Next Article in Journal
Software Fault Localization Based on Weighted Association Rule Mining and Complex Networks
Previous Article in Journal
Greedy Kernel Methods for Approximating Breakthrough Curves for Reactive Flow from 3D Porous Geometry Data
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Security Control for a Fuzzy System under Dynamic Protocols and Cyber-Attacks with Engineering Applications

1
Department of Electrical Engineering, College of Engineering, University of Ha’il, Hail 2440, Saudi Arabia
2
Centre of Mathematics, Universidade do Minho, 4710-057 Braga, Portugal
3
School of Industrial Engineering, Pontificia Universidad Católica de Valparaíso, Valparaíso 2362807, Chile
4
Department of Industrial Engineering, College of Engineering, University of Ha’il, Hail 2440, Saudi Arabia
*
Authors to whom correspondence should be addressed.
Mathematics 2024, 12(13), 2112; https://doi.org/10.3390/math12132112
Submission received: 28 May 2024 / Revised: 27 June 2024 / Accepted: 28 June 2024 / Published: 5 July 2024

Abstract

:
The objective of this study is to design a security control for ensuring the stability of systems, maintaining their state within bounded limits and securing operations. Thus, we enhance the reliability and resilience in control systems for critical infrastructure such as manufacturing, network bandwidth constraints, power grids, and transportation amid increasing cyber-threats. These systems operate as singularly perturbed structures with variables changing at different time scales, leading to complexities such as stiffness and parasitic parameters. To manage these complexities, we integrate type-2 fuzzy logic with Markov jumps in dynamic event-triggered protocols. These protocols handle communications, optimizing network resources and improving security by adjusting triggering thresholds in real-time based on system operational states. Incorporating fractional calculus into control algorithms enhances the modeling of memory properties in physical systems. Numerical studies validate the effectiveness of our proposal, demonstrating a 20% reduction in network load and enhanced stochastic stability under varying conditions and cyber-threats. This innovative proposal enables real-time adaptation to changing conditions and robust handling of uncertainties, setting it apart from traditional control strategies by offering a higher level of reliability and resilience. Our methodology shows potential for broader application in improving critical infrastructure systems.

1. Introduction

In today technologically driven world, reliability and resilience of control systems are crucial for operating essential infrastructures, including electrical manufacturing, power grids, and urban transportation networks. These systems comprise automated and semi-automated devices, processes, and software that ensure the continuity and safety of operations within our society. However, the systems face challenges and threats from cyber-attacks, especially network-based deception attacks that undermine the integrity of data and system communications, as well as the constraints imposed by network bandwidth limitations. Such systems also face complexities such as stiffness and influence of parasitic parameters. Although such parameters are minor, they can affect the system behavior, leading to higher-order dynamics and system stiffness, characterized by system sensitivity to changes in its inputs. Current methods, such as traditional proportional-integral-derivative controllers and linear quadratic regulators, often fall short in addressing such complexities. These methods typically assume linearity and fail to adequately handle the high nonlinearity and variability in system parameters found in real-world scenarios.
Existing approaches may not provide robust performance under severe cyber-attacks and network constraints, highlighting the need for more advanced control strategies [1]. To address the mentioned challenges and complexities, singularly perturbed systems (SPSs) were introduced, separating fast-changing dynamics (like sudden voltage spikes in power systems) from slow-changing ones (such as gradual power load increase), simplifying their analysis and control. The effectiveness of SPSs in dealing with such dual-changing dynamics is well documented in critical sectors [2,3], proving their value in enhancing system reliability and resilience. Recent advancements in the control of Markov jump (MJ) systems have introduced various techniques, including the quantized output feedback control with dynamic cost triggering [4] and fusion-based state estimation for networked autonomous surface vehicles with measurement outliers and cyber-attacks [5]. These techniques demonstrate important improvements in handling system uncertainties and cyber-threats, but their integration with SPSs remains an open research area.
The nonlinearity of the mentioned systems presents another layer of complexity. Such nonlinearity is prevalent in the mentioned systems, making the design of control frameworks complex. This complexity has led to the development of controller design frameworks addressing such a nonlinear behavior [6,7]. Specifically, the type-1 Takagi-Sugeno (TS) fuzzy model has proved to be effective in managing nonlinearity, demonstrating capabilities as highlighted in several studies [8,9,10]. This model excels in environments where system parameters are well defined and stable.
The type-1 TS fuzzy model often falls short in environments of high uncertainty when dealing with varying system parameters [11]. In contrast, the interval type-2 (IT2) fuzzy model extends the traditional fuzzy approach by incorporating uncertainty into its membership functions through the footprint of uncertainty. This allows the IT2 model to handle the uncertainty of nonlinear systems effectively. Such handling is beneficial for SPSs, where the rapid and slow system dynamics mean that even minor parametric uncertainties can impact their behavior [12]. The application of IT2 fuzzy logic in such dynamics provides a framework for enhancing control precision, adapting it to fluctuating conditions found in network environments or cyber-physical threats. Recent work on fuzzy differential systems has shown the effectiveness of this application in complex contexts [13,14,15]. Moreover, the integration of state estimation based on data fusion and robust control can importantly enhance the reliability and resilience of such systems. For example, control schemes for nonlinear systems with MJ parameters have shown promising results in improving fault tolerance and maintaining stability under cyber-attack scenarios [16].
Despite the advantages of the IT2 fuzzy model in handling uncertainties within SPSs, its application in these systems has been limited. The potential benefits, however, are considerable and warrant further exploration and integration [17,18,19]. Another crucial concept in complex control is the MJ system. In such a system, its structure and parameters can undergo changes due to a variety of reasons, such as sudden environmental shifts, sensor or actuator malfunctions, or even temporary communication failures. SPSs are challenging because their behavior may shift unexpectedly, requiring control strategies that can adapt to or anticipate these shifts.
Recent research has focused on MJ systems, yielding studies that have explored aspects such as fault tolerance, multi-agent systems, and networked control [9,20,21,22]. An assumption in several of these studies is that the Markov chains governing the system transitions have stationary transition probabilities (TPs). This means that the probabilities of switching from one state to another are considered constant over time. However, in practical applications, especially in networked control systems, such assumption does not hold true. Nonstationary TPs, which fluctuate due to factors like network delays or packet losses, are more realistic but also more challenging to model and predict [23].
Although studies addressing nonstationary TPs in applications exist [24,25], their integration into SPSs is still a gap. This gap motivates the need for developing strategies that handle nonstationary TPs within the framework of SPSs. Moving beyond the technical challenges, control systems need to enhance communication and network security.
The aforementioned need highlights the complexity of the current operational environment, motivating the exploration of event-triggered protocols (ETPs). The integration of communication into feedback control loops offers cost savings [26] and optimizes the use of network resources to reduce network load. This is crucial in interconnected systems, where the utilization of network resources is linked to their performance.
ETPs represent an advancement over traditional time-triggering techniques by initiating data transmission under specific predefined conditions. ETPs minimize unnecessary data transmission, easing network congestion and improving efficiency. Recent studies have refined ETPs to manage bandwidth constraints through static [27,28] and adaptive [29] ETPs, which represent advancements in such protocols by relying on fixed and dynamic triggering conditions. These protocols have boosted the responsiveness and efficiency of networked control systems, optimizing data transmission and conserving bandwidth. Despite these advances, there is room for further enhancement in the efficiency of ETPs.
Dynamic ETPs (DETPs) go beyond static and adaptive ETPs, adjusting triggering thresholds according to the system current state and performance needs [30,31]. This adjustment allows for finer management of data transmission and reduces network traffic. Nevertheless, the literature has not fully explored the customization of these triggering thresholds for components of the measurement signal. Addressing such thresholds could boost network efficiency and control responsiveness. Thus, this could improve the investigation in the field [18] when the threat of cyber-attacks on communication is challenging. Attackers exploit vulnerabilities through tactics like deception attacks, denial-of-service and replay attacks, incapacitating network nodes or data integrity, obstructing operations and reducing network capacity [32,33]. Such attacks need countermeasures to safeguard system security and reliability [31,34,35].
Enhancing network efficiency through DETPs and defense mechanisms highlights the complexity in which control systems operate. Developing systems that achieve resilience, reliability, and security is vital in our interconnected world, where balancing operational performance and security is essential. A gap in the literature on Markov fuzzy SPSs is in network-based deception attacks. One can address this gap by introducing robust control that integrates IT2 fuzzy logic with MJ systems [36]. To advance dynamic event management, one may implement a component-based dynamic event-triggered mechanism (CB-DETM). This mechanism customizes the DETPs for system components, enhancing the response to dynamic environments and operational demands. The CB-DETM improves data flow and security, as well as the reliability and resilience of infrastructure systems facing network constraints and cyber-threats. In the present investigation, we bridge all the mentioned gaps.
Therefore, our main objective is to design an asynchronous security control to ensure the stability of closed-loop systems, maintaining the system state within bounded limits, and securing operations despite challenges such as MJs, actuator attacks, and nonlinear disturbances. This control mechanism enhances network efficiency and system security, addressing the existing research gaps. Rigorous numerical simulations demonstrate the effectiveness of our proposal in ensuring stochastic stability and optimizing network performance under various conditions and cyber-threats [37,38].
The innovation of our methodology lies in the comprehensive integration of IT2 fuzzy logic with MJ systems, coupled with a DETP. This integration enables real-time adaptation to changing conditions and robust handling of uncertainties and cyber-physical threats, distinguishing our methodology from traditional control strategies. Unlike standard techniques, our proposal dynamically adjusts control parameters and communication strategies based on real-time system states and operational conditions, offering a higher level of reliability and resilience. Specifically, our contributions are as follows:
  • Asynchronous control for MJ-IT2 fuzzy SPSs—We explore asynchrony for IT2 fuzzy MJ SPSs vulnerable to deception attacks and offer robustness to traditional controllers by addressing the nonlinearity and uncertainties of these systems.
  • Unified framework for random attacks—We integrate actuator and random attacks through the use of two independent Bernoulli-distributed random variables, facilitating a security control capable of mitigating the unpredictability of cyber-threats.
  • CB-DETM—We implement CB-DETM, which tailors DETPs for system components, distinct from existing methods in the literature [28,39], regulating data transmission and optimizing communication resources by enhancing resilience against cyber-threats.
  • Asynchronous controller design with nonstationary mode transitions: We formulate an asynchronous controller for MJ SPSs, which is capable of handling nonstationary-mode transitions, addressing random deception attacks and setting new security benchmarks for networked control systems.
These contributions strive to advance the state of the art in secure control strategies for SPSs, with a particular focus on MJ systems and IT2 fuzzy logic by addressing the pressing challenges of cyber-security and network efficiency.
The rest of this article is organized as follows. Section 2 explores the fundamentals of SPSs and their integration with fuzzy control models. In Section 3, we describe the system framework and preliminary concepts necessary for understanding our proposal. In Section 4, the main theoretical results are presented, providing the mathematical foundation for the proposed methodology. Section 5 demonstrates the practical application of our proposal through numerical illustrations, highlighting its effectiveness and advantages over existing approaches. In Section 6, we conclude by discussing the findings and suggesting directions for future research.

2. Fundamentals of Singularly Perturbed Systems and Fuzzy Control Integration

This section provides an overview of SPSs, their mathematical characterization, and the integration of fuzzy models for improved control under uncertainty.

2.1. Mathematical Representation of SPSs

An SPS is described by differential equations as
ε x ˙ 1 ( k ) = f ( x 1 ( k ) , x 2 ( k ) , t , ε ) , x ˙ 2 ( t ) = g ( x 1 ( k ) , x 2 ( k ) , k , ε ) , k 0 ,
where 0 < ε 1 is a parameter that signifies the disparity in time scales between fast ( x 1 ) and slow ( x 2 ) dynamics. The functions f and g represent the fast and slow subsystem dynamics, respectively. The parameter ε introduces challenges in stability and numerical methods, requiring specialized techniques for analysis and control [40].

2.2. Challenges in SPS Analysis and Control

Key challenges in SPSs include:
  • A parasitic parameter ( ε ) that takes small values—Note that ε induces instability and sensitivity to perturbations, necessitating numerical methods for accurate control [41].
  • Higher-order dynamics—The interaction between fast and slow dynamics creates complex behaviors, requiring advanced mathematical techniques for effective analysis [42].
  • System stiffness—High sensitivity to input variations impacts stability and performance, demanding robust and adaptive control strategies [43].

2.3. Type-1 and Type-2 Fuzzy Models

Fuzzy logic systems manage uncertainties using linguistic variables, with two of their models being as follows:
  • Type-1 fuzzy models: They use precise membership functions within a range from zero to one. A type-1 fuzzy set for an element u is defined as A { ( u , μ A ( u ) ) | u U } , where μ A ( u ) denotes the membership function assigning the degree of membership of u in the fuzzy set A , and U represents the universal set [44].
  • Type-2 fuzzy models: They incorporate uncertainty into membership functions, making them effective for ambiguous data. A type-2 fuzzy set is presented as
    A ˜ { ( ( u , α ) , μ A ˜ ( u , α ) ) | u U , α J u [ 0 , 1 ] } ,
    where μ A ˜ ( u , α ) is the membership function for u at a specific uncertainty level α , and J u is the interval of membership grades available for u [45].
Transitioning from type-1 to type-2 fuzzy models adds an uncertainty layer to the membership functions, enhancing system stability and responsiveness. Mathematically, this is modeled by extending the type-1 membership function μ A ( u ) to μ A ˜ ( u , α ) in type-2 sets, where α introduces a degree of freedom that captures additional uncertainty. Such transition allows the control system to better handle imprecision and variability, leading to improved performance in dynamic and unpredictable environments [46].
Choosing between type-1 and type-2 fuzzy models depends on the level of uncertainty and required control robustness. While type-1 models are simpler and computationally less intensive, type-2 models offer superior performance in highly uncertain environments by providing an additional degree of freedom to model uncertainties. Integrating fuzzy logic into control systems represents an important advancement in managing complex, uncertain, and nonlinear systems, providing reliability and resilience control strategies [47].

2.4. Discussion on Control Characteristics

Our proposed event-triggered control setup ensures asymptotic convergence. Unlike finite-time convergence setups such as those discussed in [48], which achieve convergence in a fixed time, our proposal focuses on ensuring stability and performance over an extended period, even under persistent cyber-attacks and disturbances. While finite-time convergence offers rapid stabilization, our asymptotic approach ensures robust long-term stability and adaptability to changing conditions, which is crucial in complex and dynamic environments. This highlights the reliability and resilience of our methodology in relation to finite-time convergence strategies.
The Zeno phenomenon, where an infinite number of events are triggered in a finite amount of time, is a common issue in event-triggered setups. Our design avoids this issue by incorporating a minimum inter-event time, ensuring that events are not triggered too frequently. Specifically, for a discrete-time process, the minimum time-interval between two adjacent trigger instants is not less than the sampling period, effectively preventing the Zeno phenomenon and ensuring practical implementation feasibility [49].
The computational complexity of our control methodology is of polynomial order. This is important for large-scale setups, where computational efficiency is crucial. By ensuring that the complexity remains manageable, our approach is suitable for real-time applications in large and complex systems [50].

3. System Description and Preliminaries

Building on the theoretical foundations, this section focuses on an MJ TS fuzzy model designed to manage the complexities of systems with random structural changes. Such model leverages fuzzy logic for uncertainty management and MJ processes for dynamic adaptability. Figure 1 provides a schematic overview of the organization of this section, illustrating the relationships and flow between the various subsections discussed.

3.1. Overview of Markov Jump Systems

An MJ system is a type of stochastic model whose dynamics switch between different subsystems randomly. These switches are governed by a Markov process, which is characterized mathematically by a sequence of random variables X { X ( k ) | k 0 } , where each variable X ( k ) represents the state of the system at a discrete time k.
The Markov property asserts that the future state of the process depends only on the current state and not on the past. Mathematically, this property can be expressed as
Pr ( X ( k + 1 ) = x | X ( k ) = x ( k ) , X ( k 1 ) = x ( k 1 ) , , X ( 0 ) = x ( 0 ) ) = Pr ( X ( k + 1 ) = x | X ( k ) = x ( k ) ) ,
for any state x and sequence of states x ( k ) , x ( k 1 ) , , x ( 0 ) . The system dynamics are described by possible states and TPs between them. If we denote the set of all states by S , and the system state at time k by ρ ( k ) , for convenience, which takes values in S , the transitions between states are governed by a TP matrix P = [ P i j ] , where P i j = Pr ( ρ ( k + 1 ) = j | ρ ( k ) = i ) . This matrix is stochastic, meaning that each row sums to one, that is, j S P i j = 1 , for all i S . The matrix P defines the behavior of the Markov process over time, dictating how the system transitions from one state to another based on the current state.
In practical terms, an MJ system hops between different operational modes, with each mode corresponding to a different subsystem. The mode of operation at any given time is determined by the state of the underlying Markov model (chain) { ρ ( k ) | k } . This modeling framework is powerful in scenarios where the system behavior is subject to sudden changes due to external or internal shocks, component failures, or regime shifts.

3.2. Takagi-Sugeno Fuzzy Model

The TS fuzzy model is a sophisticated formulation to describe complex nonlinear systems using a series of linear submodels. Each submodel, associated with a fuzzy rule, is designed to operate effectively within a specific region of the input space. The mathematical formulation of TS fuzzy models is as follows. The essence of the TS model lies in its ability to blend linear models through fuzzy logic principles.
Mathematically, the TS model can be described as
Rule i : If x 1 is A 1 i and x n is A n i , then y = ν i 0 + ν i 1 x 1 + + ν i n x n ,
where x 1 , , x n are the input variables; A j i the fuzzy sets related to rule i for input variable j; and ν i 0 , ν i 1 , , ν i n the coefficients defining the linear model within the rule region. The output y of the TS model is a weighted average of each rule output, where the weights are the degrees of fulfillment of each rule conditions, stated as
y = i = 1 r w i ( ν i 0 + ν i 1 x 1 + + ν i n x n ) i = 1 r w i ,
with w i being the truth degree of rule i given by
w i = j = 1 n μ A j i ( x j ) ,
where μ A j i ( x j ) is the membership function of the fuzzy set A j i evaluated at x j .

3.3. Integration of Markov Jumps into TS Fuzzy Models

The integration of Markov dynamics into TS fuzzy models introduces stochastic variability in the selection of which fuzzy rule (or submodel) governs the system at any time step. This is described by incorporating the state or mode of the system, ρ ( k ) say, determined by a Markov process. The mathematical formulation with MJs is as follows. In the MJ TS model, the output at time step k is expressed as
y ( k ) = i = 1 r w i ( ρ ( k ) ) ( ν i 0 ( ρ ( k ) ) + ν i 1 ( ρ ( k ) ) x 1 ( k ) + + ν i n ( ρ ( k ) ) x n ( k ) ) ,
where ρ ( k ) is the current state of the Markov chain governing the system mode, with w i ( ρ ( k ) ) and ν i j ( ρ ( k ) ) being the rule weights and model coefficients conditioned on the current state ρ ( k ) , respectively. The model configuration stated in (3) allows the system to adapt to shifts in dynamics caused by external events or internal state changes, enhancing its reliability and resilience to handle complex varying environments.

3.4. Model Specification

Building on the integrated framework of Markov dynamics and TS fuzzy logic, we consider the following MJ TS fuzzy model at each discrete time step k. This model adapts the general TS fuzzy structure to accommodate stochastic transitions between different sets of linear equations based on the current state of the Markov process { ρ ( k ) | k 0 } . Let us detail the MJ TS fuzzy model that is specified at each discrete time step k as
Rule i : If ψ 1 ( x ( k ) ) is N i 1 and ψ s ( x ( k ) ) is N i s , then x ( k + 1 ) = A i ε ( ρ ( k ) ) x ( k ) + B 2 i ( ρ ( k ) ) u ( k ) ,
where N i j is an IT2 fuzzy set for premise j in rule i, providing enhanced capability to handle uncertainty; ψ j ( x ( k ) ) is the premise variable j, which is a function mapping the state vector x ( k ) to its corresponding fuzzy set; A i ε ( ρ ( k ) ) and B 2 i ( ρ ( k ) ) are dynamic matrices that allow the TS fuzzy model to adapt to changes in the system state as dictated by the Markov process; ε is defined in (1); s is the total number of premises per rule; and i indexes the rule within the set S { 1 , , r } . The formulation presented in (4) is the description of the TS fuzzy model stated in (2), where each rule output is a linear combination of input variables weighted by the degree of membership in the fuzzy sets. However, unlike the static framework given in (2), here the rules are adapted at each time step k, influenced by the current state ρ ( k ) of the Markov chain, as described in (3). This integration of Markov dynamics introduces variability in the selection of which fuzzy rule governs the system at any time step, enhancing the model ability to handle complex varying environments.
The state vector is x ( k ) = [ x 1 ( k ) x 2 ( k ) ] R n , with x 1 ( k ) R n 1 , x 2 ( k ) R n 2 being the slow, fast state vectors, and u ( k ) is the input signal affecting the system dynamics.
The modes of the system are determined by the Markov process { ρ ( k ) | k 0 } , with a transition matrix Π 1 = [ π p q ] defined over the finite set S 1 { 1 , , N } , with elements given by
π p q = Pr ( ρ ( k + 1 ) = q ρ ( k ) = p ) ,
where 0 π p q 1 and q = 1 N π p q = 1 , for all p , q in S 1 .
As mentioned, the dynamic matrices A i ε ( ρ ( k ) ) and B 2 i ( ρ ( k ) ) are components that allow the TS fuzzy model to adapt to changes in the system state as dictated by the Markov process, formulated as
A i ε ( ρ ( k ) ) = A i ( ρ ( k ) ) E ε ,
where ε is defined in (1), E ε = diag { I n 1 , ε I n 2 } , with I n being the n × n identity matrix, and A i ( ρ ( k ) ) provides a model for the linear dynamics associated with rule i under mode ρ ( k ) , specified by
A i ( ρ ( k ) ) = A 11 i ( ρ ( k ) ) A 12 i ( ρ ( k ) ) A 21 i ( ρ ( k ) ) A 22 i ( ρ ( k ) ) .
The bifurcated control input matrix is structured as
B 2 i ( ρ ( k ) ) = B 21 i ( ρ ( k ) ) B 22 i ( ρ ( k ) ) .
The singular perturbation parameter ε introduced in (5), and described in the mathematical representation of SPSs stated in (1), discriminates between fast and slow state dynamics through the matrix E ε . This discrimination is crucial for systems characterized by multi-time-scale dynamics, providing a mechanism to address the challenges posed by the inherent speed discrepancies in system responses. The structuring of A i ε ( ρ ( k ) ) and B 2 i ( ρ ( k ) ) represents the system dynamics, enhancing the control strategy effectiveness across various operational scenarios. Key benefits of this structuring include:
  • Adaptability—The model dynamically responds to transitions in operational mode ρ ( k ) , adapting to the MJs that dictate these transitions, whose adaptability ensures that the control strategy remains effective under varying system conditions.
  • Precision—The distinction between fast and slow dynamics allows for precise control, which enhances the model ability to optimize systems with multi-time-scale dynamics, improving response times and system behavior.
  • Integration of uncertainties—Incorporating IT2 fuzzy sets improves the model capability to integrate uncertainties, whose integration is valuable in environments where input data and system parameters are subject to variability and imprecision.
This structuring of dynamic matrices expands on the framework described in (3), where the model output at time step k is a function of the current state ρ ( k ) of the Markov chain. Here, w i ( ρ ( k ) ) and ν i j ( ρ ( k ) ) are the rule weights and model coefficients also conditioned on the state ρ ( k ) . The adaptation of A i ε ( ρ ( k ) ) and B 2 i ( ρ ( k ) ) ensures that the model response to input signals and state transitions is oriented using the current mode of the system, enhancing the model ability to handle complex varying environments effectively.

3.5. Fuzzy Inference and Firing Strength in the Global Fuzzy Model

The firing strength M i is a critical element in fuzzy control systems, influencing each rule on the system output and defined as M i = [ ϑ ̲ i ( x ( k ) ) , ϑ ¯ i ( x ( k ) ) ] , where ϑ ̲ i ( x ( k ) ) and ϑ ¯ i ( x ( k ) ) are the lower and upper membership functions, respectively, of the fuzzy set N i j evaluated at ψ j ( x ( k ) ) . These functions are fundamental to the fuzzy inference process, directly applying the principles previously discussed in (2) and reflecting dynamic adjustments based on the system current inputs and state as explored in (3).
To simplify the understanding, the fuzzy inference process can be broken down into the following steps:
Step 1.
Evaluate the membership functions for each input variable.
Step 2.
Calculate the firing strength for each rule by multiplying the membership values.
Step 3.
Normalize the firing strengths to ensure they sum to one.
Step 4.
Compute the output by weighting each rule output by its normalized firing strength.
This step-by-step breakdown clarifies how the system integrates contributions from multiple fuzzy rules to determine the next state. The overall dynamics of the model, which integrates the contributions of all activated rules to predict the system next state, are configured by
x ( k + 1 ) = i = 1 r ϑ i ( x ( k ) ) A i ε ( ρ ( k ) ) x ( k ) + B 2 i ( ρ ( k ) ) u ( k ) ,
where u ( k ) is the input signal, as mentioned, and ϑ i ( x ( k ) ) the normalized membership function derived from the firing strengths, ensuring that the combined influence of all rules sums to unity, as dictated by fuzzy logic norms. The rule weights are nonlinear functions that adjust each firing strength based on uncertain parameters within the range [ 0 , 1 ] . The configuration stated in (7) allows the system to adapt to transitions in operational mode ρ ( k ) , accommodating the MJs that dictate these transitions, enhancing robustness, as discussed in the context of Markov integration given in (3). The approach of dynamic matrices A i ε ( ρ ( k ) ) and B 2 i ( ρ ( k ) ) , as defined in (5) and (6), enables a representation of the system dynamics. This representation manages multi-time-scale dynamics and integrates uncertainties, aligning with the model requirements to handle complex environments.

3.6. Component-Based Dynamic Event-Triggered Mechanism

As discussed in the introduction, the CB-DETM is used to enhance the efficiency of communication networks within control systems by minimizing unnecessary transmissions. This mechanism customizes the event-triggering thresholds for each component of the state signals, reducing data flow and improving system performance.
The integration of DETM and robust fuzzy control within this framework enhances efficiency and stability. DETM adjusts data transmission rates based on the system state, minimizing unnecessary communication. Robust fuzzy control handle uncertainties and nonlinearities, maintaining performance under adverse conditions. This handling ensures the system remains resilient and responsive to internal fluctuations and external threats.
The CB-DETM regulates the transmission of the system output by utilizing a triggering function for each output component expressed for x l ( k ) , with l { 1 , , n } , as part of the state vector x ( k ) = [ x 1 ( k ) , , x n ( k ) ] , defined as
x l ( k ) = e l ( k ) e l ( k ) σ l x l ( k ) x l ( k ) 1 δ l η l ( k ) ,
where e l ( k ) represents the error between the current value x l ( k ) and its value at the last triggered instance x l ( k s l ) ; the parameters σ l and δ l are positive scalars that fine-tune the sensitivity of the triggering mechanism; and the term η l ( k ) , referred to as the auxiliary internal dynamical variable (AIDV), is updated according to
η l ( k + 1 ) = λ l η l ( k ) e l ( k ) e l ( k ) + σ l x l ( k ) x l ( k ) ,
with an initial condition η l ( 0 ) > 0 and a decay factor λ l in (0, 1), ensuring that λ l δ l > 1 .
The selection of λ l in our CB-DETM is crucial for dynamically adjusting the event-triggering thresholds. This selection is comparable to the dynamic scheme discussed in [51], where λ plays a pivotal role in managing fault tolerance and system responsiveness. Our selection of λ l offers a similar adaptability, ensuring efficient data transmission and robust control under varying conditions.
The next triggering instant for each component is based on the rule given by
k s + 1 l = min k > k s l { k 0 | x l ( k ) > 0 } .
This rule ensures the output signals are updated when needed, according to the activation specified in (10). Additionally, the release sequence for all components is consolidated into a common sequence { k s , s 0 } = l = 1 n { k s l } , facilitating a synchronized and efficient data transmission strategy. For the duration k [ k s , k s + 1 ) , the controller receives the signal x ( k ) = x ( k s ) = [ x 1 ( k s 1 ) , , x n ( k s n ) ] , where each component x l ( k ) that has not been released maintains its value from the most recent release, using a zero-order holder.
Remark 1.
In the CB-DETM described in (8) and (9), the parameter λ l plays a crucial role in managing the dynamics of the AIDV η l . As noted in [18], the condition η l ( k ) > 0 is maintained if λ l δ l > 1 and η l ( 0 ) > 0 are both satisfied. In our CB-DETM, the choice of λ l is critical for dynamically adjusting the event-triggering thresholds. This is similar to the dynamic scheme discussed in [51], where λ is co-designed with the H performance index and inter-event time to manage fault tolerance and system responsiveness. Our selection of λ l ensures efficient data transmission and robust control, offering adaptability comparable to the integral observer method used in [51]. This adaptability helps in maintaining system performance under varying conditions, highlighting the reliability and resilience of our approach. Additionally, the DETM described here is a specialized version of the technique introduced in [52], where all components share identical triggering parameters, highlighting the scalability of the CB-DETM approach.

3.7. Security Challenges: Sensor and Actuator Attacks

In modern control systems, ensuring the security and integrity of sensors and actuator components is critical. These components are susceptible to various cyber-physical attacks, which can disrupt the normal operation of the system, leading to potential failures or unsafe conditions. Next, we discuss the nature of these attacks, their implications, and countermeasures to enhance system resilience. As depicted in Figure 2, the transmitted signal from the sensors is prone to vulnerabilities, such as false data injection attacks, which may be facilitated by the presence of computer viruses, bugs, or other malicious interventions. These attacks pose a high risk to the integrity of the control system, especially in configurations where event-triggered mechanisms are used. The sensor attack manipulates the system state by injecting false data, which can be mathematically modeled as
x ˜ ( k ) = x ( k ) + ζ ( k ) ( x ( k ) + δ s ( k ) ) = ( 1 ζ ( k ) ) x ( k ) + ζ ( k ) δ s ( k ) = ( 1 ζ ¯ ) x ( k ) + ζ ¯ δ s ( k ) + ( ζ ( k ) ζ ¯ ) ( x ( k ) + δ s ( k ) ) ( 1 ζ ¯ ) ( x ( k ) e ( k ) ) + ζ ¯ δ s ( k ) + ( ζ ( k ) ζ ¯ ) ( ( x ( k ) e ( k ) ) + δ s ( k ) ) ,
where δ s ( k ) is the signal crafted by the attacker, assumed to be a smooth nonlinear function satisfying δ s ( k ) G x ( k ) , with G being a positive definite matrix, stating the operational bounds for the attack vector; whereas the random variable ζ ( k ) blends the true control and malicious signals; ζ ¯ is an auxiliar variable; and e ( k ) is a model error.
The model stated in (11) highlights how sensor attacks may distort the true system states, leading to potential miscalculations or misoperations in the control actions. Given the system reliance on accurate data for event triggering and decision making, especially in the dynamic communication network setup outlined in Figure 2, maintaining data integrity is crucial. The attacks not only disrupt normal operations but can also lead to catastrophic failures if not properly mitigated. To combat these threats, it is essential to incorporate robust security measures and anomaly detection strategies within the event-triggering mechanism. Enhancing the system resilience involves the following:
  • Implementation of advanced encryption methods for data in transit.
  • Utilization of anomaly detection algorithms to identify and isolate falsified data.
  • Employment of redundancy and diversified sensor setups to validate data integrity.
Actuators, critical components in control systems, are susceptible to imperfections which may arise due to design flaws, manufacturing defects, and wear and tear. Furthermore, in modern control systems that rely heavily on digital communications and computer-based control algorithms, actuators are also vulnerable to cyber-physical attacks. These include malware infections, targeted attacks by worms, or other cyber-security breaches that may alter the behavior of actuators by manipulating their control signals.
Actuator attacks can be modeled to show how malicious interventions alter the control signals. The effect of such attacks may be mathematically modeled as
u ˜ ( k ) = u F ( k ) + ψ ( k ) = j = 1 r ϱ j ( x ( k ) ) 1 ζ ¯ ) Ω K j s x ( k ) ( 1 ζ ¯ ) Ω K j s e ( k ) + ζ ¯ Ω K j s δ s ( k ) + ( ζ ( k ) ζ ¯ ) Ω K j s x ( k ) + Ω K j s e ( k ) + Ω K j s δ s ( k ) + Γ ¯ δ a ( k ) + ( Γ ( k ) Γ ¯ ) δ a ( k ) ,
where u F ( k ) = Ω u ( k ) represents the intended control signal, which can be potentially corrupted by faults; the term ψ ( k ) = Γ ( k ) δ a ( k ) is the effect of the actuator attacks, characterized by modifications in the actuator response due to malicious inputs; K j is a control gain; Γ ¯ is an expected value; e ( k ) is a model error; and ϱ j ( x ( k ) ) is the normalized firing strength, defined as ϱ j ( x ( k ) ) = β ̲ j ( x ( k ) ) ϱ ̲ j ( x ( k ) ) + β ¯ j ( x ( k ) ) ϱ ¯ j ( x ( k ) ) , with β ̲ j and β ¯ j being nonlinear functions that adjust the influence of each rule based on the current system state.
The components of the attack model are stated as follows:
  • Γ ( k ) is a diagonal matrix with entries γ l ( k ) , stating random variables which are Bernoulli-distributed, modeling the sporadic nature of cyber-attacks on actuators.
  • δ a ( k ) models the true malicious payload, which is a nonlinear function designed to disrupt the actuator normal operation, whose function adheres to the safety constraint presented as δ a ( k ) 2 σ 0 2 j = 1 r ϱ j ( x ( k ) ) ( x ˜ ( k ) K j ( ϖ k ) H H K j ( ϖ k ) x ˜ ( k ) ) , ensuring that the potential impact of the attack does not exceed a predefined safety threshold stated by σ 0 2 and the matrix H, where { ϖ k ( k ) | 0 } is a Markov chain.
  • The attack is modeled to adjust dynamically to the system state via the random variable ζ ( k ) , which, as mentioned, blends the true control signal with the malicious signal, creating a corrupted output that can vary in intensity and effect.
The security of the actuator signals under attack conditions is constrained by
δ a ( k ) δ a ( k ) σ 0 2 j = 1 r ϱ j ( x ( k ) ) x ˜ ( k ) K j ( ϖ k ) H H K j ( ϖ k ) x ˜ ( k ) ,
where H is a matrix defining the permissible operational space for the actuator under normal and attack conditions. The constraint stated in (13) ensures that, even during an attack, the alteration to the control signal remains within a defined safety threshold.
The expected behavior of the attack variables are formulated as Γ ¯ = E [ Γ ( k ) ] = diag { γ l ( k ) } , E [ Γ ˜ ] = E [ Γ ( k ) Γ ¯ ] = 0 , and E [ Γ ˜ Q Γ ˜ ] = l μ l 2 Σ l Q Σ l , where μ , Σ are the corresponding mean and covariance matrix, respectively, whereas Q is a positive definite matrix, ensuring that the attack impact is kept within manageable limits. Given the fundamental role that actuators play in control systems, it is essential to implement robust security measures to detect and mitigate these attacks. These measures include:
  • The employment of sophisticated monitoring systems that can detect unusual behaviors or deviations in actuator performance.
  • The design of systems with redundant actuator configurations and fault-tolerant controls that may maintain operation even when some components are compromised.
  • The strengthening of cyber-security practices, including regular updates, patches, and protective measures against malware and other forms of cyber-attacks.
By integrating these measures, the system can improve its resilience against attacks, ensuring reliability and resilience even in the face of sophisticated cyber-threats.

3.8. Fuzzy Controller

Following the discussion on sensor attacks and the system vulnerabilities they expose, it is crucial to consider how control strategies can be adapted to maintain system performance and reliability despite these vulnerabilities. The fuzzy controller design presented here assumes that the system modes are not entirely accessible and that the synchronization between the system and controller may not always be perfect.
To address the potential desynchronization and enhance the system resilience against sensor errors and attacks, a nonstationary IT2 fuzzy controller is employed. The controller is structured to adapt to different degrees of asynchrony among the system states and control actions, defined as
Rule j : If φ 1 ( x ( k ) ) is F j 1 and φ ς ( x ( k ) ) is F j ς , then u ( k ) = K j ( ρ ( k + 1 ) ) x ˜ ( k ) ,
where φ ς ( x ( k ) ) represents the premise variable ς and F j ς the type-2 fuzzy sets associated with the jth control rule for each premise variable ς . The control gain K j ( ρ ( k + 1 ) ) , designed to be adaptive, responds to the nonstationary Markov chain that characterizes the system modes referenced by the system given in (7). The underlying nonstationary Markov chain { ρ ( k ) | k 0 } takes values in S 2 { 1 , , S } and is crucial for adjusting the control actions based on the current system state, established as
Π 2 = [ φ s t ρ ( k + 1 ) ] , φ s t ρ ( k + 1 ) = Pr ϖ ( k + 1 ) = t ρ ( k ) = s ,
where the TP φ s t ρ ( k ) ensures that the controller dynamically adjusts to the changing conditions. The concept of firing strength in a fuzzy control system is critical as it determines how much each rule influences the control action. In this IT2 fuzzy controller, the firing strength for each rule j is defined as N j = [ ϱ ̲ j ( x ^ ( k ) ) , ϱ ¯ j ( x ^ ( k ) ) ] , where ϱ ̲ j ( x ^ ( k ) ) and ϱ ¯ j ( x ^ ( k ) ) are the aggregated lower and upper membership values of the IT2 fuzzy sets F j ς evaluated at the state variables φ ( k ) . These membership values are computed as the product of the membership degrees across all relevant fuzzy sets by means of
ϱ ̲ j ( x ^ ( k ) ) = ς = 1 v ω ̲ F j ς ( φ ( k ) ) , ϱ ¯ j ( x ^ ( k ) ) = ς = 1 v ω ¯ F j ς ( φ ( k ) ) ,
with each ω ̲ and ω ¯ representing the lower and upper bounds of the membership functions, respectively, ensuring that the control system can handle uncertainties and imprecisions inherent in the sensor readings and other inputs.
The control actions are then calculated using these firing strengths, which are normalized to ensure that their sum is always equal to one, enhancing the reliability and resilience of the control system, and formulated as
u ( k ) = j = 1 r ϱ j ( x ( k ) ) K j ( ρ ( k + 1 ) ) x ( k ) ,
where, as mentioned, ϱ j ( x ( k ) ) = β ̲ j ( x ( k ) ) ϱ ̲ j ( x ( k ) ) + β ¯ j ( x ( k ) ) ϱ ¯ j ( x ( k ) ) , with β ̲ j and β ¯ j being nonlinear functions designed to dynamically adjust the influence of each rule based on the current system state, ensuring adaptive and responsive control actions. The functions β ̲ j and β ¯ j satisfy 0 β ̲ j ( x ( k ) ) β ¯ j ( x ( k ) ) 1 and β ̲ j ( x ( k ) ) + β ¯ j ( x ( k ) ) = 1 . This formulation allows the controller to effectively manage the trade-offs between responsiveness and robustness, tailoring the control efforts to the current conditions and uncertainties faced by the system.
In summary, the presented configuration of the fuzzy controller ensures that the system can maintain optimal performance and stability even under varying and unpredictable conditions, making it resilient to the complexities and challenges posed by real-world operational environments.

3.9. Closed-Loop System

To establish the closed-loop configuration for a discrete-time MJ nonlinear system, we introduce the state representation in a compact form x ^ ( k ) = [ x 1 ( k ) , ε x 2 ( k ) ] , where ε is a critical parameter in our system matrix parameterization, as described in (5). This configuration incorporates both the primary and scaled secondary state vectors, with the extended state vector defined as
ξ ( k ) = { x ^ ( k ) , e ( k ) , δ s ( k ) , δ a ( k ) , η ( k ) } ,
where η ( k ) is a vector comprising the square roots of state-dependent parameters, expressed as η ( k ) = col { η 1 ( k ) , , η n x ( k ) } . In the expression given in (17), “col” denotes the column concatenation of vectors and each component serves a distinct purpose, established as follows:
  • e ( k ) represents estimated error dynamics.
  • δ s ( k ) models disturbances or potential attacks targeting sensors.
  • δ a ( k ) pertains to disruptions or malfunctions in actuators, previously mentioned.
  • η ( k ) includes AIDVs, enhancing our model ability to capture complex internal dynamics.
The formulation established in (17) allows us to model the system dynamics more comprehensively by including not only the states but also errors, disturbances, and system parameters that are subject to attacks and other dynamics.
The integration of system dynamics stated in (7), considering the effects of actuator attacks presented in (12), and with the control actions defined in (16), permits us to describe the closed-loop system as
x ^ ( k + 1 ) = i = 1 r j = 1 r ϑ i ϱ j E ε A i j p s ξ k + ( ζ ( k ) ζ ¯ ) A 1 i j p s ξ k + B 2 i p Γ ¯ δ a ( k ) ,
where the matrices A i j p s and A 1 i j p s represent the aggregated system dynamics under normal and perturbed conditions, respectively, and are stated as
A i j p s = A i p + ( 1 ζ ¯ ) B 2 i p Ω K j s ( 1 ζ ¯ ) B 2 i p Ω K j s ζ ¯ B 2 i p Ω K j s B 2 i p Γ ¯ 0 , A 1 i j p s = B 2 i p Ω K j s B 2 i p Ω K j s B 2 i p Ω K j s 0 0 .
As mentioned in the introduction, the primary objective addressed in this article is to design an asynchronous security control, as specified in (16), for ensuring that the closed-loop system, represented in (18), achieves stochastic stability. This objective entails maintaining the system state within bounded limits, ensuring reliable and secure operation despite challenges such as MJs, actuator attacks, and other nonlinear disturbances.

4. Main Results

Building on the framework established for achieving stochastic stability through asynchronous security control strategies, this section presents the core theoretical results. These results lay the mathematical groundwork necessary to ensure the system desired performance under our proposed control and validate the structures and approaches discussed in Section 3.

4.1. Implementing Robust Control Mechanisms

Next, we delineate the practical application of our theoretical findings, shaping robust control strategies essential for:
  • Developing controllers that efficiently manage uncertainties and dynamically adapt to environmental changes, ensuring operational resilience.
  • Mitigating impacts from external disturbances, including sensor and actuator attacks, so preserving the integrity and security of the system.
  • Achieving comprehensive system stability, particularly stochastic mean-square stability, crucial for system reliability over prolonged operational periods.
Our theoretical framework includes fundamental lemmas that support the stability analysis of our control system, adapted from foundational sources [6].
Lemma 1.
Given a positive scalar ε and matrices X 1 and X 2 of appropriate dimensions, if condition X 1 < 0 is met, then it follows that X 1 + ε X 2 < 0 for all 0 < ε ε ¯ .
Lemma 1 ensures that the system stability margins can be maintained even under varying parameter conditions, providing a mathematical foundation for our stability analysis. We now present a critical theorem that establishes the necessary conditions for system stability amidst the nonlinear dynamics and uncertainties associated with MJ processes and the challenges introduced by asynchronous security controls.
Theorem 1.
Given constants 0 < σ l < 1 , δ l , and λ l satisfying λ l δ l > 1 , the closed-loop system described in (18) is stochastically mean-square stable if there exist positive definite matrices Z p s R n × n and positive scalars τ 1 , τ 2 , τ 3 ensuring that
i = 1 r j = 1 r ϱ i ϑ j Ψ ^ i j p s ε < 0 ,
where
Ψ ^ i j p s ε = Ψ ^ 11 i j p s ε Ψ ^ 12 i j p s ε Ψ ^ 13 i j p s ε * Ψ ^ 22 0 * * Ψ ^ 33 , Ψ ^ 11 i j p s ε = diag Φ ^ i j p s ε , ( Γ 2 + τ 1 I ) + 2 τ 2 G G , τ 2 I , τ 3 I , Γ 3 + τ 1 Θ 3 , Φ ^ i j p s ε = ( E ε Z p s E ε ) + Γ 1 + τ 1 Θ 1 + 2 τ 2 G G , Ψ ^ 12 i j p s = I p s ( A ^ i j p s ) ζ ^ I p s ( A 1 i j p s ) Ψ ^ 13 i j p s = σ 0 ( K j s ) Ψ ^ 33 p s = ζ ^ σ 0 ( K 1 j s ) , Ψ ^ 22 = diag { Φ ^ 22 , Φ ^ 22 } , Ψ ^ 33 = diag { τ 3 1 I , τ 3 1 I } , Φ ^ 22 = diag { Z 11 , , Z N S } ,
Γ 1 = diag l = 1 n σ l θ l , Θ 1 = diag l = 1 n { σ l } , Γ 3 = diag l = 1 n λ l 1 θ l , Γ 2 = Θ 3 = diag l = 1 n 1 θ l , A ^ i j p s = A i p + ( 1 ζ ¯ ) B 2 i p Ω K j s ( 1 ζ ¯ ) B 2 i p Ω K j s ζ ¯ B 2 i p Ω K j s B 2 i p Γ ¯ + Θ 0 , K j s = ( 1 ζ ¯ ) K j s ( 1 ζ ¯ ) K j s ζ ¯ K j s 0 0 , K 1 j s = K j s K j s K j s 0 0 , I p s = π p 1 φ s 1 1 I π p N φ s S N I , ζ ^ = ζ ¯ ( 1 ζ ¯ ) , Θ = diag { μ 1 , , μ m } .
Proof. 
The derivation of the stability condition is based on the Lyapunov theory, where the Lyapunov function V ( k ) is positive and verifies that Δ V ( k ) < 0 . For the system described in (18), due to the adaptive nature of the ETP, the term l = 1 n ( 1 / θ l ) η l ( k ) is included in the Lyapunov function, stated as
V ( k ) = x ^ ( k ) P ρ ¯ ( k ) , ϖ k x ^ ( k ) + l = 1 n 1 θ l η l ( k ) ,
where P ρ ¯ ( k ) , ϖ k > 0 and ( ρ ¯ ( k ) , ϖ k ) takes values in ( p , s ) S 1 × S 2 . Moreover, P ρ ¯ ( k ) , ϖ k depends on the Markov processes { ρ ¯ ( k ) | k 0 } and { ϖ k | k 0 } . Let Δ V ( k ) = V ( k + 1 ) V ( k ) . It can be proved along the trajectories of the system presented in (18) that
E ( Δ V ( k ) ) = E x ^ ( k + 1 ) q S 1 , t S 2 Pr ρ ¯ ( k + 1 ) = q , ϖ k + 1 = t | ρ ¯ k = p , ϖ k = s P q t x ^ ( k + 1 ) x ^ ( k ) P p s x ^ ( k ) + l = 1 n 1 θ l η l ( k + 1 ) l = 1 n 1 θ l η l ( k ) .
Using the conditional probability Pr ρ ¯ ( k + 1 ) = q , ϖ k + 1 = t | ρ ¯ k = p , ϖ k = s = π p q φ s t q , we can simplify the expectation as
E Δ V ( k ) = E x ^ ( k + 1 ) P p s x ^ ( k + 1 ) x ^ ( k ) P p s x ^ ( k ) + l = 1 n 1 θ l η l ( k + 1 ) l = 1 n 1 θ l η l ( k ) ,
where P p s = q S 1 π p q t S 2 φ s t q P q t . Using the fact that Pr ρ ¯ ( k + 1 ) = q , ϖ k + 1 = t | ρ ¯ k = p , ϖ k = s = π p q φ s t q , we have that
E Δ V ( k ) = E x ^ ( k + 1 ) P p s x ^ ( k + 1 ) x ^ ( k ) P p s x ^ ( k ) + l = 1 n 1 θ l ( ( λ l 1 ) η l ( k ) e l ( k ) e l ( k ) + σ l x l ( k ) x l ( k ) ) = E x ^ ( k + 1 ) P p s x ^ ( k + 1 ) x ^ ( k ) P p s x ^ ( k ) + x ^ ( k ) Γ 1 x ^ ( k ) e ( k ) e ( k ) + η ( k ) Γ 3 η ( k ) = E ξ ( k ) ( A ϱ ϑ p s ) E ε P p s E ε A ϱ ϑ p s ξ ( k ) + E ( ζ ( k ) ζ ¯ ) 2 ξ ( k ) ( A 1 ϱ ϑ p s ) E ε P p s E ε A 1 ϱ ϑ p s ξ ( k ) + E δ a ( k ) ( B 2 ϱ p Γ ˜ ) E ε P p s E ε B 2 ϱ p Γ ˜ δ a ( k ) + ξ ( k ) diag P p s + Γ 1 , Γ 2 , 0 , 0 , Γ 3 ξ ( k ) ,
where P p s = q S 1 π p q t S 2 φ s t q P q t . Also, note that E ( ( ζ ( k ) ζ ¯ ) 2 ξ ( k ) ( A 1 ϱ ϑ p s ) E ε P p s × E ε A 1 ϱ ϑ p s ξ ( k ) ) = ζ ^ 2 ξ ( k ) ( A 1 ϱ ϑ p s ) E ε P p s E ε A 1 ϱ ϑ p s ξ ( k ) and
E ( B 2 ϱ p Γ ˜ δ a ( k ) E ε P p s E ε B 2 ϱ p Γ ˜ δ a ( k ) ) = δ a ( k ) l = 1 m μ l 2 ( B 2 ϱ p Σ l ) ( E ε P p s E ε ) B 2 ϱ p Σ l δ a ( k ) = δ a ( k ) ( ( B 2 ϱ p Θ ) ( E ε P p s E ε ) B 2 ϱ p Θ ) δ a ( k ) τ 1 l = 1 n ( σ l x l ( k ) x l ( k ) e l ( k ) e l ( k ) + ( 1 / θ l ) η l ( k ) ) = τ 1 ξ ( k ) diag { Θ 1 , I , 0 , 0 , Θ 3 } ξ ( k ) 0 .
Additionally, the expression δ s ( k ) G x ( k ) provides
τ 2 δ s ( k ) δ s ( k ) + 2 τ 2 x ^ ( k ) G G x ^ ( k ) + 2 τ 2 e ( k ) G G e ( k ) 0 .
Considering the formula given in (13), it follows for τ 3 > 0 that
0 τ 3 E δ a ( k ) δ a ( k ) + τ 3 σ 0 2 ξ ( k ) ( K ϑ s ) K ϑ s ξ ( k ) + τ 3 ζ ^ 2 σ 0 2 ξ ( k ) ( K 1 ϑ s ) K 1 ϑ s ξ ( k ) .
The positive scalars τ 1 , τ 2 , and τ 3 are introduced using the S-procedure lemma. Define P p s = ( E ε Z p s E ε ) and combining (20) and (21), it follows that E Δ V ( k ) ξ ( k ) Φ ˜ ϱ ϑ p s ε ξ ( k ) .
We introduce P p s = ( E ε Z p s E ε ) , which is equivalent to E ε ( P p s ) 1 E ε = ( Z p s ) 1 . This allows us to use the Schur complement lemma to obtain the matrix Φ ^ 22 , with
Φ ˜ ϱ ϑ p s ε = Φ ^ ϱ ϑ p s ε + ( A ^ ϱ ϑ p s ) Z p s A ^ ϱ ϑ p s + ζ ^ 2 ( A 1 ϱ ϑ p s ) Z p s A 1 ϱ ϑ p s + τ 3 σ 0 2 ( K ϑ s ) K ϑ s + τ 3 ζ ^ 2 σ 0 2 ( K 1 ϑ s ) K 1 ϑ s ,
where Z p s = q S 1 π p q t S 2 φ s t q ( Z q t ) 1 . Based on the Schur complement, the condition given in (19) implies that E ( Δ V ( k ) ) i = 1 r j = 1 r ϱ i ϑ j ξ ( k ) Φ ˜ i j p s ε ξ ( k ) < 0 . Furthermore, it can be deduced that E ( Δ V ( k ) ) λ ξ ( k ) ξ ( k ) , and
E 0 ( x ( k ) ) x ^ ( k ) E 0 ( ξ ( k ) ) ξ ( k ) 1 λ E 0 Δ V ( k ) 1 λ V ( 0 ) < ,
where λ < 0 is the largest eigenvalue of Φ ˜ i j p s ε . Thus, the system defined in (18) is stochastically mean-square stable, according to Definition 2 stated in [28].    □

4.2. Controller Design

In the development of our strategy for managing the complex dynamics associated with the MJ processes and asynchronous nature of the control actions, a robust controller design is essential. The relationships between ϱ i and ϑ j , as introduced previously, play a crucial role in shaping the controller response to system uncertainties and state transitions. Based on these relationships, we present an ε -independent stability in the following theorem. This stability addresses the interaction between the product term of ϱ i with ϑ j and ε , ensuring that the controller remains effective regardless of ε within the specified bounds.
Theorem 2.
Consider the system described in (7) and the nonsynchronous controller stated in (16), coupled with nonstationary TP matrices defined in (14). Assume the following scalars and matrices:
(i) 
Scalars ζ v , b v , v { 1 , 2 } , 0 < σ l < 1 , and λ l θ l > 1 , ensuring responsiveness and stability in the controller operation.
(ii) 
Matrices Z p s > 0 , X p s , Y p s , and scalars β 1 , β 2 , β 3 , τ 1 , τ ¯ 2 , τ ¯ 3 exist satisfying the stability conditions for each { 0 , ε ¯ } , expressed as Ψ i i p s < 0 , Ψ i j p s + ζ 1 Ψ ˜ j i p s < 0 , and Ψ i j p s + ζ 2 Ψ ˜ j i p s < 0 , for 1 i < j r .
If conditions (i) and (ii) are met, the system established in (18) is stochastically mean-square stable, and the controller gains are given by K ¯ j s = Y j s ( X j 11 s ) 1 .
Theorem 2 articulates a method for defining the matrices that configure the controller gains, ensuring the system responsiveness and stability under various operational conditions. The matrices Z p s , X p s , and Y p s are designed to optimize the controller actions in response to the state changes and to handle the uncertainties of the system effectively. The scalars λ l and θ l play a critical role in this design, enhancing the controller ability to maintain stability across different system modes and environmental conditions.
The matrices defined in Theorem 2 are given by
Ψ ˜ i j p s = Ψ ˜ 11 i j p s Ψ ˜ 12 i j p s Ψ ˜ 13 i j p s Ψ ˜ 14 i j p s Ψ ˜ 15 i j p s Ψ ˜ 16 i j p s * Ψ ^ 22 0 0 0 0 * * Ψ ˜ 33 0 0 0 * * * 0.5 τ ¯ 2 I 0 0 * * * * 0.5 τ ¯ 2 I 0 * * * * * Ψ ˜ 66 , Ψ ˜ 11 i j p s = diag Φ ˜ 11 i j p s , Φ ˜ 22 j s , sym ( X j s ) + τ ¯ 2 I , τ ¯ 3 I , Γ 3 + τ 1 Θ 3 , Φ ˜ 11 i j p s = sym ( β 1 X j s ) + β 1 2 E Z p s E , Φ ˜ 22 j s = sym ( ( 1 + β 2 ) X j s ) + β 2 2 Γ 2 + τ 1 1 I , Ψ ˜ 12 i j p s = I p s ( A i j p s ) ζ ^ I p s ( A 1 i j p s ) , Ψ ˜ 66 = Γ 1 + τ 1 Θ 1 1 , Ψ ˜ 13 i j p s = [ σ 0 ( Y j s ) ζ ^ σ 0 ( Y 1 j s ) ] , Ψ ˜ 33 = diag { τ ¯ 3 I , τ ¯ 3 I } , Ψ ˜ 14 i j p s = [ G X j s       0       0       0       0 ] , Ψ ˜ 15 i j p s = [ 0       G X j s       0       0       0 ] , Ψ ˜ 16 i j p s = [ X j s       0       0       0       0 ] , A i j p s = A i p X j s + ( 1 ζ ¯ ) B 2 i p Ω Y j s ( 1 ζ ¯ ) B 2 i p Ω Y j s ζ ¯ B 2 i p Ω Y j s B 2 i p Γ ¯ + B 2 i p Θ 0 , A 1 i j p s = B 2 i p Ω Y j s B 2 i p Ω Y j s B 2 i p Ω Y j s 0 0 , Y j s = ( 1 ζ ¯ ) Y j s ( 1 ζ ¯ ) Y j s ζ ¯ Y j s 0 0 , Y 1 j s = Y j s Y ̠ j s Y j s 0 0 , X j s = b 1 X j 11 s b 2 X j 11 I , X j 21 s X j 22 s , E ε ¯ = diag { I n 1 , ε ¯ I n 2 } , E 0 = diag { I n 1 , 0 n 2 } .
The parameters ζ v , b v , σ l , θ l , and λ l are instrumental in defining the operational limits and stability conditions of the system. Specifically, σ l , θ l , and λ l must satisfy λ l θ l > 1 , which is a condition to ensure that the dynamic adjustments in the controller response are sufficient to counteract any disturbances and maintain system stability. In addition, the matrices Z p s , X p s , and Y p s are designed to encapsulate both the state feedback and uncertainties inherent in the system. Their positive definiteness and structured form ensure that the control law can robustly handle stochastic variations. The stability criteria given in (1) are important as they ensure that, under any given { 0 , ε ¯ } , the system response remains within desired bounds, hence guaranteeing mean-square stability. Each condition within these criteria targets different aspects of the system response, making sure that the overall system dynamics do not lead to instability.
Proof of Theorem 2.
Assume that ϑ j = ρ j ( k ) ϱ j and | ϱ j ϑ j | δ j , where ρ j and δ j , for j S , are positive scalars. Thus, it can be established that 0 < ρ 1 1 δ j / ϱ ̲ j 1 δ j / ϱ j ρ j ( k ) 1 + δ j / ϱ j 1 + δ j / ϱ ̲ j ρ 2 , where ρ 1 and ρ 2 represent the minimum and maximum values of ρ j ( k ) . Thus, it follows that
ζ 1 = ρ 1 ρ 2 min ρ i ( k ) max ρ j ( k ) ρ i ( k ) ρ j ( k ) max ρ i ( k ) min ρ j ( k ) ρ 2 ρ 1 = ζ 2 .
Consequently, there exist ε 1 0 and ε 2 0 satisfying ε 1 + ε 2 = 1 such that ρ i ( k ) / ρ j ( k ) = ε 1 ζ 1 + ε 2 ζ 2 . From this relationship, it can be deduced that i = 1 r j = 1 r ϱ i ϑ j Ψ ˜ i j p s ε = l = 1 2 ε l ( Ψ ˜ i j p s ε + ζ l Ψ ˜ i j p s ε ) .
According to Lemma 1, the matrix Y ˜ ( ε ) holds ε ( 0 , ε ¯ ] , using the expression given in (19) for = 0 and = ε ¯ . Thus, it can be concluded that i = 1 r j = 1 r ϱ i ϑ j Ψ ˜ i j p s ε < 0 , and consequently, Ψ ˜ i j p s ε < 0 . This proves that the stability condition is met under the given assumptions. Also, a solution for Theorem 2 satisfies sym ( β 1 2 X j s ) β 1 E ε Z p s E ε < 0 and X j s is then nonsingular.
Using the fact that ( X j s + β 1 E ε Z p s E ε ) ( E ε Z p s E ε ) 1 ( X j s + β 1 E ε Z p s E ε ) 0 , it follows that ( X j s ) ( E ε Z p s E ε ) 1 X j s sym ( β l X j s ) + β l 2 E ε Z p s E ε . Similarly, for τ 2 ¯ = τ 2 1 , we prove that τ 1 ( X j s ) X j s sym ( X j s ) + τ 1 1 I and τ 2 ( X j s ) X j s sym ( X j s ) + τ 2 ¯ I . Let Π j 2 s = diag { ( X j s ) 1 , ( X j 11 s ) 1 , ( X j s ) 1 , τ 3 1 I , τ 3 1 I , I , I , I } . By applying the congruence transformation to Ψ ˜ i j p s ε < 0 , using Π j 2 s , and subsequently utilizing the Schur complement, it can be verified that Φ ^ i j p s ε < 0 . These transformations and verifications ensure that the stability conditions are met for the system under the defined control strategy.    □
Remark 2.
The criteria specified in Theorem 2 could exhibit a degree of conservatism and computational complexity, mostly due to the following factors:
(i) 
In the controller design described in Theorem 2, the structure of the matrix X j s plays a crucial role in achieving the desired stability properties. Specifically, if b 2 = 0 , the top-right element of X j s becomes zero. This particular specification is common in the literature and is known to yield conservative results in stability analysis. The matrix X j s is defined as
X j s = b 1 X j 11 s b 2 X j 11 s I X j 21 s X j 22 s ,
where I represents an appropriately dimensioned identity matrix, ensuring compatibility across the matrix dimensions. This matrix allows for flexibility in adjusting the controller gains by modifying the constants b 1 and b 2 . Adjusting these constants can enhance the system performance by optimizing the response of the controller to changes in system states and disturbances. Therefore, careful selection of b 1 and b 2 is recommended to tailor the controller performance to specific operational requirements, thereby potentially overcoming the conservatism associated with standard configurations.
(ii) 
Theorem 2 provides a direct correlation between the expansion of fuzzy rules and MJ modes as well as the subsequent expansion in computing complexity. In this article, the linear matrix inequalities (LMIs) matrices are used to calculate the controller gains, in which the corresponding algorithm dealing with the LMIs has polynomial time complexity. Fortunately, with the increasing power of computers and accelerating advances in LMI optimization techniques, the complex LMIs are well solved.

5. Empirical Applications

This section illustrates the feasibility and merits of the proposed methodology by employing two applications.

5.1. Application I: Control of a Tunnel Diode Circuit

The dynamics of SPSs pose important challenges in control theory, particularly under conditions involving cyber-physical threats and the necessity for efficient communication within networked control systems. Next, we illustrate the application of an advanced control strategy employing IT2 fuzzy models within an MJ framework to manage uncertainties and enhance both the reliability and resilience of networked systems. The circuit selection and characteristics are as follows. The tunnel diode is chosen for its unique electrical properties, ideal for applications in real-world industrial scenarios characterized by frequent operational fluctuations. Tunnel diodes exhibit a phenomenon known as negative differential resistance, where the current decreases as the voltage increases within a specific range. This phenomenon is due to the quantum tunneling effect that allows electrons to pass through a potential barrier at low voltages. The nonlinear current-voltage (I–V) relationship of tunnel diodes is crucial for their application in circuits where rapid response to voltage changes is needed and less common in other semiconductor devices. This nonlinear response is vital for evaluating control strategies under dynamic conditions, where system performance is susceptible to unpredictable parameter variations and cyber-threats.
The parameters used in our model are grounded in empirical data and circuit specifications. Specifically, the values for inductance, capacitance, and resistance were chosen based on typical characteristics of commercially available tunnel diodes and components used in high-speed circuit applications. The I–V characteristics of the tunnel diode, described by the parameter α 0 , were derived from experimental measurements and are documented in the literature. This ensures that our model accurately reflects the behavior of real-world tunnel diodes, providing a reliable basis for evaluating the proposed control strategies.
The mathematical representation of I–V characteristics is as follows. The current i D ( t ) through the diode as a function of the voltage across it, v D ( t ) say, is empirically derived to capture the tunnel diode dynamic behavior, particularly its ability to handle rapid changes in voltage. This relationship is described by i D ( t ) = 0.002 v D ( t ) + α 0 v D 3 ( t ) , where the parameter α 0 , ranging from 0.001 to 0.004 , quantifies the uncertainty in the model and is based on empirical observations.
To accurately simulate the behavior of the tunnel diode, specific values for inductance and capacitance are selected: (i) inductance, L = 0.1 mH , and (ii) capacitance, C = 20 mF . These values help to model the temporal response of the circuit to external stimuli and enhance the fidelity of simulations in dynamic and potentially adverse environments. The time-varying resistance, denoted by R, complements the diode rapid response characteristics by facilitating an accurate representation of the system dynamic response to voltage and current variations.
To evaluate the control strategy in a digital setting, we discretized the continuous model formulated previously. The discrete-time model uses state variables x 1 ( k ) and x 2 ( k ) to represent the capacitor voltage and inductor current, respectively. The model is given by
x 1 ( k + 1 ) = γ ( α 0 , x 1 ( k ) ) x 1 ( k ) + x 2 ( k ) , x 2 ( k + 1 ) = x 1 ( k ) x 2 ( k ) + δ ( ρ ( k ) ) u ( k ) ,
where γ ( α 0 , x 1 ( k ) ) = 0.002 + α 0 x 1 2 ( k ) models the nonlinear I-V characteristics affected by α 0 . Additionally, δ ( ρ ( k ) ) adjusts the control input u ( k ) based on the operational state of the system, which is governed by a Markov process. The operational states δ ( 1 ) = 1 and δ ( 2 ) = 0.75 represent full and reduced functionality, respectively, reflecting potential actuator failures. These states are part of the MJ system described in (7), illustrating how system dynamics are integrated with control inputs to manage state transitions effectively.
Given the operational constraints of the system, which limit the state variable x 1 ( k ) such that | x 1 ( k ) | 3 , the sector nonlinearity technique is employed to approximate the nonlinear behavior exhibited by the tunnel diode circuit. This technique transforms the nonlinear circuit model into an equivalent IT2 fuzzy singularly perturbed model, similar to the parameterization of system matrices described in (5) and (6).
The linear components of this transformed model are configured to adapt to the fuzzy rules and Markov transitions, mirroring the approach used in our TS fuzzy model, for p { 1 , 2 } , stated as
A 1 p = 1.0017 0.3711 0.5344 0.6902 , A 2 p = 1.0108 0.2177 0.1121 1.0355 ,
B 21 1 = 0.5046 0.0391 , B 22 1 = 0.37845 0.029325 , B 23 2 = 0.2944 0.0236 , B 24 2 = 0.2208 0.0177 .
where the matrices are parameterized in accordance with the current Markov state, ρ ( k ) namely, influencing how the system dynamics are linearly combined with control inputs under varying operational conditions, as discussed in Section 3.3.
While the parameters used in our model are grounded in empirical data and circuit specifications, due to failures and attacks which affect the system, we assume that the input matrix B 2 i p may randomly change according to a Markov process, with operational states δ ( 1 ) = 1 and δ ( 2 ) = 0.75 representing full and reduced functionality, respectively.
In our methodology, to control the tunnel diode circuit we adapt techniques from the TS fuzzy model framework.
Similar to the dynamic calculation of firing strengths based on system states and uncertainties in the TS model stated in Section 3.5, we define the lower and upper membership function bounds, ϱ ̲ i and ϱ ¯ i say, based on the nonlinear characteristics captured by γ ( α 0 , x 1 ( k ) ) . This ensures that our IT2 fuzzy controller dynamically adjusts its strategy to optimally handle the nonlinear and uncertain dynamics of the tunnel diode, as seen in the calculations presented in (15). The membership functions ϑ ̲ i and ϑ ¯ i , specific to the state variables, enable precise modulation of the controller response, ensuring robust control even under high system variations. This method mirrors the adaptive response strategies employed in the TS fuzzy model, where rule contributions are adjusted according to their relevance and the current system conditions. To adeptly model these nonlinear dynamics and uncertainties within the fuzzy logic framework, we proceed to define the lower and upper bounds of the membership functions as
ϱ ̲ 1 ( x ( k ) ) = γ max γ ( 0.04 , x 1 ( k ) ) γ max γ min , ϱ ¯ 1 ( x ( k ) ) = γ max γ ( 0.01 , x 1 ( k ) ) γ max γ min
ϱ ̲ 2 ( x ( k ) ) = γ ( 0.01 , x 1 ( k ) ) γ min γ max γ min , ϱ ¯ 2 ( x ( k ) ) = γ ( 0.04 , x 1 ( k ) ) γ min γ max γ min .
By establishing the bounds in the expressions above, the controller can adjust its strategy based on the system current state, enhancing its adaptability and response to nonlinearities and uncertainties. The IT2 fuzzy logic controller is modeled through the membership functions specific to each state variable in the vector x ( k ) , whose elements are given by
ϑ ̲ 1 i ( x ( k ) ) = 0.8 exp ( x i 2 ) , ϑ ¯ 1 i ( x ( k ) ) = ϑ ̲ 1 i ( x ( k ) ) ,
ϑ ̲ 2 i ( x ( k ) ) = 1 ϑ ̲ 1 i ( x ( k ) ) , ϑ ¯ 2 i ( x ( k ) ) = ϑ ̲ 2 i ( x ( k ) ) ,
where i indexes the components of x ( k ) . These functions provide the controller with a flexible mechanism to adeptly manage the system dynamics and the uncertainties it encounters, applying tailored control strategies to each dimension of the state vector.
Building upon the Markov framework outlined in Section 3.1 and Section 3.2, this control model leverages the TP matrices Π 1 and Π 2 ρ ( k + 1 ) to deal with the operational states of actuators, aligning with the Markov dynamics previously discussed. These matrices, elaborated in Section 3.3 and Section 3.8, facilitate a proactive and dynamic response to the actuator current conditions, thereby enhancing the system resilience to uncertainties and external perturbations. The model incorporates TPs to manage Markov transitions between different states of the actuators. These transitions are defined within the stationary TP matrix Π 1 and the piecewise-stationary matrices Π 2 ρ ( k + 1 ) given in (14), which are structured as
Π 1 = 0.7 0.3 0.55 0.45 , Π 2 1 = 0.4 0.6 0.8 0.2 , Π 2 2 = 0.85 0.15 0.5 0.5 ,
providing a representation of the actuator state dynamics under different operational conditions. After introducing IT2 fuzzy models and the MJ framework for tunnel diode circuit complexities, we move to test our control strategy, checking its reliability and resilience. We now proceed to the practical implementation phase, starting with Case I. This phase is designed to test the resilience and adaptability of our control strategy against cyber-physical threats, with a particular focus on the CB-DETM.
Case I.
Next, we explore the strategic development of the CB-DETM controller, designed to protect the system from sensor and actuator deception attacks. This case demonstrates the practical application of IT2 fuzzy models and the MJ framework, highlighting the challenges and implications of applying our methodology in real-world scenarios. Furthermore, this case bridges the gap between theoretical foundations and practical applications, underscoring the relevance of our research in addressing contemporary cyber-security challenges in control systems.
To optimize the performance of the CB-DETM controller, we select key design parameters (see Section 3.7). These parameters include Ω = 0.8 , reflecting the system sensitivity to changes; G = diag { 0.3 , 0.4 } , outlining the feedback loop gain matrix; H 0 = 1 , which sets the threshold for event triggering; and σ 0 = 0.5 , quantifying the cyber-attack impact strength. These selections enable the CB-DETM to dynamically adapt its response, ensuring the system stability and effective performance under various attack conditions.
Table 1 details specific parameters for each sensor within the system. The parameter σ represents the sensitivity related to the sensor measurements, affecting how the sensor perceives changes in its environment. The parameter θ is a specific adjustment factor for each sensor, impacting their sensitivity to detected changes. The parameter λ is another adjustment factor, influencing the rate at which the sensor updates or responds to changes, while η 0 is a baseline parameter that applies to both sensors representing an initial state used for calibration and consistency across different operational scenarios.
The parameters in Table 1 are chosen based on theoretical insights, empirical evidence, and simulations. While some choices are common in similar applications, experimentation and adjustment are crucial. Different scenarios may require parameter optimization to enhance resilience against cyber-threats. Thus, we recommend periodic re-evaluation and optimization of these parameters based on updated research and system performance.
To calculate the controller gain matrices, we employ Yalmip, a MATLAB toolbox designed for optimization, alongside Mosek, a solver renowned for its efficiency and precision in tackling large-scale optimization challenges. Our methodology facilitates the precise fine-tuning of the CB-DETM response, ensuring it aligns with the system operational demands in the face of simulated deception attacks. Using Yalmip and Mosek, we derive the controller gain matrices as K 1 1 = 0.9303 , K 2 1 = 1.1696 , K 1 2 = 0.93036 , and K 2 2 = 1.1694 . To simulate realistic cyber-physical threats, we define models for sensor and actuator attacks. The sensor attack model, δ s ( k ) , simulates disruptions in sensor readings and is defined as
δ s ( k ) = 0 , k < 1 ; 0.1 k x , 1 k 3 ; b sin ( 10 k ) x 1 2 + x 2 2 + 0.1 , 13 k 16 ;
where b = 0.5 is the magnitude of the attack, incorporating both continuous and intermittent disruptions within a simulation period. The actuator attack signal, δ a ( k ) , represents adversarial actions manipulating actuator behavior. For every time step k 0 , the actuator attack model is expressed as δ a ( k ) = σ 0 tanh ( 3 u ( k ) ) cos ( 1000 k ) . This model helps to analyze how external manipulations could potentially alter the behavior of the system actuators. Furthermore, the probabilities of encountering sensor and actuator attacks are assigned as ζ ¯ = 0.25 and Γ ¯ = 0.45 , respectively. These values reflect our assumptions about the probability of attacks occurring within the system operational environment.
Setting the initial condition of the system as x ( 0 ) = [ 2.5 , 1.5 ] , 50 random independent simulations were conducted to robustly test the system resilience. This simulation allows us to observe the system behavior under a variety of attack scenarios.
Our numerical studies validated the effectiveness of our proposal, demonstrating important improvements in system performance. The results indicated a 20% reduction in network load and enhanced stochastic stability under varying conditions and cyber-threats. Figure 3 displays the results of these simulations, focusing on the closed-loop system performance with the applied control strategy, as defined in (12).
Figure 3 shows the system behavior with the CB-DETM control strategy implemented, illustrating the system stability and resilience across simulated attack scenarios, highlighting the effectiveness of our proposal in maintaining operational integrity and mitigating cyber-attack impacts. The figure shows that, despite the presence of deception attacks targeting both sensors and actuators, the system remains stable over time. This stability shows the effectiveness of our control strategy.
Figure 4 displays the open-loop response of the system without the CB-DETM, serving as a baseline for comparison. This figure provides a clear reference point to evaluate the essential improvements and benefits obtained by implementing the control strategy, illustrating the system vulnerability to cyber-physical attacks in the absence of advanced control mechanisms.
By comparing the outcomes in Figure 3 and Figure 4, the success and efficiency of the implemented control approach in mitigating the effects of cyber-physical attacks are evident. Through such an analysis, we can clearly see how our strategy ensures the system robustness and operational integrity, even in the face of sophisticated cyber-threats. To evaluate our strategy against cyber-physical threats, we show the dynamics of the controller using simulations.
Figure 5 sketches timelines of (a) a sequence of system and asynchronous controller modes, illustrating the state transitions and control actions, and (b) deception attacks encountered during the simulations, indicating when and how the system is targeted. This helps to understand the frequency and nature of these threats, as well as the temporal distribution and impact of these attacks, providing insights into the adaptability and responsiveness of the system to conditions induced by cyber-threats, illustrating the system and controller abilities to maintain operational integrity amidst such threats.
Figure 6 focuses on the instants and behavior of internal variables, η 1 ( k ) , η 2 ( k ) say, as governed by the adaptive equation stated in (9), showing the moments when the controller decides to transmit signals from sensors to actuators, which is essential for managing communication while ensuring stability. From Figure 6, we find that sensor 1 transmits 48 signals, achieving a transmission rate of 19.12%. Similarly, sensor 2 transmits 74 signals, resulting in a transmission rate of 29.48%. These findings show the efficacy of our strategy in optimizing signal transmission under varying operational conditions and cyber-threats.
The results garnered from the simulations confirm the reliability and resilience of our methodology. By managing communication between sensors and actuators, the system demonstrates resilience to cyber-physical attacks, ensuring stable and efficient operation even under adversity. After validating the effectiveness of the CB-DETM control strategy against cyber-physical threats through simulations, our attention now turns to Case II.
Case II.
Now, we explore the feasibility of constructing a dynamic event trigger (DET)-based control system for components with identical triggering parameters, as discussed in Remark 1 and outlined in [52]. We analyze two distinct scenarios characterized by the minimum and maximum values of the parameters. The outcomes of this investigation are succinctly summarized in Table 2. The DET-based control system effectively maintains communication efficiency and control gains by applying uniform triggering parameters. The data, particularly from the comparison with the protocol, show that sensor 1 could remain inactive for up to 28 sample periods. This inactivity indicates the ability of our methodology to reduce redundant communications without affecting system performance. The results from Case II highlight the benefits of uniform triggering parameters in a DET-based control system, pointing to opportunities for enhancing the management of communications within cyber-physical systems, aiming for greater efficiency and optimization.
Case III.
In this case, we evaluate the resilience of the proposed methodology by increasing the intensity of cyber-attacks. The actuator attack intensity is increased by a factor of 15, and the sensor by a factor of 20. Figure 7 illustrates the system state trajectories under these intensified attacks, demonstrating that stability is maintained despite the escalated threat level.
Furthermore, we compare our control strategy with the scheme developed in [17] to emphasize the superiority of our methodology. Implementing the control scheme presented in [17] under identical initial conditions and system parameters results in diminished system efficacy, as evident from Figure 8. Given the advancements demonstrated in the present study, our control methodology notably outperforms the strategy presented in [17], especially in managing increased attack intensities. This superior performance highlights the relevance of event-triggered mechanisms in bolstering system resilience against complex cyber-threats, contributing to the field of adversarial-condition control systems.
Cases I, II, and III collectively underscore the effectiveness and superiority of our proposed methodology. Case I establishes the foundational effectiveness of the CB-DETM control strategy. Case II further validates the methodology under uniform triggering parameters, showing improved communication efficiency. Case III confirms the system robustness against strongly intensified attacks. Armed with the conclusive evidence from these investigations, we advance to explore additional applications of our methodology.

5.2. Discussion and Limitations

While the numerical results validate the effectiveness of the proposed CB-DETM control strategy, several limitations must be acknowledged. First, the simulations assume ideal conditions that may not fully capture the complexities and uncertainties present in real-world applications.
Factors such as sensor noise, communication delays, and hardware limitations are not explicitly considered in our simulations. Furthermore, the chosen parameters for the simulations, although based on empirical data and realistic specifications, may not cover the entire range of possible operational scenarios.
Therefore, the robustness of the proposed methodology should be further tested under more diverse and challenging conditions to ensure its applicability in a wider array of real-world situations. The potential real-world applications of this research are relevant, particularly in areas requiring high reliability and resilience against cyber-physical threats, such as industrial control systems, smart grids, and autonomous vehicles.
The ability to maintain system stability and performance under adversarial conditions is crucial for the safety and efficiency of these systems. In comparison with existing methods, the proposed CB-DETM methodology offers enhanced reliability and resilience.
Unlike traditional control strategies, which may not effectively handle the dynamic nature of cyber-attacks and operational uncertainties, our methodology leverages the flexibility of IT2 fuzzy logic and the dynamic adaptation capabilities of MJ systems. This allows for a more reliable and resilient control mechanism, as demonstrated by the superior performance observed in our simulations compared to the control scheme presented in [17]. Future work should focus on addressing the identified limitations by incorporating more realistic system models and exploring the integration of additional factors such as network constraints and multi-agent coordination. This will help to validate the applicability of the proposed control strategy and enhance its effectiveness in real-world scenarios.

5.3. Controller Performance Results

The proposed state feedback controller was implemented, and its performance was evaluated using various metrics. The results demonstrated important improvements in system stability and responsiveness under different operational conditions. The figures presented next illustrate the effectiveness of the state feedback controller. Figure 9a shows the system response with damped oscillations in the state variables. Figure 9b displays the dynamic variation in the control input. Figure 9c highlights the periods where the system is subject to sensor and actuator attacks. These results validate the reliability and resilience of the controller in managing the dynamic behavior and maintaining stability under different operational conditions and attack scenarios.
Figure 9 complements Figure 3 by providing a detailed analysis of the simulated attack scenarios and the system response to these attacks. While Figure 3 focuses on the overall closed-loop performance of the system, Figure 9 breaks down the specific effects of the sensor and actuator attacks, as well as the dynamic variations in the control input and system state variables. This detailed analysis is crucial for demonstrating the controller effectiveness under attack conditions, thereby validating its reliability and resilience in maintaining system stability and performance in the presence of cyber-physical threats.

5.4. Application II: Another Operational Context

Next, we evaluate the effectiveness of our control system of an IT2 fuzzy SPS in a distinct operational context. This evaluation demonstrates the reliability and resilience of our system, facilitating a comparison with the methodologies given in [18].
Through such an evaluation, we aim to highlight the robustness and adaptability of our methodology under varying conditions. The system parameters and configuration for this illustration are specified as
A 1 = 0.8 0.3 0.1 1.0 , A 2 = 1.1 0.4 0.2 1.0 , A 21 = 0.1 0.2 , A 22 = 0.1 0.5 .
Considering the range of x 1 ( k ) [ 2 , 2 ] , under varying conditions, we define the lower and upper bounds of the membership functions to model the system stated as
ϱ ̲ 1 ( x ( k ) ) = 0.2 ( x 1 2 ( k ) + 2 ) 3 , ϱ ¯ 1 ( x ( k ) ) = 0.2 ( 3 x 1 2 ( k ) + 2 ) 3 , ϱ ̲ 2 ( x ( k ) ) = 1 ϱ ¯ 1 ( x ( k ) ) , ϱ ¯ 2 ( x ( k ) ) = 1 ϱ ̲ 1 ( x ( k ) ) .
Functions are crucial for tailoring the IT2 fuzzy controller as
ϑ ̲ 1 ( x 1 ) = 0.6 ϱ ̲ 1 ( x ( k ) ) + 0.4 ϱ ¯ 1 ( x ( k ) ) , ϑ ̲ 2 ( x 1 ) = 1 ϑ ̲ 1 ( x 1 ) , ϑ ¯ 2 ( x 1 ) = ϑ ̲ 2 ( x 1 ) .
For a comprehensive understanding, the dynamic event-triggered parameters for each sensor, as defined in the comparative study given in [18], are listed in Table 3. These parameters are similar to those listed in Table 1, which detail the parameters for each sensor in a different operational context. This helps to compare the performance and adaptability of the system under varying conditions.
The model for a sensor attack, δ s ( k ) say, simulates cyber-threats affecting sensor readings, described as δ s ( k ) = 0.2 2 x 1 x 2 . Given the parameters ε ¯ = 0.01 , Ω = 0.6 , G = diag { 0.2 , 0.2 } , H 0 = 1 , and σ 0 = 0.1 , we apply Theorem 2 to find a viable control solution. This results in the gain matrices: K 1 1 = 11.3217 , K 2 1 = 15.8528 , K 1 2 = 11.3198 , and K 2 2 = 15.8528 . The probabilities of sensor and actuator attacks are set to ζ ¯ = 0.3 and Γ ¯ = 0.2 , respectively. The dynamics of ζ ( k ) and Γ ( k ) , illustrated in Figure 10, show the system behavior under cyber-attacks with the initial condition x ( 0 ) = [ 2 , 1.5 ] . The simulation results demonstrate the stability and performance of the system under the CB-DETM controller, even in the presence of cyber-attacks. The system states x 1 ( k ) and x 2 ( k ) maintain their trajectories effectively, while the input u ( k ) adapts to the changes induced by the attacks. This illustrates how the controller manages the probabilistic nature of the attacks. The states x 1 ( k ) and x 2 ( k ) achieved triggering numbers of 27 and 29, respectively, indicating that the communication and control mechanisms are functioning efficiently to mitigate the effects of the cyber-attacks.
To highlight the superiority of our methodology, we employ the control method suggested in [18], which is rooted in the sliding mode control scheme. This method utilizes the gains K 1 = [ 1.1706 , 40553 ] and K 2 = [ 1.1703 , 3.5647 ] . We compare the performance of the method stated in [18] under identical initial conditions and system parameters in Figure 11. This comparison shows the enhanced reliability and resilience of our methodology, particularly when evaluating system performance under equivalent operational scenarios. However, note that the method given in [18] did not consider the complexities introduced by MJs and cyber-attacks, which are critical aspects of our study. Thus, we conclude that our strategy offers important advantages when handling the uncertainties and dynamics introduced by MJs and cyber-attacks over the method suggested in [18].
Throughout the present study, we have undertaken a thorough examination of an advanced control strategy designed to enhance the reliability and resilience of systems facing cyber-physical threats. Application I, with its cases I, II, and III, as well as Application II, have clearly demonstrated the effectiveness of our proposal in mitigating diverse and intensified cyber-attacks. The exploration began with a tunnel diode circuit application, showing the methodology capability to handle unexpected parameter variations and sophisticated cyber-threats.

6. Conclusions and Future Work

This article presented a control methodology for discrete-time Markov jump singularly perturbed systems under cyber-physical threats, integrating a dynamic event-triggered protocol with interval type-2 fuzzy models. Our methodology effectively handled system uncertainties and cyber-attacks, demonstrating high reliability and resilience improvements. Key contributions of our study included:
  • Robust framework integration—It effectively handled uncertainties and dynamic changes, critical for managing stochastic cyber-attacks.
  • Enhanced communication efficiency—It optimized data transmission, reducing unnecessary communications while maintaining stability.
  • Resilience under cyber-attacks—It maintained system stability under intense attacks.
  • Comparative superiority: It demonstrated enhanced stability and robustness compared to existing methods.
  • Adaptive control mechanisms—It dynamically adjusted control parameters in response to real-time conditions, ensuring resilience and operational integrity.
The innovation of our methodology lies in the comprehensive integration of interval type-2 fuzzy logic and Markov jump systems, coupled with a dynamic event-triggered protocol. This integration enabled real-time adaptation to changing conditions and robust handling of uncertainties and cyber-physical threats, setting our methodology apart from traditional control strategies. Unlike standard techniques, our methodology dynamically adjusted control parameters and communication strategies based on real-time system states and operational conditions, offering a higher level of reliability and resilience.
Future research should explore machine learning techniques to optimize event-triggered parameters dynamically, enhancing network resource utilization and system response. Investigating semi-Markovian jump systems and integrating fractional calculus and fractal dynamics could provide more realistic modeling and control of complex systems under nonstationary conditions. Further investigation should address scalability and applicability across different systems and industries to ensure robustness against evolving cyber-threats. Additionally, while our study guarantees asymptotic stability in the mean-square sense using a mode-dependent Lyapunov function technique, exploring finite-time stability, as suggested in [48], could offer practical advantages in scenarios where rapid stabilization is critical.
In conclusion, this study addressed important gaps that are present in the literature on the topic controlling Markov jump singularly perturbed systems under cyber-physical threats, providing a foundation for future advancements. Ongoing innovation is essential to bridge the gap between theoretical developments and practical applications in safeguarding interconnected systems.

Author Contributions

Conceptualization, M.K., C.C., R.A., V.L., and H.J.; data curation, M.K. and C.C.; formal analysis, M.K., C.C., R.A., V.L., and H.J.; investigation, M.K., C.C., R.A., V.L., and H.J.; methodology, M.K., C.C., R.A., V.L., and H.J.; writing—original draft, M.K., R.A., and H.J. writing—review and editing, V.L. and C.C. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Data and codes are available from the authors upon request.

Acknowledgments

The authors would like to thank the editors and reviewers for their constructive comments, which led to improvements in the presentation of the article.

Conflicts of Interest

There are no conflicts of interest declared by the authors.

References

  1. Mei, X.; Rodríguez, J.; Kennel, R. Advanced control strategies of induction machine: Field oriented control, direct torque control and model predictive control. Energies 2018, 11, 120. [Google Scholar] [CrossRef]
  2. Yan, Y.; Yang, C.; Ma, X.; Zhou, L. Observer-based event-triggered control for singularly perturbed systems with saturating actuator. Int. J. Robust Nonlinear Control 2019, 29, 3954–3970. [Google Scholar] [CrossRef]
  3. Yang, C.; Li, F.; Kong, Q.; Chen, X.; Wang, J. Asynchronous fault-tolerant control for stochastic jumping singularly perturbed systems: An H sliding mode control scheme. Appl. Math. Comput. 2021, 389, 125562. [Google Scholar] [CrossRef]
  4. Efheij, H.; Albagul, A.; Albraiki, N.A. Comparison of model predictive control and PID controller in real time process control system. In Proceedings of the 2019 19th International Conference on Sciences and Techniques of Automatic Control and Computer Engineering (STA), Sousse, Tunisia, 24–26 March 2019; pp. 64–69. [Google Scholar]
  5. Cheng, J.; Park, J.H.; Zhao, X.; Karimi, H.R.; Cao, J. Quantized nonstationary filtering of networked Markov switching RSNSS: A multiple hierarchical structure strategy. IEEE Trans. Autom. Control 2020, 65, 4816–4823. [Google Scholar] [CrossRef]
  6. Wan, X.; Wang, Z.; Wu, M.; Liu, X. H State estimation for discrete-time nonlinear singularly perturbed complex networks under the round-robin protocol. IEEE Trans. Neural Netw. Learn. Syst. 2019, 30, 415–426. [Google Scholar] [CrossRef]
  7. Zheng, D.D.; Guo, K.; Pan, Y.; Yu, H. Indirect adaptive control of multi-input-multi-output nonlinear singularly perturbed systems with model uncertainties. Neurocomputing 2022, 491, 104–116. [Google Scholar] [CrossRef]
  8. Wang, J.; Yang, C.; Xia, J.; Wu, Z.G.; Shen, H. Observer-based sliding mode control for networked fuzzy singularly perturbed systems under weighted try-once-discard protocol. IEEE Trans. Fuzzy Syst. 2022, 30, 1889–1899. [Google Scholar] [CrossRef]
  9. Cheng, J.; Wang, Y.; Park, J.H.; Cao, J.; Shi, K. Static output feedback quantized control for fuzzy Markovian Switching Singularly Perturbed Systems with Deception Attacks. IEEE Trans. Fuzzy Syst. 2022, 30, 1036–1047. [Google Scholar] [CrossRef]
  10. Charfeddine, S.; Boudjemline, A.; Ben Aoun, S.; Jerbi, H.; Kchaou, M.; Alshammari, O.; Elleuch, Z.; Abbassi, R. Design of a fuzzy optimization control structure for nonlinear systems: A disturbance-rejection method. Appl. Sci. 2021, 11, 2612. [Google Scholar] [CrossRef]
  11. Alshammari, O.; Kchaou, M.; Jerbi, H.; Ben Aoun, S.; Leiva, V. A fuzzy design for a sliding mode observer-based control scheme of Takagi-Sugeno Markov jump systems under imperfect premise matching with bio-economic and industrial applications. Mathematics 2022, 10, 3309. [Google Scholar] [CrossRef]
  12. Chaouch, H.; Charfeddine, S.; Ben Aoun, S.; Jerbi, H.; Leiva, V. Multiscale monitoring using machine learning methods: New methodology and an industrial application to a photovoltaic system. Mathematics 2022, 10, 890. [Google Scholar] [CrossRef]
  13. Kuppusamy, V.; Shanmugasundaram, M.; Dhandapani, P.; Martin-Barreiro, C.; Cabezas, X.; Leiva, V.; Castro, C. Addressing a decision problem through a bipolar Pythagorean fuzzy approach: A novel methodology with application in digital marketing. Heliyon 2024, 10, e23991. [Google Scholar] [CrossRef]
  14. Dhandapani, P.; Thippan, J.; Martin-Barreiro, C.; Leiva, V.; Chesneau, C. Numerical solutions of a differential system considering a pure hybrid fuzzy neutral delay theory. Electronics 2022, 11, 1478. [Google Scholar] [CrossRef]
  15. Carreon-Ortiz, H.; Valdez, F.; Castillo, O. Comparative study of type-1 and interval type-2 fuzzy logic systems in parameter adaptation for the fuzzy discrete mycorrhiza optimization algorithm. Mathematics 2023, 11, 2501. [Google Scholar] [CrossRef]
  16. Salem, F.; Mosaad, M.I. A comparison between MPC and optimal PID controllers: Case studies. In Proceedings of the Michael Faraday IET International Summit 2015, Kolkata, India, 12–13 September 2015; pp. 59–65. [Google Scholar]
  17. Hu, Y.; Cai, C.; Lee, S.; Lee, Y.; Kwon, O.M. New results on H control for interval type-2 fuzzy singularly perturbed systems with fading channel: The weighted try-once-discard protocol case. Appl. Math. Comput. 2023, 448, 127939. [Google Scholar] [CrossRef]
  18. Yang, Y.; Niu, Y.; Reza Karimi, H. Dynamic learning control design for interval type-2 fuzzy singularly perturbed systems: A component-based event-triggering protocol. Int. J. Robust Nonlinear Control 2022, 32, 2518–2535. [Google Scholar] [CrossRef]
  19. Wang, J.; Liu, X.; Xia, J.; Shen, H.; Park, J.H. Quantized interval type-2 fuzzy control for persistent dwell-time switched nonlinear systems with singular perturbations. IEEE Trans. Cybern. 2022, 52, 6638–6648. [Google Scholar] [CrossRef] [PubMed]
  20. Liu, S.; Cheng, J.; Zhang, D.; Yan, H.; Park, J.H. Saturation control for fuzzy Markovian switching systems with singularly perturbation and cyber-attacks. Inf. Sci. 2022, 609, 931–948. [Google Scholar] [CrossRef]
  21. Li, F.; Xu, S.; Zhang, B. Resilient asynchronous H control for discrete-time Markov jump singularly perturbed systems based on hidden markov model. IEEE Trans. Syst. Man Cybern. Syst. 2020, 50, 2860–2869. [Google Scholar] [CrossRef]
  22. Kchaou, M.; Jerbi, H.; Toual, B.; Kouzou, A. Non-fragile mixed H/passive-based asynchronous sliding mode control for nonlinear singular Markovian jump systems. Int. J. Syst. Sci. 2022, 53, 447–467. [Google Scholar] [CrossRef]
  23. Hamidi, F.; Jerbi, H.; Alharbi, H.; Leiva, V.; Popescu, D.; Rajhi, W. Metaheuristic solution for stability analysis of nonlinear systems using an intelligent algorithm with potential applications. Fractal Fract. 2023, 7, 78. [Google Scholar] [CrossRef]
  24. Cheng, J.; Zhan, Y. Nonstationary l2l filtering for Markov switching repeated scalar nonlinear systems with randomly occurring nonlinearities. Appl. Math. Comput. 2020, 365, 124714. [Google Scholar] [CrossRef]
  25. Zhang, H.; Chen, H.; Xiong, L.; Zhang, Y. Dynamic event-triggered control for delayed nonlinear Markov jump systems under randomly occurring dos attack and packet loss. Mathematics 2024, 12, 1064. [Google Scholar] [CrossRef]
  26. Latrach, C.; Kchaou, M.; Rabhi, A.; El Hajjaji, A. Decentralized networked control system design using Takagi-Sugeno (TS) fuzzy approach. Int. J. Autom. Comput. 2015, 12, 125–133. [Google Scholar] [CrossRef]
  27. Chu, X.; Li, M. Observer-based model following sliding mode tracking control of discrete-time linear networked systems with two-channel event-triggered schemes and quantizations. Appl. Math. Comput. 2019, 355, 428–448. [Google Scholar] [CrossRef]
  28. Kchaou, M.; Regaieg, M.A. Event-triggered extended dissipativity fuzzy filter design for nonlinear Markovian switching systems against deception attacks. Mathematics 2023, 11, 2064. [Google Scholar] [CrossRef]
  29. Ahmad, I.; Ge, X.; Han, Q.L. Decentralized dynamic event-triggered communication and active suspension control of in-wheel motor driven electric vehicles with dynamic damping. IEEE/CAA J. Autom. Sin. 2021, 8, 971–986. [Google Scholar] [CrossRef]
  30. Chu, X.; Li, M. H non-fragile observer-based dynamic event-triggered sliding mode control for nonlinear networked systems with sensor saturation and dead-zone input. ISA Trans. 2019, 94, 93–107. [Google Scholar] [CrossRef]
  31. Chen, Q.X.; Chang, X.H. Resilient filter of nonlinear network systems with dynamic event-triggered mechanism and hybrid cyber-attack. Appl. Math. Comput. 2022, 434, 127419. [Google Scholar] [CrossRef]
  32. Zhao, N.; Shi, P.; Xing, W.; Lim, C.P. Event-triggered control for networked systems under denial of service attacks and applications. IEEE Trans. Circuits Syst. I Regul. Pap. 2022, 69, 811–820. [Google Scholar] [CrossRef]
  33. Zhang, H.; Hu, J.; Liu, G.P.; Yu, X. Event-triggered secure control of discrete systems under cyber-attacks using an observer-based sliding mode strategy. Inf. Sci. 2022, 587, 587–606. [Google Scholar] [CrossRef]
  34. Kaviarasan, B.; Kwon, O.M.; Park, M.J.; Sakthivel, R. Reduced-order filtering for semi-Markovian jump systems against randomly occurring false data injection attacks. Appl. Math. Comput. 2023, 444, 127832. [Google Scholar] [CrossRef]
  35. Liu, J.; Yin, T.; Cao, J.; Yue, D.; Karimi, H.R. Security control for T-S fuzzy systems with adaptive event-triggered mechanism and multiple cyber-attacks. IEEE Trans. Syst. Man Cybern. Syst. 2021, 51, 6544–6554. [Google Scholar] [CrossRef]
  36. Charfeddine, S.; Alharbi, H.; Jerbi, H.; Kchaou, M.; Abbassi, R.; Leiva, V. A stochastic optimization algorithm to enhance controllers of photovoltaic systems. Mathematics 2022, 10, 2128. [Google Scholar] [CrossRef]
  37. Aykroyd, R.; Leiva, V.; Ruggeri, F. Recent developments of control charts, identification of big data sources and future trends of current research. Technol. Forecast. Soc. Change 2019, 144, 221–232. [Google Scholar] [CrossRef]
  38. Palanivelu, K.; Leiva, V.; Dhandapani, P.B.; Castro, C. On fuzzy and crisp solutions of a novel fractional pandemic model. Fractal Fract. 2023, 7, 528. [Google Scholar] [CrossRef]
  39. Ma, Z.; Song, J.; Zhou, J. Reliable event-based dissipative filter design for discrete-time system with dynamic quantization and sensor fault. Appl. Math. Comput. 2022, 418, 126823. [Google Scholar] [CrossRef]
  40. Kokotovic, P.V.; Khalil, H.K.; O’Reilly, J. Singular Perturbation Methods in Control: Analysis and Design; SIAM: Philadelphia, PA, USA, 1999. [Google Scholar]
  41. Kokotovic, P.V.; Sannuti, P. Applications of singular perturbation techniques to control problems. SIAM Rev. 1984, 26, 501–550. [Google Scholar] [CrossRef]
  42. Haddad, W.M.; Chellaboina, V.; Nersesov, S.G. Impulsive and Hybrid Dynamical Systems: Stability, Dissipativity, and Control; Princeton University Press: Princeton, NJ, USA, 2011. [Google Scholar]
  43. Cao, Y.; Chen, Y.; Patton, R.J. Control of stochastic hybrid systems with application to power regulation in wind energy conversion systems. IEEE Trans. Control Syst. Technol. 2002, 10, 685–694. [Google Scholar]
  44. Zadeh, L.A. Fuzzy sets. Inf. Control 1965, 8, 338–353. [Google Scholar] [CrossRef]
  45. Mendel, J.M. Type-2 fuzzy sets: Some questions and answers. IEEE Connect. 2002, 1, 10–13. [Google Scholar]
  46. Wu, D.; Mendel, J.M. A comparison of interval type-2 and type-1 fuzzy logic controllers for real-time uncertain systems. Decis. Support Syst. 2011, 51, 425–436. [Google Scholar]
  47. Mendel, J.M. Uncertain Rule-Based Fuzzy Systems: Introduction and New Directions; Springer: Cham, Switzerland, 2017. [Google Scholar]
  48. Doostmohammadian, M.; Meskin, N. Finite-time stability under denial of service. IEEE Syst. J. 2020, 15, 1048–1055. [Google Scholar] [CrossRef]
  49. Tabuada, P. Event-triggered real-time scheduling of stabilizing control tasks. IEEE Trans. Autom. Control 2007, 52, 1680–1685. [Google Scholar] [CrossRef]
  50. Khalil, H.K. Nonlinear Systems; Prentice Hall: Upper Saddle River, NJ, USA, 2000. [Google Scholar]
  51. Yang, G.; Shen, M.; Ahn, C.K. Dynamic event-triggered fault-tolerant control through a new intermediate observer. Int. J. Robust Nonlinear Control 2023, 33, 9804–9825. [Google Scholar]
  52. Liu, S.; Cheng, J.; Zhang, D.; Cao, J.; Zhang, H.; Alsaedi, A. Dynamic quantized control for switched fuzzy singularly perturbation systems with event-triggered protocol. J. Frankl. Inst. 2023, 360, 5996–6020. [Google Scholar] [CrossRef]
Figure 1. Schematic overview of the section organization in system description and preliminaries.
Figure 1. Schematic overview of the section organization in system description and preliminaries.
Mathematics 12 02112 g001
Figure 2. Schematic depiction of the IT2 fuzzy MJ SPS control system incorporating the CB-DETM with an asynchronous fuzzy controller.
Figure 2. Schematic depiction of the IT2 fuzzy MJ SPS control system incorporating the CB-DETM with an asynchronous fuzzy controller.
Mathematics 12 02112 g002
Figure 3. Plots of closed-loop performance of the system using simulations for (a) x 1 ( k ) and (b) x 2 ( k ) state variables; and (c) u ( k ) input variable through time step k.
Figure 3. Plots of closed-loop performance of the system using simulations for (a) x 1 ( k ) and (b) x 2 ( k ) state variables; and (c) u ( k ) input variable through time step k.
Mathematics 12 02112 g003
Figure 4. Plot of open-loop response of the system without the CB-DETM control strategy for state variables x 1 ( k ) , x 2 ( k ) through time step k.
Figure 4. Plot of open-loop response of the system without the CB-DETM control strategy for state variables x 1 ( k ) , x 2 ( k ) through time step k.
Mathematics 12 02112 g004
Figure 5. Plots of timelines for (a) the sequence of modes ρ ( k ) , ϖ ( k ) using the system-controller and (b) deception attacks ζ ( k ) , Γ ( k ) through time step k during the simulations.
Figure 5. Plots of timelines for (a) the sequence of modes ρ ( k ) , ϖ ( k ) using the system-controller and (b) deception attacks ζ ( k ) , Γ ( k ) through time step k during the simulations.
Mathematics 12 02112 g005
Figure 6. Plots of release time k versus d of the release interval (defined as the difference between the release times of two consecutive events) and the respective trajectory for (a) η 1 ( k ) and (b) η 2 ( k ) through time step k for sensor signal transmission.
Figure 6. Plots of release time k versus d of the release interval (defined as the difference between the release times of two consecutive events) and the respective trajectory for (a) η 1 ( k ) and (b) η 2 ( k ) through time step k for sensor signal transmission.
Mathematics 12 02112 g006
Figure 7. Plots of release time k versus duration d of the release interval (defined as the difference between the release times of two consecutive events) for (a) sensor 1 x 1 ( k ) and (b) sensor 2 x 2 ( k ) generated from our simulations.
Figure 7. Plots of release time k versus duration d of the release interval (defined as the difference between the release times of two consecutive events) for (a) sensor 1 x 1 ( k ) and (b) sensor 2 x 2 ( k ) generated from our simulations.
Mathematics 12 02112 g007
Figure 8. Plot of state variables x 1 ( k ) , x 2 ( k ) through time step k with the controller presented in [17], recreated from our implementation for comparison purposes.
Figure 8. Plot of state variables x 1 ( k ) , x 2 ( k ) through time step k with the controller presented in [17], recreated from our implementation for comparison purposes.
Mathematics 12 02112 g008
Figure 9. Plots of (a) system state variables x 1 ( k ) , x 2 ( k ) , where x 1 is the capacitor voltage and x 2 the inductor current; (b) input variable u ( k ) to control the system; and (c) the sensor and actuator attack signals through time step k.
Figure 9. Plots of (a) system state variables x 1 ( k ) , x 2 ( k ) , where x 1 is the capacitor voltage and x 2 the inductor current; (b) input variable u ( k ) to control the system; and (c) the sensor and actuator attack signals through time step k.
Mathematics 12 02112 g009
Figure 10. Plots of simulation results using the proposed control scheme for (a) state x 1 ( k ) , x 2 ( k ) and input u ( k ) variables; (b) dynamics ζ ( k ) , Γ ( k ) ; (c) release time k versus duration d of the release interval of sensor 1 as well as the respective trajectory η 1 ( k ) ; and (d) release time k versus duration d of the release interval of sensor 2 as well as the respective trajectory η 2 ( k ) .
Figure 10. Plots of simulation results using the proposed control scheme for (a) state x 1 ( k ) , x 2 ( k ) and input u ( k ) variables; (b) dynamics ζ ( k ) , Γ ( k ) ; (c) release time k versus duration d of the release interval of sensor 1 as well as the respective trajectory η 1 ( k ) ; and (d) release time k versus duration d of the release interval of sensor 2 as well as the respective trajectory η 2 ( k ) .
Mathematics 12 02112 g010
Figure 11. Plots of state variables x 1 ( k ) , x 2 ( k ) and input variable u ( k ) through time step k using the control scheme from [18], recreated from our implementation for comparison purposes.
Figure 11. Plots of state variables x 1 ( k ) , x 2 ( k ) and input variable u ( k ) through time step k using the control scheme from [18], recreated from our implementation for comparison purposes.
Mathematics 12 02112 g011
Table 1. Parameters of the DETP for each sensor.
Table 1. Parameters of the DETP for each sensor.
Parameter σ θ λ η 0
Sensor 10.530.85
Sensor 20.440.65
Table 2. Results of DET-based control.
Table 2. Results of DET-based control.
Minimum ValuesMaximum Values
Gains K ¯ 1 1 = 0.82877 K ¯ 2 1 = 1.0369 , K ¯ 1 2 = 0.82852 K ¯ 2 2 = 1.037 K ¯ 1 1 = 0.92125 K ¯ 2 1 = 1.1582 , K ¯ 1 2 = 0.92227 K ¯ 2 2 = 1.1581
Number of triggering7376
Communication rate29.08%30.27%
Table 3. Parameters of the dynamic event trigger for each sensor.
Table 3. Parameters of the dynamic event trigger for each sensor.
Parameter σ θ λ η 0
Sensor 10.2100.40.1
Sensor 20.180.50.2
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Kchaou, M.; Castro, C.; Abbassi, R.; Leiva, V.; Jerbi, H. Security Control for a Fuzzy System under Dynamic Protocols and Cyber-Attacks with Engineering Applications. Mathematics 2024, 12, 2112. https://doi.org/10.3390/math12132112

AMA Style

Kchaou M, Castro C, Abbassi R, Leiva V, Jerbi H. Security Control for a Fuzzy System under Dynamic Protocols and Cyber-Attacks with Engineering Applications. Mathematics. 2024; 12(13):2112. https://doi.org/10.3390/math12132112

Chicago/Turabian Style

Kchaou, Mourad, Cecilia Castro, Rabeh Abbassi, Víctor Leiva, and Houssem Jerbi. 2024. "Security Control for a Fuzzy System under Dynamic Protocols and Cyber-Attacks with Engineering Applications" Mathematics 12, no. 13: 2112. https://doi.org/10.3390/math12132112

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop