CN113625647A - Nonlinear system event driver and DOFSS controller joint design method - Google Patents
Nonlinear system event driver and DOFSS controller joint design method Download PDFInfo
- Publication number
- CN113625647A CN113625647A CN202110962406.8A CN202110962406A CN113625647A CN 113625647 A CN113625647 A CN 113625647A CN 202110962406 A CN202110962406 A CN 202110962406A CN 113625647 A CN113625647 A CN 113625647A
- Authority
- CN
- China
- Prior art keywords
- controller
- matrix
- dofss
- event driver
- nonlinear
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000013461 design Methods 0.000 title claims abstract description 37
- 238000000034 method Methods 0.000 title claims abstract description 26
- 239000011159 matrix material Substances 0.000 claims abstract description 101
- 238000005259 measurement Methods 0.000 claims abstract description 24
- 238000005070 sampling Methods 0.000 claims description 34
- 238000004891 communication Methods 0.000 claims description 15
- 230000000694 effects Effects 0.000 claims description 7
- 238000009825 accumulation Methods 0.000 claims description 3
- 238000005516 engineering process Methods 0.000 claims description 3
- 230000007958 sleep Effects 0.000 claims description 3
- 238000006467 substitution reaction Methods 0.000 claims description 3
- 230000017105 transposition Effects 0.000 claims description 2
- 230000005540 biological transmission Effects 0.000 description 4
- 230000000737 periodic effect Effects 0.000 description 4
- 238000011217 control strategy Methods 0.000 description 3
- 238000013016 damping Methods 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 239000000047 product Substances 0.000 description 2
- 229920006395 saturated elastomer Polymers 0.000 description 2
- 208000011580 syndromic disease Diseases 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 230000000903 blocking effect Effects 0.000 description 1
- 230000000295 complement effect Effects 0.000 description 1
- 230000001934 delay Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000006073 displacement reaction Methods 0.000 description 1
- 230000014509 gene expression Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000004088 simulation Methods 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
- 238000001308 synthesis method Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B19/00—Programme-control systems
- G05B19/02—Programme-control systems electric
- G05B19/04—Programme control other than numerical control, i.e. in sequence controllers or logic controllers
- G05B19/042—Programme control other than numerical control, i.e. in sequence controllers or logic controllers using digital processors
- G05B19/0423—Input/output
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B2219/00—Program-control systems
- G05B2219/20—Pc systems
- G05B2219/25—Pc structure of the system
- G05B2219/25257—Microcontroller
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02P—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
- Y02P90/00—Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
- Y02P90/02—Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Automation & Control Theory (AREA)
- Feedback Control In General (AREA)
Abstract
The invention discloses a nonlinear system event driver and DOFSS controller joint design method, which comprises the following steps: a, establishing a nonlinear object model, an actuator saturation model and an event driver based on nonlinear object measurement output; b, establishing a random deception attack model, a DOFSS controller model and a closed-loop system model organically integrating random deception attack, an event driver, actuator saturation and network induced delay parameters; and C, designing joint design conditions of the nonlinear system event driver and the DOFSS controller under the influence of random deception attack, actuator saturation and network induced delay, solving parameters of the event driver and a gain matrix of the equivalent DOFSS controller, and finally obtaining the event driver and the DOFSS controller. The invention can solve the problem that the existing nonlinear system cannot be stable under the influence of random deception attack, actuator saturation and network induced delay.
Description
Technical Field
The invention relates to the field of networked control systems, in particular to a combined design method of a nonlinear system event driver and a dynamic output feedback fuzzy saturated security (DOFSS) controller under random spoofing attack.
Background
The networked control system introduces a shared communication network into a control closed loop, has the advantages of high flexibility, low cost, convenience in installation and maintenance and the like, and is widely applied to the fields of smart power grids, smart traffic and the like. Networked control systems typically employ well-developed periodic sampling control strategies, and the sampling rate is typically set higher in order to guarantee system performance in the worst case. However, in practice, the worst case situation is rare, and the large amount of redundant data generated by the high sampling rate causes the waste of system-limited resources such as network bandwidth, and the like, and greatly influences the system performance.
Unlike the periodic control strategy which neglects the system dynamic to perform on-time control, the event-driven control strategy performs on-demand control only when the system dynamic meets the event-driven conditions, thereby saving the system limited resources such as network bandwidth and the like. However, existing event drivers typically employ a continuous-time event-driven mechanism that requires the addition of dedicated monitoring hardware and complex pre-computation to avoid the sesno phenomenon (i.e., driving samples an infinite number of times in a finite time).
Although the shared communication network brings great convenience to the networked control system, network-induced delay which degrades system performance is also introduced, and the system faces network attack threats. Network attacks are roughly divided into denial of service attacks and spoofing attacks, and the denial of service attacks prevent data packets from being delivered by blocking a communication network; the deception attack generates false data packets through data tampering, has strong concealment and great harm, and is an attack type researched by the invention. However, existing efforts focus on how to design event-driven mechanisms to conserve more system resources, with less simultaneous consideration of spoofing attacks and network-induced latency effects. In addition, existing event-driven control system analysis and synthesis methods generally assume that there is no attack threat, and such methods generally cannot be directly applied to event-triggered control system analysis under the influence of a spoofing attack.
In reality, actuator saturation is a non-linear phenomenon commonly existing in a control system. And if the input quantity of the actuator exceeds the saturation threshold value, the actuator enters a saturation state. In the saturated state, further increasing the actuator input amount does not have any effect on the actuator output. However, existing efforts are less likely to consider both actuator saturation and spoofing attack effects. Furthermore, existing efforts typically assume that the system state is fully measurable and state feedback controllers are designed, however in practice the system state is typically not directly accessible.
In order to solve the problems and simultaneously consider the influences of random spoofing attack, actuator saturation, network induced delay and incapability of directly measuring the object state, the invention provides a nonlinear system event driver and DOFSS controller joint design method.
Disclosure of Invention
The invention aims to provide a nonlinear system event driver and DOFSS controller joint design method, which can solve the problem that the conventional nonlinear system cannot be stable under the influences of random deception attack, actuator saturation and network induced delay, can effectively save system limited resources such as network bandwidth and the like, and can remove the hypothesis limitation on the complete testability of the system state.
The invention adopts the following technical scheme:
a nonlinear system event driver and dofss controller joint design method, comprising the steps of:
a, establishing a nonlinear object model and an actuator saturation model, and designing an event driver based on nonlinear object measurement output;
b, establishing a random deception attack model and a DOFSS controller model, and establishing a closed-loop system model organically integrating random deception attack, an event driver, actuator saturation and network induced delay parameters;
designing the joint design conditions of the nonlinear system event driver and the DOFS controller under the influence of random deception attack, actuator saturation and network induced delay to solve the event driver parameters meeting the communication and control requirements of the nonlinear systemAnd gain matrix of equivalent DOFSS controllerAnd finally obtaining the event driver and the DOFSS controller which meet the communication and control requirements of the nonlinear system.
In the step A, the nonlinear object model is as follows:
wherein,is the derivative of x (t), x (t) represents the object state, x (t) is an n-dimensional real number,representing a control input affected by actuator saturation,is nuDimensional real number, y (t) representing measurement output, y (t) being nyDimensional real number, t represents time, Ai,BiAnd CiRepresenting a gain matrix; the number of the object fuzzy rules is r, and i represents the serial number of the object fuzzy rules; substitution typeAnd is And thetag(t) represents the 1 st and the 1 st, respectivelyThe individual and the g-th antecedent variables, g representing the number of antecedent variables,the sequence number of the front-piece variable is shown,representing a front-part variableMembership in fuzzy setsRepresents the accumulation and multiplication operations, respectively.
In the step a, the event driver based on the nonlinear object measurement output is:
wherein, delta epsilon (0,1) is a driver threshold parameter,is a positive definite matrix, h denotes the sampling period, tkh denotes the kth drive time, tkh is t of the sampling periodkMultiple, tk+1h denotes the (k + 1) th driving time, tk+1h is t of the sampling periodk+1The lower subscript k denotes the drive time number,which is indicative of the current sampling instant,is tkAfter h is firstOne sampling period, y (t)kh) Andrespectively represent tkh andand (3) outputting corresponding nonlinear object measurement, wherein min { } represents a minimum function, and a right upper corner mark T of the matrix represents the transposition of the matrix.
In the step A, the actuator saturation model is as follows:
wherein,denotes the number u (t)Dimensional components, u (t) representing object control inputs without regard to actuator saturation effects, u (t) being nuThe number of the dimensional real number is,the number of dimensions of u (t) is shown,andrespectively representing the maximum and minimum allowable output values of the actuator,to representThe corresponding actuator saturation function value, sat (), represents the actuator saturation function. In the step B, the random deception attack model is as follows:
wherein, the first and second guide rollers are arranged in a row,representing a spoofing attack function, wherein a (t) epsilon {0,1} represents a Bernoulli distribution random variable, and when a (t) is 1, the spoofing attack is activated and the controller input is tampered; when a (t) is 0, the spoofing attack sleeps, and the controller input is not tampered;g is an attack energy limiting matrix;y (t- η (t)) represents a nonlinear object measurement output corresponding to time t- η (t), where t- η (t) is tkh+nkh,e(t)=y(tkh)-y(tkh+nkh),y(tkh+nkh) Representing the sampling instant tkh+nkh corresponding to the non-linear object measurement output.
In step B, the dofss controller model is:
wherein,is xcDerivative of (t), xc(t) denotes controller status, xc(t) is an n-dimensional real number, xc(t- η (t)) represents the controller state for t- η (t),andis a gain matrix; the number of fuzzy rules of the controller is r, j represents the serial number of the fuzzy rules of the controller, and the alternative formulaAnd is Representing a front-part variableMembership in fuzzy setsMembership function of (c).
In the step B, the closed-loop system model organically integrating random deception attack, event drivers, actuator saturation and network induced delay parameters is as follows:
in the formula,is the derivative of x (t),representing the closed-loop system state, x (t-eta (t)) representing the closed-loop system state corresponding to t-eta (t),andrepresenting closed-loop system gain matrices, alternatively Andrespectively represents u1,Andcorresponding function value of actuator dead zone u1,Andrespectively represent the 1 st and the 1 st dimensions of u (t)And nuThe component of the dimension(s) is,representing the actuator dead band function.
The step C comprises the following specific steps:
c1: determining a nonlinear system asymptotic stability condition under the influence of random deception attack, an event driver, actuator saturation and network induced delay based on the Lyapunov stability theory;
c2 obtaining the combined design condition of the event driver and the DOFSS controller by utilizing the linear matrix inequality technology based on the nonlinear system asymptotic stable condition obtained in the step C1, namely obtaining the event driver parameters meeting the communication and control requirements of the nonlinear systemAnd gain matrix of equivalent DOFSS controllerAnd finally obtaining the event driver and the DOFSS controller which meet the communication and control requirements of the nonlinear system.
The nonlinear system asymptotic stability condition under the influence of random deception attack, event driver, actuator saturation and network induced delay is as follows:
given a sampling period h, the lower bound of network induced delayτAnd upper boundAn actuator saturation parameter ε, an attack energy definition matrix G, and an event driver threshold parameter δ ∈ (0,1), if there is a positive definite matrix R>0,S>0,Q1>0,Q2>0,Q3> 0, and matrix U2,U3Satisfy the following requirementsAnd
the closed loop system is asymptotically stable under the influence of random deception attack, event drivers, actuator saturation and network induced delay; in the above stability conditions, the following alternative formula is used:
wherein,the mathematical expectation for a (t) is shown,is a mathematical expectation function. He { } denotes the sum of the matrix and its transpose, denotes the symmetric terms in the symmetric matrix,the matrix represents a zero matrix, the upper right corner mark-1 of the matrix represents an inverse matrix, I is an identity matrix, col represents a column matrix, and diag represents a diagonal matrix.
The joint design conditions of the event driver and the DOFSS controller are as follows:
given a sampling period h, the lower bound of network induced delayτAnd upper boundThe saturation parameter epsilon of the actuator and the attack energy limit matrix G, and the real number epsilon1>0,∈2>0,∈3> 0, if real numbers are presentPositive definite matrix And a matrixSatisfy the requirement of And
the closed loop system is asymptotically stable while obtaining event driver parametersAnd gain matrix of equivalent DOFSS controllerAs follows
Under the above conditions, the following alternative formulae were used
The invention can solve the problem that the existing nonlinear system cannot be stable under the influence of random deception attack, actuator saturation and network induced delay, can effectively save system limited resources such as network bandwidth and the like, and can remove the hypothesis limitation of completely measurable system states.
Drawings
FIG. 1 is a schematic diagram of feedback control of event-driven output of a nonlinear system under spoofing attack in the present invention;
FIG. 2 is a schematic flow chart of the present invention.
Detailed Description
The invention is described in detail below with reference to the following figures and examples:
as shown in fig. 1, a feedback control system for event-driven output of a nonlinear system under random spoofing attack includes a sensor for periodically sampling measurement output of a nonlinear object, a sensor sampling data is sent to an event driver, and the event driver determines whether an event-driven condition is satisfied: if yes, sending the sampling data; otherwise, the sampled data is discarded. The DOFSS controller receives the zero-order keeper data and calculates a control signal, and the actuator adjusts the state of an object according to the control signal and considers the saturation influence of the actuator.
As shown in fig. 2, the method for designing a nonlinear system event driver and dofss controller in combination according to the present invention includes the following steps:
a, establishing a nonlinear object model and an actuator saturation model, and designing an event driver based on nonlinear object measurement output;
wherein, when describing the nonlinear object model as a T-S (Takagi-Sugeno) fuzzy system:
let the ith fuzzy rule of the nonlinear object be expressed as follows: if theta1(t) is Mi1,...,Is composed of..., θg(t) is MigThen, then
In the formula,is the derivative of x (t), x (t) represents the object state, x (t) is an n-dimensional real number,representing a control input affected by actuator saturation,is nuDimensional real number, y (t) representing measurement output, y (t) being nyDimensional real number, t represents time, Ai,BiAnd CiRepresenting a gain matrix; the number of the object fuzzy rules is r, and i represents the serial number of the object fuzzy rules; theta1(t),And thetag(t) denotes 1 st, k-th and g-th antecedent variables, respectively, g denotes the number of antecedent variables,indicating the sequence number of the antecedent variable, Mi1,And MigRespectively represent the 1 st and the 1 st fuzzy rules of the objectAnd the g fuzzy set.
The nonlinear object model represented by the T-S fuzzy system is obtained by using product fuzzy inference, a center average deblurring device and a single-point fuzzifier as follows
In the formula, an alternativeAnd is Representing a front-part variableMembership in fuzzy setsRepresents the accumulation and multiplication operations, respectively.
In designing an event driver based on nonlinear object measurement output:
based on the measured output of the nonlinear object, the event driver is designed as follows:
wherein, delta epsilon (0,1) is a driver threshold parameter,is a positive definite matrix, h denotes the sampling period, tkh denotes the kth drive time, tkh is t of the sampling periodkMultiple, tk+1h denotes the (k + 1) th driving time, tk+1h is t of the sampling periodk+1The lower subscript k denotes the drive time number.Which is indicative of the current sampling instant,is tkAfter h is firstOne sampling period, y (t)kh) Andrespectively represent tkh andcorresponding non-linear object measurement output, min { } denotes the minimum function, and the upper right corner of the matrix, T, denotes the transpose of the matrix.
In the invention, an event driver judges and judges the event driving condition in the formula (3) at each period sampling point, and if the condition is met, the event driver sends sampling data; if the condition is not met, the sampled data is discarded. Therefore, the event driver transmits only the sample data satisfying the event-driven condition, and system-limited resources such as network bandwidth can be saved. In addition, the event driver only uses the periodic sampling value output by the nonlinear object measurement, the software implementation is easy, the Chino phenomenon is avoided in principle, and the assumed limit that most achievements can completely measure the object state is released.
The actuator saturation model is established as follows:
in the formula,denotes the number u (t)Dimensional components, u (t) representing object control inputs without regard to actuator saturation effects, u (t) being nuThe number of the dimensional real number is,the number of dimensions of u (t) is shown,andrespectively representing the maximum and minimum allowable output values of the actuator,to representThe corresponding actuator saturation function value, sat (), represents the actuator saturation function.
