Next Article in Journal
MA-EVIO: A Motion-Aware Approach to Event-Based Visual–Inertial Odometry
Previous Article in Journal
EFDepth: A Monocular Depth Estimation Model for Multi-Scale Feature Optimization
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Practical Predefined-Time Sliding-Mode Adaptive Resilient Control for PMSM Cyber–Physical Systems

1
Advanced Institute of Information Technology, Peking University, Hangzhou 311200, China
2
School of Computer Science, Peking University, Beijing 100871, China
3
School of Information and Control Engineering, Xi’an University of Architecture and Technology, Xi’an 710055, China
*
Author to whom correspondence should be addressed.
Sensors 2025, 25(23), 7380; https://doi.org/10.3390/s25237380
Submission received: 29 October 2025 / Revised: 26 November 2025 / Accepted: 1 December 2025 / Published: 4 December 2025
(This article belongs to the Section Physical Sensors)

Abstract

The permanent magnet synchronous motor (PMSM) is extensively utilized in the power drive systems of Cyber–Physical Systems (CPSs). In scenarios where control signals are subjected to malicious attacks within the network, ensuring that the PMSM achieves its designated speed within a specified timeframe serves as a critical metric for evaluating the efficacy of security control strategies in networked systems. To address practical challenges arising from updates to controlled objects at the physical layer and limitations of control layer algorithms—wherein convergence time for system trajectory tracking errors (TTEors) may extend indefinitely—we have developed a novel resilient control algorithm with predefined-time convergence (PreTC) tailored for uncertain PMSMs susceptible to cyber threats. Firstly, we introduce an innovative Lyapunov stability criterion characterized by an adjustable gain reaching law alongside PreTC. Following this, we design an SMS (SMS) that incorporates PreTC and employ an extreme learning machine (ELM) to facilitate real-time identification of both physical layer models and malicious cyber-attacks. A sliding-mode adaptive resilient controller devoid of explicit physical model information is proposed for CPSs, with Lyapunov stability theory substantiating the system’s predefined-time (PDT) stability. This significantly enhances resilience against malicious cyber-attacks and other uncertainties. Finally, comparative simulations involving four distinct resilient control algorithms demonstrate that our proposed algorithm not only guarantees predetermined convergence times but also exhibits robust resistance to cyber-attacks, parameter perturbations, and external disturbances—notably achieving a motor speed tracking error accuracy of 0.008. These findings validate the superior robustness and effectiveness of our control algorithm against malicious cyber threats.

1. Introduction

Cyber-physical systems (CPSs) represent an advanced intelligent framework capable of seamlessly integrating computation, communication, and control mechanisms. By fusing human–computer interaction capabilities with real-time network communication technologies, the CPS enables secure and reliable management of remote physical entities [1]. This innovative technology has found widespread applications across multiple domains, including the Internet of Things (IoT), smart homes, and aerospace engineering. The evolution of CPS is characterized by continuous enhancements in intelligence, flexibility, scalability, and collaboration. Consequently, in practical engineering applications, CPS must exhibit high reliability, safety, control accuracy, as well as exceptional perception and autonomous control capabilities. Permanent magnet synchronous motors (PMSMs), renowned for their wide speed regulation range and high control precision, are frequently employed as driving devices for remote operations within CPS frameworks. However, technological advancements and changes in application environments often necessitate the update or replacement of driving motors, while also introducing challenges such as malicious cyber-attacks, prescribed-time stability requirements, and unforeseen disturbances. These issues may adversely affect the universality, accuracy, stability, and transient performance of PMSM-based CPS. Therefore, effectively addressing the universality, stability, and accuracy challenges of PMSM-CPS holds significant importance in industrial automation and high-performance control applications.
In recent years, research on defenses against integrity attacks has encompassed a diverse range of systems and technologies. Regarding cyber-attack detection techniques, researchers have adopted hybrid approaches combining nonlinear observers, Chi-square detectors, mixed-integer nonlinear programming, and state estimation to achieve attack detection. Within the realm of wireless sensor networks, investigators have explored malicious information injection and state estimation algorithms in Krein space. While these algorithms offer the advantage of addressing unforeseen attacks, their detection efficiency remains unstable [2]. Reference [3] proposed a minimum defense budget state estimation algorithm for power systems vulnerable to false data injection (FDI) attacks, relaxing the assumption that “certain meter measurements can fully resist such attacks.” Reference [4] employed a Chi-square detector combined with the Cosine Similarity Matching (CSM) method for attack detection, demonstrating robust performance in identifying both FDI attacks and other attack types. Reference [5] introduced a decentralized homomorphic computing paradigm for system state estimation and designed a centralized FDI detector specifically tailored to identify FDI attacks. Despite their utility, these methods face challenges such as reliance on numerous attack model assumptions and the need for improved accuracy. Furthermore, these approaches primarily focus on detecting attacks rather than ensuring system stability in the presence of attacks. To address this gap, scholars have proposed resilient control strategies that enable CPS to maintain favorable steady-state performance even when confronting cyber-attacks. To solve the resilient control problem of linear CPS under FDI attacks and process interference, Reference [6] proposed a control strategy integrating an attack-resilient state observer with a control gain-switching mechanism, whose effectiveness was validated through anti-attack simulations on a linearized reduced-order aircraft system. Reference [7] combined a Butterworth low-pass filter with radial basis function neural networks to construct a neural network observer for estimating unmeasurable states, and designed an adaptive event-triggered neural network resilient control method for CPS to ensure system stability. Additionally, Reference [8] developed a distributed observer to stabilize the estimation error system and proposed an algorithm capable of exposing attacker behavior and identifying tampered sensors. Reference [9] designed a sliding-mode resilient control strategy for network systems subjected to DoS attacks, effectively enhancing the system’s ability to resist DoS attacks. Although these algorithms improve CPS’s resilience against various cyber-attacks, they rely heavily on physical layer model information, failing to meet the application requirements of rapid iteration and update of current physical layer intelligent terminals [10]. Therefore, establishing resilient control strategies that minimally depend on or are independent of physical layer model information is more aligned with technological iteration needs. However, model-independent resilient control strategies are currently scarce and remain in the early stages of research.
Ensuring the stability of cyber-attacked CPS within a specified timeframe is a critical metric for evaluating the effectiveness of cyber system security control strategies. Nevertheless, existing resilient control strategies predominantly rely on asymptotic stability, often leading to infinite convergence time for CPS. To enhance the convergence speed of controlled systems, researchers have proposed finite-time control algorithms. For instance, Zhang W et al. [11] introduced a generalized super-twisting observer to estimate the rotor position and speed of PMSMs, endowing the speed controller with finite-time convergence capability. Additionally, Chen Z et al. [12] developed a finite-time control algorithm based on the backstepping method, considering the dynamic performance constraints of angular position tracking errors. While both algorithms guarantee finite-time convergence of motor systems, they neglect parameter uncertainties and external disturbances, compromising their robustness. Sliding-mode control (SMC) exhibits strong robustness, and its combination with finite-time control methods has been successfully applied to trajectory tracking in PMSM systems. Li S et al. [13] proposed a non-singular terminal sliding-mode surface (SMS) and designed a speed controller based on this surface, achieving system state convergence to the sliding-mode surface and equilibrium point within finite time. Feng Y et al. [14] designed a disturbance observer for finite-time convergent estimation of uncertainty components in PMSMs, and developed an observer-based terminal SMC to ensure that the PMSM position converges to the target position within finite time. Echreshavi, Z [15,16,17] approached the problem from the perspective of event-triggered control, designing a series of sliding-mode control strategies for uncertain nonlinear systems that not only enhance system robustness but also effectively reduce control input energy consumption. Despite the fact that such finite-time control algorithms improve the convergence speed of PMSM systems, a critical limitation is that the upper bound of convergence time depends on both initial states and controller parameters, rendering it unpredictable. Consequently, researchers have developed fixed-time controllers, whose convergence time upper bound is solely determined by control parameters. For example, Reference [18] designed a fixed-time convergence controller and applied it to wheeled robots with control dead zones; Xu P [19] proposed a fixed-time stability controller for dynamic positioning ships under unknown disturbances; Wang L [20] applied fixed-time control algorithms to PMSMs by designing a non-singular fast terminal sliding-mode controller (TSMC) with a fixed-time convergence law. It is important to note that the maximum value of this fixed-time convergence algorithm has specific limitations, as it directly influences system stability through its dependence on control parameters. Subsequently, researchers designed Predefined-Time Sliding-Mode Controllers (PDT SMCs) for various uncertain systems [21,22,23]. Although the convergence time of these PDT controllers can be preset, they are all designed based on fixed-time convergence stability criteria. Munoz-Vazquez A. J. [24] proposed a PDT stability criterion where the upper bound of convergence time is independent of both initial states and control parameters. However, the parameters of the proposed stability criterion lack adjustability, preventing performance tuning of the controlled system. On the other hand, sliding-mode control consists of an approaching phase and a sliding phase. Existing PDT control strategies can only guarantee that the SMS converges to zero within the PDT, but the tracking error at this point remains unstable. The tracking error within the SMS still needs to reach the origin through the sliding phase to achieve stability. Since the SMSs in existing PDT SMC strategies do not possess PDT convergence characteristics, the SMC cannot ensure that the trajectory tracking error of CPS exhibits PDT convergence.
By analyzing the above discussion, the current security control strategies for cyber–physical systems (CPSs) exhibit certain deficiencies:
(1)
Most existing security control strategies rely on the model information of the controlled object at the physical layer. However, when changes occur in the intelligent terminals of CPS, this can lead to control failures, rendering model-based control strategies insufficiently universal. Moreover, such strategies fail to meet cost-saving requirements during CPS update iterations. Therefore, there is an urgent need to develop an adaptive control strategy that does not depend on the model information of the controlled object. Nevertheless, current research on model-free and disturbance-independent control strategies for CPS remains limited.
(2)
Stability criteria for both finite-time convergence and fixed-time convergence have been proposed for NLS. However, practical NLS control faces limitations: the upper bound (UB) of convergence time in finite/fixed-time control theory depends on initial values and control parameters, resulting in a non-predetermined UB of convergence time. Although A. J. Muñoz–Vázquez proposed a PreTC stabilization criterion for NLS, allowing arbitrary setting of convergence time, this criterion designs a controller with fixed gains in the reaching law. Consequently, parameter adjustment for dynamic performance optimization is not feasible.
(3)
The application of SMC as a safety control strategy for CPS is prevalent. However, existing sliding-mode security control strategies for CPS can only ensure asymptotic convergence and provide no guarantees regarding the convergence of attacked CPS within a PDT. The PDT in SMC consists of two phases: the time required for the TTEor to reach the SMS and the time for the TTEor to converge to the equilibrium point. Current SMSs lack the capability to predefine convergence time, making it impossible to set an UB on the convergence time of TTEor after reaching the SMS. Consequently, the actual convergence time of the TTEor cannot be predetermined.
In light of the aforementioned deficiencies in CPS security controls, this paper aims to make the following improvements:
(1)
Although A. J. Muñoz–Vázquez proposed a PreTC stabilization criterion for NLSs, the controller gains are fixed, precluding adjustments to dynamic performance. This paper extends the stability criterion proposed by A. J. Muñoz–Vázquez to enhance PreTC theory. Specifically, controllers with adjustable gains in the reaching law are designed, enabling dynamic performance optimization of the controlled object through gain-tuning.
(2)
A novel SMS is proposed to contain the TTEor, allowing the UB of the TTEor‘s convergence time to be arbitrarily set according to engineering requirements. The controller designed based on this improved SMS, combined with the PreTC criterion proposed in this paper, ensures that the TTEor of CPS converges within the specified UB of convergence time.
(3)
The proposed approach employs an extreme learning machine (ELM) to estimate the system model and detect malicious cyber-attacks in real-time, using the TTEor as input information. By integrating the proposed SMS with the PreTC stabilization criterion, this paper develops a novel sliding-mode adaptive controller with a concise structure. This controller guarantees that the TTEor of CPS converges within a predetermined timeframe, thereby enhancing the universality and attack resilience of CPS security controllers.
The paper is organized section-wise: Section 2 describes the CPS, which includes the model of the PMSM in the physical layer, the attack model in the network layer, and the control objectives. Section 3 introduces a novel PreTC stability theory along with an innovative SMS incorporating PreTC. Section 4 details the primary design of a PDT sliding-mode adaptive resilient controller based on ELM and discusses its stability. Numerical simulations presented in Section 5 validate the proposed control strategy, focusing primarily on dynamic performance under malicious cyber-attacks. Comparative simulation analyses are conducted under varying predefined convergence times and different controllers. Finally, our study concludes in Section 6.

2. Description of Cyber–Physical Systems

The PMSM offers numerous advantages, including a simple structure, low moment of inertia, wide speed range, and high efficiency. It is widely used in high-precision numerical control machines, robotics, and the aerospace industry. This paper addresses the security control problem of CPS where the network layer is subjected to malicious threat signals and the physical layer consists of a PMSM. An adaptive resilient SMC that does not rely on models and is disturbance-independent has been proposed. The overall structure of the CPS is illustrated in Figure 1 below.

2.1. PMSM’s Model of the Physical Layer

In physical layer, the PMSM’s voltage equation in CPS is [25].
i ˙ d = ( u d R i d + ω e L q i q ) / L i ˙ q = ( u q R i q ω e ( L d i d + ψ f ) ) / L
From above expression, the u d , u q , i d , i q denote the stator voltage and current in the d-axis and q-axis, correspondingly; R denotes the stator resistance; L denotes the synchronous inductance, and L d ,   L q denote the inductance in the d-axis and q-axis; ψ f is the magnetic chain of the PMSM; and ω e denotes the electrical angular velocity.
The mechanical equations of motion for PMSM can be described as [26].
J ω ˙ r = T e B ω r T L
The parameter ω r signifies the mechanical angular velocity of the rotor; J is the inertia moment; T L is the load torque; B is the damping coefficient; T e denotes an electromagnetic torque and its mathematical model is given as the following:
T e = 1.5 p ψ f i q
where p is the number of poles of the motor and satisfies e e = p ω r . Substituting Equation (3) into Equation (2) and letting χ = ( 1.5 p ψ f ) / J , η = B / J , γ = 1 / J , It is rewritten as:
ω ˙ r = χ i q η ω r γ T L

2.2. Attack Model of the Network Layer

In the network layer, the open nature of communication networks renders CPS vulnerable to malicious cyber threats during remote real-time control implementation, such as denial-of-service (DoS) and false data injection (FDI) attacks.
A DoS attack is a typical malicious assault that attempts to flood the information transmission channels in a network with massive traffic, thereby disrupting network signal transmission. In remotely operated systems, DoS attacks degrade the control commands sent to the control layer by consuming network-layer resources, ultimately affecting the control performance of the physical layer. This type of model under a DoS attack can be expressed as follows:
i q _ attack ( t ) = κ Dos ( t m ) i q ( t )
where κ Dos ( t m ) > 0 is the weakening/increasing ratio; t m is the initial attack time.
FDI attacks represent a type of cyber intrusion that leverages forged data to manipulate the allocation of resources within target computer networks. Within remote control frameworks, FDI introduces deceptive data into network-level control signals. This interference has a cascading effect on the physical layer’s control effectiveness. An FDI attack within the network layer is
i q _ attack ( t ) = i q ( t ) + λ FDI ( t a )
where λ FDI ( t a ) is the deviation in FDI attacks; t a is the initial attack time.
There are various types of cyber-attacks, but all attacks are aimed at weakening/increasing control inputs or biasing control input signals, so the control input becomes the following:
i q _ attack ( t ) = κ Dos ( t m ) i q ( t ) + λ FDI ( t a )
where i q _ attack ( t ) represents input current after cyber-attack, κ Dos ( t m ) ( 0 , ) is the multiplicative attack threat, and λ FDI ( t a ) is the additive attack threat.
Due to the unknown and uncertain nature of κ Dos ( t m ) and λ FDI ( t a ) , the cyber-attack (7) can be modified as
i q _ attack ( t ) = i q ( t ) + ( κ Dos 1 ) i q ( t ) + λ FDI

2.3. Control Objective

There are parametric perturbations during the motor rotation process, which lead to unknown disturbances Δ χ , Δ η , Δ γ in the system parameters χ , η , γ , respectively, and denote known mode information g = η ω r γ T L , and unknown d = Δ χ ( α i q + β ) + χ ( ( α 1 ) i q + β ) Δ η ω r Δ γ T L ; then the uncertain PMSM’s mechanical equation under cyber-attack is simplified as
ω ˙ r = χ i q + g + d
Let the desired trajectory of the mechanical angular velocity be ω r * ( t ) . Denote the angular velocity TTEor as
e ( t ) = ω r * ( t ) ω r ( t )
The objective of the CPS is to design a reference input i q * for the q-axis current in PMSM that accounts for malicious cyber-attacks and parameter perturbations. This will enable the angular velocity TTEor e ( t ) to converge to zero within the PDT T s .

3. Novel PDT Convergence Stability Norm

To design a PreTC resilient controller for a PMSM CPS, a novel PreTC Lyapunov stability criterion is proposed and proved firstly.
Consider a nonlinear system (NLS) described by the following dynamical equation:
x ˙ = f ( x ) ,   x ( 0 ) = x 0
where x n denotes the system’s state; function f : n n represents the system dynamics; it is a smooth and differentiable function. x ( 0 ) = x 0 are the initial conditions.
Theorem 1.
For NLS (11), and for arbitrary PDT  T s 2 > 0 , if there exists a radial unbounded and positive definite Lyapunov function  σ ( x ( t ) )  which satisfies
σ ˙ ( x ) π 2 p 2 T s 2 a 2 b 2 [ a 2 σ ( x ) 1 p 2 + b 2 σ 1 + p 2 ( x ) 1 p 2 ]
 among them, and the parameters are  0 < p 2 < 1 ,   a 2 > 0 ,   b 2 > 0 , the NLS (11) is global PDT stability, and the time  t s  of the state variable converges till the equilibrium point satisfies
t s = 2 T s 2 π arctan [ b 2 / a 2 σ ( x 0 ) p 2 ] < T s 2
Proof. 
According to σ ˙ ( x ( t ) ) π 2 p 2 T s 2 a 2 b 2 [ a 2 σ ( x ) 1 p 2 + b 2 σ ( x ) 1 + p 2 ] , let σ ˙ ( x ) = π [ a 2 σ ( x ) 1 p 2 + b 2 σ ( x ) 1 + p 2 ] 2 p 2 T s 2 a 2 b 2 δ , where δ > 0 , then
d σ ( x ) d t = π a 2 σ ( x ) 1 p 2 2 p 2 T s 2 a 2 b 2 [ 1 + b 2 a 2 σ ( x ) 2 p 2 + 2 p 2 T s 2 a 2 b 2 π a 2 σ ( x ) 1 p 2 δ ]
After transforming Equation (13) and gathering together the differential, the following equation is obtained.
π d t 2 T s 2 = d [ b 2 / a 2 σ ( x ) p 2 ] 1 + [ b 2 / a 2 σ ( x ) p 2 ] 2 + 2 p 2 T s 2 a 2 b 2 π a 2 σ ( x ) 1 p 2 δ
Suppose that σ ( x ( t s ) ) = 0 at t s , integrating both sides of Equation (14). Since σ ( x ) 0 , δ 0 , then 2 p 2 T s 2 a 2 b 2 π a 2 σ ( x ) 1 p 2 δ 0 , which provides
0 t s π 2 T s 2 d t = σ ( x 0 ) σ ( x ( t s ) ) d ( b 2 / a 2 σ ( x ) p 2 ) 1 + ( b 2 / a 2 σ ( x ) p 2 ) 2 + 2 p 2 T s 2 a 2 b 2 π a 2 σ ( x ) 1 p 2 δ = 0 σ ( x 0 ) d ( b 2 / a 2 σ ( x ) p 2 ) 1 + ( b 2 / a 2 σ ( x ) p 2 ) 2 + 2 p 2 T s 2 a 2 b 2 π a 2 σ ( x ) 1 p 2 δ 0 σ ( x 0 ) 1 1 + ( b 2 / a 2 σ ( x ) p 2 ) 2 d ( b 2 / a 2 σ ( x ) p 2 ) t s 2 T s 2 π arctan [ b 2 / a 2 σ ( x 0 ) p 2 ] T s 2
The above proof demonstrates that the convergence time of the nonlinear system (NLS) in (11) satisfies t s < T s 2 . This indicates that the state variable can converge to zero within the PDT T s 2 , where the UB of the convergence time is independent of both the initial state and control parameters. Thus, the system’s convergence time can be preset arbitrarily. □
Remark 1.
The stability criterion, and the upper of convergence time are shown in Table 1. Compared with the Lyapunov stability theory of  σ ˙ ( x ) π ( σ ( x ) 0.5 + σ ( x ) 1.5 ) T s 2  proposed in Reference [24], the novel PreTC Lyapunov stability criterion proposed in this paper incorporates parameters  a 2 > 0 ,   b 2 > 0 . These parameters enable adjustability of the reaching law gain in the controller designed based on the given stability criterion, thereby facilitating the tuning of the controlled system’s dynamic performance. If  a 2 = b 2 = 1 ,   p 2 = 0.5  are satisfied, the proposed Lyapunov stability criterion is equivalent to that presented in Reference [24]. For the NLS in (11), if the Lyapunov function is  σ = 0.5 x Τ x , the PDT controller derived based on the stability criterion in Reference [24] is  u = f ( x ) π T s 2 ( s i g n ( x ) + x 2 sign ( x ) ) . However, based on the novel stability criterion proposed in this paper, the controller is  u = f ( x ) π ( a 2 x 1 p 2 + b 2 x 1 + p 2 ) 2 p 2 T s 2 a 2 b 2 . By comparing these two controllers, it can be observed that the gain of the latter is adjustable.
Remark 2.
Current controllers designed based on finite-time/fixed-time control theory merely ensure that the TTEor of the NLS converges within a finite time. However, the UB of this convergence time depends on both the initial state values and controller parameters, and thus cannot be predetermined. In contrast, by leveraging the novel Lyapunov stability criterion proposed in this paper, we achieve a predefined convergence time  T s 2  for the system’s TTEor to converge to zero. This guarantees that an explicit upper limit for the overall convergence time can be established in advance.
Remark 3.
Building upon the PreTC stability criterion proposed in this paper, control techniques such as SMC, adaptive control, backstepping control, and prescribed performance control can be integrated to design corresponding PDT controllers for arbitrary uncertain NLSs.

4. Sliding-Mode Controller Design

4.1. Controller Desigen

Step 1: SMS design
To fully exploit the robustness advantage of SMClers, and ensure that the TTEor e ( t ) can converge within a PDT T s , the following sliding-mode surface (SMS) with a PreTC is designed:
S = e ( t ) + π 2 p 1 T s 1 a 1 b 1 ( a 1 φ ( t ) + b 1 ξ 1 + p 1 ( t ) )
where the parameters satisfy 0 < p 1 < 1 ,   a 1 > 0 ,   b 1 > 0 ; T s 1 is the PDT; ξ ( t ) = 0 t e ( τ ) d τ 0 < δ ξ < 1 , l 2 , l 3 > 0 are parameters to be designed; l 1 = δ ξ p 1 l 2 δ ξ l 3 δ ξ 2 ; φ ( t ) is defined as
φ ( t ) = ξ [ 1 p 1 ] ,                                   | ξ | > δ ξ l 1 ξ + l 2 ξ [ 2 ] + l 3 ξ [ 3 ] ,     | ξ | δ ξ
Remark 4.
If  ξ > 0 ,  lim ξ δ ξ + φ = lim ξ δ ξ + ξ [ 1 p 1 ] = δ ξ 1 p 1 , lim ξ δ ξ φ = l 1 δ ξ + l 2 δ ξ 2 + l 3 δ ξ 3 = δ ξ 1 p 1 , then  φ ( t )  is continuous at  ξ = δ ξ . When  ξ < 0 ,  lim ξ δ ξ + φ = lim ξ δ ξ + ξ [ 1 p 1 ] = δ ξ 1 p 1 , lim ξ δ ξ φ = = l 1 δ ξ l 2 δ ξ 2 l 3 e ξ 3 = δ ξ 1 p 1 ; therefore,  φ ( t )  is continuous at  ξ = δ ξ . Taken together, the function  φ ( t )  is continuous, which solves the problem of control input jumping caused by discontinuity at segmentation points in traditional functions.
According Equation (16), we have
φ ˙ ( t ) = ( 1 p 1 ) ξ [ p 1 ] ,                           | ξ | > δ ξ ( l 1 + 2 l 2 ξ [ 1 ] + 3 l 3 ξ [ 2 ] ) ,       | ξ | δ ξ
Remark 5.
To confirm the PreTC characteristic of TTEor within SMS, we assume that TTEor reaches the SMS (designated as  S = 0 ) and set the convergence times as  T s 1 = 0.3   s ,   0.5   s ,   1   s ,   1.5   s ,   2   s . The simulation is shown in Figure 2. It shows that the actual convergence times are persistently shorter than the PDT, as the TTEor grasps the SMS. This implies that the TTEor situated on SMS (15) has the property of PDT convergence.
Step 2: Design Compensator Based on ELM
Derive the SMS S , then
S ˙ ( t ) = π ( b 1 ( 1 + p 1 ) ξ p 1 ( t ) + a 1 φ ˙ ( t ) ) e ( t ) 2 p 1 T s 1 a 1 b 1 + e ˙ ( t ) = ω r ( t ) χ i q ( t ) g ( t ) d ( t ) + π ( b 1 ( 1 + p 1 ) ξ p 1 ( t ) + a 1 φ ˙ ( t ) ) e ( t ) 2 p 1 T s 1 a 1 b 1
Let G = g + d represent the encapsulated component, which can be estimated with ELM [26]. The ELM is regarded as single hidden-layer feed-forward neural networks (SLFNNs), and the structural of SLFNs is shown in Figure 3.
The input of the SLFN is z = [ e , ξ ] Τ , N ˜ is the nodes, and h ( x ) is the activation function. Through continuous learning and training, it is possible to obtain the optimal weight vector w * of SLFN in order to approximate the encapsulated component G .
G = i = 1 N ˜ w i * h i ( c i z , v i ) = w * h ( z )
where c i = [ c i 1 , c i 2 , c i n ] Τ R n is the internal connection weight to be designed, v i is the node threshold to be designed, and w i = [ w i 1 , w i 2 , w i m ] Τ R m is the external connection weight.
SLFNs need to learn and adjust their weight vectors c i = [ c i 1 , c i 2 , c i n ] Τ , w i = [ w i 1 , w i 2 , w i m ] Τ , and bias values v i , which can result in a large amount of computation and slow computation speed. To make SLFNs easier to compute, the ELM is proposed by Huang G B [27]. In the ELM, the connection weights c i and the node thresholds v i have been arbitrarily created. w i is the outer weight vector to be recognized. h ( z ) = ( h 1 ( c 1 z , v 1 ) , , h N ˜ ( c N ˜ z , v N ˜ ) ) Τ . The estimation of w * is obtained indirectly in practical engineering applications and cannot be approximated as G precisely. The value of G ^ is calculated as
G ^ = h ( z ) w ^ = i = 1 N ˜ w ^ i h i ( c i z , v i )
In the above formula, the w ^ i signifies an estimation of the optimal value w i * , and the designed adaptive law is as follows:
w ^ ˙ = γ h S
Step 3: Controller design.
We designed the following resilient controller:
i q * = i a + i b
where
i a = 1 χ ω r G ^ + π ( a 1 φ ˙ ( t ) + b 1 ( 1 + p 1 ) ξ p 1 ) 2 p 1 T s 1 a 1 b 1 e i b = π χ p 2 T s 2 a 2 b 2 ( a 2 S 1 p 2 + b 2 S 1 + p 2 )
where constant a i > 0 ,   b i > 0 ,   0 < p i < 1 .
Remark 6.
The controller proposed in this paper exclusively utilizes the angular velocity tracking error information of the PMSM, without relying on any physical layer model information. This controller exhibits excellent universality, as it does not require explicit knowledge of the PMSM’s detailed mechanical model or external disturbances.

4.2. Stability Analysis

Theorem 2.
For arbitrary PDT  T s 1 > 0 ,   T s 2 > 0 , when the q-axis current reference input  i q *  of the PMSM (9) in the physical layer is (22), the angular velocity TTEor of the PMSM will converge to the SMS (15) within the PDT  T s 2 , and the upper-bounded angular velocity TTEor’s convergence time is  T s = T s 1 + T s 2 .
Proof. 
Taking the Lyapunov candidate as σ 1 = 0.5 S 2 , we derive t to obtain
σ ˙ 1 = S S ˙ = S π ( a 1 φ ˙ ( t ) + b 1 ( 1 + p 1 ) ξ p 1 ) e 2 p 1 T s 1 a 1 b 1 + e ˙ = S ω r χ i q G + π ( a 1 φ ˙ ( t ) + b 1 ( 1 + p 1 ) ξ p 1 ) e 2 p 1 T s 1 a 1 b 1
Noting w ˜ = w * w ^ , G ˜ = G G ^ , construct the Lyapunov function as σ 2 = σ 1 + 0.5 γ 1 t r ( w ˜ Τ w ˜ ) , then
σ ˙ 2 = π ( a ¯ σ 1 1 p ¯ + b ¯ σ 1 1 + p ¯ ) 2 p ¯ T s 2 a ¯ b ¯ S G ˜ t r ( w ˜ Τ w ^ ˙ ) γ = π ( a ¯ σ 1 1 p ¯ + b ¯ σ 1 1 + p ¯ ) 2 p ¯ T s 2 a ¯ b ¯ t r ( w ˜ Τ ( γ h S + w ^ ˙ ) ) γ
where a ¯ = a 2 2 1 0.5 p 2 ,   b ¯ = b 2 2 1 + 0.5 p 2 ,   p ¯ = 0.5 p 2 . By substituting Equation (22) into Equation (25), we obtain
σ ˙ 2 = π ( a ¯ V 1 1 p ¯ + b ¯ V 1 1 + p ¯ ) 2 p ¯ T s 2 a ¯ b ¯
According to Theorem 1, the SMS S ( t ) will converge in PDT T s 2 , and the state variables will converge to the SMS in PDT T s 2 .
When the SMS satisfies S ( t ) = 0 , then
e ( t ) = π 2 p 1 T s 1 a 1 b 1 ( a 1 φ ( t ) + b 1 ξ 1 + p 1 ( t ) )
Define the Lyapunov candidate as σ ( t ) = 0.5 ξ 2 , then obtain the following:
σ ˙ ( t ) = ξ ( t ) ξ ˙ ( t ) = π ( b 1 ξ 2 + p 1 ( t ) + a 1 ξ ( t ) φ ˙ ( t ) ) 2 p 1 T s 1 a 1 b 1 = π ( a ¯ 1 σ 1 p 1 2 ( t ) + b ¯ 1 σ 1 + p 1 2 ( t ) ) 2 p ¯ 1 T s 1 a ¯ 1 b ¯ 1 | ξ | > δ ξ π ( a 1 ξ ( ( l 1 + 2 l 2 ξ [ 1 ] + 3 l 3 ξ [ 2 ] ) ) + b 1 ξ 2 + p 1 ( t ) ) 2 p 1 T s 1 a 1 b 1 | ξ | δ ξ
where p ¯ 1 = p 1 2 ,   a ¯ 1 = a 1 2 1 p 1 2 ,   b ¯ 1 = b 1 2 1 + p 1 2 .
According to Theorem 1, it can be concluded that when | ξ ( t ) | > δ ξ , ξ ( t ) will converge within the PDT T s 1 . From Equation (26), if ξ ( t ) = 0 , then e ( τ ) 0 , so if the SMS (15) satisfies S = 0 , then the TTEor e ( t ) will converge at PDT T s 1 . When | ξ | δ ξ , ξ ( t ) will asymptotically converge stably to zero.
Combining the above analyses, it verified that the angular velocity trajectory tracking error e ( t ) can converge to zero within the PDT T s = T s 1 + T s 2 . □
Remark 7.
The motion trajectory of SMC is mainly divided into two phases: Phase (1) is the phase where state variables at any initial position converge to the SMS. This phase ensures that the TTEor converges toward the SMS (rather than the SMS itself converging to zero), while the state variables themselves do not converge to zero. Phase (2) is the phase where the state variables on the SMS converge to the equilibrium point (zero). In this phase, the state variables essentially achieve convergence to zero. Compared with existing finite-time/fixed-time SMCs, the latter can only ensure that state variables converge to the SMS within finite/fixed time in the first phase, but fail to guarantee that the state variables in the second phase also converge within a finite/fixed time. Therefore, traditional finite-time/fixed-time SMC is not essentially finite-time convergent in nature. In addition, these control algorithms do not possess the characteristic of PreTC. The algorithm proposed in this paper achieves essential PreTC.

5. Validation Analysis

5.1. Simulation Environment

To verify the effectiveness of the predefined-time sliding-mode adaptive resilient control (PTSMAC) strategy designed in this paper, numerical simulations were performed via the MATLAB 2018 platform, utilizing the parameters of the PMSM listed in Table 2.
The q-axis current input i q * of the PMSM angular velocity dynamics Equation (9) is the output value of the PTSMAC, and voltage inputs of Equation (1) are the PI controllers with respect to the current tracking error.
u d = k d p ( 0 i d ) + k d i 0 t ( 0 i d ) d τ u q = k q p ( i q * i q ) + k q i 0 t ( i q * i q ) d τ
where i q denotes the output of q-axis voltage equation. There are four ELM nodes, parameters c i , v i are randomly generated, and the desired angular velocity is ω r = 100 rad/s. The motor is initiated with a 50 N·m load, followed by a sudden impact load of 50 N·m within 0.2 s, before returning to the initial 50 N m load thereafter. Taking into account Δ χ , Δ η , and Δ γ as perturbations of the system parameters, the control parameters are set as
a 1 = 1.01 ,   b 1 = 11.01 ;   p 1 = 0.2 ,   T s 1 = 0.01 ,   a 2 = 1.10 ,   b 2 = 10.01 , p 2 = 0.3 ,   γ = 0.01 ,   k d p = 10 ,   k d i = 15 ,   k q p = 11 , k q i = 10

5.2. A Comparative Simulation Under Different Pdt

Assuming that the CPS is subject to external malicious cyber-attacks, denoted as
κ Dos ( t ) = 0.001 ( 3 + e 0.1 t ) ,   λ FDI ( t ) = 0.01 cos 2 ( 3 t )
The load of the PMSM is T L = 100 t = 0 . 2 50 t 0 . 2 . To verify the convergence time of the TTEor of the closed-loop CPS, which can be set in advance, the convergence time of the controller is set as T s 2 = 0.03   s ,   0.05   s ,   0.1   s ,   0.2   s , respectively. Figure 4 and Figure 5 depict the efficacy of the novel sliding-mode adaptive controller formulated in this study, demonstrating its robustness against network attacks and parameter disturbances. Specifically, Figure 5 shows that the TTor for the PMSM in CPS is capable of converging to zero within a predetermined timeframe, despite such adversities. Moreover, convergence accuracy can attain a value of 7   ×   10 3 . The smaller the predefined convergence time, the lesser the oscillation of the PMSM angular velocity tracking error, and the greater the convergence precision. This confirms the efficiency of the controller proposed in this paper, indicating that it can effectively mitigate external cyber-attacks. Additionally, by adjusting the convergence time in the controller, the PMSM’s TTEor in the CPS can converge to zero within the PDT. Figure 6 portrays the tracking effect between the output current ( i q ) of the PMSM’s voltage equation and the control input current ( i q * ) of the PMSM’s mechanical motion equation.
Figure 6 illustrates that at the initial stage of control, the control input current in the PMSM’s mechanical motion equation exhibits significant and erratic oscillations, with the maximum input current reaching 1.5   ×   10 4 A. Subsequently, the control input current decreases rapidly. There is a deviation between the PMSM’s output current i q and the reference current i q * , and the tracking accuracy can be improved by adjusting the control gain of the PI controller based on the current tracking error.

5.3. Anti-Interference Robust Analysis

To verify the anti-interference ability of the novel controller, we assume the malicious cyber-attacks is κ Dos ( t ) = 0.001 ( 3 + e 0.1 t ) ,   λ FDI ( t ) = 0.01 cos 2 ( 3 t ) and the time-varying load of the PMSM is T L = 50 e 0.5 t . Under the same control parameters, the simulation results are shown in Figure 7, Figure 8 and Figure 9.
The simulation results demonstrate that when the load of the PMSM increases over time, the TTEor of the PMSM-based CPS can still converge to zero with high accuracy within the PDT. This verifies that the proposed algorithm exhibits strong anti-interference capability.

5.4. Performance Comparison and Simulation Analysis of Different Controllers

Considering the presence of unknown disturbances in the physical model of CPS, the following extended state observer (ESO) can be chosen to estimate d ( t ) ,
υ = z 1 ω r , z ˙ 1 = z 2 + g ^ + χ i q * β 1 υ z ˙ 2 = β 2 tanh ( β 3 θ ) , g ^ ˙ = η g s
where z 2 is the estimation of d ( t ) and g ^ is the estimation of g ; the following controller-based ESO and the PI controller are chosen for comparative simulation.
(1)
Super-twisting SMCler based on ESO (STSMC+ESO) [28].
i q * = 1 χ [ c e ˙ z 2 + ε | s | 1 / 2 sign ( s ) + k 0 t sign ( s ) d τ ] s = e ˙ ( t ) + c e ( t )
(2)
Backstepping L2 gain controller based on ESO (BSLGC+ESO) [29].
e = θ θ * , a l = k l 1 e θ ˙ * , η l = ω r a l i q * = 1 χ [ k l 2 η l + z 2 γ l 2 z 2 2 2 η l a ˙ l ]
(3)
Sliding-mode speed controller based on ESO (SMSC+ESO) [25].
e ( t ) = θ * θ , s = e ˙ ( t ) + c e ( t ) , g ^ ˙ = η g s                 η > 0 i q * = 1 χ [ θ ¨ * g ^ z 2 + ε | ω r | a sgn ( s ) + k | s | b sgn ( | s | 1 ) s + c e ˙ ]
(4)
PI controller.
i q * = k p e + k i 0 τ e d τ
The load of the PMSM is T L = 100 t = 0 . 2 50 t 0 . 2 . Three cyber-attack environments are selected for numerical simulation, respectively, as follows:
Case 1: Weak cyber-attack
External malicious cyber-attacks can be described as
κ Dos ( t ) = 0.001 ( 3 + e 0.1 t ) t 0.01 1 0 t < 0.01 ,   λ FDI ( t ) = 0.01 cos 2 ( 3 t ) t 0.01 0 0 t < 0.01
The results depicted in Figure 10 and Figure 11 demonstrate the remarkable efficacy of the PTSMACler proposed in this paper when the CPS is subjected to a weak cyber-attack.
It outperforms the other four considered controllers by minimizing the amplitude of the PMSM’s angular velocity tracking error, exhibiting a smoother convergence trajectory, achieving a shorter convergence time, and attaining higher convergence accuracy. Trajectory tracking based on the PI controller exhibits a significant steady-state error. Under the STSMC+ESO and BSLGC+ESO algorithms, the angular velocity tracking error converges with oscillations and requires a longer convergence time. Meanwhile, although the SMSC+ESO algorithm displays comparatively fewer oscillations, it exhibits both a higher maximum tracking error and a larger steady-state tracking error. On the other hand, Figure 12 illustrates that under PTSMAC and SMSC+ESO control, the control input currents of the mechanical dynamics equations exhibit minimal oscillations; however, the current amplitude under PTSMAC is significantly smaller than that under SMSC+ESO control. Conversely, under STSMC+ESO and BSLGC+ESO controls, the control input currents exhibit obvious oscillatory behavior with larger amplitudes. These simulation results unequivocally demonstrate the exceptional performance of the proposed controller against weak cyber-attacks.
Case 2: High-powered cyber-attack
High-powered external malicious cyber-attacks can be described as
κ Dos ( t ) = 10 ( 3 + e 0.1 t ) t 0.01 1 0 t < 0.01 ,   λ FDI ( t ) = 0.1 cos 2 ( 3 t ) t 0.01 0 0 t < 0.01
The results depicted in Figure 13 and Figure 14 demonstrate the remarkable resilience of the PTSMAC, as it successfully drives the angular velocity of the PMSM to zero within a mere 0.05 s, even when subjected to potent multiplicative and additive cyber-attacks. Notably, this convergence is achieved with an impeccably smooth trajectory. These findings unequivocally establish the efficacy of the PTSMAC under high-intensity cyber-attacks. Among its counterparts, the PI, STSMC+ESO, and BSLGC+ESO controllers exhibit rapid angular velocity tracking convergence with near-zero convergence times. However, it is worth mentioning that the SMSC+ESO controller lags significantly in performance, displaying larger convergence errors and more pronounced oscillations in its trajectory. Furthermore, the SMSC+ESO controller also exhibits the longest convergence time among all controllers. Figure 15 visually presents the control input current for each controller employed in this study. It is noteworthy that neither the PTSMAC nor the SMSC+ESO controller induces any oscillations in their respective input currents; however, when the PTSMAC is utilized, the current amplitude is minimized to the smallest possible value. Conversely, under the control of STSMC+ESO and PI, the input current signal exhibits a sharp fluctuation pattern, whereas BSLGC+ESO manages to keep such oscillations relatively subdued.
Case 3: High-powered cyber-attack
Other high-powered external malicious cyber-attacks can be described as follows:
κ Dos ( t ) = 0.10 ( 3 + e 0.1 t ) t 0.01 1 0 t < 0.01 ,   λ FDI ( t ) = 1 cos 2 ( 3 t ) t 0.01 0 0 t < 0.01
The simulation results depicted in in Figure 16, Figure 17 and Figure 18 demonstratethat the PMSM’s angular velocity tracking error remains consistently smooth and free of chattering across all five controllers. This holds true even when weak multiplicative and strong additive attacks are launched against the network layer of the CPS. Among these controllers, the PI controller exhibits a significant vibration amplitude in the tracking error; the SMSC+ESO controller demonstrates a remarkably prolonged convergence time for the PMSM’s angular velocity tracking error; while the STSMC+ESO and BSLGC+ESO controllers showcase swift convergence times approaching zero. In stark contrast, the PTSMAC ensures that the PMSM’s angular velocity tracking error converges in less than 0.05 s, thereby meeting the PDT requirement with utmost efficiency. Notably, among these five controllers, the PTSMAC-based control yields the smallest input current amplitude.
The convergence time (CT), steady-state error (SSE), and comprehensive energy consumption (CEC) of the five controllers are listed in Table 3. The results demonstrate that the PTSMAC outperforms the other three controllers, particularly in terms of convergence speed, tracking accuracy, and transient performance. Moreover, the convergence time of the proposed controller is user-definable, whereas the convergence times of the other three controllers cannot be fully preconfigured. Consequently, the proposed PTSMAC offers numerous advantages, including superior control performance and flexible convergence time configuration.

5.5. Sensitivity Analysis of ELM Parameters

To analyze the influence of the type of activation function and the number of nodes of the neural network on the control effect, the number of nodes is set to four, and the activation functions are set to the sigmoid function (Sigmoid): Φ w ( ξ ) = ( 1 + exp ( V w ξ T + b w ) ) 1 , hyperbolic tangent function (Tanh): Φ w ( ξ ) = tanh ( V w ξ T + b w ) , Gauss function (Gauss): Φ w ( ξ ) = exp ( | | ξ V w | | 2 / b w 2 ) , and cosine Fourier basis function (Cosine): Φ w ( ξ ) = cos   ( V w ξ T + b w ) , respectively, with other parameters unchanged. The numerical simulation results are shown in Figure 19 and Figure 20. It can be observed from the simulation results that the type of activation function does not affect the control performance of the cyber–physical system (CPS).
Similarly, the activation function is fixed as the sigmoid function, and the number of nodes of the ELM is set to 4, 10, 20, and 30, respectively, for numerical simulations. The simulation results are presented in Figure 21 and Figure 22. These results indicate that the number of nodes also has no impact on the control performance of the CPS.

6. Conclusions

We have investigated the trajectory tracking control problem of CPS based on PMSM, focusing on the impacts of malicious cyber-attacks at the cyber layer, as well as parameter perturbations and external loads at the physical layer. A model-free and disturbance-independent sliding-mode adaptive safety control strategy is proposed, which only requires information about the motor’s angular velocity tracking error and supports predefined convergence time. Numerical simulations confirm that this safety control strategy can resist malicious cyber-attacks and exhibits strong anti-interference capability.
A novel PreTC Lyapunov stability criterion is proposed, and an SMS with predefined convergence time is designed, enriching the theoretical framework of PreTC. The upper bound of the predefined convergence time is not affected by the initial system state or controller parameters, which not only enhances the degree of freedom in the design of time-optimal control algorithms but also renders the convergence time of the closed-loop system controllable. By using an ELM to approximate the aggregated term composed of the PMSM model and external disturbances, a novel sliding-mode adaptive controller is designed for PMSM-based CPS under cyber-attacks. This controller can effectively mitigate the adverse effects of malicious cyber-attacks, system parameter perturbations, and external heavy loads on the CPS, improve the robustness of the PMSM-based CPS, and rapidly achieve high-precision angular velocity tracking—thus effectively expanding the application scenarios of PMSM-based CPS. Through comparative simulations of four safety control strategies under weak and strong cyber-attacks, it is demonstrated that the proposed algorithm offers multiple advantages, including smaller TTEor, a smoother convergence trajectory, shortened convergence time, and higher convergence accuracy.
The next step will involve constructing a physical model to verify the engineering application effect of the proposed algorithm through physical simulation experiments, considering actual constraints and disturbance issues. Additionally, while this paper uses an ELM to approximate the aggregated term, the output weights of the ELM lack convergence, which cannot guarantee the accurate estimation of the aggregated term by the ELM and may increase control energy consumption. In future research, designing an ELM output weight update law with convergence characteristics and completing the corresponding stability theoretical proof will be the key direction for improvement.

Author Contributions

The following contributions reflect the role of individual authors in this study and manuscript. Conceptualization, C.Y.; methodology, C.Y.; software, Z.W., Y.J.; validation, Z.W.; formal analysis, S.Z.; investigation, Z.W.; resources, C.Y.; data curation, S.Z.; writing—original draft preparation, C.Y., Y.J.; writing—review and editing, S.Z., Y.J.; project administration, Y.J.; funding acquisition, Z.W. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

There are no ethical issues with these data.

Informed Consent Statement

Not applicable.

Data Availability Statement

The authors confirm that the data supporting the findings of this study are available within the article.

Conflicts of Interest

The authors declare that no conflict of interest exists in the submission of this manuscript, and manuscript is approved by all authors for publication.

Abbreviation

ELMExtreme learning machineSMSSliding-mode surface
CPSCyber–physical systemDoSDenial-of-service
FDIFalse data injectionPreTCPredefined-time convergence
PMSMPermanent magnet synchronous motorTTEorTrajectory tracking error
PDTPredefined timeNLSNonlinear system
SMCSliding-mode controlUBUpper bound

References

  1. Ding, Y.; Yin, C.W.; Riaz, S. A novel PT-SMC based resilient control of cyber-physical robotic system under malicious-threats. ISA Trans. 2025, 8, 63. [Google Scholar] [CrossRef]
  2. Ge, X.; Han, Q.L.; Zhong, M.; Zhang, X.M. Distributed Krein space-based attack detection over sensor networks under deception attacks. Automatica 2019, 109, 108557. [Google Scholar] [CrossRef]
  3. Deng, R.; Xiao, G.; Lu, R. Defending against false data injection attacks on power system state estimation. IEEE Trans. Ind. Inform. 2015, 13, 198–207. [Google Scholar] [CrossRef]
  4. Rawat, D.B.; Bajracharya, C. Detection of false data injection attacks in smart grid communication systems. IEEE Signal Process. Lett. 2015, 22, 1652–1656. [Google Scholar] [CrossRef]
  5. Li, B.; Lu, R.; Xiao, G.; Li, T.; Choo, K.-K.R. Detection of False Data Injection Attacks on Smart Grids: A Resilience-Enhanced Scheme. IEEE Trans. Power Syst. 2022, 37, 2679–2692. [Google Scholar] [CrossRef]
  6. Xie, C.H.; Yang, G.H. Observer-based attack-resilient control for linear systems against FDI attacks on communication links from controller to actuators. Int. J. Robust Nonlinear Control 2018, 28, 4382–4403. [Google Scholar] [CrossRef]
  7. Li, T.; Wang, L.; Li, Z. Observer-based adaptive event-triggered neural tracking control for nonlinear cyber-physical systems with incomplete measurements. Int. J. Adapt. Control Signal Process. 2023, 37, 972–992. [Google Scholar] [CrossRef]
  8. Su, L.; Ye, D.; Zhao, X.-G. Distributed secure state estimation for cyber-physical systems against replay attacks via multisensor method. IEEE Syst. J. 2021, 16, 5720–5728. [Google Scholar] [CrossRef]
  9. Meng, Q.; Kasis, A.; Polycarpou, M. Sliding Mode Control for Robustness in Networked Switched Systems Under Denial-of-Service Attacks. IEEE Trans. Autom. Control 2025, 70, 6021–6035. [Google Scholar] [CrossRef]
  10. Yin, C. Model-free sliding mode resilient control of cyber-physical system based on reinforcement learning. Appl. Intell. 2025, 55, 824. [Google Scholar] [CrossRef]
  11. Zhang, W.; Du, H.; Zhu, W. Finite-time speed sensorless control of permanent magnet synchronous motor based on generalized super-twisting algorithm. Control Theory Appl. 2021, 38, 833–841. [Google Scholar]
  12. Chen, Z.; Lin, Z.; Jia, H. Finite-time control for permanent magnet synchronous motor with prescribed performance. Control Theory Appl. 2021, 38, 479–488. [Google Scholar]
  13. Li, S.; Zhou, M.; Yu, X. Design and implementation of terminal sliding mode control method for PMSM speed regulation system. IEEE Trans. Ind. Inform. 2012, 9, 1879–1891. [Google Scholar] [CrossRef]
  14. Feng, Y.; Yu, X.; Han, F. High-order terminal sliding-mode observer for parameter estimation of a permanent-magnet synchronous motor. IEEE Trans. Ind. Electron. 2012, 60, 4272–4280. [Google Scholar] [CrossRef]
  15. Farbood, M.; Echreshavi, Z.; Mobayen, S.; Skruch, P. Resilient event-triggered observer-based control of uncertain nonlinear fuzzy systems subject to unknown inputs. IEEE Access 2025, 13, 156359–156374. [Google Scholar] [CrossRef]
  16. Echreshavi, Z.; Farbood, M.; Shasadeghi, M.; Mobayen, S. Robust event-triggered data-driven control subject to control constraints. Soft Comput. 2024, 28, 13083–13096. [Google Scholar] [CrossRef]
  17. Echreshavi, Z.; Farbood, M.; Shasadeghi, M.; Mobayen, S. Data-driven adaptive event-triggered terminal sliding mode control for nonlinear systems with prescribed performance. Int. J. Robust Nonlinear Control 2025, 1–15. [Google Scholar] [CrossRef]
  18. Yang, Z.; Zhao, Y.; Gao, F. Fixed-time stabilization for a wheeled mobile robot with actuator dead-zones. IAENG Int. J. Comput. Sci. 2021, 48, 514–518. [Google Scholar]
  19. Xu, P. Fixed time control of dynamic positioning ship with unknown interference. Open J. Appl. Sci. 2020, 10, 246–257. [Google Scholar] [CrossRef]
  20. Wang, L.; Du, H.; Zhang, W.; Wu, D.; Zhu, W. Implementation of integral fixed-time sliding mode controller for speed regulation of PMSM servo system. Nonlinear Dyn. 2020, 102, 185–196. [Google Scholar] [CrossRef]
  21. Yin, C.; Ding, Y.; Sun, H. Nonsingular Fast Predefined Time Convergence Sliding Mode Control for Construction Robot. ISA Trans. 2025, 161, 109–121. [Google Scholar] [CrossRef]
  22. Chavoshi, H.; Sedgh, A.; Khaloozadeh, H. Resilience PI controller design for mitigating weak denial-of-service attacks in cyber-physical systems. IET Cyber-Phys. Syst. Theory Appl. 2025, 10, 70002. [Google Scholar] [CrossRef]
  23. Yin, C.; Yi, P.; Bu, X. Neural network-based guaranteed performance sliding mode security control of nonlinear cyber-physical systems. Eng. Appl. Artif. Intell. 2025, 157, 111423. [Google Scholar] [CrossRef]
  24. Munoz-Vazquez, A.J.; Sánchez-Torres, J.D.; Jimenez-Rodriguez, E.; Loukianov, A.G. Predefined-time robust stabilization of robotic manipulators. IEEE/ASME Trans. Mechatron. 2019, 24, 1033–1040. [Google Scholar] [CrossRef]
  25. Wang, Y.; Feng, Y.; Zhang, X.; Liang, J. A new reaching law for anti-disturbance sliding-mode control of PMSM speed regulation system. IEEE Trans. Power Electron. 2020, 35, 4117–4126. [Google Scholar] [CrossRef]
  26. Raoufi, M.; Habibi, H.; Yazdani, A.; Wang, H. Robust prescribed trajectory tracking control of a robot manipulator using adaptive finite-time sliding mode and extreme learning machine method. Robotics 2022, 11, 111. [Google Scholar] [CrossRef]
  27. Huang, G.B.; Zhu, Q.Y.; Siew, C.K. Extreme learning machine: Theory and applications. Neurocomputing 2006, 70, 489–501. [Google Scholar] [CrossRef]
  28. Levant, A. Sliding order and sliding accuracy in sliding mode control. Int. J. Control 1993, 58, 1247–1263. [Google Scholar] [CrossRef]
  29. Forbes, J.R. L2-gain and passivity techniques in nonlinear control. IEEE Control Syst. Mag. 2017, 37, 75–76. [Google Scholar]
Figure 1. Structural diagram of cyber-attacked CPS model.
Figure 1. Structural diagram of cyber-attacked CPS model.
Sensors 25 07380 g001
Figure 2. TTEor for different predefined convergence times.
Figure 2. TTEor for different predefined convergence times.
Sensors 25 07380 g002
Figure 3. Diagram of SLFN structure.
Figure 3. Diagram of SLFN structure.
Sensors 25 07380 g003
Figure 4. Angular velocity tracking for CPS.
Figure 4. Angular velocity tracking for CPS.
Sensors 25 07380 g004
Figure 5. Angular velocity tracking error for CPS.
Figure 5. Angular velocity tracking error for CPS.
Sensors 25 07380 g005
Figure 6. PMSM current tracking schematic.
Figure 6. PMSM current tracking schematic.
Sensors 25 07380 g006
Figure 7. Angular velocity tracking for CPS.
Figure 7. Angular velocity tracking for CPS.
Sensors 25 07380 g007
Figure 8. Angular velocity tracking error for CPS.
Figure 8. Angular velocity tracking error for CPS.
Sensors 25 07380 g008
Figure 9. PMSM current tracking schematic.
Figure 9. PMSM current tracking schematic.
Sensors 25 07380 g009
Figure 10. Angular velocity tracking for CPS.
Figure 10. Angular velocity tracking for CPS.
Sensors 25 07380 g010
Figure 11. Angular velocity tracking error for CPS.
Figure 11. Angular velocity tracking error for CPS.
Sensors 25 07380 g011
Figure 12. PMSM current-tracking schematic.
Figure 12. PMSM current-tracking schematic.
Sensors 25 07380 g012
Figure 13. Angular velocity tracking for CPS.
Figure 13. Angular velocity tracking for CPS.
Sensors 25 07380 g013
Figure 14. Angular velocity tracking error for CPS.
Figure 14. Angular velocity tracking error for CPS.
Sensors 25 07380 g014
Figure 15. PMSM current tracking schematic.
Figure 15. PMSM current tracking schematic.
Sensors 25 07380 g015
Figure 16. Angular velocity tracking for CPS.
Figure 16. Angular velocity tracking for CPS.
Sensors 25 07380 g016
Figure 17. Angular velocity tracking error for CPS.
Figure 17. Angular velocity tracking error for CPS.
Sensors 25 07380 g017
Figure 18. PMSM current tracking schematic.
Figure 18. PMSM current tracking schematic.
Sensors 25 07380 g018
Figure 19. Angular velocity tracking error.
Figure 19. Angular velocity tracking error.
Sensors 25 07380 g019
Figure 20. PMSM current tracking schematic.
Figure 20. PMSM current tracking schematic.
Sensors 25 07380 g020
Figure 21. Angular velocity tracking error.
Figure 21. Angular velocity tracking error.
Sensors 25 07380 g021
Figure 22. PMSM current-tracking schematic.
Figure 22. PMSM current-tracking schematic.
Sensors 25 07380 g022
Table 1. Stability criterion and convergence time.
Table 1. Stability criterion and convergence time.
Lyapunov CandidateUpper of Convergence Time
Asymptotically stable system σ ˙ ( x ( t ) ) < 0 T ( x 0 ) T max =
Finite-time stability σ ˙ ( x ) λ 1 σ ( x ) λ 2 σ ( x ) α T ( x 0 ) T max = 1 λ 1 ( 1 α ) ln λ 1 σ ( x 0 ) 1 α + λ 2 λ 2
Fixed-time stability σ ˙ ( x ) < α 1 σ ( x ) β 1 α 2 σ β 2 ( x ) T ( x 0 ) T max = 1 α 1 ( 1 β 1 ) + 1 α 2 ( β 2 1 )
Predefined-time stability σ ˙ ( x ) π ( a 2 σ ( x ) 1 p 2 + b 2 σ ( x ) 1 + p 2 ) 2 p 2 T s 2 a 2 b 2 T ( x 0 ) T max = T s 2
Table 2. Parameters of PMSM.
Table 2. Parameters of PMSM.
ParametricNotationValueUnit
Number of motor polesp6/
ResistanceR1.55Ω
Stator inductance L 5 × 10−3H
d-axis inductor L d 6.71 × 10−3H
q-axis inductor L q 6.71 × 10−3H
Permanent magnet chain ψ f 0.175Wb
Inertia moment J 0.0002kg·m2
Damping factor B 0.0003N·m·s
Parametric perturbance Δ χ 20 sin(t)/
Δ η 10 sin(t)/
Δ γ 10 sin(t)/
Table 3. Performance comparison under different controllers.
Table 3. Performance comparison under different controllers.
ControllerCase 1Case 2Case 3
CTSSECECCTSSECECCTSSECEC
PTSMAC0.030 s0.0073.8732 × 1060.05 s0.0060.0709 × 1040.042 s0.0250.3332 × 104
STSMC+ESO0.320 s0.6303.8668 × 1060.01 s0.201.0243 × 1040.016 s0.0153.8167 × 104
BSLGC+ESO0.102 s0.0033.8669 × 1060.01 s0.100.0569 × 1040.012 s0.0013.8331 × 104
SMSC+ESO0.068 s0.1403.8684 × 1060.06 s3.000.0719 × 1040.084 s0.0373.8349 × 104
PI0.450 s16.8003.8646 × 1060.01 s0.417.7741 × 1040.013 s0.0273.9071 × 104
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wang, Z.; Zhang, S.; Jiang, Y.; Yin, C. Practical Predefined-Time Sliding-Mode Adaptive Resilient Control for PMSM Cyber–Physical Systems. Sensors 2025, 25, 7380. https://doi.org/10.3390/s25237380

AMA Style

Wang Z, Zhang S, Jiang Y, Yin C. Practical Predefined-Time Sliding-Mode Adaptive Resilient Control for PMSM Cyber–Physical Systems. Sensors. 2025; 25(23):7380. https://doi.org/10.3390/s25237380

Chicago/Turabian Style

Wang, Zhenzhong, Shu Zhang, Yun Jiang, and Chunwu Yin. 2025. "Practical Predefined-Time Sliding-Mode Adaptive Resilient Control for PMSM Cyber–Physical Systems" Sensors 25, no. 23: 7380. https://doi.org/10.3390/s25237380

APA Style

Wang, Z., Zhang, S., Jiang, Y., & Yin, C. (2025). Practical Predefined-Time Sliding-Mode Adaptive Resilient Control for PMSM Cyber–Physical Systems. Sensors, 25(23), 7380. https://doi.org/10.3390/s25237380

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop