CN110647033A - Networked motion control system attack identification method based on class-Longberger observer - Google Patents
Networked motion control system attack identification method based on class-Longberger observer Download PDFInfo
- Publication number
- CN110647033A CN110647033A CN201910821302.8A CN201910821302A CN110647033A CN 110647033 A CN110647033 A CN 110647033A CN 201910821302 A CN201910821302 A CN 201910821302A CN 110647033 A CN110647033 A CN 110647033A
- Authority
- CN
- China
- Prior art keywords
- attack
- formula
- sensor
- equation
- constructing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B13/00—Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion
- G05B13/02—Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion electric
- G05B13/0205—Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion electric not using a model or a simulator of the controlled system
- G05B13/024—Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion electric not using a model or a simulator of the controlled system in which a parameter or coefficient is automatically adjusted to optimise the performance
Landscapes
- Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Evolutionary Computation (AREA)
- Medical Informatics (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Automation & Control Theory (AREA)
- Feedback Control In General (AREA)
Abstract
A networked motion control system attack identification method based on a quasi-Luenberger observer comprises the steps of firstly modeling a networked motion control system, considering the condition of sensor attack in the system, determining a state space equation of the system and discretizing the state space equation; selecting tau sensor measurement values, and constructing an output equation; and finally, constructing a quasi-Luenberger observer to estimate the system state and the sensor attack. The invention adopts the event-driven technology, can save the computing resource and improve the computing performance of the system. By constructing the Lyapunov energy function, the error is converged into a minimum energy boundary, and the attack identification effect precision is higher.
Description
Technical Field
The invention belongs to the technical field of network security, and particularly provides a networked motion control system attack identification method based on a quasi-Luenberger observer, which can identify the attack, evaluate the security situation of a system and guarantee the safe operation of the system.
Background
With the high-speed development of network information technology, the use of networks to replace the traditional motion control architecture becomes a necessary trend, and the networked motion control system becomes a hotspot in the current motion control field. The information space and the physical space of the networked motion control system are highly fused and mutually influenced, and because the modern networked motion control system has lower security level, the network attack starting from the information space can directly damage the normal operation of the physical system. Therefore, whether the attack signal can be accurately identified plays an important role in the motion control system.
The real-time online identification of the attack depends on the design of an observer, and the existing attack identification methods mainly include an attack identification method based on unknown input observers such as a robust observer, a sliding mode observer, an intermediate observer and the like. The sliding mode observer needs prior knowledge such as known upper bound of an attack signal and the like, and needs a system to meet the matching condition of the observer, however, any information of an attacker cannot be obtained in actual engineering. Although the robust observer has no observer matching condition, an accurate estimation error upper bound cannot be obtained, and the estimation accuracy cannot be ensured in the actual application process. The intermediate observer gives a theoretical upper bound, but the upper bound is large and only has theoretical significance, and the estimation error of the attack signal cannot be limited within a preset range, so that the intermediate observer is difficult to apply to practice.
Disclosure of Invention
Based on the problems, the invention provides a network motion control system attack identification method based on a similar Luenberger observer, and particularly, the method is used for reconstructing an output signal containing sparsity sensor attack, estimating the state and the attack of a system at the same time, and ensuring that the estimation error of the system is converged into a very small energy range.
The invention provides the following technical scheme for solving the technical problems:
a networked motion control system attack identification method based on a quasi-Luenberger observer comprises the following steps:
step 1), establishing a state space equation of a networked motion control system and discretizing:
considering the situation that sensor attack and noise exist in the system, the state space equation is discretized, and the equation (1) is shown as the following formula:
wherein, A is a state matrix of the system, B is an input matrix, C is an output matrix, x represents a state quantity of the system, u is a system input, y is a system output, and a represents a sensor attack;
step 2), selecting tau sensor measurement values to construct an output equation, wherein the process is as follows:
2.1) acquiring tau epsilon N measurement values, and constructing an output equation of the ith sensor as shown in the formula (2):
wherein the content of the first and second substances,
2.2) since U (t) is known, the formula (2) is simplified to the formula (3):
Yi(t)=Oix(t-τ+1)+Ei(t) ⑶
step 3), constructing a quasi-Luenberger observer, and carrying out the following process:
3.1) augmenting the system, using y (t) as new input quantity, and enablingObtaining an augmented state space equation as shown in formula (5):
wherein the content of the first and second substances, bifor natural basis vectors, the superscript "T" represents the transpose of the matrix,as an estimate of the system state quantity and sensor attack z,pre-estimated values of system state quantity and sensor attack z;
3.2) constructing a Lyapunov energy function, as shown in the formula (6):
wherein the content of the first and second substances,is an estimated value of the system state quantity and the sensor attack z, | ·| non-calculation2A two-norm representing a;
3.3) constructing a projection operator as shown in formula (7):
Π(z)=Π(x,E)=(x,Π'(E)) ⑺
wherein pi' (E) represents E ═ E (E)1,E2,…,Ep)TIn (1), obtain EiThe sum of squares of the middle elements, s (s < p) E elements with smaller sum of squaresiZero setting is carried out, and the sparsity of sensor attack estimation is ensured;
3.4) constructing a Lorberg-like observer as shown in formula (8):
wherein, L ═ QTSigma, sigma is a positive definite matrix;
a) If it isAnd isv∈[0,1]The artificial set value is obtained by performing iterative operation according to the formula (8) until the artificial set value is obtainedTo that endEntering b); otherwise, directly entering b);
b) if it isResetReturning to a); otherwise, obtaining the system state at the t-T moment and the estimation value of the sensor attack at the t moment
According to the network motion control system attack identification method based on the class-Luenberger observer, an event-driven class-Luenberger observer is constructed by reconstructing output signals containing sensor attacks, and system states and the sensor attacks are estimated.
The invention has the beneficial effects that: by adopting the event-driven technology, the computing resources can be saved, and the computing performance of the system is improved; through the design of a Lorberg observer, a Lyapunov energy function is constructed, so that the error is converged into a minimum energy boundary, and the attack identification effect precision is higher; the identification precision of the method can meet the requirements of practical application, and the required related parameters can be measured by a low-cost sensor.
Drawings
FIG. 1 is a system state x1The estimated effect of (2);
FIG. 2 is a system state x2The estimated effect of (2);
FIG. 3 is an attack a on the first sensor1The estimated effect of (2);
FIG. 4 shows an attack a on a second sensor2The estimated effect of (2);
FIG. 5 shows an attack a on a third sensor3The effect of the estimation of (2).
Detailed Description
In order to make the purpose, technical solution and advantages of the present invention more clear, the technical solution of the present invention is further described below with reference to the accompanying drawings and practical experience.
Referring to fig. 1-5, a networked motion control system attack identification method based on a quasi-lunberg observer firstly models a motion control system, considers the sensor attack in the system, determines a state space equation of the system and discretizes the equation; constructing an output equation containing sensor attack; a quasi-Luenberger observer is constructed to estimate the sensor attack and the system state.
A networked motion control system attack identification method based on a quasi-Luenberger observer comprises the following steps:
1) establishing a state space equation of a networked motion control system and discretizing;
2) constructing an output equation containing sensor attack;
3) and constructing a quasi-Luenberger observer.
Further, in the step 1), a state space equation of the networked motion control system is established and discretized, as shown in formula (1):
wherein the state matrixInput matrixOutput matrixx represents the system state quantity, u is the system input, y is the system output, and the sensor attacks
Step 2), selecting tau-2 sensor measurement values to construct an output equation, wherein the process is as follows:
2.1) acquiring tau which is 2 measured values, and constructing an output equation of the ith sensor as shown in formula (2):
2.2) since U (t) is known, the formula (2) is simplified to the formula (3):
Yi(t)=Oix(t-1)+Ei(t) ⑶
wherein the content of the first and second substances,
The output equation is simplified as shown in equation (4):
step 3), constructing a quasi-Luenberger observer, and carrying out the following process:
3.1) augmenting the system, using y (t) as new input quantity, and enablingObtaining an augmented state space equation as shown in formula (5):
wherein the content of the first and second substances,
as an estimate of the system state quantity and sensor attack z,pre-estimated values of system state quantity and sensor attack z;
3.2) constructing a Lyapunov energy function, as shown in the formula (6):
wherein the content of the first and second substances,is an estimated value of the system state quantity and the sensor attack z, | ·| non-calculation2A two-norm representing a;
3.3) constructing a projection operator as shown in formula (7):
Π(z)=Π(x,E)=(x,Π'(E)) ⑺
wherein pi' (E) represents E ═ E (E)1,E2,…,Ep)TIn (1), obtain EiThe sum of squares of the elements in the formula (I), and s, which is the smaller of the sum of squares, is 1EiZero setting is carried out, and the sparsity of sensor attack estimation is ensured;
3.4) constructing a Lorberg-like observer as shown in formula (8):
a) If v is 0.8And isThen the iterative operation is performed by equation (8) untilTo that endEntering b); otherwise, directly entering b);
b) if it isThe reset m is set to 0 and,returning to a); otherwise, obtaining the system state at the t-T moment and the estimation value of the sensor attack at the t moment
The experimental results show that the attack can be accurately estimated in real time, and the system state before tau moments is estimated. The operation result can meet the requirements of precision and real-time performance of practical application, and required relevant parameters can be measured by using a low-cost sensor.
The embodiments of the present invention have been described and illustrated in detail above with reference to the accompanying drawings, but are not limited thereto. Many variations and modifications are possible which remain within the knowledge of a person skilled in the art, given the concept underlying the invention.
Claims (1)
1. A networked motion control system attack identification method based on a Loenberger-like observer is characterized by comprising the following steps:
step 1), establishing a state space equation of a networked motion control system and discretizing:
considering the situation that sensor attack and noise exist in the system, the state space equation is discretized, and the equation (1) is shown as the following formula:
wherein, A is a state matrix of the system, B is an input matrix, C is an output matrix, x represents a state quantity of the system, u is a system input, y is a system output, and a represents a sensor attack;
step 2), selecting tau sensor measurement values to construct an output equation, wherein the process is as follows:
2.1) acquiring tau epsilon N measurement values, and constructing an output equation of the ith sensor as shown in the formula (2):
wherein the content of the first and second substances,
2.2) since U (t) is known, the formula (2) is simplified to the formula (3):
Yi(t)=Oix(t-τ+1)+Ei(t) ⑶
step 3), constructing a quasi-Luenberger observer, and carrying out the following process:
3.1) augmenting the system, using y (t) as new input quantity, and enablingObtaining an augmented state space equation as shown in formula (5):
wherein the content of the first and second substances, bifor natural basis vectors, the superscript "T" represents the transpose of the matrix,as an estimate of the system state quantity and sensor attack z,pre-estimated values of system state quantity and sensor attack z;
3.2) constructing a Lyapunov energy function, as shown in the formula (6):
wherein the content of the first and second substances,is an estimated value of the system state quantity and the sensor attack z, | ·| non-calculation2A two-norm representing a;
3.3) constructing a projection operator as shown in formula (7):
Π(z)=Π(x,E)=(x,Π'(E)) ⑺
wherein pi' (E) represents E ═ E (E)1,E2,…,Ep)TIn (1), obtain EiThe sum of squares of the middle elements, s (s < p) E elements with smaller sum of squaresiZero setting is carried out, and the sparsity of sensor attack estimation is ensured;
3.4) constructing a Lorberg-like observer as shown in formula (8):
wherein, L ═ QTSigma, sigma is a positive definite matrix;
a) If it isAnd isv∈[0,1]The artificial set value is obtained by performing iterative operation according to the formula (8) until the artificial set value is obtainedTo that endEntering b); otherwise, directly entering b);
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910821302.8A CN110647033A (en) | 2019-09-02 | 2019-09-02 | Networked motion control system attack identification method based on class-Longberger observer |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910821302.8A CN110647033A (en) | 2019-09-02 | 2019-09-02 | Networked motion control system attack identification method based on class-Longberger observer |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110647033A true CN110647033A (en) | 2020-01-03 |
Family
ID=68991425
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910821302.8A Pending CN110647033A (en) | 2019-09-02 | 2019-09-02 | Networked motion control system attack identification method based on class-Longberger observer |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110647033A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111258223A (en) * | 2020-03-12 | 2020-06-09 | 电子科技大学 | Sliding mode-based switching networked control system safety control method |
CN112596387A (en) * | 2020-12-14 | 2021-04-02 | 电子科技大学 | Networked system security control method based on extended observer |
CN113489673A (en) * | 2021-05-25 | 2021-10-08 | 浙江工业大学 | Networked motion control system attack estimation method based on projection intermediate observer |
CN113595974A (en) * | 2021-06-11 | 2021-11-02 | 山东师范大学 | Security control method and system for attacked discrete random distribution control system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150096026A1 (en) * | 2013-03-15 | 2015-04-02 | Cyberricade, Inc. | Cyber security |
CN105798930A (en) * | 2016-04-01 | 2016-07-27 | 浙江工业大学 | Flexible mechanical arm system saturation compensation control method based on Luenberger state observer |
CN106599997A (en) * | 2016-12-20 | 2017-04-26 | 中兴软创科技股份有限公司 | Zero dynamic-based industrial control attack detection and identification method and system |
CN109108964A (en) * | 2018-07-25 | 2019-01-01 | 西北工业大学 | A kind of space manipulator control method for coordinating based on adaptive Dynamic Programming Nash game |
CN109782595A (en) * | 2019-01-14 | 2019-05-21 | 山东大学 | The neural network forecast control method and system of ball-beam system based on event trigger mechanism |
-
2019
- 2019-09-02 CN CN201910821302.8A patent/CN110647033A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150096026A1 (en) * | 2013-03-15 | 2015-04-02 | Cyberricade, Inc. | Cyber security |
CN105798930A (en) * | 2016-04-01 | 2016-07-27 | 浙江工业大学 | Flexible mechanical arm system saturation compensation control method based on Luenberger state observer |
CN106599997A (en) * | 2016-12-20 | 2017-04-26 | 中兴软创科技股份有限公司 | Zero dynamic-based industrial control attack detection and identification method and system |
CN109108964A (en) * | 2018-07-25 | 2019-01-01 | 西北工业大学 | A kind of space manipulator control method for coordinating based on adaptive Dynamic Programming Nash game |
CN109782595A (en) * | 2019-01-14 | 2019-05-21 | 山东大学 | The neural network forecast control method and system of ball-beam system based on event trigger mechanism |
Non-Patent Citations (1)
Title |
---|
YASSER SHOUKRY等: "Event-Triggered State Observers for Sparse Sensor Noise/Attacks", 《IEEE TRANSACTIONS ON AUTOMATIC CONTROL》 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111258223A (en) * | 2020-03-12 | 2020-06-09 | 电子科技大学 | Sliding mode-based switching networked control system safety control method |
CN112596387A (en) * | 2020-12-14 | 2021-04-02 | 电子科技大学 | Networked system security control method based on extended observer |
CN113489673A (en) * | 2021-05-25 | 2021-10-08 | 浙江工业大学 | Networked motion control system attack estimation method based on projection intermediate observer |
CN113489673B (en) * | 2021-05-25 | 2022-12-20 | 浙江工业大学 | Networked motion control system attack estimation method based on projection intermediate observer |
CN113595974A (en) * | 2021-06-11 | 2021-11-02 | 山东师范大学 | Security control method and system for attacked discrete random distribution control system |
CN113595974B (en) * | 2021-06-11 | 2023-06-16 | 山东师范大学 | Security control method and system of attacked discrete random distribution control system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110647033A (en) | Networked motion control system attack identification method based on class-Longberger observer | |
KR102170105B1 (en) | Method and apparatus for generating neural network structure, electronic device, storage medium | |
CN111291897A (en) | Semi-supervision-based horizontal federal learning optimization method, equipment and storage medium | |
CN108924836B (en) | A kind of edge side physical layer channel authentication method based on deep neural network | |
US11614978B2 (en) | Deep reinforcement learning for workflow optimization using provenance-based simulation | |
Wu et al. | Weighted H∞ filtering of switched systems with time-varying delay: average dwell time approach | |
CN110708284A (en) | Networked motion control system attack estimation method based on gradient descent algorithm | |
WO2019173943A1 (en) | Method for automatically tracking structural modal parameters | |
CN116047984B (en) | Consistency tracking control method, device, equipment and medium of multi-agent system | |
CN109033021B (en) | Design method of linear equation solver based on variable parameter convergence neural network | |
CN110083518A (en) | A kind of software virtual machine ageing predetermination method based on AdaBoost-Elman | |
CN115019128A (en) | Image generation model training method, image generation method and related device | |
CN109165296B (en) | Industrial Internet of things resource knowledge map construction method, readable storage medium and terminal | |
CN109345041A (en) | A kind of equipment failure rate prediction technique using Weibull distribution in conjunction with ARMA | |
CN111293706A (en) | Method and device for identifying low-frequency oscillation parameters of power system | |
Grassi et al. | The statistical relation of sea-level and temperature revisited | |
CN115618361A (en) | Application program vulnerability analysis method and system based on big attack data | |
CN110034559B (en) | Power system fusion state estimation method based on switching system model | |
Garmaev et al. | Deep Koopman Operator-based degradation modelling | |
CN107305348B (en) | Dynamic system delay calculation method based on dependency measurement | |
Nguyen et al. | Dynamic state estimation and prediction for real-time control and operation | |
Huang et al. | Centralized fusion of unscented kalman filter based on huber robust method for nonlinear moving target tracking | |
CN111582474B (en) | Neural network structure detection method, training method and training device of structure detection model | |
Jiao et al. | Topology inference for multi-agent cooperation under unmeasurable latent input | |
WO2018198298A1 (en) | Parameter estimation device, parameter estimation method, and computer-readable recording medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200103 |
|
RJ01 | Rejection of invention patent application after publication |