Volume 33, Issue 6 pp. 3440-3457
RESEARCH ARTICLE

Memory-event-trigger-based output tracking control for networked switched interval type-2 fuzzy systems against deception attacks

Hui Gao

Hui Gao

College of Mechanical and Electrical Engineering, China Jiliang University, Hangzhou, People's Republic of China

Search for more papers by this author
Kaibo Shi

Kaibo Shi

School of Electronic Information and Electrical Engineering, Chengdu University, Chengdu, People's Republic of China

Search for more papers by this author
Kun Zhou

Corresponding Author

Kun Zhou

College of Mechanical and Electrical Engineering, China Jiliang University, Hangzhou, People's Republic of China

Correspondence Kun Zhou, College of Mechanical and Electrical Engineering, China Jiliang University, Hangzhou 310018, People's Republic of China.

Email: [email protected]

Search for more papers by this author
Yueying Wang

Yueying Wang

School of Mechatronic Engineering and Automation, Shanghai University, Shanghai, People's Republic of China

Search for more papers by this author
Qunxian Zheng

Qunxian Zheng

School of Electrical Engineering, Anhui Polytechnic University, Wuhu, People's Republic of China

Search for more papers by this author
First published: 05 January 2023
Citations: 4

Funding information: National Key Research and Development Program of China, Grant/Award Number: 2018YFB2101004

Abstract

This paper investigates the problem of event-triggered output tracking control for networked switched interval type-2 (IT2) fuzzy systems under deception attacks. Different from the existing event-triggered method, a new type of event-triggered scheme which called the memory event-triggered scheme (METS) is proposed to save the network resources, under which some past released triggering events are used to generate the new events. Also, the network communication may be corrupted by deception attacks and the tracking control is meaningful. We give some conditions to guarantee the H $$ {H}_{\infty } $$ output tracking performance of the closed loop memory event-triggered networked switched IT2 fuzzy systems under deception attacks in secure sense. Finally, a simulation example validates the proposed technique.

CONFLICT OF INTEREST

We confirm that this work does not have any conflict of interests.

DATA AVAILABILITY STATEMENT

Data will be made available on request. The data that support the findings of this study are openly available in [repository name] at [DOI], reference number [reference number].

The full text of this article hosted at iucr.org is unavailable due to technical difficulties.