兰州理工大学学报 ›› 2026, Vol. 52 ›› Issue (1): 85-92.

• 自动化技术与计算机技术 • 上一篇    下一篇

全方位攻击下具有混合时滞的信息物理系统安全控制

祝超群*1,2,3, 刘淑慧1, 贾玄1, 黄苗苗4   

  1. 1.兰州理工大学 自动化与电气工程学院, 甘肃 兰州 730050;
    2.兰州理工大学 甘肃省工业过程先进控制重点实验室, 甘肃 兰州 730050;
    3.兰州理工大学 电气与控制工程国家级实验教学示范中心, 甘肃 兰州 730050;
    4.兰州理工大学 理学院, 甘肃 兰州 730050
  • 收稿日期:2023-09-01 出版日期:2026-02-28 发布日期:2026-03-05
  • 通讯作者: 祝超群(1977-),男,新疆塔城人,博士,副教授.Email:chaoqunzhu@yeah.net
  • 基金资助:
    国家自然科学基金(62363024,62263019),甘肃省科技重大专项(21ZD4GA028)

Security control of cyber-physical systems with mixed time-delays under all-around attacks

ZHU Chao-qun1,2,3, LIU Shu-hui1, JIA Xuan1, HUANG Miao-miao4   

  1. 1. School of Automation and Electrical Engineering, Lanzhou University of Technology, Lanzhou 730050, China;
    2. Key Laboratory of Gansu Advanced Control for Industrial Processes, Lanzhou University of Technology, Lanzhou 730050, China;
    3. National Demonstration Center for Experimental Electrical and Control Engineering Education, Lanzhou University of Technology, Lanzhou 730050, China;
    4. School of Science, Lanzhou University of Technology, Lanzhou 730050, China
  • Received:2023-09-01 Online:2026-02-28 Published:2026-03-05

摘要: 针对全方位攻击环境下具有混合时滞的非线性信息物理系统,研究了系统的安全控制问题.首先,考虑到网络攻击、物理攻击和混合时滞的影响,建立了一类具有多种约束参数的时滞系统模型;其次,借助李雅普诺夫稳定性理论和线性矩阵不等式技术给出了信息物理系统均方稳定的充分条件,在此基础上设计了保证系统均方稳定的安全控制器;最后,通过仿真实例验证了所提出控制方法的正确性和有效性.

关键词: 信息物理系统, 全方位攻击, 混合时滞, 安全控制

Abstract: The security control problem is investigated for the nonlinear information physical system with mixed time-delays under an all-around attack environment. Firstly, a time-delay system model with multiple constraint parameters is established by considering the effect of cyber-attacks, physical attacks, and mixed time-delays. Secondly, sufficient conditions are derived for the closed-loop system to be mean-square stable by utilizing the Lyapunov theory and linear matrix inequality technology. Based on these results, a secure controller ensuring the mean-square stability of the system is designed. Finally, the correctness and effectiveness of the proposed control method are verified by a simulation example.

Key words: cyber-physical systems, all-around attacks, mixed time-delays, security control

中图分类号: