CN113625647A - Joint Design Method of Event Driver and DOFFSS Controller for Nonlinear Systems - Google Patents
Joint Design Method of Event Driver and DOFFSS Controller for Nonlinear Systems Download PDFInfo
- Publication number
- CN113625647A CN113625647A CN202110962406.8A CN202110962406A CN113625647A CN 113625647 A CN113625647 A CN 113625647A CN 202110962406 A CN202110962406 A CN 202110962406A CN 113625647 A CN113625647 A CN 113625647A
- Authority
- CN
- China
- Prior art keywords
- controller
- matrix
- event driver
- dofss
- nonlinear
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000013461 design Methods 0.000 title claims abstract description 46
- 238000000034 method Methods 0.000 title claims abstract description 28
- 239000011159 matrix material Substances 0.000 claims abstract description 100
- 238000005259 measurement Methods 0.000 claims abstract description 23
- 238000005070 sampling Methods 0.000 claims description 31
- 238000004891 communication Methods 0.000 claims description 17
- 230000000694 effects Effects 0.000 claims description 7
- 238000009825 accumulation Methods 0.000 claims description 5
- 238000006467 substitution reaction Methods 0.000 claims description 3
- 238000005516 engineering process Methods 0.000 claims 1
- 230000007958 sleep Effects 0.000 claims 1
- 230000017105 transposition Effects 0.000 claims 1
- 230000001934 delay Effects 0.000 description 7
- 230000000737 periodic effect Effects 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 3
- 238000011217 control strategy Methods 0.000 description 3
- 238000013016 damping Methods 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 2
- 230000000295 complement effect Effects 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 229920006395 saturated elastomer Polymers 0.000 description 2
- 230000009466 transformation Effects 0.000 description 2
- 230000000903 blocking effect Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000009795 derivation Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000006073 displacement reaction Methods 0.000 description 1
- 230000004927 fusion Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000004088 simulation Methods 0.000 description 1
- 238000001308 synthesis method Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B19/00—Programme-control systems
- G05B19/02—Programme-control systems electric
- G05B19/04—Programme control other than numerical control, i.e. in sequence controllers or logic controllers
- G05B19/042—Programme control other than numerical control, i.e. in sequence controllers or logic controllers using digital processors
- G05B19/0423—Input/output
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B2219/00—Program-control systems
- G05B2219/20—Pc systems
- G05B2219/25—Pc structure of the system
- G05B2219/25257—Microcontroller
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02P—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
- Y02P90/00—Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
- Y02P90/02—Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Automation & Control Theory (AREA)
- Feedback Control In General (AREA)
Abstract
Description
技术领域technical field
本发明涉及网络化控制系统领域,尤其涉及一种随机欺骗攻击下非线性系统事件驱动器与动态输出反馈模糊饱和安全(dynamic output feedback fuzzy saturatedsecurity,DOFFSS)控制器联合设计方法。The invention relates to the field of networked control systems, in particular to a joint design method for a nonlinear system event driver and a dynamic output feedback fuzzy saturated security (DOFFSS) controller under random spoofing attacks.
背景技术Background technique
网络化控制系统将共享通信网络引入控制闭环,具有柔性高、成本低及安装维护方便等优点,广泛应用于智能电网、智慧交通等领域。网络化控制系统通常采用发展成熟的周期采样控制策略,为了在最坏情形下保证系统性能,采样率通常设置较高。然而,实际中最坏情形很少发生,高采样率产生的大量冗余数据导致网络带宽等系统受限资源浪费,极大地影响了系统性能。The networked control system introduces the shared communication network into the control loop, which has the advantages of high flexibility, low cost, convenient installation and maintenance, etc., and is widely used in smart grid, smart transportation and other fields. The networked control system usually adopts a well-developed periodic sampling control strategy. In order to ensure the system performance in the worst case, the sampling rate is usually set higher. However, the worst situation rarely occurs in practice, and the large amount of redundant data generated by high sampling rate leads to the waste of limited system resources such as network bandwidth, which greatly affects the system performance.
不同于周期控制策略忽略系统动态进行按时控制,事件驱动控制策略仅当系统动态满足事件驱动条件时进行按需控制,从而能够节约网络带宽等系统受限资源。然而,现有事件驱动器通常采用连续时间事件驱动机制,该机制需要增加专用监测硬件,且需要复杂前期计算以避免芝诺现象(即有限时间内的无穷多次驱动采样)。Different from periodic control strategy ignoring system dynamics to perform on-time control, event-driven control strategy performs on-demand control only when system dynamics meet event-driven conditions, thereby saving limited system resources such as network bandwidth. However, existing event drivers usually use a continuous-time event-driven mechanism, which requires the addition of dedicated monitoring hardware and complex up-front calculations to avoid Zeno phenomenon (ie, infinitely many driving samples in a finite time).
虽然共享通信网络为网络化控制系统带来了诸多便利,但也引入了使系统性能变差的网络诱导延时,也使系统面临网络攻击威胁。网络攻击大致分为拒绝服务攻击和欺骗攻击,拒绝服务攻击通过阻断通信网络使数据包无法送达;欺骗攻击通过数据篡改产生虚假数据包,欺骗攻击隐蔽性强且危害大,为本发明研究的攻击类型。然而,现有成果重点关注如何设计事件驱动机制以节约更多系统资源,较少同时考虑欺骗攻击和网络诱导延时影响。另外,现有事件驱动控制系统分析与综合方法通常假设不存在攻击威胁,此类方法通常不能直接适用于欺骗攻击影响下的事件触发控制系统分析。Although the shared communication network brings many conveniences to the networked control system, it also introduces a network-induced delay that deteriorates the system performance, and also makes the system face the threat of network attacks. Network attacks are roughly divided into denial of service attacks and spoofing attacks. Denial of service attacks prevent data packets from being delivered by blocking the communication network; spoofing attacks generate false data packets through data tampering, and spoofing attacks have strong concealment and great harm. type of attack. However, existing results focus on how to design event-driven mechanisms to save more system resources, and less consider both spoofing attacks and network-induced delay effects. In addition, existing event-driven control system analysis and synthesis methods usually assume that there is no attack threat, and such methods are usually not directly applicable to event-triggered control system analysis under the influence of spoofing attacks.
现实中,执行器饱和是控制系统中普遍存在的非线性现象。如果执行器输入量超过饱和阈值,执行器进入饱和状态。在饱和状态下,进一步增加执行器输入量对执行器输出不能产生任何影响。然而,现有成果较少同时考虑执行器饱和及欺骗攻击影响。此外,现有成果通常假设系统状态完全可测并设计状态反馈控制器,然而实际中系统状态通常不能直接获取。In reality, actuator saturation is a ubiquitous nonlinear phenomenon in control systems. If the actuator input exceeds the saturation threshold, the actuator goes into saturation. In the saturated state, further increasing the actuator input cannot have any effect on the actuator output. However, few existing works consider both the effect of actuator saturation and spoofing attacks. In addition, the existing works usually assume that the system state is completely measurable and design a state feedback controller, however, the system state cannot be directly obtained in practice.
为了解决上述问题,同时考虑随机欺骗攻击、执行器饱和、网络诱导延时及对象状态不能直接测量影响,本发明提出了非线性系统事件驱动器与DOFFSS控制器联合设计方法。In order to solve the above problems, while considering the influence of random spoofing attack, actuator saturation, network induced delay and object state cannot be measured directly, the present invention proposes a joint design method of nonlinear system event driver and DOFFSS controller.
发明内容SUMMARY OF THE INVENTION
本发明的目的是提供一种非线性系统事件驱动器与DOFFSS控制器联合设计法,能够解决现有非线性系统在随机欺骗攻击、执行器饱和及网络诱导延时影响下不能稳定的问题,并能够有效节约网络带宽等系统受限资源,而且能够解除对系统状态完全可测的假设限制。The purpose of the present invention is to provide a joint design method of nonlinear system event driver and DOFFSS controller, which can solve the problem that the existing nonlinear system cannot be stabilized under the influence of random spoofing attack, actuator saturation and network induced delay, and can It can effectively save system-limited resources such as network bandwidth, and can remove the assumption that the system state is completely measurable.
本发明采用下述技术方案:The present invention adopts following technical scheme:
一种非线性系统事件驱动器与DOFFSS控制器联合设计法,包括以下步骤:A non-linear system event driver and DOFFSS controller joint design method, including the following steps:
A:建立非线性对象模型和执行器饱和模型,并设计基于非线性对象测量输出的事件驱动器;A: Establish nonlinear object model and actuator saturation model, and design an event driver based on nonlinear object measurement output;
B:建立随机欺骗攻击模型及DOFFSS控制器模型,并建立有机融合随机欺骗攻击、事件驱动器、执行器饱和及网络诱导延时参数的闭环系统模型;B: Build a random spoofing attack model and a DOFFSS controller model, and build a closed-loop system model that organically integrates random spoofing attacks, event drivers, actuator saturation, and network-induced delay parameters;
C:设计随机欺骗攻击、执行器饱和及网络诱导延时影响下非线性系统事件驱动器与DOFFSS控制器联合设计条件,求出满足非线性系统通信和控制需求的事件驱动器参数和等价DOFFSS控制器的增益矩阵最终得到满足非线性系统通信和控制需求的事件驱动器和DOFFSS控制器。C: Design the joint design conditions of the nonlinear system event driver and DOFFSS controller under the influence of random spoofing attack, actuator saturation and network-induced delay, and find the event driver parameters that meet the communication and control requirements of the nonlinear system and the gain matrix of the equivalent DOFFSS controller Finally, an event driver and DOFFSS controller that meet the communication and control requirements of nonlinear systems are obtained.
所述的步骤A中,非线性对象模型为:In the described step A, the nonlinear object model is:
其中,为x(t)的导数,x(t)表示对象状态,x(t)为n维实数,表示受执行器饱和影响的控制输入,为nu维实数,y(t)表示测量输出,y(t)为ny维实数,t 表示时间,Ai,Bi和Ci表示增益矩阵;对象模糊规则数目为r,i表示对象模糊规则序号;替代式且 和θg(t)分别表示第1个、第个和第g个前件变量,g表示前件变量数目,表示前件变量序号,表示前件变量隶属于模糊集的隶属度函数,Σ和Π分别表示累加和累乘运算。in, is the derivative of x(t), x(t) represents the state of the object, x(t) is an n-dimensional real number, represents the control input affected by actuator saturation, is n u -dimensional real number, y(t) represents measurement output, y(t) is n y -dimensional real number, t represents time, A i , B i and C i represent gain matrix; the number of object fuzzy rules is r, i represents object Fuzzy rule number; alternative and and θ g (t) represent the first, the first and the g-th antecedent variable, where g represents the number of antecedent variables, Indicates the serial number of the antecedent variable, represents the antecedent variable belongs to fuzzy set The membership function of , Σ and Π represent the accumulation and accumulation operations, respectively.
所述的步骤A中,基于非线性对象测量输出的事件驱动器为:In the described step A, the event driver based on the nonlinear object measurement output is:
式中,δ∈(0,1)为驱动器阈值参数,为正定矩阵,h表示采样周期,tkh表示第k个驱动时刻,tkh为采样周期的tk倍,tk+1h表示第k+1个驱动时刻,tk+1h为采样周期的tk+1倍,下角标k表示驱动时刻序号,表示当前采样时刻,为tkh 后第个采样周期,y(tkh)和分别表示tkh和对应的非线性对象测量输出,min{}表示最小值函数,矩阵的右上角标T表示矩阵的转置。where δ∈(0,1) is the driver threshold parameter, is a positive definite matrix, h represents the sampling period, t k h represents the kth driving moment, t k h is t k times the sampling period, t k+1 h represents the k+1 th driving moment, and t k+1 h is t k+1 times the sampling period, the subscript k represents the drive time sequence number, represents the current sampling time, is the first after t k h sampling period, y(t k h) and represent t k h and The corresponding nonlinear object measurement output, min{} represents the minimum function, and the upper right corner of the matrix T represents the transpose of the matrix.
所述的步骤A中,执行器饱和模型为:In the described step A, the actuator saturation model is:
其中,表示u(t)的第维分量,u(t)表示不考虑执行器饱和影响的对象控制输入,u(t)为nu维实数,表示u(t)的维数序号,和分别表示执行器最大允许输出值和最小允许输出值,表示对应的执行器饱和函数值,sat()表示执行器饱和函数。所述的步骤B中,随机欺骗攻击模型为:in, represents the first order of u(t) dimensional component, u(t) represents the object control input without considering the effect of actuator saturation, u(t) is a n u -dimensional real number, represents the dimension number of u(t), and respectively represent the maximum allowable output value and the minimum allowable output value of the actuator, express The corresponding actuator saturation function value, sat() represents the actuator saturation function. In the described step B, the random spoofing attack model is:
其中,,表示欺骗攻击函数,a(t)∈{0,1}表示伯努利分布随机变量,当 a(t)=1时,欺骗攻击激活,控制器输入被篡改;当a(t)=0时,欺骗攻击休眠,控制器输入未被篡改;G为攻击能量限定矩阵;y(t-η(t))表示时刻t-η(t)对应的非线性对象测量输出,t-η(t)=tkh+nkh,e(t)=y(tkh)-y(tkh+nkh),y(tkh+nkh)表示采样时刻 tkh+nkh对应的非线性对象测量输出。in,, represents the spoofing attack function, a(t)∈{0,1} represents a Bernoulli distributed random variable, when a(t)=1, the spoofing attack is activated, and the controller input is tampered with; when a(t)=0 , the spoofing attack is dormant, and the controller input has not been tampered with; G is the attack energy limit matrix; y(t-η(t)) represents the nonlinear object measurement output corresponding to time t-η(t), t-η(t)=t k h+n k h, e(t)=y(t k h )-y(t k h+n k h), y(t k h+n k h) represents the nonlinear object measurement output corresponding to the sampling time t k h+n k h.
所述的步骤B中,DOFFSS控制器模型为:In the described step B, the DOFFSS controller model is:
其中,为xc(t)的导数,xc(t)表示控制器状态,xc(t)为n维实数,xc(t-η(t))表示t-η(t)对应的控制器状态,和为增益矩阵;控制器模糊规则数目为r,j表示控制器模糊规则序号,替代式且 表示前件变量隶属于模糊集的隶属度函数。in, is the derivative of x c (t), x c (t) represents the controller state, x c (t) is an n-dimensional real number, and x c (t-η(t)) represents the controller corresponding to t-η(t) state, and is the gain matrix; the number of fuzzy rules of the controller is r, j represents the sequence number of the fuzzy rules of the controller, and the substitution formula and represents the antecedent variable belongs to fuzzy set membership function.
所述的步骤B中,有机融合随机欺骗攻击、事件驱动器、执行器饱和及网络诱导延时参数的闭环系统模型为:In the described step B, the closed-loop system model that organically integrates random spoofing attacks, event drivers, actuator saturation and network-induced delay parameters is:
式中,为χ(t)的导数,表示闭环系统状态,χ(t-η(t))表示t-η(t)对应的闭环系统状态,和表示闭环系统增益矩阵,替代式 和分别表示u1,和对应的执行器死区函数值,u1,和分别表示u(t)的第1维、第维和第nu维分量,表示执行器死区函数。In the formula, is the derivative of χ(t), represents the state of the closed-loop system, χ(t-η(t)) represents the state of the closed-loop system corresponding to t-η(t), and represents the closed-loop system gain matrix, the alternative and respectively represent u 1 , and Corresponding actuator dead zone function value, u 1 , and represent the first dimension and the first dimension of u(t), respectively. dimension and the n-th u -dimension component, Represents the actuator deadband function.
所述的步骤C包括以下具体步骤:Described step C includes following concrete steps:
C1:基于李雅普诺夫稳定性理论,确定随机欺骗攻击、事件驱动器、执行器饱和及网络诱导延时影响下的非线性系统渐近稳定条件;C1: Based on Lyapunov stability theory, determine the asymptotic stability conditions of nonlinear systems under the influence of random spoofing attacks, event drivers, actuator saturation, and network-induced delays;
C2:基于步骤C1得出的非线性系统渐近稳定条件,利用线性矩阵不等式技术,得到事件驱动器与DOFFSS控制器联合设计条件,即求出满足非线性系统通信和控制需求的事件驱动器参数和等价DOFFSS控制器的增益矩阵最终得到满足非线性系统通信和控制需求的事件驱动器和DOFFSS 控制器。C2: Based on the asymptotic stability conditions of the nonlinear system obtained in step C1, using the linear matrix inequality technique, the joint design conditions of the event driver and the DOFFSS controller are obtained, that is, the event driver parameters that meet the communication and control requirements of the nonlinear system are obtained. and the gain matrix of the equivalent DOFFSS controller Finally, an event driver and DOFFSS controller that meet the communication and control requirements of nonlinear systems are obtained.
所述的随机欺骗攻击、事件驱动器、执行器饱和及网络诱导延时影响下的非线性系统渐近稳定条件为:The asymptotic stability conditions of nonlinear systems under the influence of random spoofing attacks, event drivers, actuator saturation, and network-induced delays are:
给定采样周期h,网络诱导延时下界τ和上界执行器饱和参数ε,攻击能量限定矩阵G和事件驱动器阈值参数δ∈(0,1),如果存在正定矩阵 R>0,S>0,Q1>0,Q2>0,Q3>0,及矩阵U2,U3,满足以及Given the sampling period h, the lower bound τ and the upper bound of the network-induced delay The actuator saturation parameter ε, the attack energy limiting matrix G and the event driver threshold parameter δ∈(0,1), if there is a positive definite matrix R>0, S>0, Q 1 >0, Q 2 >0, Q 3 >0, and matrices U 2 , U 3 , satisfying as well as
则随机欺骗攻击、事件驱动器、执行器饱和及网络诱导延时影响下闭环系统是渐近稳定的;上述稳定性条件中,使用了替代式如下:Then the closed-loop system is asymptotically stable under the influence of random spoofing attacks, event drivers, actuator saturation, and network-induced delays; in the above stability conditions, the following alternatives are used:
其中,表示a(t)的数学期望,为数学期望函数。He{}表示矩阵与其转置矩阵的和,*表示对称矩阵中的对称项,表示零矩阵,矩阵右上角标-1表示逆矩阵,I为单位矩阵,col{}表示列矩阵,diag{}表示对角矩阵。in, represents the mathematical expectation of a(t), is the mathematical expectation function. He{} represents the sum of the matrix and its transposed matrix, * represents the symmetric term in the symmetric matrix, Represents a zero matrix, the upper right corner of the matrix -1 represents the inverse matrix, I is the identity matrix, col{} represents the column matrix, and diag{} represents the diagonal matrix.
所述的事件驱动器与DOFFSS控制器联合设计条件为:The joint design conditions of the event driver and the DOFFSS controller are:
给定采样周期h,网络诱导延时下界τ和上界执行器饱和参数ε和攻击能量限定矩阵G,实数∈1>0,∈2>0,∈3>0,如果存在实数正定矩阵 及矩阵满足 以及 Given the sampling period h, the network-induced delay lower bound τ and upper bound Actuator saturation parameter ε and attack energy limit matrix G, real numbers ∈ 1 > 0, ∈ 2 > 0, ∈ 3 > 0, if there are real numbers positive definite matrix and matrix Satisfy as well as
则闭环系统是渐进稳定的,同时得到事件驱动器参数和等价 DOFFSS控制器的增益矩阵如下Then the closed-loop system is asymptotically stable, and the event-driven parameters are obtained at the same time and the gain matrix of the equivalent DOFFSS controller as follows
上述条件中,使用的替代式如下In the above conditions, the alternatives used are as follows
为正定矩阵,N为n×n维实数矩阵。 is a positive definite matrix, and N is an n×n-dimensional real number matrix.
本发明能够解决现有非线性系统在随机欺骗攻击、执行器饱和及网络诱导延时影响下不能稳定的问题,并能够有效节约网络带宽等系统受限资源,而且能够解除对系统状态完全可测的假设限制。The invention can solve the problem that the existing nonlinear system cannot be stabilized under the influence of random spoofing attack, actuator saturation and network induced delay, and can effectively save system limited resources such as network bandwidth, and can eliminate the completely measurable system state. hypothetical limit.
附图说明Description of drawings
图1为本发明中欺骗攻击下非线性系统事件驱动输出反馈控制示意图;1 is a schematic diagram of a nonlinear system event-driven output feedback control under spoofing attack in the present invention;
图2为本发明的流程示意图。FIG. 2 is a schematic flow chart of the present invention.
具体实施方式Detailed ways
以下结合附图和实施例对本发明作以详细的描述:Below in conjunction with accompanying drawing and embodiment, the present invention is described in detail:
随机欺骗攻击下非线性系统事件驱动输出反馈控制系统如图1所示,传感器对非线性对象测量输出进行周期采样,传感器采样数据发送至事件驱动器,事件驱动器判断是否满足事件驱动条件:若满足,则发送采样数据;否则,丢弃采样数据。事件驱动器发送数据经由通信网络发送至零阶保持器,通信网络受随机欺骗攻击影响,DOFFSS控制器接收零阶保持器数据并计算控制信号,执行器根据控制信号调整对象状态,并考虑执行器饱和影响。The nonlinear system event-driven output feedback control system under random spoofing attack is shown in Figure 1. The sensor periodically samples the measurement output of the nonlinear object, and the sensor sampling data is sent to the event driver. The event driver determines whether the event-driven condition is met: if so, The sampled data is sent; otherwise, the sampled data is discarded. The event driver sends data to the zero-order keeper via the communication network. The communication network is affected by random spoofing attacks. The DOFFSS controller receives the zero-order keeper data and calculates the control signal. The actuator adjusts the object state according to the control signal and considers actuator saturation. influences.
如图2所示,本发明所述的非线性系统事件驱动器与DOFFSS控制器联合设计法,包括以下步骤:As shown in Figure 2, the non-linear system event driver and DOFFSS controller joint design method of the present invention includes the following steps:
A:建立非线性对象模型和执行器饱和模型,并设计基于非线性对象测量输出的事件驱动器;A: Establish nonlinear object model and actuator saturation model, and design an event driver based on nonlinear object measurement output;
其中,在将非线性对象模型描述为T-S(Takagi-Sugeno)模糊系统时:Among them, when describing the nonlinear object model as a T-S (Takagi-Sugeno) fuzzy system:
设非线性对象第i个模糊规则表示如下:若θ1(t)为Mi1,...,为..., θg(t)为Mig,则Let the ith fuzzy rule of nonlinear object be expressed as follows: If θ 1 (t) is M i1 ,..., for ..., θ g (t) is Mig , then
式中,为x(t)的导数,x(t)表示对象状态,x(t)为n维实数,表示受执行器饱和影响的控制输入,为nu维实数,y(t)表示测量输出,y(t)为ny维实数,t 表示时间,Ai,Bi和Ci表示增益矩阵;对象模糊规则数目为r,i表示对象模糊规则序号;θ1(t),和θg(t)分别表示第1个、第k个和第g个前件变量,g表示前件变量数目,表示前件变量序号,Mi1,和Mig分别表示对象第i个模糊规则下第1个、第个和第g个模糊集。In the formula, is the derivative of x(t), x(t) represents the state of the object, x(t) is an n-dimensional real number, represents the control input affected by actuator saturation, is n u -dimensional real number, y(t) represents measurement output, y(t) is n y -dimensional real number, t represents time, A i , B i and C i represent gain matrix; the number of object fuzzy rules is r, i represents object Fuzzy rule number; θ 1 (t), and θ g (t) represent the 1st, kth and gth antecedent variables, respectively, and g represents the number of antecedent variables, Indicates the serial number of the antecedent variable, M i1 , and M ig respectively represent the first and third objects under the i-th fuzzy rule of the object. and the gth fuzzy sets.
使用乘积模糊推理、中心平均解模糊器和单点模糊器,得到T-S模糊系统表示的非线性对象模型如下Using product fuzzy inference, center-average defuzzifier, and single-point fuzzer, the nonlinear object model represented by the T-S fuzzy system is obtained as follows
式中,替代式且 表示前件变量隶属于模糊集的隶属度函数,Σ和Π分别表示累加和累乘运算。In the formula, the alternative and represents the antecedent variable belongs to fuzzy set The membership function of , Σ and Π represent the accumulation and accumulation operations, respectively.
在设计基于非线性对象测量输出的事件驱动器时:When designing event drivers that measure outputs based on nonlinear objects:
基于非线性对象的测量输出,设计事件驱动器为:Based on the measured output of the nonlinear object, the design event driver is:
式中,δ∈(0,1)为驱动器阈值参数,为正定矩阵,h表示采样周期,tkh表示第k个驱动时刻,tkh为采样周期的tk倍,tk+1h表示第k+1个驱动时刻,tk+1h为采样周期的tk+1倍,下角标k表示驱动时刻序号。表示当前采样时刻,为tkh 后第个采样周期,y(tkh)和分别表示tkh和对应的非线性对象测量输出,min{}表示最小值函数,矩阵的右上角标T表示矩阵的转置。where δ∈(0,1) is the driver threshold parameter, is a positive definite matrix, h represents the sampling period, t k h represents the kth driving moment, t k h is t k times the sampling period, t k+1 h represents the k+1 th driving moment, and t k+1 h is The sampling period is t k+1 times, and the subscript k represents the driving time sequence number. represents the current sampling time, is the first after t k h sampling period, y(t k h) and represent t k h and The corresponding nonlinear object measurement output, min{} represents the minimum function, and the upper right corner of the matrix T represents the transpose of the matrix.
本发明中,事件驱动器在每个周期采样点判断对式(3)中的事件驱动条件进行判断,若满足条件,则发送采样数据;若不满足条件,则丢弃采样数据。因此,事件驱动器仅发送满足事件驱动条件的采样数据,从而能够节约网络带宽等系统受限资源。另外,事件驱动器仅使用非线性对象测量输出的周期采样值,易于软件实现,从原理上避免了芝诺现象,且解除了多数成果对对象状态完全可测的假设限制。In the present invention, the event driver judges the event driving condition in formula (3) at each cycle sampling point. If the condition is satisfied, the sampled data is sent; if the condition is not satisfied, the sampled data is discarded. Therefore, the event driver only sends the sampled data that meets the event-driven conditions, thereby saving system-limited resources such as network bandwidth. In addition, the event driver only uses the periodic sampling value of the nonlinear object measurement output, which is easy to implement in software, avoids the Zeno phenomenon in principle, and removes the assumption that the state of the object is completely measurable in most achievements.
建立执行器饱和模型如下:The actuator saturation model is established as follows:
式中,表示u(t)的第维分量,u(t)表示不考虑执行器饱和影响的对象控制输入,u(t)为nu维实数,表示u(t)的维数序号,和分别表示执行器最大允许输出值和最小允许输出值,表示对应的执行器饱和函数值,sat()表示执行器饱和函数。In the formula, represents the first order of u(t) dimensional component, u(t) represents the object control input without considering the effect of actuator saturation, u(t) is a n u -dimensional real number, represents the dimension number of u(t), and respectively represent the maximum allowable output value and the minimum allowable output value of the actuator, express The corresponding actuator saturation function value, sat() represents the actuator saturation function.
由执行器饱和模型(4)可知,当时,执行器饱和函数输出为执行器最大允许输出值,即当时,执行器饱和函数输出为执行器最小允许输出值,即当时,执行器饱和函数输出为 According to the actuator saturation model (4), when When , the output of the actuator saturation function is the maximum allowable output value of the actuator, that is when When , the output of the actuator saturation function is the minimum allowable output value of the actuator, namely when When , the output of the actuator saturation function is
使用执行器饱和模型(4),将非线性对象模型(2)中受执行器饱和影响的控制输入表示为:Using the actuator saturation model (4), the control inputs in the nonlinear object model (2) that are affected by actuator saturation Expressed as:
式中,替代式u1和分别表示u(t)的第 1维和第nu维分量,sat(u1)和分别表示u1和对应的执行器饱和函数值。替代式和分别表示u1,和对应的执行器死区函数值,表示执行器死区函数。In the formula, the alternative u 1 and Represent the 1st and nth u -dimensional components of u(t), sat(u 1 ) and denote u 1 and Corresponding actuator saturation function value. Alternative and respectively represent u 1 , and Corresponding actuator dead zone function value, Represents the actuator deadband function.
由执行器饱和模型(4),可得下式成立From the actuator saturation model (4), the following formula can be obtained
式中,实数表示的最大值,max{}表示最大值函数。In the formula, the real number express The maximum value of , max{} represents the maximum value function.
B:建立随机欺骗攻击模型及DOFFSS控制器模型,并建立有机融合随机欺骗攻击、事件驱动器、执行器饱和及网络诱导延时参数的闭环系统模型;B: Build a random spoofing attack model and a DOFFSS controller model, and build a closed-loop system model that organically integrates random spoofing attacks, event drivers, actuator saturation, and network-induced delay parameters;
首先,不考虑随机欺骗攻击影响,在零阶保持器作用下,DOFFSS控制器输入表示为First, without considering the effect of random spoofing attacks, under the action of the zero-order retainer, the DOFFSS controller input Expressed as
式中,[tkh+τk,tk+1h+τk+1)表示零阶保持器保持时间,和分别表示tkh和tk+1h对应的网络诱导延时,τ和分别表示网络诱导延时的下界和上界。where [t k h+τ k ,t k+1 h+τ k+1 ) represents the holding time of the zero-order keeper, and are the network-induced delays corresponding to t k h and t k+1 h, respectively, τ and denote the lower and upper bounds of the network-induced delay, respectively.
定义划分零阶保持器保持时间如下definition Divide the zero-order keeper holding time as follows
式中,nk表示划分子区间序号,为nk最大值,∪为并集符号,子区间表示如下In the formula, n k represents the number of the divided sub-intervals, is the maximum value of n k , ∪ is the union symbol, subinterval expressed as follows
在划分子区间上,定义函数如下in dividing subintervals On, define the function as follows
e(t)=y(tkh)-y(tkh+nkh),η(t)=t-(tkh+nkh) (10);e(t)=y(t k h)-y(t k h+n k h), η(t)=t-(t k h+n k h) (10);
式中,y(tkh+nkh)表示采样时刻tkh+nkh对应的非线性对象测量输出。In the formula, y(t k h+n k h) represents the nonlinear object measurement output corresponding to the sampling time t k h+n k h.
使用式(10),将DOFFSS控制器输入(7)表示为:Using equation (10), the DOFFSS controller input (7) is expressed as:
式中,y(t-η(t))表示时刻t-η(t)对应的非线性对象测量输出,由(10)得到 t-η(t)=tkh+nkh。In the formula, y(t-η(t)) represents the nonlinear object measurement output corresponding to time t-η(t), and t-η(t)=t k h+n k h is obtained from (10).
其次,建立随机欺骗攻击模型如下Secondly, the random deception attack model is established as follows
式中,表示欺骗攻击函数,a(t)∈{0,1}表示伯努利分布随机变量,当 a(t)=1时,欺骗攻击激活,控制器输入被篡改;当a(t)=0时,欺骗攻击休眠,控制器输入未被篡改;由于实际中攻击能量通常受限,即满足下式In the formula, represents the spoofing attack function, a(t)∈{0,1} represents a Bernoulli distributed random variable, when a(t)=1, the spoofing attack is activated, and the controller input is tampered with; when a(t)=0 , the spoofing attack is dormant, and the controller input is not tampered with; since the attack energy is usually limited in practice, that is satisfy the following formula
式中,G为攻击能量限定矩阵。In the formula, G is the attack energy limit matrix.
使用式(11)和(12),得到随机欺骗攻击下控制器输入如下Using equations (11) and (12), the controller input under random spoofing attack is obtained as follows
随后,建立DOFFSS控制器模型如下:Subsequently, the DOFFSS controller model is established as follows:
设控制器第j个模糊规则表示为:若θ1(t)为Mj1,...,为...,θg(t)为 Mjg,则Let the jth fuzzy rule of the controller be expressed as: if θ 1 (t) is M j1 ,..., for ...,θ g (t) is M jg , then
式中,为xc(t)的导数,xc(t)表示控制器状态,xc(t)为n维实数,xc(t-η(t))表示t-η(t)对应的控制器状态,和为增益矩阵;控制器模糊规则数目为r,j表示控制器模糊规则序号,Mj1,和Mjg分别表示控制器第j个模糊规则下第1个、第k个和第g个模糊集。In the formula, is the derivative of x c (t), x c (t) represents the controller state, x c (t) is an n-dimensional real number, and x c (t-η(t)) represents the controller corresponding to t-η(t) state, and is the gain matrix; the number of fuzzy rules of the controller is r, j represents the sequence number of the fuzzy rules of the controller, M j1 , and Mjg respectively represent the 1st, kth and gth fuzzy sets under the jth fuzzy rule of the controller.
使用乘积模糊推理、中心平均解模糊器和单点模糊器,得到DOFFSS控制器模型如下Using product fuzzy inference, center-average defuzzifier, and single-point fuzzer, the DOFFSS controller model is obtained as follows
式中,替代式且 表示前件变量隶属于模糊集的隶属度函数。In the formula, the alternative and represents the antecedent variable belongs to fuzzy set membership function.
综上,联立非线性对象模型(2)及DOFFSS控制器模型(16),建立闭环系统模型如下:In summary, the nonlinear object model (2) and the DOFFSS controller model (16) are simultaneously established to establish a closed-loop system model as follows:
式中,表示闭环系统状态,为χ(t)的导数,χ(t-η(t))表示t-η(t)对应的闭环系统状态,和表示闭环系统增益矩阵。In the formula, represents the closed-loop system state, is the derivative of χ(t), χ(t-η(t)) represents the closed-loop system state corresponding to t-η(t), and represents the closed-loop system gain matrix.
C:设计随机欺骗攻击、执行器饱和及网络诱导延时影响下非线性系统事件驱动器与DOFFSS控制器联合设计条件,求出满足非线性系统通信和控制需求的事件驱动器参数和等价DOFFSS控制器的增益矩阵最终得到满足非线性系统通信和控制需求的事件驱动器和DOFFSS控制器。C: Design the joint design conditions of the nonlinear system event driver and DOFFSS controller under the influence of random spoofing attack, actuator saturation and network-induced delay, and find the event driver parameters that meet the communication and control requirements of the nonlinear system and the gain matrix of the equivalent DOFFSS controller Finally, an event driver and DOFFSS controller that meet the communication and control requirements of nonlinear systems are obtained.
所述的步骤C,包括以下两个具体步骤:Described step C, comprises the following two specific steps:
C1:基于李雅普诺夫稳定性理论,确定随机欺骗攻击、事件驱动器、执行器饱和及网络诱导延时影响下的非线性系统渐近稳定条件。C1: Based on Lyapunov stability theory, determine the asymptotic stability conditions of nonlinear systems under the influence of random spoofing attacks, event drivers, actuator saturation, and network-induced delays.
给定采样周期h,网络诱导延时下界τ和上界执行器饱和参数ε,攻击能量限定矩阵G和事件驱动器阈值参数δ∈(0,1),如果存在正定矩阵 R>0,S>0,Q1>0,Q2>0,Q3>0,及矩阵U2,U3,满足以及Given the sampling period h, the lower bound τ and the upper bound of the network-induced delay The actuator saturation parameter ε, the attack energy limiting matrix G and the event driver threshold parameter δ∈(0,1), if there is a positive definite matrix R>0, S>0, Q 1 >0, Q 2 >0, Q 3 >0, and matrices U 2 , U 3 , satisfying as well as
则随机欺骗攻击、事件驱动器、执行器饱和及网络诱导延时影响下闭环系统 (17)是渐近稳定的。Then the closed-loop system (17) is asymptotically stable under the influence of random spoofing attacks, event drivers, actuator saturation, and network-induced delays.
上述稳定性条件中,使用了替代式如下:In the above stability conditions, the following alternatives were used:
其中,表示a(t)的数学期望,为数学期望函数。He{}表示矩阵与其转置矩阵的和,*表示对称矩阵中的对称项,表示零矩阵,矩阵右上角标-1表示逆矩阵,I为单位矩阵,col{}表示列矩阵,diag{}表示对角矩阵。in, represents the mathematical expectation of a(t), is the mathematical expectation function. He{} represents the sum of the matrix and its transposed matrix, * represents the symmetric term in the symmetric matrix, Represents a zero matrix, the upper right corner of the matrix -1 represents the inverse matrix, I is the identity matrix, col{} represents the column matrix, and diag{} represents the diagonal matrix.
证明:构造李雅普诺夫泛函如下Proof: Construct the Lyapunov functional as follows
式中,替代式ρ=0.5(η3-η1),表示积分变量,χ(s), χ(s-η1)和χ(s-η2)分别表示s,s-η1和s-η2对应的闭环系统状态,表示χ(s)的导数。In the formula, the alternative ρ=0.5(η 3 -η 1 ), represents the integral variable, χ(s), χ(s-η 1 ) and χ(s-η 2 ) represent the closed-loop system states corresponding to s, s-η 1 and s-η 2 , respectively, represents the derivative of χ(s).
对李雅普诺夫泛函求导得到Derivation of the Lyapunov functional gives
式中,为V(t)的导数,和分别表示t和t-ρ对应的替代式χ(t-η1)表示t-η1对应的闭环系统状态,替代式ζ1,ζ2,ζ3表示如下:In the formula, is the derivative of V(t), and represent the alternatives corresponding to t and t-ρ, respectively χ(t-η 1 ) represents the closed-loop system state corresponding to t-η 1 , and the substitution formulas ζ 1 , ζ 2 , ζ 3 are expressed as follows:
式中,表示积分变量对应的闭环系统状态导数。In the formula, represents the integral variable The corresponding closed-loop system state derivative.
考虑如下两种情况:Consider the following two cases:
(1)若η(t)∈[η1,η2),对(21)中ζ1,ζ2,ζ3使用琴生不等式,并使用进一步对ζ2使用互凸方法得到(1) If η(t)∈[η 1 ,η 2 ), use Qinsheng's inequality for ζ 1 , ζ 2 , ζ 3 in (21), and use Further use the mutual convex method for ζ 2 to get
式中,替代式和和χ(t-η3) 分别表示t-η2和t-η3对应的闭环系统状态。In the formula, the alternative and and χ(t-η 3 ) represent the closed-loop system states corresponding to t-η 2 and t-η 3 , respectively.
(2)如果η(t)∈[η2,η3],对(21)中ζ1,ζ2,ζ3使用琴生不等式,并使用进一步对ζ3使用互凸方法得到(2) If η(t)∈[η 2 ,η 3 ], use Genson's inequality for ζ 1 , ζ 2 , ζ 3 in (21), and use Further use the mutual convex method for ζ 3 to get
式中,使用了替代式和 In the formula, using the alternative and
使用(22)和(23),对李雅普诺夫泛函导数(20)求数学期望得到Using (22) and (23), the mathematical expectation for the derivative of the Lyapunov functional (20) gives
式中,为替代式。In the formula, for the alternative.
使用式(10),由事件驱动器(3)及攻击能量受限条件(13)得到Using equation (10), it is obtained from the event driver (3) and the limited attack energy condition (13)
使用式(25),由式(24)得到Using Equation (25), it is obtained from Equation (24)
式中,使用了如下替代式In the formula, the following alternatives are used
对式(18)使用舒尔补引理得到Using the Schur complement lemma for equation (18), we get
将式(27)代入式(26),得到根据李雅普诺夫稳定性理论,闭环系统(17)是渐近稳定的。证毕。Substituting equation (27) into equation (26), we get According to the Lyapunov stability theory, the closed-loop system (17) is asymptotically stable. Certificate completed.
在上述系统稳定条件中,存在事件驱动器正定矩阵的逆矩阵且DOFFSS 控制器增益矩阵与正定矩阵P耦合,因此,该条件不能直接用于事件驱动器和控制器设计。为了解决此问题,本发明将进一步给出事件驱动器与 DOFFSS控制器联合设计方法。In the above system stable condition, there is an event-driven positive definite matrix the inverse of and the DOFFSS controller gain matrix coupled to a positive definite matrix P, therefore, this condition cannot be used directly in event driver and controller designs. In order to solve this problem, the present invention will further provide a joint design method of event driver and DOFFSS controller.
C2:基于步骤C1得出的非线性系统渐近稳定条件,利用线性矩阵不等式技术,得到事件驱动器与DOFFSS控制器联合设计条件,即求出满足非线性系统通信和控制需求的事件驱动器参数和等价DOFFSS控制器的增益矩阵最终得到满足非线性系统通信和控制需求的事件驱动器和DOFFSS 控制器。C2: Based on the asymptotic stability conditions of the nonlinear system obtained in step C1, using the linear matrix inequality technique, the joint design conditions of the event driver and the DOFFSS controller are obtained, that is, the event driver parameters that meet the communication and control requirements of the nonlinear system are obtained. and the gain matrix of the equivalent DOFFSS controller Finally, an event driver and DOFFSS controller that meet the communication and control requirements of nonlinear systems are obtained.
首先,给出步骤C2中使用的现有技术(定理1)如下:First, the prior art used in step C2 (Theorem 1) is given as follows:
定理1.如果给定正定矩阵Q>0,矩阵L及实数∈>0,则不等式 (L-∈Q)Q-1(L-∈Q)≥0成立,即不等式-LQ-1L≤∈2Q-2∈L成立。Theorem 1. If a positive definite matrix Q>0, matrix L and a real number ∈>0 are given, then the inequality (L-∈Q)Q -1 (L-∈Q)≥0 holds, that is, the inequality -LQ -1 L≤∈ 2 Q-2∈L holds.
然后,给出事件驱动器与DOFFSS控制器联合设计条件如下:Then, the joint design conditions of event driver and DOFFSS controller are given as follows:
给定采样周期h,网络诱导延时下界τ和上界执行器饱和参数ε和攻击能量限定矩阵G,实数∈1>0,∈2>0,∈3>0,如果存在实数正定矩阵 Given the sampling period h, the network-induced delay lower bound τ and upper bound Actuator saturation parameter ε and attack energy limit matrix G, real numbers ∈ 1 > 0, ∈ 2 > 0, ∈ 3 > 0, if there are real numbers positive definite matrix
及矩阵满足 以及 and matrix Satisfy as well as
则闭环系统(17)是渐进稳定的,同时得到事件驱动器参数和等价DOFFSS控制器(34)的增益矩阵如下Then the closed-loop system (17) is asymptotically stable, and the event-driven parameters are obtained and the gain matrix of the equivalent DOFFSS controller (34) as follows
上述条件中,使用的替代式如下In the above conditions, the alternatives used are as follows
X>0,Y>0为正定矩阵,N为n×n维实数矩阵。 X>0, Y>0 is a positive definite matrix, and N is an n×n-dimensional real matrix.
证明:将正定矩阵P分解如下Proof: Decompose a positive definite matrix P as follows
式中,X>0,Y>0为正定矩阵,N为n×n维实数矩阵。由舒尔补引理得到,正定矩阵P>0等价于 In the formula, X>0, Y>0 is a positive definite matrix, and N is an n×n-dimensional real number matrix. According to Schur's complement lemma, a positive definite matrix P>0 is equivalent to
对步骤C1中系统稳定条件变换如下The transformation of the system stability conditions in step C1 is as follows
式中,使用了以下替代式In the formula, the following alternatives are used
Ψ1=diag{Φ1,Φ1},Ψ2=diag{Φ1,Φ1,Φ1,Φ1,Φ1,I,I,I,Ψ3,I,I,I},Ψ 1 =diag{Φ 1 ,Φ 1 },Ψ 2 =diag{Φ 1 ,Φ 1 ,Φ 1 ,Φ 1 ,Φ 1 ,I,I,I,Ψ 3 ,I,I,I},
对(32)中和使用定理1,得到(28)中和 Right (32) and Using Theorem 1, we get (28) and
因此,如果满足给定条件,闭环系统(17)是渐近稳定的。同时得到事件驱动器参数和DOFFSS控制器(16)的增益矩阵如下Therefore, the closed-loop system (17) is asymptotically stable if the given conditions are met. Also get event driver parameters and the gain matrix of the DOFFSS controller (16) is as follows
为了处理(33)中未知矩阵N,使用线性变换得到等价 DOFFSS控制器如下To process the unknown matrix N in (33), use a linear transformation The equivalent DOFFSS controller is obtained as follows
式中,表示等价DOFFSS控制器状态,为n维实数,为的导数,表示t-η(t)对应的等价DOFFSS控制器状态,增益矩阵由(29)获得。证毕。In the formula, represents the equivalent DOFFSS controller state, is an n-dimensional real number, for the derivative of , Represents the equivalent DOFFSS controller state corresponding to t-η(t), the gain matrix Obtained from (29). Certificate completed.
通过本发明所述的事件驱动器与DOFFSS控制器联合设计方法,用户可结合具体设计要求,逐一确定各个参数,按所述步骤求得事件驱动器及DOFFSS控制器,事件驱动器能够降低数据发送率,从而节约网络带宽等系统受限资源;DOFFSS 控制器使非线性系统在随机欺骗攻击、事件驱动器、执行器饱和及网络诱导延时影响下能够渐近稳定。Through the joint design method of the event driver and the DOFFSS controller of the present invention, the user can determine each parameter one by one according to the specific design requirements, and obtain the event driver and the DOFFSS controller according to the steps. The event driver can reduce the data transmission rate, thereby Save system-constrained resources such as network bandwidth; DOFFSS controller enables nonlinear systems to be asymptotically stable under the influence of random spoofing attacks, event drivers, actuator saturation, and network-induced delays.
本发明应用场景举例:近年来,针对实际工业控制系统的网络攻击频发,如:2015年,乌克兰电力系统被恶意软件攻击,约140万人受停电影响。针对上述场景,应用本发明相关方法,将上述核电站离心机系统及电力系统建模为非线性对象,设计事件驱动器及执行器饱和模型,建立随机欺骗攻击模型、DOFFSS控制器模型,以及有机融合随机欺骗攻击、事件驱动器、执行器饱和及网络诱导延时参数的闭环系统模型,推导闭环系统渐近稳定条件,给出事件驱动器与DOFFSS控制器联合设计条件,同时得到满足要求的事件驱动器及DOFFSS控制器。Examples of application scenarios of the present invention: In recent years, network attacks against actual industrial control systems have occurred frequently. For example, in 2015, the Ukrainian power system was attacked by malware, and about 1.4 million people were affected by power outages. Aiming at the above scenario, the related method of the present invention is applied to model the above-mentioned nuclear power plant centrifuge system and power system as nonlinear objects, an event driver and actuator saturation model are designed, a random spoofing attack model, a DOFFSS controller model, and an organic fusion random Close-loop system model of spoofing attack, event driver, actuator saturation and network-induced delay parameters, deduce the asymptotic stability condition of the closed-loop system, give the joint design conditions of event driver and DOFFSS controller, and obtain the event driver and DOFFSS controller that meet the requirements at the same time device.
以下结合实施例对本发明做详细的描述:Below in conjunction with embodiment, the present invention is described in detail:
步骤A:建立非线性对象模型,并设计基于非线性对象测量输出的事件驱动器:Step A: Model the nonlinear object and design an event driver based on the measurement output of the nonlinear object:
其中,非线性对象以质量弹簧阻尼系统为例,其动力学方程描述为Among them, the nonlinear object takes the mass-spring damping system as an example, and its dynamic equation is described as
式中,表示距离参考点的位移,和分别表示的一阶和二阶导数,m为质量,表示摩擦力,表示弹簧弹力,表示受执行器饱和影响的控制输入,为实数。参数设置为c=2牛·米/秒, In the formula, represents the displacement from the reference point, and Respectively The first and second derivatives of , m is the mass, represents friction, represents the spring force, represents the control input affected by actuator saturation, is a real number. parameter is set to c = 2 N m/s,
定义对象状态则质量弹簧阻尼系统(35)能够描述为非线性对象(2),其中μ1(θ(t))=-(θ1(t)+8)/2.88,μ2(θ(t))=1-μ1(θ(t)),r=2,g=1,增益矩阵如下:define object state Then the mass-spring damping system (35) can be described as a nonlinear object (2), where μ 1 (θ(t))=−(θ 1 (t)+8)/2.88, μ 2 (θ(t))= 1-μ 1 (θ(t)), r=2, g=1, the gain matrix is as follows:
设计基于非线性对象测量输出的事件驱动器(3),其中采样周期h=100毫秒,驱动器阈值参数δ及正定矩阵由步骤C2中事件驱动器与DOFFSS控制器联合设计条件得到。Design an event driver (3) based on the non-linear object measurement output, where the sampling period h=100 ms, the driver threshold parameter δ and the positive definite matrix Obtained from the joint design condition of event driver and DOFFSS controller in step C2.
建立执行器饱和模型(4):其中,执行器最大允许输出值ui的最大值实数 Establish the actuator saturation model (4): where, the maximum allowable output value of the actuator the maximum value of ui real numbers
步骤B:建立随机欺骗攻击及DOFFSS控制器模型,并建立有机融合随机欺骗攻击、事件驱动器,执行器饱和及网络诱导延时参数的闭环系统模型;Step B: Build random spoofing attack and DOFFSS controller models, and build a closed-loop system model organically integrating random spoofing attack, event driver, actuator saturation and network-induced delay parameters;
首先,建立随机欺骗攻击模型为 First, establish a random spoofing attack model as
其中,为欺骗攻击函数,tanh表示非线性双曲正切函数,a(t)∈{0,1}为伯努利分布随机变量,数学期望为攻击能量限定矩阵为G=0.1(一维矩阵等同为实数)。in, is a spoofing attack function, tanh represents a nonlinear hyperbolic tangent function, a(t)∈{0,1} is a random variable with Bernoulli distribution, and the mathematical expectation is The attack energy limit matrix is G=0.1 (a one-dimensional matrix is equivalent to a real number).
其次,建立DOFFSS控制器模型(16)。Next, build the DOFFSS controller model (16).
然后,建立有机融合随机欺骗攻击、事件驱动器、执行器饱和及网络诱导延时参数的闭环系统模型(17),其中,网络诱导延时下界τ=10毫秒和上界毫秒。Then, build a closed-loop system model (17) that organically integrates random spoofing attacks, event drivers, actuator saturation, and network-induced delay parameters, where the network-induced delay lower bound τ = 10 ms and upper bound millisecond.
步骤C:设计随机欺骗攻击、执行器饱和及网络诱导延时影响下事件驱动器与DOFFSS控制器联合设计条件,求得事件驱动器参数和等价DOFFSS控制器的增益矩阵最终得到满足系统需求的事件驱动器及DOFFSS控制器。Step C: Design the joint design conditions of the event driver and the DOFFSS controller under the influence of random spoofing attack, actuator saturation and network-induced delay, and obtain the event driver parameters and the gain matrix of the equivalent DOFFSS controller Finally, the event driver and DOFFSS controller that meet the system requirements are obtained.
其中,由步骤C1得到非线性系统渐近稳定条件,进而,由步骤C2得到事件驱动器与DOFFSS控制器联合设计条件,其中∈1=∈2=∈3=1。求解此联合设计条件,得到事件驱动器参数及等价DOFFSS控制器增益矩阵如下Wherein, the asymptotically stable condition of the nonlinear system is obtained from step C1, and further, the joint design condition of the event driver and the DOFFSS controller is obtained from step C2, where ∈ 1 =∈ 2 =∈ 3 =1. Solving this joint design condition yields the event-driven parameters and the equivalent DOFFSS controller gain matrix is as follows
本实施例中,在设计的DOFFSS控制器作用下,随机欺骗攻击、事件驱动器、执行器饱和及网络诱导延时影响下质量弹簧阻尼系统能够渐近稳定。另外,在仿真时间[0,10秒]内,传感器周期采样100个数据,其中事件驱动器发送71个数据,数据发送率为71%。与周期采样器数据发送率100%比较,事件驱动器在保证系统性能前提下,节约了29%的系统资源。此外,事件驱动器发送的71个数据中,15个数据被随机欺骗攻击篡改,攻击率为21%。In this embodiment, under the action of the designed DOFFSS controller, the mass-spring damping system can be asymptotically stable under the influence of random spoofing attacks, event drivers, actuator saturation and network-induced delay. In addition, in the simulation time [0,10 seconds], the sensor cycle samples 100 data, of which the event driver sends 71 data, the data sending rate is 71%. Compared with the 100% data transmission rate of the periodic sampler, the event driver saves 29% of system resources under the premise of ensuring system performance. Additionally, 15 of the 71 data sent by the event driver were tampered with by random spoofing attacks, an attack rate of 21%.
实施例表明,一方面,事件驱动器能够将数据发送率降为71%,节约了29%网络带宽等系统受限资源。另一方面,虽然高达21%的事件驱动器发送数据被随机欺骗攻击篡改,但是,在DOFFSS控制器作用下,非线性系统仍然能够渐近稳定。另外,本发明方法基于非线性对象测量输出进行设计,解除了多数成果对对象状态完全可测的假设限制。The embodiment shows that, on the one hand, the event driver can reduce the data transmission rate to 71%, and save 29% of system-limited resources such as network bandwidth. On the other hand, although up to 21% of the data sent by event drivers are tampered with by random spoofing attacks, the nonlinear system can still be asymptotically stable under the action of the DOFFSS controller. In addition, the method of the present invention is designed based on the non-linear object measurement output, which relieves the assumption that the state of the object is completely measurable in most achievements.
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110962406.8A CN113625647B (en) | 2021-08-20 | 2021-08-20 | Joint design method of event driver and DOFFSS controller for nonlinear system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110962406.8A CN113625647B (en) | 2021-08-20 | 2021-08-20 | Joint design method of event driver and DOFFSS controller for nonlinear system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113625647A true CN113625647A (en) | 2021-11-09 |
CN113625647B CN113625647B (en) | 2025-02-14 |
Family
ID=78387034
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110962406.8A Active CN113625647B (en) | 2021-08-20 | 2021-08-20 | Joint design method of event driver and DOFFSS controller for nonlinear system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113625647B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114355993A (en) * | 2021-12-28 | 2022-04-15 | 杭州电子科技大学 | Sliding mode control method for deception attack reservoir water level system |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120045013A1 (en) * | 2010-08-23 | 2012-02-23 | Tongji University | Method for real-time online control of hybrid nonlinear system |
KR101687811B1 (en) * | 2015-09-07 | 2017-02-01 | 박준영 | Design of Agent Type's ARP Spoofing Detection Scheme which uses the ARP probe Packet and Implementation of the Security Solution |
KR20170039512A (en) * | 2015-10-01 | 2017-04-11 | 한밭대학교 산학협력단 | Control apparatus using direct discrete time design approach and method thereof |
CN108490787A (en) * | 2018-04-29 | 2018-09-04 | 天津大学 | Saturation system Composite nonlinear feedback control device design method based on event triggering |
CN110213115A (en) * | 2019-06-25 | 2019-09-06 | 南京财经大学 | A kind of Multi net voting attacks the method for controlling security of lower event-driven network control system |
CN110865616A (en) * | 2019-11-07 | 2020-03-06 | 河南农业大学 | Design method of event trigger zone memory DOF controller under random FDI attack |
CN111679572A (en) * | 2020-05-11 | 2020-09-18 | 南京财经大学 | Security control method of network control system based on mixed triggering under multiple network attacks |
CN112099347A (en) * | 2020-08-06 | 2020-12-18 | 杭州电子科技大学 | Event trigger control method of saturated nonlinear networked industrial control system |
CN112865752A (en) * | 2020-12-24 | 2021-05-28 | 南京财经大学 | Filter design method based on adaptive event trigger mechanism under hybrid network attack |
CN113009825A (en) * | 2021-02-08 | 2021-06-22 | 云境商务智能研究院南京有限公司 | Deception-attacked nonlinear networked system state estimation method |
-
2021
- 2021-08-20 CN CN202110962406.8A patent/CN113625647B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120045013A1 (en) * | 2010-08-23 | 2012-02-23 | Tongji University | Method for real-time online control of hybrid nonlinear system |
KR101687811B1 (en) * | 2015-09-07 | 2017-02-01 | 박준영 | Design of Agent Type's ARP Spoofing Detection Scheme which uses the ARP probe Packet and Implementation of the Security Solution |
KR20170039512A (en) * | 2015-10-01 | 2017-04-11 | 한밭대학교 산학협력단 | Control apparatus using direct discrete time design approach and method thereof |
CN108490787A (en) * | 2018-04-29 | 2018-09-04 | 天津大学 | Saturation system Composite nonlinear feedback control device design method based on event triggering |
CN110213115A (en) * | 2019-06-25 | 2019-09-06 | 南京财经大学 | A kind of Multi net voting attacks the method for controlling security of lower event-driven network control system |
CN110865616A (en) * | 2019-11-07 | 2020-03-06 | 河南农业大学 | Design method of event trigger zone memory DOF controller under random FDI attack |
CN111679572A (en) * | 2020-05-11 | 2020-09-18 | 南京财经大学 | Security control method of network control system based on mixed triggering under multiple network attacks |
CN112099347A (en) * | 2020-08-06 | 2020-12-18 | 杭州电子科技大学 | Event trigger control method of saturated nonlinear networked industrial control system |
CN112865752A (en) * | 2020-12-24 | 2021-05-28 | 南京财经大学 | Filter design method based on adaptive event trigger mechanism under hybrid network attack |
CN113009825A (en) * | 2021-02-08 | 2021-06-22 | 云境商务智能研究院南京有限公司 | Deception-attacked nonlinear networked system state estimation method |
Non-Patent Citations (6)
Title |
---|
刘金良;顾媛媛;费树岷;: "基于事件触发和网络攻击的负荷频率控制电力系统H_∞滤波器设计", 中国科学:信息科学, no. 10, 29 October 2018 (2018-10-29), pages 66 - 81 * |
张进;彭晨;: "基于事件触发的网络化T-S模糊系统容错控制", 信息与控制, no. 01, 15 February 2016 (2016-02-15), pages 77 - 82 * |
李刘文: "具有饱和约束的网络控制系统事件驱动控制与同步问题研究", 中国博士学位论文全文数据库信息科技辑, no. 5, 15 May 2019 (2019-05-15), pages 17 - 36 * |
李富强,等: "Output-based event-triggered control of nonlinear systems under deception attacks", 《第40届中国控制会议论文集(9)》, 26 July 2021 (2021-07-26), pages 4901 - 4906, XP033982547, DOI: 10.23919/CCC52363.2021.9549982 * |
顾媛媛: "基于网络攻击和事件触发的网络化系统若干问题研究", 中国优秀硕士学位论文全文数据库信息科技辑, no. 04, 15 April 2020 (2020-04-15), pages 17 - 32 * |
高毅: "网络环境下事件驱动控制策略的研究", 中国博士学位论文全文数据库信息科技辑, no. 12, 15 December 2019 (2019-12-15), pages 55 - 68 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114355993A (en) * | 2021-12-28 | 2022-04-15 | 杭州电子科技大学 | Sliding mode control method for deception attack reservoir water level system |
CN114355993B (en) * | 2021-12-28 | 2024-03-26 | 杭州电子科技大学 | Sliding mode control method for reservoir water level system under spoofing attack |
Also Published As
Publication number | Publication date |
---|---|
CN113625647B (en) | 2025-02-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wang et al. | Event-based asynchronous and resilient filtering for Markov jump singularly perturbed systems against deception attacks | |
Liu et al. | Security control for T–S fuzzy systems with adaptive event-triggered mechanism and multiple cyber-attacks | |
Li et al. | Event-triggered consensus control for multi-agent systems against false data-injection attacks | |
Zhang et al. | Output reachable set synthesis of event-triggered control for singular Markov jump systems under multiple cyber-attacks | |
Cai et al. | Quantized sampled-data control tactic for TS fuzzy NCS under stochastic cyber-attacks and its application to truck-trailer system | |
CN110865616B (en) | Design method of event trigger zone memory DOF controller under random FDI attack | |
Zhao et al. | Decentralized resilient $ H_ {\infty} $ load frequency control for cyber-physical power systems under DoS attacks | |
CN113009825A (en) | Deception-attacked nonlinear networked system state estimation method | |
CN112099356A (en) | Design method of event-driven SDOFQH controller under DoS attack | |
CN112698573A (en) | Networked system non-fragile event trigger control method based on positive switching system modeling | |
Yang et al. | Interval type-2 fuzzy sliding mode resilient control via probability-dependent adaptive event-triggered scheme | |
CN112859607A (en) | Collaborative design method for distributed security event driver and SDOFD controller | |
Huang et al. | Filter-based event-triggered adaptive fuzzy control for discrete-time MIMO nonlinear systems with unknown control gains | |
Huang et al. | Strategic DoS attack in continuous space for cyber-physical systems over wireless networks | |
CN113625647A (en) | Joint Design Method of Event Driver and DOFFSS Controller for Nonlinear Systems | |
Yang et al. | Sliding mode fuzzy control of stochastic nonlinear systems under cyber-attacks | |
CN112068441B (en) | A co-design method of security event driver and SDOFR controller | |
CN112068442B (en) | Design method of event-driven SDOFQ controller under periodic DoS attack | |
Gao et al. | Output-based event-triggered resilient control of uncertain NCSs under DoS attacks and quantisation | |
Zhou et al. | Consensus of NMASs with MSTs subjected to DoS attacks under event-triggered control | |
Xu et al. | Event-triggered stabilization for networked control systems under random occurring deception attacks | |
Zheng et al. | Robust security control under denial-of-service jamming attacks: An event-triggered sliding-mode control approach | |
Tan et al. | Event‐triggered security control for fuzzy‐model‐based cyber‐physical systems under Denial‐of‐Service attacks and actuator faults | |
Wang et al. | Event-based adaptive compensation control of nonlinear cyber-physical systems under actuator failure and false data injection attack | |
CN112118139B (en) | Collaborative design method for security event driver and SDOFH controller |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant |