliere, N., Murchu, L.O., Chien, E.: W32.stuxnet dossier. White Paper (2011)Google Scholar
  33. 33.
    Peng, T., Leckie, C., Ramamohanarao, K.: Survey of Network-Based Defense Mechanisms Countering the DoS and DDoS Problems. ACM, Oxford (2007)CrossRefGoogle Scholar
  34. 34.
    Ambrosin, M., Conti, M., Gaspari, F.D., Devarajan, N.: Amplified distributed denial of service attack in software defined networking. In: IFIP International Conference on New Technologies, Mobility and Security, pp. 1–4 (2016)Google Scholar
  35. 35.
    Zhang, J., Xia, Y., Shi, P.: Design and stability analysis of networked predictive control systems. IEEE Trans. Control Syst. Technol. 21(4), 1495–1501 (2013)CrossRefGoogle Scholar
  36. 36.
    Yin, X., Yue, D., Hu, S., Peng, C., Xue, Y.: Model-based event-triggered predictive control for networked systems with data dropout. SIAM J. Control Optim. 54(2), 567–586 (2016)MathSciNetCrossRefzbMATHGoogle Scholar
  37. 37.
    Dong, Y., Tian, E., Han, Q.L.: A delay system method for designing event-triggered controllers of networked control systems. IEEE Trans. Autom. Control 58(2), 475–481 (2013)MathSciNetCrossRefzbMATHGoogle Scholar
  38. 38.
    Wang, L., Lam, H.K.: A new approach to stability and stabilization analysis for continuous-time Takagi–Sugeno fuzzy systems with time delay. IEEE Trans. Fuzzy Syst. 26(4), 2460–2465 (2018)CrossRefGoogle Scholar
  39. 39.
    Zhang, Y., Sun, J., Liang, H., Li, H.: “Event-triggered adaptive tracking control for multiagent systems with unknown disturbances,” IEEE transactions on cybernetics, (2018)Google Scholar
  40. 40.
    Zhou, Q., Li, H., Wu, C., Wang, L., Ahn, C.K.: Adaptive fuzzy control of nonlinear systems with unmodeled dynamics and input saturation using small-gain approach. IEEE Trans. Syst. Man Cybern. Syst. PP(99), 1–11 (2017)Google Scholar
  41. 41.
    Hespanha, J.P., Morse, A.S.: Stability of switched systems with average dwell-time. Proc. IEEE Conf. Decis. Control 1999 3, 2655–2660 (2002)CrossRefGoogle Scholar
  42. 42.
    Hu, S., Yue, D., Peng, C., Xie, X., Yin, X.: Event-triggered controller design of nonlinear discrete-time networked control systems in T–S fuzzy model. Appl. Soft Comput. 30, 400–411 (2015)CrossRefGoogle Scholar
  43. 43.
    Peng, C., Han, Q.L.: A novel event-triggered transmission scheme and \(\cal{L}_{\in }\) control co-design for sampled-data control systems. IEEE Trans. Autom. Control 58(10), 2620–2626 (2013)MathSciNetCrossRefzbMATHGoogle Scholar

Copyright information

© Taiwan Fuzzy Systems Association 2019

Authors and Affiliations

  • Hui Ge
    • 1
  • Dong Yue
    • 2
  • Xiangpeng Xie
    • 2
    Email author
  • Song Deng
    • 2
  • Songlin Hu
    • 2
  1. 1.School of AutomationNanjing University of Post and TelecommunicationsNanjingPeople’s Republic of China
  2. 2.Institute of Advanced TechnologyNanjing University of Post and TelecommunicationsNanjingPeople’s Republic of China

Personalised recommendations