CN112995154B - Synchronous control method for complex network under aperiodic DoS attack - Google Patents
Synchronous control method for complex network under aperiodic DoS attack Download PDFInfo
- Publication number
- CN112995154B CN112995154B CN202110175213.8A CN202110175213A CN112995154B CN 112995154 B CN112995154 B CN 112995154B CN 202110175213 A CN202110175213 A CN 202110175213A CN 112995154 B CN112995154 B CN 112995154B
- Authority
- CN
- China
- Prior art keywords
- representing
- matrix
- dos attack
- attack
- time
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 28
- 230000001360 synchronised effect Effects 0.000 title claims abstract description 24
- 239000011159 matrix material Substances 0.000 claims abstract description 61
- 230000005540 biological transmission Effects 0.000 claims abstract description 26
- 230000007246 mechanism Effects 0.000 claims abstract description 22
- 238000004891 communication Methods 0.000 claims abstract description 11
- 238000005070 sampling Methods 0.000 claims description 21
- 238000010168 coupling process Methods 0.000 claims description 14
- 238000005859 coupling reaction Methods 0.000 claims description 14
- 230000007958 sleep Effects 0.000 claims description 11
- 230000008878 coupling Effects 0.000 claims description 8
- 230000000737 periodic effect Effects 0.000 claims description 7
- 230000001960 triggered effect Effects 0.000 claims description 7
- 230000005059 dormancy Effects 0.000 claims description 5
- 230000004069 differentiation Effects 0.000 claims description 4
- 238000005259 measurement Methods 0.000 claims description 3
- 230000007704 transition Effects 0.000 claims description 3
- 230000017105 transposition Effects 0.000 claims 1
- 230000010485 coping Effects 0.000 abstract description 2
- 238000010586 diagram Methods 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000004088 simulation Methods 0.000 description 3
- 230000006978 adaptation Effects 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 239000003795 chemical substances by application Substances 0.000 description 1
- 238000011217 control strategy Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000001934 delay Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 230000009897 systematic effect Effects 0.000 description 1
- 230000002123 temporal effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Abstract
The invention discloses a complex network synchronous control method under aperiodic DoS attack, which comprises the steps of firstly, establishing a complex network system model and a synchronous error model, introducing an event triggering mechanism, establishing a network attack model based on the influence of the aperiodic DoS attack on network transmission data, and designing the synchronous error model of the complex network under the aperiodic DoS attack and the event triggering mechanism; obtaining sufficiency conditions for ensuring system index stability by utilizing Lyapunov stability theory; finally solving the inequality of the linear matrix to obtain an event trigger parameter and a feedback gain of the controller; the invention can effectively save network bandwidth resources, improve the communication capacity of a transmission channel, and simultaneously help a networked system to still keep running stably when coping with network attacks; by introducing the event triggering mechanism, the burden of network transmission can be effectively reduced.
Description
Technical Field
The invention relates to the technical field of network control, in particular to a synchronous control method of a complex network system attacked by aperiodic DoS.
Background
In networked systems, the communication network may be controlled remotely, flexibly and economically, but as sampled data continues to surge, network resources become more and more limited, resulting in reduced system performance. In order to alleviate the dilemma of resource limitation, the event triggering mechanism is considered as an effective method for saving network resources due to the special advantages, and the main idea is that only when the corresponding triggering condition is met, the current data can be transmitted, so that the network resources are saved. Over the past several years, there have been many different event triggering schemes that are employed in corresponding engineering systems, such as sensor networks, multi-agent systems, and the like.
Despite the attractive advantages of event-triggered schemes, the performance of network systems is still challenged by various network attacks due to the openness of the communication network. DoS attacks are particularly common in the classification of existing network attacks because they tend to cause large transmission delays and severe packet losses, wasting network resources. DoS attacks are classified into periodic and aperiodic, and periodic DoS attacks have been widely studied. Thus, it is also a challenging problem to study event-triggered synchronization control of complex network systems under aperiodic DoS attacks.
Disclosure of Invention
The invention aims to: in order to overcome the defects in the prior art, the invention provides a complex network synchronous control method under aperiodic DoS attack, and a new state estimation system is established under the condition of considering an event triggering mechanism and the aperiodic DoS attack, so that the network load can be effectively reduced.
The technical scheme is as follows: in order to achieve the above purpose, the invention adopts the following technical scheme:
a complex network synchronous control method under aperiodic DoS attack includes building complex network system model and synchronous error model, introducing event trigger mechanism, building network attack model based on influence of aperiodic DoS attack on network transmission data, designing synchronous error model of complex network under aperiodic DoS attack and event trigger mechanism. And obtaining sufficiency conditions for ensuring system index stability by utilizing Lyapunov stability theory. And finally solving the inequality of the linear matrix to obtain the event triggering parameter and the feedback gain of the controller. The invention can effectively save network bandwidth resources, improve the communication capacity of the transmission channel, and simultaneously help the networked system to still keep running stably when coping with network attacks. The event triggering mechanism is introduced, so that the load of network transmission can be effectively reduced, and the method specifically comprises the following steps:
and S1, establishing a complex network system model and a synchronous error model according to the state variables of the nodes, the control inputs of the nodes, the coupling strength and the network matrix.
And S2, introducing an event triggering mechanism.
The measurement output is released into the network and transmitted to the state estimator when the following conditions are met:
wherein ,ρi E (0, 1) is a predefined parameter, Ω i Is a symmetric positive definite matrix, h is a constant sampling period,representing the last sampling instant, indicating that the ith node has sampled within the kth sampling interval,/, is->Is positive and has an initial value of 0, k denotes k-th sample interval, k=1, 2, …, < >>For the current sampling time, the i node passes through u after the last data transmission time point i h time intervals are sampled again, u i Positive number, indicating the time interval, u i h represents the (u) i h time intervals, +.> and />Representing the last transmitted data and the current sampled data, respectively, T represents the transpose.
Wherein min represents all u satisfying the condition i The smallest u in h i h, | represents a condition, u i h needs to satisfy the condition |following.
And S3, establishing a network attack model by considering the influence of the aperiodic DoS attack on the network transmission data.
And S4, considering the influence of the aperiodic DoS attack on the network transmission data, and adjusting an event triggering mechanism.
If a DoS attack in step S3 is introduced, the control signal will be blocked during the attack interval, which will result in the triggering condition in step S2 not being directly adopted, adjusted to:
where n represents the nth DoS attack interference time interval,the time interval for indicating that the ith node satisfies the trigger condition is +.>Personal (S)>Indicate->Time interval->Namely k+u i Alternatively, the expression->k i Representing the sum of the number of triggers of the ith node in the nth interference period, +.>k i (n) represents the maximum number of times the ith node can be triggered, ψ, in the nth interference period i (n) represents the set of values of k that the ith node triggers in the nth cycle,/->Representation definition->
wherein ,represents the union of all time intervals, +.>The mth time interval of the division is indicated,the representation will->Divided into a plurality of->The maximum m, [ ] of the time interval represents the interval opening and closing.
Under event triggering and DoS attack, the actual time interval of data transmission of the ith node is:
will beDivided into-> An intersection of an mth interval of data transmission representing an event of an ith node and an nth DoS attack interference dormancy interval, wherein:
representing the time interval during which data can be normally transmitted without DoS attack interference.
Two piecewise functions are defined:
the synchronization error is expressed as:
wherein ,representing defined piecewise functions, +.>Representing defined piecewise functions, +.>Data transmitted without DoS attack interference, < >>Representation, Ω i Event-triggered parameter matrix, ρ, representing the ith node i Representing the event trigger parameters of the ith node, Γ represents the in-coupling matrix between complex network nodes.
And S5, designing a synchronous error model of the ith node of the complex network based on the DoS attack and the event trigger mechanism, and further obtaining the synchronous error model of the whole complex network system.
The synchronization error model of the whole complex network system is as follows:
Wherein C represents a connection matrix between complex network nodes,represents the Cronecker product, ψ (t) represents the initial state of the node, h represents the sampling time interval, col N {ε i (t) } represents a column vector of N consecutive columns, V k,n Representing event trigger time period irrespective of DoS attack, S n-1 Representing the period of time for which data is actually transmitted in consideration of the DoS attack.
And S6, obtaining sufficiency conditions for ensuring the index stability of the whole complex network system based on the Lyapunov stability theory.
And S7, solving a linear matrix inequality according to the sufficiency condition for ensuring the exponential stability of the whole complex network system obtained in the step 6, and obtaining an event triggering parameter and a controller feedback gain.
Preferably: the complex network system model established in the step S1 is as follows:
wherein ,xi (t) is the state variable of the ith node, x i (t)∈R n′ ,Is x i Differentiation of (t), u i (t)∈R n′ ,u i (t) is the control input of the ith node, g: R n →R n Sigma > 0 is a given coupling strength as a continuous nonlinear vector function. C= [ C ] ij ] N×N Is a network matrix, wherein c ij When > 0, i is not equal to j, indicating that there is undirected connection between node i and node j, otherwise c ij =0. Diagonal element +.>Γ=diag{t 1 ,t 2 ,…,t N Is an in-coupling matrix and obeys +.> wherein t i and />Is a known constant, A is a constant matrix I, B is a constant matrix II, N is the number of complex network nodes, R n′ Representing the n' dimensional euclidean space.
Preferably: the outlier model established in step S1 is as follows:
let the synchronization error be epsilon i =x i (t) -s (t), the synchronization error system model is built as follows:
wherein ,g(xi (t),s(t))=g(x i (t))-g(s(t))。
Wherein s (t) is an isolated point, t is time,is s (t)) Is a derivative of ε i For synchronization error +.>Is epsilon i Is a derivative of (a).
Preferably: in step S3, the method for establishing the network attack model considers the influence of the aperiodic DoS attack on the network transmission data:
considering the influence of non-periodic DoS attacks in a network channel, the attack signals are:
wherein F (t) is a signal of a DoS attack, and />Is a real sequence, and d n+1 >d n +g n . In time interval +.> wherein ,Dn =[d n +g n ,d n+1 ) Normal communications are blocked due to DoS attacks. In time interval +.> wherein />Normal communication is performed without interference from DoS attacks. The start time of the n+1th DoS attack period is d n +g n For a time d of n+1 -d n -g n ,/>To attack the dormant set, d n For the period of active attack, g n For the period of time of attacking dormancy.
Setting the upper time limit of the duration of the DoS attack active period and the lower time limit of the sleep period as follows:
wherein ,time upper bound representing duration of active period, +.>A time lower bound representing sleep period, d max Represents the longest time of attack, g min Representing the shortest time to sleep.
Let n (t) be the number of attacks and sleep transitions made by DoS attacks in time interval [0, t), given two parametersAnd eta is greater than or equal to 0, at->The frequency of the internal DoS attack is:
wherein ,represents the custom parameter I, eta represents the custom parameter II,>representing a natural number set.
Preferably: in step S5, a synchronization error model of the ith node of the complex network is designed:
wherein sigma represents a coupling weight parameter, K i Representing a feedback gain matrix representing the ith node.
Preferably: in step S6, a method for obtaining a sufficiency condition for ensuring exponential stability of the whole complex network system based on Lyapunov stability theory is as follows:
setting a scalar alpha j' >0,μ j' >0,j'=1,2,1>ρ i > 0, i=1, 2..N, sampling interval h > 0, dos parameter η > 0,feedback gain matrix->When positive definite matrix P exists j' 、Q j' 、R j' 、Ω i' 、M j' and Nj' Is a matrix with proper dimension, so that when the following inequality and condition are satisfied, the system index is stable, and the attenuation rate is +.>
P 1 ≤μ 2 P 2 ,
Q 1 ≤μ 2 Q 2 ,Q 2 ≤μ 1 Q 1 ,
R 1 ≤μ 2 R 2 ,R 2 ≤μ 1 R 1 ,
M 1 =[M 11 M 12 M 13 M 14 M 15 ],N 1 =[N 11 N 12 N 13 N 14 N 15 ],
M 2 =[M 21 M 22 M 23 M 24 ],N 2 =[N 21 N 22 N 23 N 24 ],
Γ 1 =[M 1 0 N 1 -M 1 -N 1 0],Γ 2 =[M 2 0 N 2 -M 2 -N 2 ],
wherein ,M11 、M 12 、M 13 、M 14 、M 15 Representing a free weight matrix M 1 Component N of (2) 11 、N 12 、N 13 、N 14 、N 15 Representing a free weight matrix N 1 Component of M 21 、M 22 、M 23 、M 24 Representing a free weight matrix M 2 Component N of (2) 21 、N 22 、N 23 、N 24 Representing a free weight matrix N 2 I represents the identity matrix.
Preferably: in step S7, the method for acquiring the event trigger parameter and the feedback gain of the controller includes:
setting a scalar alpha j' >0,μ j' >0,κ j' >0,e j' >0,s j' >0,j'=1,2,1>ρ i > 0, i=1, 2..N, sampling interval h > 0, dos parameter η > 0,matrix Λ, P j' >0,X j' >0,Y j' >0,/> and />For a matrix of appropriate dimensions, so that the following linear matrix inequality holds, the system state estimation model is exponentially stable and the decay rate is +.>
compared with the prior art, the invention has the following beneficial effects:
the synchronous control method of the complex network system under the aperiodic DoS attack effectively saves the bandwidth, reduces the network load, improves the communication capacity of the transmission channel, and can efficiently save the network bandwidth resource and reduce the network load. An event triggering mechanism is introduced, and the load of network transmission is reduced. The problem of synchronous control of a complex network system based on an event trigger mechanism is studied. The adeep stability theory and the linear matrix inequality technology are utilized to obtain the sufficiency condition of the index stability of the synchronous error system, and an ideal design method of the controller is provided.
Drawings
FIG. 1 is a flow chart of a state estimator design provided by the present invention.
Fig. 2 is a synchronization error diagram in an embodiment of the invention.
Fig. 3 is a diagram of control input signals under non-periodic DoS attack disturbance in an example of the present invention.
Fig. 4 is a diagram of event trigger timing in an example of the invention.
Detailed Description
The present invention is further illustrated in the accompanying drawings and detailed description which are to be understood as being merely illustrative of the invention and not limiting of its scope, and various equivalent modifications to the invention will fall within the scope of the appended claims to the skilled person after reading the invention.
The synchronous control method of the complex network system under the aperiodic DoS attack shown in fig. 1 comprises the following steps:
and S1, establishing a complex network system model and a synchronous error model according to the state variables of the nodes, the control inputs of the nodes, the coupling strength and the network matrix.
The complex network system model is built as follows:
wherein ,xi (t) is the state variable of the ith node, x i (t)∈R n ,Is x i Differentiation of (t), u i (t)∈R n ,u i (t) is the control input of the ith node, g: R n →R n Sigma > 0 is a given coupling strength as a continuous nonlinear vector function. C= [ C ] ij ] N×N Is a network matrix, wherein c ij Indicating the existence of undirected connection between node i and node j, c ij When > 0, i is not equal to j, indicating whether there is a directional connection between nodes i and j, otherwise c ij =0. Diagonal line elementΓ=diag{t 1 ,t 2 ,…,t N Is an in-coupling matrix and obeys wherein t i and />Is a known constant, A is a constant matrix one, and B is a constant matrix two.
The outlier model is as follows:
let the synchronization error be epsilon i =x i (t) -s (t), the synchronization error system model is built as follows:
wherein ,g(xi (t),s(t))=g(x i (t))-g(s(t))。
And S2, introducing an event triggering mechanism.
The measurement output is released into the network and transmitted to the state estimator when the following conditions are met:
wherein ,ρi E (0, 1) is a predefined parameter, Ω i Is a symmetric positive definite matrix, h is a constant sampling period,representing the last sampling instant, indicating that the ith node has sampled within the kth sampling interval,/, is->Is positive and has an initial value of 0, k denotes k-th sample interval, k=1, 2, …, < >>For the current sampling time, the i node passes through u after the last data transmission time point i h time intervals are sampled again, u i Positive number, indicating the time interval, u i h represents the (u) i h time intervals, +.> and />Representing the last transmitted data and the current sampled data, respectively, T represents the transpose.
wherein min represents all u satisfying the condition i The smallest u in h i h, | represents a condition, u i h needs to satisfy the condition |following.
And step S3, a network attack model is established by considering the influence of the aperiodic DoS attack on the network transmission data.
Considering the influence of non-periodic DoS attacks in a network channel, the attack signals are:
wherein , and />Is a real sequence, and d n+1 >d n +g n . In time interval +.> wherein ,Dn =[d n +g n ,d n+1 ) Normal communications are blocked due to DoS attacks. In time interval +.> wherein Normal communication is performed without interference from DoS attacks. The start time of the n+1th DoS attack period is d n +g n For a time d of n+1 -d n -g n 。
Setting the upper time limit of the duration of the DoS attack active period and the lower time limit of the sleep period as follows:
wherein ,time upper bound representing duration of active period, +.>Representing the temporal lower bound of sleep periods.
Let n (t) be the number of attacks and sleep transitions made by DoS attacks in time interval [0, t), given two parametersAnd eta is greater than or equal to 0, at->The frequency of the internal DoS attack is:
and S4, considering the influence of the aperiodic DoS attack on the network transmission data, and adjusting an event triggering mechanism.
If the DoS attack described above is introduced, the control signal will be blocked during the attack interval, which will result in the above trigger condition not being directly applicable, adjusted to:
wherein ,k i indicating the sum of the number of triggers of the ith node in the nth interference period,
wherein ,represents the union of all time intervals, +.>Represents the m-th time interval of the division, +.>The representation will->Divided into a plurality of->The maximum m, [ ] of the time interval represents the interval opening and closing.
Under event triggering and DoS attack, the actual time interval of data transmission of the ith node is:
will beDivided into-> An intersection of an mth interval of data transmission representing an event of an ith node and an nth DoS attack interference dormancy interval, wherein:
Two piecewise functions are defined:
the synchronization error is expressed as:
wherein ,representing defined piecewise functions, +.>Representing defined piecewise functions, +.>Data transmitted without DoS attack interference, < >>Representation, Ω i Event-triggered parameter matrix, ρ, representing the ith node i Representing the event trigger parameters of the ith node, Γ represents the in-coupling matrix between complex network nodes.
Step S5, designing a synchronous error model of the ith node of the complex network based on the DoS attack and the event trigger mechanism as follows:
the synchronization error model of the entire complex network system is as follows:
Wherein C represents a connection matrix between complex network nodes,represents the Cronecker product, ψ (t) represents the initial state of the node, h represents the sampling time interval, col N {ε i (t) } represents a column vector of N consecutive columns, V k,n Representing event trigger time period irrespective of DoS attack, S n-1 Representing the period of time for which data is actually transmitted in consideration of the DoS attack.
And S6, obtaining sufficiency conditions for ensuring system index stability based on Lyapunov stability theory.
Setting a scalar alpha j' >0,μ j' >0,j'=1,2,1>ρ i > 0, i=1, 2..N, sampling interval h > 0, dos parameter η > 0,feedback gain matrix->When positive definite matrix P exists j' 、Q j' 、R j' 、Ω i' 、M j' and Nj' Is a matrix with proper dimension, so that when the following inequality and condition are satisfied, the system index is stable, and the attenuation rate is +.>
P 1 ≤μ 2 P 2 ,
Q 1 ≤μ 2 Q 2 ,Q 2 ≤μ 1 Q 1 ,
R 1 ≤μ 2 R 2 ,R 2 ≤μ 1 R 1 ,
M 1 =[M 11 M 12 M 13 M 14 M 15 ],N 1 =[N 11 N 12 N 13 N 14 N 15 ],
M 2 =[M 21 M 22 M 23 M 24 ],N 2 =[N 21 N 22 N 23 N 24 ],
Γ 1 =[M 1 0 N 1 -M 1 -N 1 0],Γ 2 =[M 2 0 N 2 -M 2 -N 2 ],
the proving process is as follows:
the Lyapunov function was constructed as follows:
Based on the above definition, consider the following two cases:
when j' =1, the derivative is calculated as follows:
G (·) satisfies G T (t)G(t)≤ε T (t)Λ T Λε(t).
The following can be obtained:
using the Schur theorem, one can derive:
the finishing method can obtain:
when j' =2, the derivative is calculated as follows:
wherein b1 =2η(α 1 +α 2 )h+ηln(μ 1 μ 2 )+2α 2 d max η-2α 1 g min η,
b 2 =(η+1)(2(α 1 +α 2 )h+ln(μ 1 μ 2 )+2α 2 d max η-2α 1 g min )。
it can be derived that the system index is stable.
And S7, solving a linear matrix inequality, and acquiring an event triggering parameter and a controller feedback gain.
Setting a scalar alpha j' >0,μ j' >0,κ j' >0,e j' >0,s j' >0,j'=1,2,1>ρ i > 0, i=1, 2..N, sampling interval h > 0, dos parameter η > 0,matrix Λ, P j' >0,X j' >0,Y j' >0,/> and />For a matrix of appropriate dimensions, so that the following linear matrix inequality holds, the system state estimation model is exponentially stable and the decay rate is +.>/>
the following was demonstrated:
using Schur's theorem, one can obtain:
The following method of simulation analysis is adopted to provide a specific embodiment, the gains of the estimator are solved by programming Matlab program to solve the inequality of the linear matrix, and a simulation curve is drawn, and the effectiveness of the invention is proved by a simulation example:
consider a complex network system with three nodes, the system parameters are:
the initial conditions of the system are as follows:
the nonlinear function and its upper bound Λ are expressed as:
let h=0.1, σ=0.8, α 1 =0.05,α 2 =0.5,μ 1 =μ 2 =1.01,d max =0.2,g min =1.78,ρ 1 =ρ 2 =ρ 3 =0.1,e j =10,s j =10 (j=1, 2). The initial state is s T (0)=[-0.5 0.5]The LMI toolbox using matlab derives the gain of the controller as:
K 1 =[-0.1039 -0.0823],K 2 =[-0.1042 -0.0838],K 3 =[-0.1057 -0.0875],
the obtained system synchronization error fluctuation is shown in fig. 2, the complex network system can be kept stable under the designed controller, the change track of the control input under the non-periodic DoS attack signal is shown in fig. 3, the release moment and the trigger interval of the event trigger of the designed controller are shown in fig. 4, and the complex network system can be kept stable under the control strategy of the designed controller and can effectively improve the data transmission efficiency, so that the designed controller is effective and has good performance.
The foregoing is only a preferred embodiment of the invention, it being noted that: it will be apparent to those skilled in the art that various modifications and adaptations can be made without departing from the principles of the present invention, and such modifications and adaptations are intended to be comprehended within the scope of the invention.
Claims (1)
1. A complex network synchronous control method under aperiodic DoS attack is characterized by comprising the following steps:
step S1, a complex network system model and a synchronous error model are established according to state variables of nodes, control inputs of the nodes, coupling weights and a connection matrix;
the complex network system model is built as follows:
wherein ,xi (t) is the state variable of the ith node, x i (t)∈R n′ ,Is x i Differentiation of (t), u i (t)∈R n′ ,u i (t) is the control input of the ith node, g: R n →R n As a continuous nonlinear vector function, sigma > 0 is a given coupling weight parameter; c= [ C ] ij ] N×N Is a connection matrix between complex networks, where c ij When > 0, i is not equal to j, indicating that there is undirected connection between node i and node j, otherwise c ij =0; diagonal element +.>Γ=diag{t 1 ,t 2 ,…,t N Is an in-coupling matrix between complex network nodes and obeys +.> wherein t i and />Is a known constant, A is a constant matrix I, B is a constant matrix II, N is the number of complex network nodes, R n′ Representing an n' dimensional Euclidean space;
the established outlier model is as follows:
let the synchronization error be epsilon i (t)=x i (t) -s (t), the synchronization error model is built as follows:
wherein ,g(xi (t),s(t))=g(x i (t))-g(s(t));
Wherein s (t) is an isolated point, t is time,is the differentiation of s (t), ε i (t) is synchronization error,>is epsilon i Is a derivative of (2);
s2, introducing an event triggering mechanism;
the measurement output is released into the network and transmitted to the state estimator when the following conditions are met:
wherein ,ρi E (0, 1) represents the event trigger parameter of the ith node, Ω i Is a symmetric positive definite matrix, h is a constant sampling period,representing the last sampling instant +.>Is positive and has an initial value of 0, k denotes the kth sampling interval, k=1, 2, …, < >>For the current sampling instant, u i h represents the (u) i h time intervals, +.> and />Respectively representing the last transmitted data and the current sampled data, wherein T represents transposition;
wherein min represents all u satisfying the condition i The smallest u in h i h, | represents a condition, u i h is required to satisfy the condition |following;
s3, establishing a network attack model by considering the influence of the aperiodic DoS attack on network transmission data;
the method for establishing the network attack model by considering the influence of the aperiodic DoS attack on the network transmission data comprises the following steps:
considering the influence of non-periodic DoS attacks in a network channel, the attack signals are:
wherein F (t) is a signal of a DoS attack, and />Is a real sequence, and d n+1 >d n +g n The method comprises the steps of carrying out a first treatment on the surface of the At intervals of time wherein ,Dn =[d n +g n ,d n+1 ) Normal communications are blocked due to DoS attacks; in time interval +.> wherein />Normal communication is carried out, and interference of DoS attack is avoided; the start time of the n+1th DoS attack period is d n +g n For a time d of n+1 -d n -g n ,/>To attack the dormant set, d n For the period of active attack, g n A period of time for attacking dormancy;
setting the upper time limit of the duration of the DoS attack active period and the lower time limit of the sleep period as follows:
wherein ,time upper bound representing duration of active period, +.>A time lower bound representing sleep period, d max Represents the longest time of attack, g min Representing the shortest time to sleep;
let n (t) be the number of attacks and sleep transitions made by DoS attacks in time interval [0, t), given two parametersAnd eta is greater than or equal to 0, at->The frequency of the internal DoS attack is:
wherein ,represents the custom parameter I, eta represents the custom parameter II,>representing a natural number set;
s4, considering the influence of the aperiodic DoS attack on the network transmission data, and adjusting an event triggering mechanism;
if a DoS attack in step S3 is introduced, the control signal will be blocked during the attack interval, which will result in the triggering condition in step S2 not being directly adopted, adjusted to:
where n represents the nth DoS attack interference time interval,the time interval for indicating that the ith node satisfies the trigger condition is +.>Personal (S)>Indicate->Time interval->k i Representing the sum of the number of triggers of the ith node in the nth interference period, +.>k i (n) represents the maximum number of times the ith node can be triggered, ψ, in the nth interference period i (n) represents the set of values of k that the ith node triggers in the nth cycle,/->The definition of the representation is given by,
wherein ,represents the union of all time intervals, +.>Represents the m-th time interval of the division, +.>The representation will->Divided into a plurality of->The maximum m of the time interval, [) represents the interval opening and closing;
under event triggering and DoS attack, the actual time interval of data transmission of the ith node is:
will beDivided into-> An intersection of an mth interval of data transmission representing an event of an ith node and an nth DoS attack interference dormancy interval, wherein:
a time interval which indicates that data can be normally transmitted without DoS attack interference;
two piecewise functions are defined:
the synchronization error is expressed as:
wherein ,representing defined piecewise functions, +.>Representing defined piecewise functions, +.>Representing data transmitted without DoS attack interference, Ω i Event-triggered parameter matrix, ρ, representing the ith node i An event trigger parameter representing an ith node, Γ representing an in-coupling matrix between complex network nodes;
s5, designing a synchronous error model of an ith node of the complex network based on the DoS attack and the event trigger mechanism, and further obtaining the synchronous error model of the whole complex network system;
the synchronization error model of the whole complex network system is as follows:
Wherein C represents a connection matrix between complex network nodes,represents the Cronecker product, ψ (t) represents the initial state of the node, h represents the sampling time interval, col N {ε i (t) } represents a column vector of N consecutive columns, V k,n Representing event trigger time period irrespective of DoS attack, S n-1 Representing a period of time for actually transmitting data in consideration of DoS attack;
designing a synchronous error model of an ith node of the complex network:
wherein sigma represents a coupling weight parameter, K i A feedback gain matrix representing the ith node;
s6, obtaining sufficiency conditions for ensuring the index stability of the whole complex network system based on Lyapunov stability theory;
the method for obtaining the sufficiency condition for ensuring the exponential stability of the whole complex network system based on Lyapunov stability theory comprises the following steps:
setting a scalar alpha j' >0,μ j' >0,j'=1,2,1>ρ i > 0, i=1, 2..N, sampling time interval h > 0, dos parameter η > 0,feedback gain matrix->When positive definite matrix P exists j' 、Q j' 、R j' 、Ω i' 、M j' and Nj' Is a matrix with proper dimension, so that when the following inequality and condition are satisfied, the system index is stable, and the attenuation rate is +.>/>
P 1 ≤μ 2 P 2 ,
Q 1 ≤μ 2 Q 2 ,Q 2 ≤μ 1 Q 1 ,
R 1 ≤μ 2 R 2 ,R 2 ≤μ 1 R 1 ,
M 1 =[M 11 M 12 M 13 M 14 M 15 ],N 1 =[N 11 N 12 N 13 N 14 N 15 ],
M 2 =[M 21 M 22 M 23 M 24 ],N 2 =[N 21 N 22 N 23 N 24 ],
Γ 1 =[M 1 0 N 1 -M 1 -N 1 0],Γ 2 =[M 2 0 N 2 -M 2 -N 2 ],
wherein ,M11 、M 12 、M 13 、M 14 、M 15 Representing a free weight matrix M 1 Component N of (2) 11 、N 12 、N 13 、N 14 、N 15 Representing a free weight matrix N 1 Component of M 21 、M 22 、M 23 、M 24 Representing a free weight matrix M 2 Component N of (2) 21 、N 22 、N 23 、N 24 Representing a free weight matrix N 2 I represents an identity matrix;
s7, solving a linear matrix inequality according to the sufficiency condition for ensuring the exponential stability of the whole complex network system obtained in the step 6, and obtaining an event triggering parameter and a controller feedback gain;
the method for acquiring the event triggering parameters and the feedback gain of the controller comprises the following steps:
setting a scalar alpha j' >0,μ j' >0,κ j' >0,e j' >0,s j' >0,j'=1,2,1>ρ i > 0, i=1, 2..N, sampling time interval h > 0, dos parameter η > 0,matrix Λ, P j' >0,X j' >0,Y j' >0,/> and />For a matrix of appropriate dimensions, so that the following linear matrix inequality holds, the system state estimation model is exponentially stable and the decay rate is +.>
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110175213.8A CN112995154B (en) | 2021-02-09 | 2021-02-09 | Synchronous control method for complex network under aperiodic DoS attack |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110175213.8A CN112995154B (en) | 2021-02-09 | 2021-02-09 | Synchronous control method for complex network under aperiodic DoS attack |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112995154A CN112995154A (en) | 2021-06-18 |
CN112995154B true CN112995154B (en) | 2023-05-02 |
Family
ID=76347879
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110175213.8A Active CN112995154B (en) | 2021-02-09 | 2021-02-09 | Synchronous control method for complex network under aperiodic DoS attack |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112995154B (en) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113625684B (en) * | 2021-07-26 | 2022-08-09 | 云境商务智能研究院南京有限公司 | Design method of tracking controller based on event trigger mechanism under hybrid network attack |
CN113885333B (en) * | 2021-11-01 | 2022-09-27 | 东南大学 | DoS attack resisting image encryption method based on complex network event trigger synchronization control |
CN114563953B (en) * | 2022-01-31 | 2023-05-09 | 四川大学 | Adaptive fault-tolerant reliable control system and method for wheeled robot considering multi-factor influence |
CN114866284B (en) * | 2022-04-01 | 2023-04-25 | 上海大学 | Unmanned ship cluster distributed safety control method |
CN115378565B (en) * | 2022-08-19 | 2024-01-19 | 曲阜师范大学 | Event trigger control method for double-layer coupling network quasi-synchronization |
CN115981268B (en) * | 2022-11-29 | 2023-09-22 | 重庆邮电大学 | Design method of self-adaptive event trigger controller of uncertain nonlinear system under denial of service attack |
CN116614299B (en) * | 2023-06-15 | 2024-04-05 | 哈尔滨理工大学 | Hybrid attack-based complex network dynamic event triggering traction control method |
CN116846773B (en) * | 2023-06-15 | 2024-04-05 | 哈尔滨理工大学 | Complex network synchronous control method with bit rate constraint |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112286051A (en) * | 2020-09-20 | 2021-01-29 | 国网江苏省电力有限公司信息通信分公司 | Neural network quantitative control method based on adaptive event trigger mechanism under complex network attack |
-
2021
- 2021-02-09 CN CN202110175213.8A patent/CN112995154B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112286051A (en) * | 2020-09-20 | 2021-01-29 | 国网江苏省电力有限公司信息通信分公司 | Neural network quantitative control method based on adaptive event trigger mechanism under complex network attack |
Also Published As
Publication number | Publication date |
---|---|
CN112995154A (en) | 2021-06-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112995154B (en) | Synchronous control method for complex network under aperiodic DoS attack | |
CN109683477B (en) | Design method and system of finite time controller of random multi-agent system | |
CN112327616B (en) | Network control system controller design method based on event triggering | |
CN113009825B (en) | Deception-attacked nonlinear networked system state estimation method | |
Sahoo et al. | Stochastic optimal regulation of nonlinear networked control systems by using event-driven adaptive dynamic programming | |
CN109243165B (en) | Method for processing event-triggered network T-S fuzzy system packet loss | |
Qi et al. | Event-triggered L∞ control for network-based switched linear systems with transmission delay | |
Tan et al. | Distributed hybrid-triggered H∞ filter design for sensor networked systems with output saturations | |
CN112286051A (en) | Neural network quantitative control method based on adaptive event trigger mechanism under complex network attack | |
CN109150639A (en) | The finite time-domain H ∞ control method of time-varying system under the influence of a kind of high rate communication network | |
Shen et al. | Event-based reachable set synthesis for delayed nonlinear semi-Markov systems | |
Lu et al. | Network-based fuzzy H∞ controller design for TS fuzzy systems via a new event-triggered communication scheme | |
Zhao et al. | Fuzzy-based adaptive event-triggered control for nonlinear cyber-physical systems against deception attacks via a single parameter learning method | |
CN110262334B (en) | Finite time domain H-infinity control method of state saturation system under random communication protocol | |
Cui et al. | Stability of inertial delayed neural networks with stochastic delayed impulses via matrix measure method | |
Xu et al. | Observer-based robust fuzzy control of nonlinear networked systems with actuator saturation | |
Zhao et al. | Output synchronization of reaction–diffusion neural networks under random packet losses via event-triggered sampled–data control | |
Maity et al. | Event based control of stochastic linear systems | |
Liang et al. | Aperiodic intermittent event-triggered synchronization control for discrete-time complex dynamical networks | |
Li et al. | Guaranteed cost control of networked control systems with time-delays and packet losses | |
Shi et al. | Flocking control for Cucker–Smale model under denial‐of‐service attacks | |
Dong et al. | Almost surely synchronization of directed coupled neural networks via stochastic distributed delayed impulsive control | |
Zhang et al. | Stabilization control for discrete time systems with random delay | |
Wu et al. | Fuzzy adaptive event-triggered synchronization of complex dynamical networks via switched pinning control | |
CN117040828A (en) | Observer-based periodic event triggering synchronous control method for complex network with attack |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |