CN113489673B - Networked motion control system attack estimation method based on projection intermediate observer - Google Patents
Networked motion control system attack estimation method based on projection intermediate observer Download PDFInfo
- Publication number
- CN113489673B CN113489673B CN202110570275.9A CN202110570275A CN113489673B CN 113489673 B CN113489673 B CN 113489673B CN 202110570275 A CN202110570275 A CN 202110570275A CN 113489673 B CN113489673 B CN 113489673B
- Authority
- CN
- China
- Prior art keywords
- attack
- sensor
- equation
- motion control
- control system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Feedback Control In General (AREA)
Abstract
A networked motion control system attack estimation method based on a projection intermediate observer comprises the steps of firstly modeling a motion control system, considering sensor attack and actuator attack in the system, determining a state space equation of the motion control system and discretizing the state space equation; constructing an output equation containing sensor attack and actuator attack; estimating system state, sensor attack and actuator attack based on a projection intermediate observer. The method comprises the following steps: 1) Establishing a state space equation of a networked motion control system and discretizing; 2) Constructing an output equation containing sensor attack and actuator attack; 3) A projection intermediate observer is constructed. The identification precision of the invention can meet the requirements of practical application, and the required related parameters can be measured by a low-cost sensor.
Description
Technical Field
The invention belongs to the technical field of network security, and particularly provides a networked motion control system attack estimation method based on a projection intermediate observer, which can stably and accurately reconstruct faults of an actuator and a sensor, so as to evaluate the security situation of a system and guarantee the safe operation of the system.
Background
The networked motion control system refers to a kind of network control system in which the information transmission processing process and the object dynamic evolution process are mutually influenced and tightly coupled. However, it is the high coupling of the information transfer process to the system dynamics that makes such systems vulnerable to information attacks. In order to ensure that networked motion control systems can operate safely and reliably, they must have the ability to automatically identify attacks. Therefore, whether the attack signal can be accurately identified plays an important role in a motion control system, the purpose of attack reconstruction is to acquire explicit information such as the shape and size of the attack signal, so far, in order to solve the problem of attack reconstruction, researchers regard the attack signal as a fault or interference and extend the traditional unknown input observers such as an ESO, an SMO and an intermediate estimator to estimate the attack signal on line. The main advantage is that attacks can be designed manually with high rates of change and randomness, which are difficult to identify accurately on the web, and therefore attack reconstruction is a common challenge for unknown input observers.
In recent years, security estimation techniques based on sparsity concepts have been developed rapidly, and many iterative algorithms on sensor attacks have been proposed to guarantee estimation performance. It should be noted that computational complexity is a major obstacle to the application of these iterative algorithms. Although there have been some achievements in improving the sensor attack reconstruction algorithm by modifying the nominal gradient descent method. Experiments show that the time cost caused by the actuator attack is more surprising than that caused by the sensor attack. Meanwhile, the calculation performance and the estimation capability are difficult to be simultaneously ensured. To date, the problem of multi-attack reconstruction has not been well studied.
Disclosure of Invention
Based on the problems, the invention provides a networked motion control system attack estimation method based on a projection intermediate observer, and particularly relates to a method for reconstructing output signals containing sparse sensor attacks, estimating the state and the attacks of a system at the same time, and ensuring that an estimation error is converged within a preset minimum energy range.
The invention provides the following technical scheme for solving the technical problems:
a networked motion control system attack estimation method based on a projection intermediate observer comprises the following steps:
step 1), establishing a state space equation of a networked motion control system and discretizing, wherein the process is as follows:
considering the situation that the sensor attack exists in the system, the state space equation is discretized, and the equation (1) is shown as follows:
wherein A is the state matrix of the system, B is the input matrix, C is the output matrix, x (t) represents the state quantity of the system, u (t) is the system input, y (t) is the system output, a s (t) denotes a sensor attack, a u (t) represents an actuator attack, w (t) and e (t) represent bounded process noise and measurement noise, respectively;
step 2), introducing an intermediate variable,
ξ(t)=a u (t)-ωB T x(t) (2)
omega is a scalar artificially selected, and tau sensor measurement values are selected to construct an output equation by the following process:
2.1 τ ∈ N measured values are collected, and an output equation of the ith sensor is constructed as shown in formula (2):
wherein U (t-1) = (U (t- τ + 1),.., U (t-1)),ζ(t-1)=(ξ(t-τ+1),ξ(t-τ+2),...,ξ(t-1)),W(t-1)=(ω(t-τ+1),ω(t-τ+2),...,ω(t)),G i (t)=(a si (t-τ+1),a si (t-τ+2),...,a si (t)),E i (t)=(e i (t-τ+1),e i (t-τ+2),...,e i (t)), wherein, a si And e i Is a s Ith elements of (t) and e (t), coefficient matrix
Y(t)=Qz(t)+MW(t-1)+E(t) (4)
wherein Q = [ O ] i1 F Π I],z(t)=(x(t-τ+1),ζ(t-1),G(t)),
Step 3) constructing a projection intermediate observer, wherein the process is as follows:
3.1 Define P (z (t)) as the closest point to z in the two-norm sense:
3.2 A Lyapunov energy function is constructed as shown in formula (6), and the energy of the estimated value is calculated
Wherein the content of the first and second substances,the norm of the norm is expressed by | | · | | | |, which is the estimated values of the system state quantity and the sensor attack z (t);
3.3 Constructing a projection intermediate observer, the estimated values of the i +1 th system state quantity and the sensor attack z (t) are
Wherein Q + The Moore-penrose pseudo inverse of Q,is a matrix in the sense of a two-normThe most recent point is:
a) When k is less than or equal to alpha, alpha and v 1 If the real number is artificially set, the iterative operation is performed by the formula (7) and the energy function at the moment is calculatedIf i > v is satisfied 1 Then calculate the average value of energy
c) i = i +1, if the k is still less than or equal to the alpha condition, repeating the steps a) and b) to carry out iterative operation, and if the iteration is finished, calculating:
obtaining the attack estimation value of the actuator at the t-tau +1 moment and the attack estimation value of the sensor at the t moment
The invention discloses a networked motion control system attack estimation method based on a projection intermediate observer.
The invention has the beneficial effects that: based on the design of the projection intermediate observer, the attack estimation effect is higher in precision, and the estimation performance can be improved by adjusting specific parameters; the identification precision of the method can meet the requirements of practical application, and the required related parameters can be measured by a low-cost sensor.
Drawings
FIG. 1 shows sensor failure a s The estimated effect of (2);
FIG. 2 shows an actuator failure a u The estimated effect of (2);
FIG. 3 is a system state x 1 And x 2 The effect of the estimation of (2).
Detailed Description
In order to make the purpose, technical solution and advantages of the present invention more clear, the technical solution of the present invention is further described below with reference to the accompanying drawings and practical experience.
Referring to fig. 1-3, a networked motion control system attack estimation method based on a projection intermediate observer firstly models a motion control system, considers sensor attack and actuator attack in the system, determines a state space equation of the system and discretizes the equation; constructing an output equation containing sensor attack and actuator attack; estimating system state, sensor attack and actuator attack based on a projection intermediate observer.
A networked motion control system attack estimation method based on a projection intermediate observer comprises the following steps:
1) Establishing a state space equation of a networked motion control system and discretizing;
2) Constructing an output equation containing sensor attack and actuator attack;
3) A projection intermediate observer is constructed.
Further, in the step 1), a state space equation of the networked motion control system is established and discretized, as shown in formula (1):
wherein the state matrixInput matrixOutput matrixx(t)=(x p (t),x v (t)) represents a system state quantity, x p (t)、x v (t) respectively representing the position and speed of the servo motor system, u (t) being system input, y (t) being system output, sensor attackw (t) and e (t) respectively representThe process noise and the measurement noise of the boundary are random signals, and the boundary is 0.5 ℃;
in the step 2), introducing an intermediate variable,
ξ(t)=a u (t)-ωB T x(t) (2)
ω is set to 1, and 2 sensor measurements are selected to construct the output equation as follows:
2.1 τ =2 measurements are acquired, and the output equation of the ith sensor is constructed as shown in equation (2):
wherein U (t-1) = U (t-1),ζ(t-1)=ξ(t-1),W(t-1)=(w(t-1),w(t)),G i (t)=(a si (t-1),a si (t)),E i (t)=(e i (t-1),e i (t)) wherein a si And e i Is a s Ith elements of (t) and e (t), coefficient matrix
2.2 Since U (t) is known, equation (2) is simplified as shown in equation (3):
Y(t)=Qz(t)+MW(t-1)+E(t) (4)
wherein Q = [ O ] i1 F Π I]Z (t) = (x (t-1), ζ (t-1), G (t)), p is the Y (t) dimension,
in the step 3), the process of constructing the projection intermediate observer is as follows:
3.1 A Lyapunov energy function is constructed as shown in formula (5), and the energy of the estimated value is calculated
Wherein the content of the first and second substances,the system state quantity and the estimated value of the sensor attack z are represented by | · | | |, which represents a quadratic norm of the system state quantity and the sensor attack z;
3.2 Construct a projection operator as shown in equation (6):
wherein Q is + The Moore-dependent pseudo inverse of Q,
a) When k is less than or equal to alpha, alpha =5,v 1 If =3, the iterative operation is performed by the equation (6) andif i > v is satisfied 1 Then calculate the average value of energyEntering b);
c) i = i +1, if the condition k is still less than or equal to alpha, repeating the steps a) and b) to carry out iterative operation, and if the iteration is finished, calculating Obtaining the attack estimation value of the actuator at the t-1 moment and the attack estimation value of the sensor at the t moment
The experimental result shows that the method can converge the estimation error into a preset minimum energy boundary, and can meet the requirements of precision and real-time performance of practical application. The relevant parameters required by the invention can be adjusted according to actual conditions and measured by low-cost sensors.
The embodiments of the present invention have been described and illustrated in detail above with reference to the accompanying drawings, but are not limited thereto. Many variations and modifications are possible which remain within the knowledge of a person skilled in the art, given the concept underlying the invention.
Claims (1)
1. A networked motion control system attack estimation method based on a projection intermediate observer is characterized by comprising the following steps:
step 1), establishing a state space equation of a networked motion control system and discretizing, wherein the process is as follows:
considering the case of a sensor attack in the system, the state space equation is discretized, as shown in equation (1):
wherein A is the state matrix of the system, B is the input matrix, C is the output matrix, x (t) represents the state quantity of the system, u (t) is the system input, y (t) is the system output, a s (t) denotes a sensor attack, a u (t) represents an actuator attack, w (t) and e (t) represent bounded process noise and measurement noise, respectively;
step 2), introducing an intermediate variable,
ξ(t)=a u (t)-ωB T x(t) (2)
omega is a scalar artificially selected, and tau sensor measurement values are selected to construct an output equation by the following process:
2.1 τ ∈ N measured values are collected, and an output equation of the ith sensor is constructed as shown in formula (2):
wherein U (t-1) = (U (t- τ + 1),.., U (t-1)),ζ(t-1)=(ξ(t-τ+1),ξ(t-τ+2),...,ξ(t-1)),W(t-1)=(ω(t-τ+1),ω(t-τ+2),...,ω(t)),G i (t)=(a si (t-τ+1),a si (t-τ+2),...,a si (t)),E i (t)=(e i (t-τ+1),e i (t-τ+2),...,e i (t)), wherein a si And e i Is a s Ith elements of (t) and e (t), coefficient matrix
Y(t)=Qz(t)+MW(t-1)+E(t) (4)
wherein Q = [ O ] i1 F Π I],z(t)=(x(t-τ+1),ζ(t-1),G(t)),
Step 3) constructing a projection intermediate observer, wherein the process is as follows:
3.1 Define P (z (t)) as the closest point to z in the two-norm sense:
3.2 Constructing a Lyapunov energy function as shown in formula (6), and calculating an estimated value energy
Wherein the content of the first and second substances,the norm of the norm is expressed by | | · | | | |, which is the estimated values of the system state quantity and the sensor attack z (t);
3.3 Constructing a projection intermediate observer, the estimated values of the i +1 th system state quantity and the sensor attack z (t) are
Wherein Q is + The Moore-penrose pseudo inverse of Q,is a matrix in the sense of a two-normThe most recent point is:
a) When k is less than or equal to alpha, alpha and v 1 If the real number is artificially set, the iterative operation is performed by the formula (7) and the energy function at the moment is calculatedIf i > v is satisfied 1 Then calculate the average value of energyEntering b);
c) i = i +1, if the k is still less than or equal to the alpha condition, repeating the steps a) and b) to carry out iterative operation, and if the iteration is finished, calculating:
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110570275.9A CN113489673B (en) | 2021-05-25 | 2021-05-25 | Networked motion control system attack estimation method based on projection intermediate observer |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110570275.9A CN113489673B (en) | 2021-05-25 | 2021-05-25 | Networked motion control system attack estimation method based on projection intermediate observer |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113489673A CN113489673A (en) | 2021-10-08 |
CN113489673B true CN113489673B (en) | 2022-12-20 |
Family
ID=77933663
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110570275.9A Active CN113489673B (en) | 2021-05-25 | 2021-05-25 | Networked motion control system attack estimation method based on projection intermediate observer |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113489673B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110531616A (en) * | 2019-07-29 | 2019-12-03 | 浙江工业大学 | A kind of network motion control systems under coloured noise attack discrimination method |
CN110647033A (en) * | 2019-09-02 | 2020-01-03 | 浙江工业大学 | Networked motion control system attack identification method based on class-Longberger observer |
CN110708284A (en) * | 2019-08-30 | 2020-01-17 | 浙江工业大学 | Networked motion control system attack estimation method based on gradient descent algorithm |
CN110794811A (en) * | 2019-11-07 | 2020-02-14 | 浙江工业大学 | Safety control method of networked motion control system with quantification |
CN111158343A (en) * | 2020-01-10 | 2020-05-15 | 淮阴工学院 | Asynchronous fault-tolerant control method for switching system with actuator and sensor faults |
-
2021
- 2021-05-25 CN CN202110570275.9A patent/CN113489673B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110531616A (en) * | 2019-07-29 | 2019-12-03 | 浙江工业大学 | A kind of network motion control systems under coloured noise attack discrimination method |
CN110708284A (en) * | 2019-08-30 | 2020-01-17 | 浙江工业大学 | Networked motion control system attack estimation method based on gradient descent algorithm |
CN110647033A (en) * | 2019-09-02 | 2020-01-03 | 浙江工业大学 | Networked motion control system attack identification method based on class-Longberger observer |
CN110794811A (en) * | 2019-11-07 | 2020-02-14 | 浙江工业大学 | Safety control method of networked motion control system with quantification |
CN111158343A (en) * | 2020-01-10 | 2020-05-15 | 淮阴工学院 | Asynchronous fault-tolerant control method for switching system with actuator and sensor faults |
Non-Patent Citations (1)
Title |
---|
Event-Triggered State Observers for Sparse Sensor Noise/Attacks;Yasser Shoukry;《IEEE Transactions on Automatic Control》;20160831;第61卷(第8期);2079-2091 * |
Also Published As
Publication number | Publication date |
---|---|
CN113489673A (en) | 2021-10-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101958674B1 (en) | Actually-measured marine environment data assimilation method based on sequence recursive filtering three-dimensional variation | |
CN107590317B (en) | Generator dynamic estimation method considering model parameter uncertainty | |
Deisenroth et al. | Robust filtering and smoothing with Gaussian processes | |
CN107704962B (en) | Steam flow interval prediction method based on incomplete training data set | |
Zhao et al. | Model-based fault diagnosis methods for systems with stochastic process–a survey | |
WO2020052213A1 (en) | Iterative cubature unscented kalman filtering method | |
CN109670145A (en) | Helicopter Main Reducer vibration performance threshold setting method based on observer | |
CN113489673B (en) | Networked motion control system attack estimation method based on projection intermediate observer | |
CN111798494A (en) | Maneuvering target robust tracking method under generalized correlation entropy criterion | |
CN115688288A (en) | Aircraft pneumatic parameter identification method and device, computer equipment and storage medium | |
CN115719294A (en) | Indoor pedestrian flow evacuation control method and system, electronic device and medium | |
CN108829983B (en) | Equipment residual life prediction method based on multi-hidden-state fractional Brownian motion | |
CN108448594B (en) | Frequency self-adaptive learning control method for micro-grid | |
CN110708284A (en) | Networked motion control system attack estimation method based on gradient descent algorithm | |
CN113325717A (en) | Optimal fault-tolerant control method, system, processing equipment and storage medium based on interconnected large-scale system | |
CN109256773B (en) | Power system state estimation method of noise reduction self-coding and depth support vector machine | |
CN115865702B (en) | Distributed fusion estimation method with data attenuation under network scheduling strategy | |
CN111482966A (en) | Force and position control method of robot force sense remote control system | |
CN114372036B (en) | State estimation method, device, equipment and computer storage medium for power system | |
CN111062139A (en) | Method for estimating water flow situation of urban underground drainage pipe network | |
CN113110321B (en) | Distributed estimation method of networked industrial control system based on event trigger | |
CN111416595B (en) | Big data filtering method based on multi-core fusion | |
CN115453534A (en) | Sequential InSAR time sequence deformation resolving method considering unwrapping error | |
CN115183969A (en) | Method and system for estimating BWBN model parameters | |
CN115455353A (en) | Online parameter identification method based on nonlinear time domain filtering |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |