This paper is concerned with the finite and infinite horizon optimal control issue for a class of networked control systems with stochastic communication protocols. Due to the limitation of networked bandwidth, only the limited number of sensors and actuators are allowed to get access to network mediums according to stochastic access protocols. A discrete-time Markov chain with a known transition probability matrix is employed to describe the scheduling behaviors of the stochastic access protocols, and the networked systems are modeled as a Markov jump system based on the augmenting technique. In such a framework, both the approaches of stochastic analysis and dynamic programming are utilized to derive the optimal control sequences satisfying the quadratic performance index. Moreover, the optimal controller gains are characterized by solving the solutions to coupled algebraic Riccati equations. Finally, a numerical example is provided to demonstrate the correctness and effectiveness of the proposed results.
This paper is concerned with a security problem for a discrete-time linear networked control system of switched dynamics. The control sequence generated by a remotely located controller is transmitted over a vulnerable communication network, where the control input may be corrupted by false data injection attacks launched by a malicious adversary. Two partially conflicted cost functions are constructed as the quantitative guidelines for both the controller and the attacker, after which a switched Stackelberg game framework is proposed to analyze the interdependent decision-making processes. A receding-horizon switched Stackelberg strategy for the controller is derived subsequently, which, together with the corresponding best response of the attacker, constitutes the switched Stackelberg equilibrium. Furthermore, the asymptotic stability of the closed-loop system under the switched Stackelberg equilibrium is guaranteed if the switching signal exhibits a certain average dwell time. Finally, a numerical example is provided to illustrate the effectiveness of the proposed method in this paper.