Adaptive Secure Control For Uncertain Cyber-Physical Systems With Markov Switching Against Both Sensor and Actuator Attacks
Adaptive Secure Control For Uncertain Cyber-Physical Systems With Markov Switching Against Both Sensor and Actuator Attacks
Abstract—In this article, adaptive secure controller synthesis [8], [9]. It is thus of great significance, from the point of view
for uncertain cyber–physical systems with Markov switching of long-term operation, to deal with the security problem of
(CPSMSs), both sensor and actuator stealthy attacks as well as CPSs with in-depth exploration [10].
generally unknown transition rates (GUTRs), is under consider-
ation via neural sliding mode control (SMC) technique. In order Of special relevance for this work are a class of hybrid
to resist unknown attack signals from both sensor and actuator dynamic systems called Markov jump systems (MJSs), by
channels, a novel neural network (NN)-based SMC design is which physical plants with random switching mechanism
performed, which could not only guarantee the boundedness of could be emulated, such as chemical reactor, DC motor, TD
relevant adaptive data but also force the actual state trajectories jump circuit, wheeled mobile manipulators, and aircraft engine
to arrive at the proposed sliding mode surface (SMS) with
limited moments almost surely. Then, a fresh stochastically stable system [11], [12], [13], [14], [15]. Note that the primary
criterion for the resultant plant is provided in spite of hidden matter of concern for analysis and synthesis of MJSs is
cyber attacks, GUTRs, and structural uncertainty, relying on the relevant to so-called transition rates (TRs), and research under
arrival of the SMS and stochastic stability theory. Finally, an partly unknown TRs reduces conservatism of the investigated
F-404 aircraft engine model with performance comparisons is model [16], in comparison to the case of completely known
offered to confirm the feasibleness of the theoretical result.
TRs. However, given the difficulty in obtaining the TRs and
Index Terms—Cyber–physical systems (CPSs), Markov switch- unknown uncertainties in practical situations, comprehensive
ing parameter, neural network (NN), sensor and actuator attacks, studies on control of MJSs under generally unknown TRs
sliding mode control (SMC).
(GUTRs) may be more realistic, and some remarkable control
strategies have been reported in this direction [7].
As a typical robust control technique, sliding mode control
I. I NTRODUCTION (SMC) has been extensively focused around control commu-
nity and engineering applications in view of its simplicity
YBER–PHYSICAL systems (CPSs), in view of the
C advancement of computers and information interaction
technology, have been extensively found and studied in indus-
in algorithm, robustness to parametric uncertainties and dis-
turbances [17], [18], [19], [20]. It is noteworthy that some
progresses under SMC strategy have been absorbed into the
trial field around the heterogeneous cyber layers and physical
synthesis of uncertain MJSs [12], [13], [15], [17], [20], [21],
plants [1], [2], [3], [4]. Nevertheless, upon the background
[22]. To cite a few, an event-triggered SMC for discrete-
of continuous development and increasing complexity of
time MJSs was deliberated more in [20]; the stabilization for
networked embedded technique, the fragility of CPSs from
MJSs subject to actuator faults was investigated based upon
unknown attackers is escalated. Malicious attacks will degrade
adaptive SMC in [23]. It is also notable that, security control
system’s control precision by fabricating the sensor’s measure-
problems of CPSs have been probed further [24], [25], [26],
ment and/or impeding the actuator’s command, which would
e.g., adaptive control methods against stealthy attacks were
cause unpredictable damage to physical systems [5], [6], [7],
proposed for nonlinear T–S fuzzy systems and discrete-time
Received 15 August 2024; revised 28 December 2024; accepted 26 systems in [24] and [25], respectively.
February 2025. This work was supported in part by the National Natural Due to practical background of hybrid systems and signal
Science Foundation of China under Grant 61803217 and Grant 62003231;
in part by the Natural Science Foundation of Shandong Province under
communications between plant devices and cyber layers,
Grant ZR2023MF029; in part by the Team Plan for Youth Innovation of recent years have witnessed the research progress of CPSs with
Universities in Shandong Province under Grant 2022KJ142; and in part by Markov switching (CPSMSs). Apart from the GUTRs, another
the Taishan Scholar Special Project Fund under Grant TSON202408163.
(Corresponding author: Zhen Liu.)
crucial matter in resilient control of CPSMSs is the malicious
Zhen Liu and Junye Zhang are with the School of Automation cyber attacks, and some control strategies for CPSMSs against
and the Shandong Key Laboratory of Industrial Control Technology, injected attacks were investigated [7], [17], [27], [28]. Notably,
Qingdao University, Qingdao 266071, China (e-mail: zhenliuzz@hotmail.com;
junyezhang1@163.com).
the above researches focused on the actuator attacks from
Quanmin Zhu is with the School of Engineering, University of the West of cyber layers only, while ignoring the general case malicious
England, BS16 1QY Bristol, U.K. (e-mail: quan.zhu@uwe.ac.uk). attackers pose unknown attacks to both the actuator and
Color versions of one or more figures in this article are available at
https://doi.org/10.1109/TSMC.2025.3547865.
sensor’s channels concurrently. In fact, the output signals
Digital Object Identifier 10.1109/TSMC.2025.3547865 may be contaminated due to injected sudden sensor attacks,
2168-2216
c 2025 IEEE. All rights reserved, including rights for text and data mining, and training of artificial intelligence
and similar technologies. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: SHENZHEN UNIVERSITY. Downloaded on March 27,2025 at 02:34:01 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
which will be inaccurate for the sliding surface design and D(rt ) and E(rt ) are known matrices, Y(t) is an uncertain
controller synthesis, then the control signal becomes invalid matrix and Y T (t)Y(t) ≤ I. The right-continuous Markov
and the security of the system is not guaranteed, leading process denoted by {rt , t ≥ 0}, give values in the set J =
to the instability of the whole system. Just recently, an {1, 2, . . . , J}.
adaptive resilient control method for CPSMSs under sensor In what follows, attack scenarios are focused in the begin-
and actuator attacks was studied in [29], whereas the previous ning, from which both sensor measurement and control input
control results were discussed in the light of norm-bounded signal may be corrupted. The sensor attack depending on the
assumption made in system attacks. To the authors’ knowl- state is defined by ∂s (t) as
edge, the above-addressed issues or limitations regarding the
analysis and synthesis of CPSMSs still have not been fully ∂s (t) = p(t)x(t), t ≥ 0 (2)
inspected and solved so far. Moreover, neural network (NN), where p(t) denotes the time-varying unknown nonlinear
as a valid approximation technology, has been employed to weight function which satisfies 0 ≤ p(t) ≤ ¯ < 1 and |ṗ(t)| ≤
identify unknown nonlinear signals, which is beneficial for ς̄ < 1, t ≥ 0, ¯ and ς̄ are two unknown scalars. Then, the
the controller design to a great extent [30], however, related actual state information xs (t), stemming from the compromised
reports on NN-based SMC strategy of CPSMSs are relatively sensor channel for feedback, is expressed as
scarce, which generates the motivation of the work finally.
In response to the above observations, this article attempts xs (t) = x(t) + ∂s (t), t ≥ 0. (3)
to provide an NN-based secure control scheme for uncertain
In addition, the actual control signal ua (t) received by the
CPSMSs against structural uncertainty, GUTRs, both sensor
actuator is depicted by
and actuator attacks under a novel SMC framework. The main
innovations and tasks are delivered as follows. ua (t) = u(t) + ∂a (x(t), t), t ≥ 0 (4)
1) In contrast to [17] and [28], a simplified linear-type
sliding mode surface (SMS) is established drawing upon in which u(t) is the devised controller, ∂a (x(t), t) represents
the actual sensor measurement, from which an updated the actuator attack signal estimated by NN in Section II-B.
adaptive SMC framework for uncertain CPSMSs is con- Designate = [ηij ]J×J (i, j ∈ J ) as TR matrix with mode
ducted, and a novel sufficient criterion for the resultant transition probabilities shown by
system to be stochastically stable is derived relying
Pij = Pr(rt+t = j|rt = i)
on the attainability of the special SMS and stochastic
ηij t + o(t), if i = j;
stability theory. =
2) In comparison to [17], [27], [28], and [29], a novel 1 + ηii t + o(t), if i = j
NN-based SMC strategy is exhibited to guarantee both
the finite-time reachability of the proposed SMS and where ηij = η̂ij + ηij represents TR from mode i at moment t
security performance with robustness against sensor and to mode j at moment t + t, η̂ij denotes the TR’s deterministic
actuator attacks as well as the GUTRs, where previous term, and ηij stands for uncertain term satisfying |ηij | ≤
norm boundedness assumption for unknown attacks is no ϑij , ϑij > 0, when i = j; and ηii = − Jj=1,j=i ηij . For
longer required, which generalizes the result in previous convenience, the following two index sets are introduced:
works.
k j:η̂ij is accessible for j ∈ J
i
3) The resiliency of the developed control mechanism
uk j:η̂ij is inaccessible for j ∈ J
i
against pernicious actuator and sensor attacks is verified (5)
through simulation analysis, and the efficiency of the
proposed theoretical result is justified by performance with the TRs divided by four categories: 1) i ∈ k i and j ∈
uk = ; 2) i ∈ uk i and k i = ; 3) uk i = J and
i
comparisons with specified indicators.
Notation: sym{P} represents P + PT . In symmetric block j ∈ k for some j = i; and 4) uk i = J and j ∈
j / k j for any
matrices, “∗” is employed to denote abbreviations of symmetry j ∈ J . Let rt = i ∈ J , A(rt ), A(rt , t), B(rt ), D(rt ), E(rt ) and
terms. Mathematical expectation is expressed by E{·}, and ·F Y(t) can be shortened by Ai , Ai (t), Bi , Di , Ei , and Y.
represents the Frobenius-norm. Consequently, (1) is reorganized as
ẋ(t) = (Ai + ΔAi (t))x(t)
II. M ODEL D ESCRIPTION AND P REPARATIONS + Bi [u(t) + ∂a (x(t), t)]. (6)
A. System Description
The following class of uncertain CPSMSs are considered: B. Neural Network Architecture
ẋ(t) = (A(rt ) + ΔA(rt , t))x(t) + B(rt )ua (t) (1) As stated in [30], a three-layer feedforward NN is used
to design an adaptive neural controller in this research (see
where x(t) = [x1 (t), x2 (t), . . . , xn (t)]T ∈ Rn and ua (t) ∈ Rm Fig. 1), and the net with the input x and output y is given
stand for state vector and control signal subject to certain as y(x) = W T ϕ(V T x), where W and V denote the connection
actuator attacks, respectively. A(rt ) ∈ Rn×n and B(rt ) ∈ weights between neurons with corresponding dimensions, and
Rn×m represent system matrices, A(rt , t) is the structural ϕ(·) represents the activation function in the hidden layer
uncertainty that fulfills A(rt , t) = D(rt )Y(t)E(rt ), where neurons.
Authorized licensed use limited to: SHENZHEN UNIVERSITY. Downloaded on March 27,2025 at 02:34:01 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
Authorized licensed use limited to: SHENZHEN UNIVERSITY. Downloaded on March 27,2025 at 02:34:01 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
in which S(x(t)) Bi T Pi x(t). Thus, the following can be In view of β̂(t) ˙ ≥0, one
˙ = −1 ζ ϒST (x (t))≥ 0 and β̂(0)
4 s
derived: also gives
ẋ(t) (1 − q̇(t))x(t) R1,i ≤ S(xs (t))Bi T Pi (Ai + ΔAi (t))xs (t)
Ṡ(xs (t)) = Bi T Pi [ − ]. (15)
1 − q(t) (1 − q(t))2 − S(xs (t))Bi T Pi (Ai + Di Ei )xs (t)
Then, the infinitesimal operator L on V1 (S(xs (t)), i) yields Λi
+ ζ ϒS(xs (t))α T ω −
1 − q(t)
LV1 (S(xs (t) ), i) = R1,i + R2,i (16) − ζ ϒS(xs (t))(α̂ T ω + σ )
where R1,i = (1/(1 − q(t)))ST (xs (t))Bi T Pi ẋ(t) + + tr W̃ T 1 W̃˙ + tr ÕT Õ˙ + α̃ T α̃˙
2 3
T ˙ T ˙
tr W̃ 1 W̃ + tr Õ 2 Õ + α̃ T 3 α̃, ˙ R2,i = −((1 − Λi
q̇(t))/((1 − q(t)) ))S (xs (t))Bi Pi x(t). Further, R1,i is
2 T T ≤ ζ ϒS(xs (t))α T ω −
1 − q(t)
converted into
− ζ ϒS(x(t))(α̂ T ω + σ ) + α̃ T 3 α̃˙
ST (xs (t)) T ˙ + tr ÕT Õ˙ .
+ tr W̃ T W̃ (21)
R1,i = Bi Pi (Ai + ΔAi (t))x(t) 1 2
1 − q(t)
In the position, for the case Λi > 0, it follows that:
ST (xs (t)) T
+ (Bi Pi Bi )(u(t) + ∂a (xs (t), t)) R1,i ≤ ζ ϒS(xs (t))(α T ω − α̂ T ω) − ζ ϒS(xs (t))σ
1 − q(t)
˙ + tr{ÕT Õ} ˙ + α̃ T α̃.
˙ ˙ + tr ÕT Õ˙ + α̃ T α̃˙
− ζ Λi + tr W̃ T 1 W̃
+ tr{W̃ T 1 W̃} 2 3 2 3
T
(17) ≤ ζ ϒS(xs (t)) α ω − α̂ ω T
Authorized licensed use limited to: SHENZHEN UNIVERSITY. Downloaded on March 27,2025 at 02:34:01 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
it further follows: ⎡ ⎤
i,3 + 3 (Pi Di )T Pi − Pg
R3,i ≤ −δ1 S(xs (t)) < 0, for t ≥ T ∗ . (29) ⎣ ∗ −ιI 0 ⎦ < 0. (36)
∗ ∗ −Wi
Moreover, introduce the function V3 (S(xs (t)), i) =
˙
[1/2]ST (xs (t))S(xs (t)). Considering the case that β̃(t) = Case 4: uk
i = J, g ∈
uk and j ∈
i / k j for any j ∈ J
˙ ⎧⎡ ⎤
β̂(t) > 0, there exists a finite instant T > 0 such that ⎪
⎪ + 4 (Pi Di )T Pjα − Pj
˙ ⎨ ⎣ i,4
4 β̃(t)β̃(t) ≥ 0 for t ≥ Tf = max{T ∗ , T }. In view of (29), ∗ −ιI 0 ⎦<0
(37)
one can get ⎪
⎪ ∗ ∗ −Xi,jα
⎩
Pi − Pj ≥ 0.
LV3 (S(xs (t)), i) ≤ −δ1 S(xs (t)) < 0 ∀t ≥ Tf .
where the matrix Ki is set for Ai − Bi Ki is Hurwitz, and
(30)
i, = sym{Pi (Ai − Bi Ki )} + ιEi T Ei , ∈ {1, 2, 3, 4}
Further, one has 1 2
1 = η̂ij Pj − Pg + ϑij Ug,i
LV3 (S(xs (t)), i) ≤ −ζ V3 (S(xs (t)), i)∀t ≥ Tf (31) i
4
j∈
√ k
where ζ = 2δ1 . By Itô’s formula, it yields 1 2
2 = η̂ij Pj − Pg + ϑij Vg,i
LS(xs (t)) = L V3 (S(xs (t)), i) ≤ −ζ /2 (32) i
4
j∈ k
and hence 1 2
3 = αi η̂jj Pi − Pg + ϑjj Wi ,
4
ES(xs (t)) ≤ ES xs Tf − (ζ /2)(t − Tf ) (33) 1 2
4 = η̂jjα Pjα − Pg + ϑjjα Xi,jα
which concludes there exists an instant tf = Tf + 2m0 /ζ 4
satisfying ES(xs (t)) = 0 for all t ≥ tf , where m0 = ψ1 = Pj,1 − Pg , Pj,2 − Pg , . . . , Pj1 − Pg
ES(xs (Tf )) < ∞. Thus, the arrival of the devised SMS can ψ2 = Pj,1 − Pg , Pj,2 − Pg , . . . , Pj2 − Pg .
be determined almost surely.
Proof: The Lyapunov function candidate is selected as
Remark 2: In contrast to the existing control strat-
egy [17], [19] that guaranteed the uniform boundedness of V4 (x, i) = xT (t)Pi x(t). (38)
sliding variable only, the proposed NN-based adaptive SMC
The infinitesimal generator of V4 (x, i) along system (6) gives
design can not only satisfy the boundedness of related data
but also admit the state onto the proposed SMS S(xs (t)) = 0
J
in finite time almost surely. LV4 (x, i) = 2xT (t)Pi ẋ(t) + ηij xT (t)Pj x(t)
Remark 3: Differing from the projection operator approach j=1
to handle the attack signals in [29], the NN-based control = x (t) · sym{Pi (Ai − Bi Ki )}x(t)
T
method is introduced herein. It is worth mentioning that the + 2xT (t)Pi ΔAi x(t) + 2xT (t)Pi Bi
norm-bounded assumption is not required in this work, which
indicates the control design in (12) generalizes the result J
· ua (t) + Ki x(t) + ηij xT (t)Pj x(t).
proposed in [29]. j=1
Authorized licensed use limited to: SHENZHEN UNIVERSITY. Downloaded on March 27,2025 at 02:34:01 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
ηij
Besides, the following inequality is held: = ηij Pj + ηii Pi − ηii + λi,k Pj
i i ,j =i
−ηii − λi,k
2xT (t)Pi ΔAi x(t) ≤ ι−1 xT (t)Pi Di Di T Pi x(t) j∈ k j∈ uk
+ ιxT (t)Ei T Ei x(t) (39) where j∈ i ,j =i (ηij /−ηii − λi,k ) = 1, 0 ≤ ηij /(−ηii − λi,k )
uk
Authorized licensed use limited to: SHENZHEN UNIVERSITY. Downloaded on March 27,2025 at 02:34:01 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
J
ηij Pj IV. S IMULATION VALIDATION
j=1 In this section, a representative example is taken, from
= ηija Pja + ηii Pi + ηij Pj which the viability of the presented control method is substan-
i ,j =i tiated with simulation comparisons.
j∈ uk
Example 1: As a simulation object, the linearized F-404
ηij Pj
= ηija Pja + ηii Pi − ηii + λi,k (54) aircraft engine plant model in [15] is borrowed, in which the
i ,j =i
−ηii − λi,k relevant state vector with physical data is written as
j∈ uk
⎡ ⎤
thus one has sideslip angle(o /s)
J x(t) = ⎣ roll rate(o /s) ⎦.
i,4 + ηij Pj yaw rate(o /s)
j=1
The corresponding matrix Ai is described as
= i,4 +ηii Pi − Pg + ηija Pja − Pg . (55) ⎡ ⎤
g∈Ωuk i ,j=i −1.46 0 2.48
Ai = ⎣0.1643 + 0.5τi −0.4 + τi −0.3788⎦
Since 0 ≤ ηij ≤ −ηii −λi,k , the inequality i,4 +ηii (Pi −Pg )+ 0.3107 0 −2.23
ηija (Pja − Pg ) < 0 is equivalent to
where τi , i = 1, 2, 3, are unknown parameters of the system
i,4 + ηii Pi − Pg + αi ηjja Pja − Pg < 0. (56)
model and set by −1, −2 and −3, respectively, then it follows:
Due to ηii < 0, (56) < 0 holds if ⎡ ⎤ ⎡ ⎤
−1.46 0 2.428 −0.1
Pi − Pg ≥ 0, (57) A1 = ⎣−0.3357 −1.4 −0.3788⎦, B1 = ⎣ 0.2 ⎦,
i,4 + αi ηjja Pja − Pg < 0. 0.3107 0 −2.23 −0.2
⎡ ⎤ ⎡ ⎤
Further, by Lemma 3, for any Xijα > 0, it gives −1.46 0 2.428 −0.2
A2 = ⎣−0.8357 −2.4 −0.3788⎦, B2 = ⎣ 0.1 ⎦,
ηjja Pja − Pg 0.3107 0 −2.23 −0.1
⎡ ⎤ ⎡ ⎤
= η̂jja Pja − Pg + Δηjja Pja − Pg −1.46 0 2.428 −0.2
2
ϑjja A3 = ⎣−1.3357 −3.4 −0.3788⎦, B3 = ⎣ 0.1 ⎦;
≤ η̂jja Pja − Pg + Xija 0.3107 0 −2.23 −0.2
−1
4
T ⎡ ⎤ ⎡ ⎤
+ Pja − Pg Xija Pja − Pg . (58) 0.2 0.2 0.1 0.2 0.3 0.1
D1 = ⎣ 0 0.2 0 ⎦, E1 = ⎣ 0 0.2 0.1⎦,
From the similar line and condition (37), LV4 (x, i) < 0 still 0 0.2 0.1 0 0.3 0.3
⎡ ⎤ ⎡ ⎤
holds, which implies the stochastic stability of system (6) on 0.2 0.1 0.1 0.1 0.2 0.2
the sliding motion. D2 = ⎣0.1 0.2 0.1⎦, E2 = ⎣ 0 0.2 0.2⎦,
Remark 4: As seen, a novel NN-based secure controller 0.1 0.2 0.1 0.1 0.2 0.3
design is developed for the underlying CPSMSs, where the ⎡ ⎤ ⎡ ⎤
0.1 0.2 0 0.2 0.2 0.2
control diagram against potential sensor and actuator attacks D3 = ⎣0.1 0.2 0 ⎦, E3 = ⎣ 0 0.2 0.1⎦.
is displayed in Fig. 2, and the main components of the whole 0.2 0.2 0.1 0.1 0.2 0.3
CPSMS, i.e., the physical layer, cyber layer, and control layer,
are integrated, in which both the sensor and actuator attack The TR matrix is set as
signals described through the communication channels may ⎡ ⎤
endanger the system security, and the effects of the two −0.45 + Δη11 ? 0.27 + Δη13
malicious cyber attacks can be well suppressed by the current =⎣ ? ? 0.38 + Δη23 ⎦
adaptive control method. ? ? ?
Authorized licensed use limited to: SHENZHEN UNIVERSITY. Downloaded on March 27,2025 at 02:34:01 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
Authorized licensed use limited to: SHENZHEN UNIVERSITY. Downloaded on March 27,2025 at 02:34:01 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
Authorized licensed use limited to: SHENZHEN UNIVERSITY. Downloaded on March 27,2025 at 02:34:01 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
(a) (b)
(c) (d)
Fig. 10. Jump mode rt and SMS variable S(xs (t)).
Fig. 9. Comparison of performance measures.
⎧
⎪
⎪ M(t) + N1 (t)N2 (t), 0≤t<3
⎨
0, 3≤t<8
∂a (x(t), t) =
⎪
⎪ (1 + 1.2 sin(200t)), 8 ≤ t < 15
⎩
0, 15 ≤ t < 20
where M(t) = 0.4 sin(3t), N1 (t) = 0.2 cos(3t) and N2 (t) = (a) (b)
sin(x2 (t)) cos(x3 (t)), and the time-varying function p(t) of the
sensor attack is chosen as
⎧
⎨ 0, 0≤t<4
p(t) = 0.6 + 0.25 sin(2t), 4 ≤ t < 10
⎩
0.5 + 0.45 sin(2t), 10 ≤ t ≤ 20.
Then, the evolutions of transfer mode rt and SMS variable are (c) (d)
shown by Fig. 10, the norm curves of the adaptive parameters
Fig. 11. Norm curves of adaptive parameters Ŵ(t), Ô(t), α̂(t), and β̂(t).
Ŵ(t), Ô(t), α̂(t) and β̂(t) are provided in Fig. 11, and the
curves of the state response and control signal, based on the
two different methods, are described in Fig. 12.
Moreover, differing from the case in [28] that just takes
actuator attacks into consideration, the proposed method deals
with a more general case that the sensor and actuator are
simultaneously interfered. As seen from Fig. 12, although the
system is obviously affected by both the actuator and sensor
attacks during [0s, 3s] and [8s, 10s], the state response will (a) (b)
return to stable status more robustly and quickly by virtue
of the proposed NN-based SMC than the method in [28],
which shows the former is more efficient in achieving desirable
operation while withstanding complicated threats.
Furthermore, the analysis of the above quantitative data
indicators is carried out, see Fig. 13, which demonstrates the
resultant system using the current method is also resilient (c) (d)
against both attacks with better control accuracy and lower
EC. At last, the statistical results under 30 sets of repeated Fig. 12. State response and control signal under two methods.
experiments have been performed to further validate the
efficiency and advantage of the current control approach with
other peer methods, where the corresponding curves of state the controller and sensor can always be synchronized with the
response are shown in Fig. 14, which indicates the closed-loop system mode. However, some limitations using the proposed
system has better control accuracy with more robustness under methodology may exist in a real system. For instance, in prac-
the proposed algorithm in contrast to the method in [28]. tical engineering, identification errors of system mode, certain
Remark 5: It should be mentioned that the results of this delays in switching signals, etc., may lead to asynchronous
article are obtained based on the premise of that the modes of switching phenomenon among the modes of the controller,
Authorized licensed use limited to: SHENZHEN UNIVERSITY. Downloaded on March 27,2025 at 02:34:01 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
R EFERENCES
[1] K. D. Kim and P. R. Kumar, “Cyber-physical systems: A perspective at
the centennial,” Proc. IEEE, vol. 100, pp. 1287–1308, May 2012.
[2] D. Pan, D. Ding, X. Ge, Q.-L. Han, and X.-M. Zhang, “Privacy-
preserving platooning control of vehicular cyber-physical systems with
saturated inputs,” IEEE Trans. Syst., Man, Cybern., Syst., vol. 53, no. 4,
pp. 2083–2097, Apr. 2023.
[3] X.-L. Wang and G.-H. Yang, “Piecewise attack strategy design for T-S
(a) (b) fuzzy cyber-physical systems,” IEEE Trans. Syst., Man, Cybern., Syst.,
vol. 52, no. 10, pp. 6477–6486, Oct. 2022.
[4] L. W. An and G.-H. Yang, “Enhancement of opacity for distributed state
estimation in cyber-physical systems,” Automatica, vol. 136, Feb. 2022,
Art. no. 110087.
[5] Y. Joo, Z. Qu, and T. Namerikawa, “Resilient control of cyber-
physical system using nonlinear encoding signal against system integrity
attacks,” IEEE Trans Autom. Control, vol. 66, no. 9, pp. 4334–4341,
Sep. 2021
(c) (d) [6] F. Santoso and A. Finn, “A data-driven cyber-physical system using
deep-learning convolutional neural networks: Study on false-data injec-
Fig. 13. Comparison of performance measures. tion attacks in an unmanned ground vehicle under fault-tolerant
conditions,” IEEE Trans. Syst., Man, Cybern., Syst., vol. 53, no. 1,
pp. 346–356, Jan. 2023.
[7] Z. Liu, X. Chen, and J. Yu, “Adaptive sliding mode security control
for stochastic Markov jump cyber-physical nonlinear systems subject to
actuator failures and randomly occurring injection attacks,” IEEE Trans.
Ind. Informat., vol. 19, no. 3, pp. 3155–3165, Mar. 2023.
[8] M. Meng, G. Xiao, and B. Li, “Adaptive consensus for heterogeneous
multi-agent systems under sensor and actuator attacks,” Automatica,
vol. 122, Dec. 2020, Art. no. 109242.
[9] D. Meng, W. Niu, X. Ding, and L. Zhao, “Network-to-network control
over heterogeneous topologies: A dynamic graph approach,” IEEE
Trans. Syst. Man, Cyber. Syst., vol. 50, no. 5, pp. 1885–1896, May 2020.
[10] S. Nateghi, Y. Shtessel, and C. Edwards, “Resilient control of cyber-
physical systems under sensor and actuator attacks driven by adaptive
sliding mode observer,” Int. J. Control, vol. 31, no. 15, pp. 7425–7443,
Jul. 2021.
[11] S. Li and Z. Xiang, “Stochastic stability analysis and L∞ -gain con-
troller design for positive Markov jump systems with time-varying
delays,” Nonlinear Anal. Hybrid Syst., vol. 22, pp. 31–42, Nov. 2016.
[12] J. Yu, Z. Liu, and P. Shi, “Robust state-estimator-based control of
uncertain semi-Markovian jump systems subject to actuator failures
and time-varying delay,” IEEE Trans. Automat. Control, vol. 69, no. 1,
pp. 487–494, Jan. 2024.
Fig. 14. Comparative curves of state responses under two methods. [13] B. Jiang, Z. Wu, Z. Liu, and B. Li, “Adaptive sliding mode security
control of wheeled mobile manipulators with Markov switching joints
against adversarial attacks,” Control Eng. Pract., vol. 137, Aug. 2023,
Art. no. 105558.
the sensor, and the system [34], [35]. Asynchronous switching [14] E.-K. Boukas, Stochastic Switching Systems: Analysis and Design.
Boston, MA, USA: Birkhauser, 2006.
often results in a decrease in system performance, and as the [15] M. Liu, L. Zhang, P. Shi, and Y. Zhao, “Sliding mode control of
switching signal lags severely and/or fast switching occurs, continuous-time Markovian jump systems with digital data transmis-
it will cause the whole system to be unstable. Hence, the sion,” Automatica, vol. 80, pp. 200–209, Jun. 2017.
[16] C. Park, N. Kwon, I. Park, and P. Park, “H∞ filtering for
difficulties that asynchronous switching occurs during system singular Markovian jump systems with partly unknown transition
operation, may be encountered in deploying the methodology, rates,” Automatica, vol. 109, Nov. 2019, Art. no. 108528.
and the asynchronous control measures for the system are not [17] M. Li, Y. Chen, and Y. Z. Liu, “Sliding-mode secure control for jump
cyber–physical systems with malicious attacks,” J. Frank. Inst., vol. 358,
probed, which deserves further investigation in future work. no. 7, pp. 3424–3440, May 2021.
[18] X. Zhao, H. Yang, and G. Zong, “Adaptive neural hierarchical sliding
mode control of nonstrict-feedback nonlinear systems and an application
to electronic circuits,” IEEE Trans. Syst., Man, Cybern., Syst., vol. 47,
V. C ONCLUSION no. 7, pp. 1394–1404, Jul. 2017.
In this article, the NN-based adaptive secure control issue [19] Y. Niu, J. Lam, X. Wang, and D. W. Ho, “Neural adaptive sliding mode
control for a class of nonlinear neutral delay systems,” J. Dyn. Sys.,
for uncertain CPSMSs against GUTRs, structural uncertainty, Meas., Control., vol. 130, no. 6, Nov. 2008, Art. no. 61011.
both sensor and actuator attacks have been addressed via [20] R. Ma, X. Shao, J. Liu, and L. Wu, “Event-triggered sliding mode control
the SMC technique. A special NN-based SMC law has been of Markovian jump systems against input saturation,” Syst. Control. Lett.,
vol. 134, Dec. 2019, Art. no. 104525.
established to ensure the attainability of the devised SMS.
[21] B. Chen, Y. Niu, and Y. Zou, “Adaptive sliding mode control for stochas-
A fresh stochastically stable condition for the CPSMSs has tic Markovian jumping systems with actuator degradation,” Automatica,
been derived relying on the attainability of the SMS and vol. 49, no. 6, pp. 1748–1754, Jun. 2013.
stochastic stability theory. Finally, the feasibleness of the [22] Z. Cao, Y. Niu, and Y. Zou, “Adaptive neural sliding mode control for
singular semi-Markovian jump systems against actuator attacks,” IEEE
proposed control algorithm has been verified by simulation Trans. Syst., Man, Cybern., Syst., vol. 51, no. 3, pp. 1523–1533,
experiments with performance comparisons. Mar. 2021.
Authorized licensed use limited to: SHENZHEN UNIVERSITY. Downloaded on March 27,2025 at 02:34:01 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
[23] H. Yang, S. Yin, and O. Kaynak, “Neural network-based adaptive fault- Zhen Liu received the Ph.D. degree in control
tolerant control for Markovian jump systems with nonlinearity and theory and applications from the Ocean University
actuator faults,” IEEE Trans. Syst., Man, Cybern., Syst., vol. 51, no. 6, of China, Qingdao, China, in 2017.
pp. 3687–3698, Jun. 2021. He was a joint Ph.D. candidate with the
[24] J. Song, X.-H. Chang, and Z.-M. Li, “Secure P2P nonfragile sampled- School of Engineering, University of the West
data controller design for nonlinear networked system under sensor of England, Bristol, U.K., and a Visiting Scholar
saturation and DoS attack,” IEEE Trans. Netw. Sci. Eng., vol. 10, no. 3, with the College of Engineering, University of
pp. 1575–1585, May/Jun. 2023. Kentucky, Lexington, KY, USA. He is currently
[25] C. Wu, X. Li, W. Pan, J. Liu, and L. Wu, “Zero-sum game-based optimal a Distinguished Professor with the School of
secure control under actuator attacks,” IEEE Trans. Autom. Control, Automation, Qingdao University, Qingdao. His cur-
vol. 66, no. 8, pp. 3773–3780, Aug. 2021. rent research interests include intelligent control and
[26] Z. Kazemi, A. A. Safavi, M. M. Arefi, and F. Naseri, “Finite-time secure robot, cyber–physical systems, UAV Control, and sliding mode control.
dynamic state estimation for cyber–physical systems under unknown Dr. Liu was the recipient of the Shandong Province Taishan Scholar Special
inputs and sensor attacks,” IEEE Trans. Syst., Man, Cybern., Syst., Project Fund.
vol. 52, no. 8, pp. 4950–4959, Aug. 2022.
[27] Z. Cao, Y. Niu, and J. Song, “Finite-time sliding-mode control
of Markovian jump cyber-physical systems against randomly occur-
ring injection attacks,” IEEE Trans. Automat. Control, vol. 65, no. 3,
pp. 1264–1271, Mar. 2020. Junye Zhang received the B.S. degree in automation
[28] W. Qi, C. Lv, J. H. Park, G. Zong, J. Cheng, and K. Shi, “SMC for semi- from Jinan University, Jinan, China, in 2021. He
Markov jump cyber-physical systems subject to randomly occurring is currently pursuing the M.Sc. degree in con-
deception attacks,” IEEE Trans. Circuits Syst. II, Exp. Briefs, vol. 69, trol science and engineering with the School of
no. 1, pp. 159–163, Jan. 2022. Automation, Qingdao University, Qingdao, China.
[29] H. Yang, H. Han, S. Yin, H. Han, and P. Wang, “Sliding mode-based His research interests include stochastic systems
adaptive resilient control for Markovian jump cyber–physical systems in and intelligent control.
face of simultaneous actuator and sensor attacks,” Automatica, vol. 142,
Aug. 2022, Art. no. 110345.
[30] A. Yeşildirek and F. L. Lewis, “Feedback linearization using neural
networks,” Automatica, vol. 31, no. 11, pp. 1659–1664, Nov. 1995.
[31] S. Mohammad-Hoseini, M. Farrokhi, and A. J. Koshkouei, “Robust
adaptive control of uncertain non-linear systems using neural
networks,” Int. J. Control, vol. 81, no. 8, pp. 1319–1330, Nov. 2008.
[32] L. C. Fu, “Neural network approach to variable structure based adaptive
tracking of SISO systems,” in Proc. IEEE Workshop Variable Struct. Quanmin Zhu received the M.Sc. degree from
Syst., Tokyo, Japan, 1996, pp. 148–153. the Harbin Institute of Technology, Harbin, China,
[33] S. Mobayen and V. J. Majd, “Robust tracking control method based on in 1983, and the Ph.D. degree from the Faculty
composite nonlinear feedback technique for linear systems with time- of Engineering, University of Warwick, Coventry,
varying uncertain parameters and disturbances,” Nonlinear Dyn., vol. 70, U.K., in 1989.
no. 1, pp. 171–180, 2012. He is a Professor of Control Systems with the
[34] Z.-G. Wu, P. Shi, Z. Shu, H. Su, and R. Lu, “Passivity-based asyn- School of Engineering, University of the West of
chronous control for Markov jump systems,” IEEE Trans. Autom. England, Bristol, U.K. His main research interest is
Control, vol. 62, no. 4, pp. 2020–2025, Apr. 2017. in the area of nonlinear system modeling, identifica-
[35] X. Li, C. K. Ahn, W. Zhang, and P. Shi, “Asynchronous event-triggered- tion, and control.
based control for stochastic networked Markovian jump systems with Prof. Zhu is acting as a member of Editorial
FDI attacks,” IEEE Trans. Syst., Man, Cybern., Syst., vol. 53, no. 9, Committee of Chinese Journal of Scientific Instrument, and the President of
pp. 5955–5967, Sep. 2023. International Conference of Modeling, Identification and Control.
Authorized licensed use limited to: SHENZHEN UNIVERSITY. Downloaded on March 27,2025 at 02:34:01 UTC from IEEE Xplore. Restrictions apply.