According to the actuator saturation model (4), whenWhen the saturation function of the actuator is output as the maximum allowable output value of the actuator, i.e. the maximum allowable output value of the actuatorWhen in useWhen the actuator saturation function is output as the minimum allowable output value of the actuator, i.e.When in useWhen, the actuator saturation function is output as
Using an actuator saturation model (4), control inputs in the non-linear object model (2) affected by actuator saturation are enteredExpressed as:
in the formula, an alternativeu1And1 st and n th of u (t), respectivelyuDimensional component, sat: (u1) Andrespectively represents u1Andthe corresponding actuator saturation function value. Substitution typeAndrespectively represents u1,Andthe corresponding function value of the dead zone of the actuator,representing the actuator dead band function.
From the actuator saturation model (4), the following equation holds
B, establishing a random deception attack model and a DOFSS controller model, and establishing a closed-loop system model organically integrating random deception attack, an event driver, actuator saturation and network induced delay parameters;
first, the random spoofing attack effect is not consideredDOFSS controller input with zero-order keeperIs shown as
In the formula, [ t ]kh+τk,tk+1h+τk+1) Indicating the zero-order keeper hold time,andrespectively represent tkh and tk+1h corresponding to the network induced delay, τ andrespectively representing the lower and upper bounds of the network induced delay.
In the formula, nkIndicates the number of the division subintervals,is nkMaximum value, U, being a union symbol, subintervalIs shown below
e(t)=y(tkh)-y(tkh+nkh),η(t)=t-(tkh+nkh) (10);
In the formula, y (t)kh+nkh) Representing the sampling instant tkh+nkh corresponding to the non-linear object measurement output.
Using equation (10), the dofss controller input (7) is represented as:
in the formula, y (t- η (t)) represents a nonlinear object measurement output corresponding to time t- η (t), and t- η (t) ═ t is obtained from (10)kh+nkh。
Secondly, a random spoofing attack model is established as follows
In the formula,representing a spoofing attack function, wherein a (t) epsilon {0,1} represents a Bernoulli distribution random variable, and when a (t) is 1, the spoofing attack is activated and the controller input is tampered; when a (t) is 0, the spoofing attack sleeps, and the controller input is not tampered; since attack energy is usually limited in practice, i.e.Satisfies the following formula
Where G is an attack energy definition matrix.
Using equations (11) and (12), controller inputs under random spoofing attacks are derivedAs follows
Subsequently, a dofss controller model is built as follows:
let the jth fuzzy rule of the controller be expressed as: if theta1(t) is Mj1,...,Is composed of...,θg(t) is MjgThen, then
In the formula,is xcDerivative of (t), xc(t) denotes controller status, xc(t) is an n-dimensional real number, xc(t- η (t)) represents the controller state for t- η (t),andis a gain matrix; the number of fuzzy rules of the controller is r, j represents the serial number of the fuzzy rules of the controller, Mj1,And MjgRespectively representing the 1 st fuzzy set, the kth fuzzy set and the g fuzzy set under the jth fuzzy rule of the controller.
Using product fuzzy inference, center-mean deblurring, and single-point fuzzifier, a dofss controller model was obtained as follows
In the formula, an alternativeAnd is Representing a front-part variableMembership in fuzzy setsMembership function of (c).
In summary, the nonlinear object model (2) and the dofss controller model (16) are combined to establish a closed-loop system model as follows:
in the formula,the state of the closed-loop system is represented,is the derivative of chi (t), and chi (t-eta (t)) represents the closed-loop system state corresponding to t-eta (t),andrepresenting a closed loop system gain matrix.
Designing the joint design conditions of the nonlinear system event driver and the DOFS controller under the influence of random deception attack, actuator saturation and network induced delay to solve the event driver parameters meeting the communication and control requirements of the nonlinear systemAnd gain matrix of equivalent DOFSS controllerAnd finally obtaining the event driver and the DOFSS controller which meet the communication and control requirements of the nonlinear system.
The step C comprises the following two specific steps:
c1: based on the Lyapunov stability theory, the asymptotic stability condition of the nonlinear system under the influence of random deception attack, event drivers, actuator saturation and network induced delay is determined.
Given a sampling period h, the lower bound of network induced delayτAnd upper boundAn actuator saturation parameter ε, an attack energy definition matrix G, and an event driver threshold parameter δ ∈ (0,1), if there is a positive definite matrix R>0,S>0,Q1>0,Q2>0,Q3> 0, and matrix U2,U3Satisfy the following requirementsAnd
the closed loop system (17) is asymptotically stable under the influence of random spoofing attacks, event drivers, actuator saturation and network induced delays.
In the above stability conditions, the following alternative formula is used:
wherein,the mathematical expectation for a (t) is shown,is a mathematical expectation function. He { } denotes the sum of the matrix and its transpose, denotes the symmetric terms in the symmetric matrix,the matrix represents a zero matrix, the upper right corner mark-1 of the matrix represents an inverse matrix, I is an identity matrix, col represents a column matrix, and diag represents a diagonal matrix.
And (3) proving that: the structure of Lyapunov functional is as follows
In the formula, an alternativeρ=0.5(η3-η1),Representing integral variables, χ(s), χ (s- η)1) And χ (s- η)2) Respectively represent s, s-eta1And s-eta2The corresponding closed-loop system state is,the derivative of χ(s) is represented.
Derived from Lyapunov functional
In the formula,is the derivative of v (t),andrespectively representing alternative expressions corresponding to t and t-rhoχ(t-η1) Represents t-eta1Corresponding closed loop system state, alternative ζ1,ζ2,ζ3Is represented as follows:
in the formula,representing integral variablesThe corresponding closed loop system state derivative.
Consider the following two cases:
(1) if eta (t) belongs to [ eta ∈ [ ]1,η2) ζ in pair (21)1,ζ2,ζ3Using the Qisheng inequality, and usingFurther on ζ2Obtained by using a mutual convex method
In the formula, an alternativeAndand χ (t- η)3) Respectively represent t-eta2And t-eta3Corresponding closed loop system state.
(2) If η (t) is equal to [ η [ ]2,η3]ζ in pair (21)1,ζ2,ζ3Using the Qisheng inequality, and usingFurther on ζ3Obtained by using a mutual convex method
using (22) and (23), the mathematical expectation is given to the derivative of the Lyapunov functional (20)
Using equation (10), derived from the event driver (3) and the attack energy limited condition (13)
Obtained from formula (24) using formula (25)
Wherein the following alternative formula is used
Obtained by applying the Schur supplement theory to the formula (18)
By substituting formula (27) for formula (26) to obtainAccording to Lyapunov's stability theory, the closed loop system (17) is asymptotically stable. After the syndrome is confirmed.
In the above system stable condition, there is an event driver positive definite matrixInverse matrix ofAnd DOFSS controller gain matrixCoupled with the positive definite matrix P, this condition cannot therefore be used directly for event driver and controller designs. To solve this problem, the present invention will further present an event driver and dofss controller joint design method.
C2 obtaining the combined design condition of the event driver and the DOFSS controller by utilizing the linear matrix inequality technology based on the nonlinear system asymptotic stable condition obtained in the step C1, namely obtaining the event driver parameters meeting the communication and control requirements of the nonlinear systemAnd gain matrix of equivalent DOFSS controllerAnd finally obtaining the event driver and the DOFSS controller which meet the communication and control requirements of the nonlinear system.
First, the prior art (theorem 1) used in step C2 is given as follows:
theorem 1. if a positive definite matrix Q > 0 is given, the matrix L and the real number e > 0, then the inequality (L-e Q) Q-1(L-epsilon Q) is equal to or greater than 0, namely inequality-LQ-1L≤∈2Q-2 ∈ L holds.
Then, the event driver and dofss controller joint design conditions are given as follows:
given a sampling period h, the lower bound of network induced delayτAnd upper boundThe saturation parameter epsilon of the actuator and the attack energy limit matrix G, and the real number epsilon1>0,∈2>0,∈3> 0, if real numbers are presentPositive definite matrix
the closed loop system (17) is asymptotically stable while obtaining event driver parametersAnd a gain matrix of the equivalent DOFSS controller (34)As follows
Under the above conditions, the following alternative formulae were used
X is greater than 0, Y is greater than 0 and is positive definite matrix, N is N X N dimension real number matrix.
And (3) proving that: the positive definite matrix P is decomposed as follows
In the formula, X is more than 0, Y is more than 0 and is a positive definite matrix, and N is an N multiplied by N dimensional real number matrix. From the Sull complement theorem, a positive definite matrix P > 0 is equivalent to
The system stability condition in step C1 is changed as follows
Wherein the following alternative formulae are used
Ψ1=diag{Φ1,Φ1},Ψ2=diag{Φ1,Φ1,Φ1,Φ1,Φ1,I,I,I,Ψ3,I,I,I},
therefore, the closed loop system (17) is asymptotically stable if given conditions are satisfied. Simultaneous acquisition of event driver parametersAnd the gain matrix of the DOFSS controller (16) are as follows
To process (33) the unknown matrix N, a linear transformation is usedThe equivalent DOFSS controller is obtained as follows
In the formula,representing the equivalent dofss controller state,is a real number in the n-dimension,is composed ofThe derivative of (a) of (b),representing equivalent DOFSS controller states, gain matrices, corresponding to t- η (t)Obtained from (29). After the syndrome is confirmed.
Through the combined design method of the event driver and the DOFSS controller, a user can determine each parameter one by one according to specific design requirements, and the event driver and the DOFSS controller are obtained according to the steps, so that the event driver can reduce the data transmission rate, and system limited resources such as network bandwidth and the like are saved; the DOFSS controller enables the nonlinear system to be asymptotically stable under the influence of random spoofing attack, event drivers, actuator saturation and network-induced delay.
Application scenarios of the present invention are exemplified as follows: in recent years, network attacks against practical industrial control systems have been frequent, such as: in 2015, the ukraine power system was attacked by malware, and about 140 million people were affected by the power outage. Aiming at the scene, the related method of the invention is applied, the centrifugal machine system and the power system of the nuclear power station are modeled into a nonlinear object, an event driver and an actuator saturation model are designed, a random deception attack model, a DOFSS controller model and a closed-loop system model organically integrating random deception attack, event driver, actuator saturation and network induced delay parameters are established, the asymptotic stable condition of the closed-loop system is deduced, the combined design condition of the event driver and the DOFSS controller is given, and the event driver and the DOFSS controller meeting the requirements are obtained at the same time.
The present invention is described in detail below with reference to examples:
step A: establishing a nonlinear object model, and designing an event driver based on nonlinear object measurement output:
wherein, the nonlinear object takes a mass spring damping system as an example, and the kinetic equation is described as
In the formula,a displacement from a reference point is indicated,andrespectively representThe first and second derivatives of (a), m is mass,it is indicated that the friction force is,the elastic force of the spring is shown,representing a control input affected by actuator saturation,are real numbers. Parameter setting is as followsc is 2 n.m/s,
defining object statesThe mass-spring damping system (35) can be described as a non-linear object (2), where μ1(θ(t))=-(θ1(t)+8)/2.88,μ2(θ(t))=1-μ1(θ(t)), r 2, g 1, the gain matrix is as follows:
designing an event driver (3) based on the measurement output of a nonlinear object, wherein the sampling period h is 100 milliseconds, the threshold parameter delta of the driver and a positive definite matrixThe result of the event driver design condition in conjunction with the dofss controller in step C2.
Establishing an actuator saturation model (4): wherein the maximum allowable output value of the actuatoruiMaximum value ofReal number
And B: establishing a random deception attack and DOFSS controller model, and establishing a closed-loop system model organically integrating random deception attack, an event driver, actuator saturation and network induced delay parameters;
Wherein,for spoofing attack functions, tanh represents a non-linear hyperbolic tangent function, a (t) e {0,1} is a Bernoulli distributed random variable, and the mathematical expectation isThe attack energy limit matrix is G ═ 0.1 (the one-dimensional matrix is equally real).
Next, a dofss controller model is built (16).
Then, a closed-loop system model (17) organically integrating random spoofing attacks, event drivers, actuator saturation and network-induced delay parameters is established, wherein the network-induced delay lower boundτ10 ms and upper boundMilliseconds.
And C: designing the joint design conditions of the event driver and the DOFSS controller under the influence of random deception attack, actuator saturation and network induced delay to obtain the parameters of the event driverAnd gain matrix of equivalent DOFSS controllerAnd finally obtaining the event driver and the DOFSS controller which meet the system requirements.
Wherein the nonlinear system asymptotic steady condition is obtained from step C1, and further, the event driver and DOFSS controller joint design condition is obtained from step C2, wherein ∈1=∈2=∈31. Solving the joint design condition to obtain event driver parametersAnd equivalent DOFSS controller gain matrix as follows
In the embodiment, under the action of a designed DOFSS controller, the mass spring damping system can be gradually stabilized under the influence of random deception attack, event drivers, actuator saturation and network induced delay. In addition, the sensor samples 100 data cycles in simulation time [0,10 seconds ], with the event driver transmitting 71 data, at a data transmission rate of 71%. Compared with the data sending rate of the periodic sampler of 100 percent, the event driver saves 29 percent of system resources on the premise of ensuring the system performance. In addition, 15 data out of 71 data sent by the event driver were tampered with by random spoofing attack, and the attack rate was 21%.
The embodiment shows that, on one hand, the event driver can reduce the data transmission rate to 71%, and system limited resources such as 29% of network bandwidth are saved. On the other hand, although up to 21% of event driver transmission data is tampered with by random spoofing attacks, the nonlinear system can be asymptotically stabilized by the dofss controller. In addition, the method is designed based on the nonlinear object measurement output, and the hypothesis limit that most achievements can completely measure the object state is removed.
Claims (10)
1. A method for joint design of a nonlinear system event driver and a dofss controller, comprising the steps of:
a, establishing a nonlinear object model and an actuator saturation model, and designing an event driver based on nonlinear object measurement output;
b, establishing a random deception attack model and a DOFSS controller model, and establishing a closed-loop system model organically integrating random deception attack, an event driver, actuator saturation and network induced delay parameters;
designing the joint design conditions of the nonlinear system event driver and the DOFS controller under the influence of random deception attack, actuator saturation and network induced delay to solve the event driver parameters meeting the communication and control requirements of the nonlinear systemAnd gain matrix of equivalent DOFSS controllerAnd finally obtaining the event driver and the DOFSS controller which meet the communication and control requirements of the nonlinear system.
2. The nonlinear system event driver and dofss controller joint design method according to claim 1, wherein in the step a, the nonlinear object model is:
wherein,is the derivative of x (t), x (t) represents the object state, x (t) is an n-dimensional real number,representing a control input affected by actuator saturation,is nuDimensional real number, y (t) representing measurement output, y (t) being nyDimensional real number, t represents time, Ai,BiAnd CiRepresenting a gain matrix; the number of the object fuzzy rules is r, and i represents the serial number of the object fuzzy rules; substitution typeAnd is And thetag(t) represents the 1 st and the 1 st, respectivelyThe individual and the g-th antecedent variables, g representing the number of antecedent variables,the sequence number of the front-piece variable is shown,representing a front-part variableMembership in fuzzy setsRepresents the accumulation and multiplication operations, respectively.
3. The nonlinear system event driver and dofss controller joint design method according to claim 2, wherein in step a, the event driver based on the nonlinear object measurement output is:
wherein, delta epsilon (0,1) is a driver threshold parameter,is a positive definite matrix, h denotes the sampling period, tkh denotes the kth drive time, tkh is t of the sampling periodkMultiple, tk+1h denotes the (k + 1) th driving time, tk+1h is t of the sampling periodk+1The lower subscript k denotes the drive time number,which is indicative of the current sampling instant,is tkAfter h is firstOne sampling period, y (t)kh) Andrespectively represent tkh andand (3) outputting corresponding nonlinear object measurement, wherein min { } represents a minimum function, and a right upper corner mark T of the matrix represents the transposition of the matrix.
4. The nonlinear system event driver and dofss controller joint design method according to claim 3, wherein in step a, the actuator saturation model is:
wherein,denotes the number u (t)Dimensional components, u (t) representing object control inputs without regard to actuator saturation effects, u (t) being nuThe number of the dimensional real number is,the number of dimensions of u (t) is shown,andrespectively representing the maximum and minimum allowable output values of the actuator,to representThe corresponding actuator saturation function value, sat (), represents the actuator saturation function.
5. The nonlinear system event driver and dofss controller joint design method according to claim 4, wherein in the step B, the stochastic spoofing attack model is:
wherein,representing a spoofing attack function, wherein a (t) epsilon {0,1} represents a Bernoulli distribution random variable, and when a (t) is 1, the spoofing attack is activated and the controller input is tampered; when a (t) is 0, the spoofing attack sleeps, and the controller input is not tampered;g is an attack energy limiting matrix;y (t- η (t)) represents a nonlinear object measurement output corresponding to time t- η (t), where t- η (t) is tkh+nkh,e(t)=y(tkh)-y(tkh+nkh),y(tkh+nkh) Watch (A)Indicating the sampling time tkh+nkh corresponding to the non-linear object measurement output.
6. The nonlinear system event driver and dofss controller joint design method according to claim 5, wherein in the step B, the dofss controller model is:
wherein,is xcDerivative of (t), xc(t) denotes controller status, xc(t) is an n-dimensional real number, xc(t- η (t)) represents the controller state for t- η (t),andis a gain matrix; the number of fuzzy rules of the controller is r, j represents the serial number of the fuzzy rules of the controller, and the alternative formulaAnd is Representing a front-part variableMembership in fuzzy setsMembership function of (c).
7. The nonlinear system event driver and dofss controller joint design method according to claim 6, wherein in the step B, the closed-loop system model organically integrating stochastic spoofing attack, event driver, actuator saturation and network-induced delay parameters is:
in the formula,is the derivative of x (t),representing the closed-loop system state, x (t-eta (t)) representing the closed-loop system state corresponding to t-eta (t),andrepresenting closed-loop system gain matrices, alternatively Andrespectively representAndthe corresponding function value of the dead zone of the actuator,andrespectively represent the 1 st and the 1 st dimensions of u (t)And nuThe component of the dimension(s) is,representing the actuator dead band function.
8. The nonlinear system event driver and dofss controller joint design method according to claim 1, wherein the step C comprises the following specific steps:
c1: determining a nonlinear system asymptotic stability condition under the influence of random deception attack, an event driver, actuator saturation and network induced delay based on the Lyapunov stability theory;
c2 obtaining the combined design condition of the event driver and the DOFSS controller by utilizing the linear matrix inequality technology based on the nonlinear system asymptotic stable condition obtained in the step C1, namely obtaining the event driver parameters meeting the communication and control requirements of the nonlinear systemAnd gain matrix of equivalent DOFSS controllerAnd finally obtaining the event driver and the DOFSS controller which meet the communication and control requirements of the nonlinear system.
9. The nonlinear system event driver and dofss controller joint design method in accordance with claim 8, wherein: the nonlinear system asymptotic stability condition under the influence of random deception attack, event driver, actuator saturation and network induced delay is as follows:
given a sampling period h, the lower bound of network induced delayτAnd upper boundAn actuator saturation parameter ε, an attack energy definition matrix G, and an event driver threshold parameter δ ∈ (0,1), if there is a positive definite matrixP>0,R>0,S>0,Q1>0,Q2>0,Q3> 0, and matrix U2,U3Satisfy the following requirementsAnd
the closed loop system is asymptotically stable under the influence of random deception attack, event drivers, actuator saturation and network induced delay; in the above stability conditions, the following alternative formula is used:
wherein,the mathematical expectation for a (t) is shown,is a mathematical expectation function; he { } denotes the sum of the matrix and its transpose, denotes the symmetric terms in the symmetric matrix,the matrix represents a zero matrix, the upper right corner mark-1 of the matrix represents an inverse matrix, I is an identity matrix, col represents a column matrix, and diag represents a diagonal matrix.
10. The nonlinear system event driver and dofss controller joint design method in accordance with claim 9, wherein: the joint design conditions of the event driver and the DOFSS controller are as follows:
given a sampling period h, the lower bound of network induced delayτAnd upper boundThe saturation parameter epsilon of the actuator and the attack energy limit matrix G, and the real number epsilon1>0,∈2>0,∈3> 0, if real numbers are presentPositive definite matrix And a matrixSatisfy the requirement of And
the closed loop system is asymptotically stable while obtaining event driver parametersAnd gain matrix of equivalent DOFSS controllerAs follows
Under the above conditions, the following alternative formulae were used
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110962406.8A CN113625647A (en) | 2021-08-20 | 2021-08-20 | Nonlinear system event driver and DOFSS controller joint design method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110962406.8A CN113625647A (en) | 2021-08-20 | 2021-08-20 | Nonlinear system event driver and DOFSS controller joint design method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113625647A true CN113625647A (en) | 2021-11-09 |
Family
ID=78387034
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110962406.8A Pending CN113625647A (en) | 2021-08-20 | 2021-08-20 | Nonlinear system event driver and DOFSS controller joint design method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113625647A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114355993A (en) * | 2021-12-28 | 2022-04-15 | 杭州电子科技大学 | Sliding mode control method for deception attack reservoir water level system |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120045013A1 (en) * | 2010-08-23 | 2012-02-23 | Tongji University | Method for real-time online control of hybrid nonlinear system |
KR101687811B1 (en) * | 2015-09-07 | 2017-02-01 | 박준영 | Design of Agent Type's ARP Spoofing Detection Scheme which uses the ARP probe Packet and Implementation of the Security Solution |
CN110213115A (en) * | 2019-06-25 | 2019-09-06 | 南京财经大学 | A kind of Multi net voting attacks the method for controlling security of lower event-driven network control system |
CN111679572A (en) * | 2020-05-11 | 2020-09-18 | 南京财经大学 | Network control system security control method based on hybrid triggering under multi-network attack |
CN112099347A (en) * | 2020-08-06 | 2020-12-18 | 杭州电子科技大学 | Event trigger control method of saturated nonlinear networked industrial control system |
CN112865752A (en) * | 2020-12-24 | 2021-05-28 | 南京财经大学 | Filter design method based on adaptive event trigger mechanism under hybrid network attack |
CN113009825A (en) * | 2021-02-08 | 2021-06-22 | 云境商务智能研究院南京有限公司 | Deception-attacked nonlinear networked system state estimation method |
-
2021
- 2021-08-20 CN CN202110962406.8A patent/CN113625647A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120045013A1 (en) * | 2010-08-23 | 2012-02-23 | Tongji University | Method for real-time online control of hybrid nonlinear system |
KR101687811B1 (en) * | 2015-09-07 | 2017-02-01 | 박준영 | Design of Agent Type's ARP Spoofing Detection Scheme which uses the ARP probe Packet and Implementation of the Security Solution |
CN110213115A (en) * | 2019-06-25 | 2019-09-06 | 南京财经大学 | A kind of Multi net voting attacks the method for controlling security of lower event-driven network control system |
CN111679572A (en) * | 2020-05-11 | 2020-09-18 | 南京财经大学 | Network control system security control method based on hybrid triggering under multi-network attack |
CN112099347A (en) * | 2020-08-06 | 2020-12-18 | 杭州电子科技大学 | Event trigger control method of saturated nonlinear networked industrial control system |
CN112865752A (en) * | 2020-12-24 | 2021-05-28 | 南京财经大学 | Filter design method based on adaptive event trigger mechanism under hybrid network attack |
CN113009825A (en) * | 2021-02-08 | 2021-06-22 | 云境商务智能研究院南京有限公司 | Deception-attacked nonlinear networked system state estimation method |
Non-Patent Citations (5)
Title |
---|
刘金良;顾媛媛;费树岷;: "基于事件触发和网络攻击的负荷频率控制电力系统H_∞滤波器设计", 中国科学:信息科学, no. 10, 29 October 2018 (2018-10-29), pages 66 - 81 * |
李刘文: "具有饱和约束的网络控制系统事件驱动控制与同步问题研究", 中国博士学位论文全文数据库信息科技辑, no. 5, 15 May 2019 (2019-05-15), pages 17 - 36 * |
李富强,等: "Output-based event-triggered control of nonlinear systems under deception attacks", 《第40届中国控制会议论文集(9)》, 26 July 2021 (2021-07-26), pages 4901 - 4906, XP033982547, DOI: 10.23919/CCC52363.2021.9549982 * |
顾媛媛: "基于网络攻击和事件触发的网络化系统若干问题研究", 中国优秀硕士学位论文全文数据库信息科技辑, no. 04, 15 April 2020 (2020-04-15), pages 17 - 32 * |
高毅: "网络环境下事件驱动控制策略的研究", 中国博士学位论文全文数据库信息科技辑, no. 12, 15 December 2019 (2019-12-15), pages 55 - 68 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114355993A (en) * | 2021-12-28 | 2022-04-15 | 杭州电子科技大学 | Sliding mode control method for deception attack reservoir water level system |
CN114355993B (en) * | 2021-12-28 | 2024-03-26 | 杭州电子科技大学 | Sliding mode control method for reservoir water level system under spoofing attack |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113009825B (en) | Deception-attacked nonlinear networked system state estimation method | |
Wang et al. | Event-based asynchronous and resilient filtering for Markov jump singularly perturbed systems against deception attacks | |
CN111679572B (en) | Network control system security control method based on hybrid triggering under multi-network attack | |
CN110865616B (en) | Design method of event trigger zone memory DOF controller under random FDI attack | |
Cai et al. | Quantized sampled-data control tactic for TS fuzzy NCS under stochastic cyber-attacks and its application to truck-trailer system | |
CN113721467B (en) | Self-adaptive event triggering-based H under spoofing attack and DoS attack∞Filter design method | |
CN114415633B (en) | Security tracking control method based on dynamic event triggering mechanism under multi-network attack | |
CN112286051A (en) | Neural network quantitative control method based on adaptive event trigger mechanism under complex network attack | |
CN112099356B (en) | Design method of event-driven SDOFQH controller under DoS attack | |
Xiong et al. | Observer-based event-triggered output feedback control for fractional-order cyber–physical systems subject to stochastic network attacks | |
Gao et al. | Adaptive neural event-triggered control of networked Markov jump systems under hybrid cyberattacks | |
CN112859607B (en) | Collaborative design method for distributed security event driver and SDOFD controller | |
Visakamoorthi et al. | Reachable set estimation for T–S fuzzy Markov jump systems with time-varying delays via membership function dependent H∞ performance | |
Gao et al. | Event-triggered output feedback resilient control for NCSs under deception attacks | |
Yang et al. | Event‐based switching control for networked switched systems under nonperiodic DoS jamming attacks | |
Zhu et al. | Dynamic-memory event-based asynchronous security control for TS fuzzy singular semi-Markov jump systems against multi-cyber attacks | |
CN113625647A (en) | Nonlinear system event driver and DOFSS controller joint design method | |
CN112068441B (en) | Collaborative design method for security event driver and SDOFR controller | |
Gao et al. | Output-based event-triggered resilient control of uncertain NCSs under DoS attacks and quantisation | |
Zha et al. | Finite‐time adaptive event‐triggered asynchronous state estimation for Markov jump systems with cyber‐attacks | |
Li et al. | Event-triggered output feedback dissipative control of nonlinear systems under DoS attacks and actuator saturation | |
Liu et al. | H∞ control for time-varying cyber-physical system under randomly occurring hybrid attacks: The output feedback case | |
Gao et al. | h∞ output quantized control for networked control systems under resilient event‐triggered mechanism and aperiodic denial‐of‐service attacks | |
Priya et al. | Event-triggered H∞ control of complex dynamical networks subject to stochastic cyber-attacks by new two-sided delay-dependent LKF functional | |
CN112118139B (en) | Collaborative design method for security event driver and SDOFH controller |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |