CN113625684A - Tracking controller and method based on event trigger mechanism under hybrid network attack - Google Patents
Tracking controller and method based on event trigger mechanism under hybrid network attack Download PDFInfo
- Publication number
- CN113625684A CN113625684A CN202110843029.6A CN202110843029A CN113625684A CN 113625684 A CN113625684 A CN 113625684A CN 202110843029 A CN202110843029 A CN 202110843029A CN 113625684 A CN113625684 A CN 113625684A
- Authority
- CN
- China
- Prior art keywords
- attack
- denotes
- tracking
- representing
- matrix
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000007246 mechanism Effects 0.000 title claims abstract description 42
- 238000000034 method Methods 0.000 title claims abstract description 23
- 230000005540 biological transmission Effects 0.000 claims abstract description 34
- 238000005070 sampling Methods 0.000 claims abstract description 12
- 239000011159 matrix material Substances 0.000 claims description 60
- 238000012886 linear function Methods 0.000 claims description 6
- 230000009897 systematic effect Effects 0.000 claims description 3
- 238000011160 research Methods 0.000 description 5
- 238000004088 simulation Methods 0.000 description 5
- 230000001960 triggered effect Effects 0.000 description 3
- 238000013461 design Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000013178 mathematical model Methods 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B23/00—Testing or monitoring of control systems or parts thereof
- G05B23/02—Electric testing or monitoring
- G05B23/0205—Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults
- G05B23/0218—Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults characterised by the fault detection method dealing with either existing or incipient faults
- G05B23/0243—Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults characterised by the fault detection method dealing with either existing or incipient faults model based detection method, e.g. first-principles knowledge model
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B2219/00—Program-control systems
- G05B2219/20—Pc systems
- G05B2219/24—Pc safety
- G05B2219/24065—Real time diagnostics
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/20—Information technology specific aspects, e.g. CAD, simulation, modelling, system security
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Automation & Control Theory (AREA)
- Feedback Control In General (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a tracking controller and a method based on an event trigger mechanism under hybrid network attack. According to the current sampling data and the latest transmission data, establishing a trigger condition based on an event trigger mechanism; and respectively considering the influence of the deception attack and the DoS attack on the transmission data, and establishing a hybrid network attack model. And establishing an error system of the tracking controller and giving a tracking performance index. Sufficient conditions and controller gains to ensure tracking performance of the tracking system are obtained. The invention can effectively save network bandwidth resources and ensure the effectiveness of the system.
Description
Technical Field
The invention belongs to the field of network control, and particularly relates to a design method of a tracking controller with an event trigger mechanism and hybrid network attacks (including spoofing attacks and denial of service attacks).
Background
The goal of output tracking control is to ensure that the system output tracks the known reference model as closely as possible through a suitable controller. With the development of industry, the actual demand is gradually increased, the structure of a control system is increasingly complex, the position of a networked control system in the control system is more and more important, and tracking control is used as a basic problem in the research of control theory and application research and is widely applied in modern industry. Therefore, the research on the tracking control problem of the networked control system has certain theoretical and practical significance.
With the gradual expansion of the scale of the networked control system, the structure of the system is increasingly complex, and important problems such as network delay, data packet loss, transmission limitation and the like are inevitably brought, and the problems not only reduce the control performance of the system, but also influence the stability of the system. In addition, because the bandwidth of the communication channel in the networked control system is limited, the network load is increased, the network is blocked, and the like. The present invention therefore introduces an event triggering mechanism in order to reduce unnecessary waste of bandwidth resources in the network.
The wide introduction of the network system improves the performance of the control system in more aspects, such as resource sharing, convenient maintenance and the like. But at the same time, the system also generates a plurality of potential safety hazards, and the network system is easy to be attacked by the network. Generally, the cyber attack includes a replay attack, a spoofing attack, a denial of service (DoS attack), and the like. The basic principle of replay attacks is to transmit the previously intercepted data intact to the recipient. Spoofing attacks typically replace the actual data of the system with fake data to achieve the specific goals of the attacker. The DoS attack is to send a large number of requests to a server, occupy server resources, and make a user unable to respond in time, thereby losing normal network service.
However, it is understood that most of the existing research results only study one kind of network attack, but actually, these systems may suffer from various network attacks at the same time. To be closer to reality, two common cyber attacks are considered herein, including spoofing attacks and DoS attacks. To our knowledge, there is currently no relevant research effort to study the tracking control problem of networked control systems with event-triggered mechanisms and hybrid network attacks.
Disclosure of Invention
The purpose of the invention is as follows: in order to overcome the defects in the prior art, the invention provides the tracking controller and the method based on the event trigger mechanism under the hybrid network attack, and the event trigger scheme is introduced while the influence of the DoS attack and the deception attack on the network security is considered, so that the network bandwidth resource can be effectively saved, and the effectiveness of the system is ensured.
The technical scheme is as follows: in order to achieve the purpose, the invention adopts the technical scheme that:
a tracking controller based on an event trigger mechanism under hybrid network attack is disclosed, wherein an error system of the tracking controller is as follows:
wherein,denotes the derivative of e (t), t denotes the time, e (t) denotes the tracking error, e (t) x (t) -xr(t), x (t) denotes a systematic vector, xr(t) represents a reference model system vector, alpha (t) is a Bernoulli variable used for describing whether the spoofing attack occurs or not, wherein when the value is 1, the value does not occur, and when the value is 0, the value occurs; A. b, C, D, E, K is the required controller gain,representing the actual input to the controller; h (e (t)k,nh) A non-linear function representing a spoofing attack; eta of 0 ≦k,n(t)≤ηmRepresenting a time delay, ηk,n(t) represents the time delay, ηmAn upper bound of the time lag is indicated,
definition of We(t)=(A-D)xr(t) + Cω (t) -Er (t), ω (t) representing the system external disturbance, r (t) representing the bounded reference input vector, εk,n(t) represents the error threshold between the last transmitted signal and the current sampled signal, V1,n-1Indicating DoS attack not launchTime of birth, V2,n-1Indicating the moment at which the DoS attack occurred.
The tracking performance indexes to be met are set as follows:where U is a positive definite matrix. Gamma > 0 is a tracking performance indicator. t is tfIndicating the termination time and U represents a matrix of appropriate dimensions.
Preferably: the sufficient conditions of the tracking performance of the tracking controller are as follows:
Ξ1<0
Ξ2<0
the constraint conditions are as follows:
wherein: i is 1, 2; xi1Denotes an intermediate parameter one, xi2Representing the intermediate parameter two, P1、P2、Qi、Q3-i、Ri、R3-i、Zi、Z3-iAll represent positive definite matrices; tau is2、τ1、β1、β2、τ3-i、zmin、ιDRepresents a given positive parameter; h denotes a sampling period.
Preferably: xi1The following were used:
Σ11=2β1P1+P1A+ATP1+Q1-g1R1-g1Z1n+U
Σ32=g1(R1+S1+Z1+M1)
Σ21=αKTBTP1+g1R1+g1S1+g1Z1+g1M1
Σ22=-2g1R1-g1S1-g1S1 T-2g1Z1-g1M1n-g1M1 T+cΩ
Σ31=-g1S1-g1M1
Σ32=g1(R1+S1+Z1+M1)
Σ33=-g1Q1-g1R1-g1Z1
Δ22=diag{-Ω,-γ2I,-I}
Δ22=diag{-Ω,-γ2I,-I}
where α represents the expected value of the Bernoulli variable α (t), I represents the identity matrix of the appropriate dimension, Ω, L represent known matrices, ηm、ρ、β1Indicating a given positive parameter, U, R1、M1Representing a matrix of suitable dimensions, K representing the controller gain
Preferably: xi2The following were used:
Y11=-2β2P2+P2A+ATP2+Q2-g2Z2+U-g2R2
Y21=g2(Z2+M2+R2+S2)
Y31=-g2M2-g2S2
Y32=g2(Z2+M2+R2+S2)
Y33=-g2(Q2+Z2+R2)
Y51=ηmP2A
Y54=ηmP2
Y55=-P2(R2+Z2)-1P2
wherein, beta2Representing a known vector, Z2、M2Representing a matrix with appropriate dimensions.
Preferably: controller gain K of the tracking controller:
give DoS parameterszmin、ηm、γ、ιDAnd positive scalar parameters alpha, h, c, beta1、β2、τ1、τ2Matrix L, if present Matrix arrayY has a suitable dimension and is obtained using the linear inequality:
Γ1<0
Γ2<0
the constraint conditions are as follows:
Λ51=ηmAX2
Λ54=ηm
wherein i is 1, 2; y denotes a matrix, X1Representing a positive definite matrix, X2Denotes a positive definite matrix, τ1Denotes a positive real number, τ2Which represents a positive real number, is,a positive definite matrix is represented and,a positive definite matrix is represented and,a positive definite matrix is represented and,a positive definite matrix is represented and,a matrix representing a suitable dimension is then formed,a matrix representing a suitable dimension is then formed,a positive definite matrix is represented and,denotes positive real number, beta2Which represents a positive real number, is,a matrix representing a suitable dimension is then formed,a matrix representing a suitable dimension is then formed,a positive definite matrix is represented and,a positive definite matrix is represented and,representing a positive definite matrix.
Preferably: the method comprises the following steps of:
the data transmitted under a spoofing attack is represented as:
wherein,representing transmitted data under a spoofing attack, α (t) being a Bernoulli variable for use in transmitting data under a spoofing attackIndicates whether a spoofing attack has occurred, where 0 indicates occurrence, 1 indicates non-occurrence, and h (e (t)k,nh) A non-linear function representing a spoofing attack, e (t)k,nh) Representing the transmitted data after passing through the transmission mechanism, e (t)k,nh)=εk,n(t)+e(t-ηk,n(t)),εk,n(t) represents the error threshold, η, between the last transmitted signal and the current sampled signalk,n(t) represents a time delay, and t represents a time;
wherein,showing the transmission data under the DoS attack, and zeta (t) represents the state of the DoS attack. ζ (t) ═ 1 denotes when t ∈ [ F ]n,Fn+zn) Meanwhile, the DoS attack is in a sleep state. ζ (t) ═ 0 denotes when t ∈ [ F ]n+zn,Fn+1) Meanwhile, the DoS attack is in an active state, and the system is attacked by the DoS. FnIndicating the start of the nth active period, Fn+1Indicating the end of the nth active period and the beginning of the (n + 1) th sleep period. z is a radical ofnIndicating the length of the sleep period. Therefore, the start and end of DoS attack sleep cycle need to satisfy:
0≤F0<F1<F1+z1<F2<…<Fn<Fn+zn<Fn+1。
a design method of a tracking controller based on an event trigger mechanism under hybrid network attack mainly aims at designing a tracking controller for a networked control system with an event trigger mechanism and hybrid network attack. An event-triggered mechanism is employed to alleviate network bandwidth load. By utilizing the Lyapunov stability theory, a sufficient condition for ensuring the good tracking performance of the tracking controller is obtained. In addition, the controller gain is obtained by solving a set of linear matrix inequalities. Finally, the effectiveness of the method is verified through a simulation example, and the method specifically comprises the following steps:
step 1: and establishing a system preliminary model and a preliminary reference model based on a networked control system, and designing a preliminary tracking controller.
Step 2: firstly, an event trigger mechanism is introduced, the problem of network resource limitation can be solved by reducing unnecessary data transmission by introducing the event trigger mechanism, and specifically, a trigger condition based on the event trigger mechanism is established according to current sampling data and latest transmission data;
and step 3: and respectively considering the influence of the deception attack and the DoS attack on the transmission data, and establishing a hybrid network attack model.
And 4, step 4: and (3) establishing an error system of the tracking controller and giving a tracking performance index according to the system initial model, the initial reference model and the initial tracking controller established in the step (1), the trigger condition based on the event trigger mechanism established in the step (2) and the hybrid network attack model established in the step (3).
And 5: and obtaining sufficient conditions for ensuring the tracking performance of the tracking system by utilizing the Lyapunov stability theory.
Step 6: and solving the linear inequality to obtain a controller gain K of the tracking controller.
Preferably: the system preliminary model, the preliminary reference model and the preliminary tracking controller in the step 1 are as follows:
and (3) a system preliminary model:
a primary reference model:
definitions e (t) ═ x (t) — xr(t), designing the following preliminary tracking controller:
wherein,denotes the derivative of x (t), x (t) denotes the system vector, u (t) denotes the controller output vector, ω (t) denotes the external input disturbance,denotes xrDerivative of (t), xr(t) represents the reference model system vector, r (t) represents the bounded reference input vector, A, B, C, D, E all represent matrices of suitable dimensions, e (t) represents the tracking error, and K is the controller gain required;representing the actual input to the controller.
Preferably: triggering conditions based on an event triggering mechanism in the step 2:
wherein epsilonk(t) represents the error threshold between the last transmitted signal and the current sampled signal, Ω represents a free weight matrix of suitable dimensions, c represents an event trigger scalar parameter, e (t)kh + sh) represents the current sample data, e (t)kh) Indicating the latest transmitted data, tkh denotes the latest transmission time, sh denotes the current sampling time, s denotes a positive integer, and h denotes the sampling period
εk(t)=e(tkh+sh)-e(tkh),Ω>0。
The next transmission instant tk+1h is expressed as:
Preferably: and 4, establishing an error system of the tracking controller and giving a tracking performance index:
due to the existence of DoS attacks, the transmission data will be affected, and the trigger condition based on the event trigger mechanism established in step 2 will no longer be applicable, so in consideration of the influence of DoS attacks, the transmission time is redefined as:
tk,nh={tk,ahsatisfying(1)|tk,ah∈Vn-1,1}∪{Fn}
wherein, tk,nh denotes the trigger time, t, of the cycle in the nth DoS attackk,ah represents the trigger time of the a-th DoS period, n represents n DoS attack periods, a represents the a-th DoS period, k represents the number of trigger times in the n-th DoS period, and tk,ah. n, a are all non-negative integers;
Event interval Xk,nThe method is divided into the following cells:the inter-cell representation of the event interval is as follows:
two piecewise functions are defined:
then, the transmission data after the event triggering mechanism is represented as:
e(tk,nh)=εk,n(t)+e(t-ηk,n(t)), wherein ηk,n(t)∈[0,ηM)。
The event triggering conditions at this time are:
wherein eta isk,n(t) represents the system time delay, ∈k,n(t) represents the error threshold, η, between the last transmitted signal and the current sampled signalMRepresents the time lag upper limit, and Ω represents a matrix of suitable dimensions;
and establishing an error system of the tracking controller according to the event triggering condition at the moment.
Compared with the prior art, the invention has the following beneficial effects:
1. the invention establishes a mathematical model of complex network attack aiming at a networked control system on the basis of considering deception attack and DoS attack.
2. And limited bandwidth is saved by adopting an event triggering scheme.
3. And (4) giving sufficient conditions of the tracking performance of the tracking controller by utilizing the Lyapunov theory.
4. The gain of the controller can be derived by solving a series of linear matrix inequalities.
Drawings
FIG. 1: the networked control system tracks the control plan.
FIG. 2: system x1(t) state trajectory and reference system xr1(t) state trace.
FIG. 3: system x2(t) state trajectory and reference system xr2(t) state trace.
FIG. 4: signal of DoS attack.
FIG. 5: the event triggers the release time and interval.
FIG. 6: and (4) spoofing the attack occurrence moment.
Detailed Description
The present invention is further illustrated by the following description in conjunction with the accompanying drawings and the specific embodiments, it is to be understood that these examples are given solely for the purpose of illustration and are not intended as a definition of the limits of the invention, since various equivalent modifications will occur to those skilled in the art upon reading the present invention and fall within the limits of the appended claims.
A method for designing a tracking controller based on an event trigger mechanism under a hybrid network attack, as shown in fig. 1, includes the following steps:
step 1: and establishing a system preliminary model and a preliminary reference model based on a networked control system, and designing a preliminary tracking controller.
And (3) a system preliminary model:
a primary reference model:
definitions e (t) ═ x (t) — xr(t), designing the following preliminary tracking controller:
in (1),denotes the derivative of x (t), x (t) denotes the system vector, u (t) denotes the controller output vector, ω (t) denotes the external input disturbance,denotes xrDerivative of (t), xr(t) represents the reference model system vector, r (t) represents the bounded reference input vector, A, B, C, D, E all represent matrices of suitable dimensions, e (t) represents the tracking error, and K is the controller gain required;representing the actual input to the controller.
Step 2: in order to effectively save bandwidth, an event triggering scheme is introduced: according to the current sampling data and the latest transmission data, establishing a trigger condition based on an event trigger mechanism;
wherein epsilonk(t) represents the error threshold between the last transmitted signal and the current sampled signal, Ω represents a free weight matrix of suitable dimensions, c represents an event trigger scalar parameter, e (t)kh + sh) represents the current sample data, e (t)kh) Indicating the latest transmitted data, tkh represents the latest transmission time, sh represents the current sampling time, s represents a positive integer, and h represents the sampling period;
εk(t)=e(tkh+sh)-e(tkh),Ω>0。
the next transmission instant tk+1h is expressed as:
And step 3: and respectively considering the influence of the deception attack and the DoS attack on the transmission data, and establishing a hybrid network attack model.
The data transmitted under a spoofing attack is represented as:
wherein,representing the transmitted data under the spoofing attack, alpha (t) is a Bernoulli variable used for representing whether the spoofing attack occurs or not, wherein 0 represents occurrence, 1 represents non-occurrence, and h (e (t) isk,nh) A non-linear function representing a spoofing attack, e (t)k,nh) Representing the transmitted data after passing through the transmission mechanism, e (t)k,nh)=εk,n(t)+e(t-ηk,n(t)),εk,n(t) represents the error threshold, η, between the last transmitted signal and the current sampled signalk,n(t) represents a time delay, and t represents a time;
wherein,represents the transmission data under DoS attack, and ζ (t) represents the state of DoS attack. ζ (t) ═ 1 denotes when t ∈ [ F ]n,Fn+zn) Meanwhile, the DoS attack is in a sleep state. ζ (t) ═ 0 denotes when t ∈ [ F ]n+zn,Fn+1) Meanwhile, the DoS attack is in an active state, and the system is attacked by the DoS. FnIndicating the start of the nth active period, Fn+1Indicating the end of the nth active period and the beginning of the (n + 1) th sleep period. z is a radical ofnIndicating the length of the sleep period. Therefore, the start and end of DoS attack sleep cycle need to satisfy:
0≤F0<F1<F1+z1<F2<…<Fn<Fn+zn<Fn+1。
and 4, step 4: and (3) establishing an error system of the tracking controller and giving a tracking performance index according to the system initial model, the initial reference model and the initial tracking controller established in the step (1), the trigger condition based on the event trigger mechanism established in the step (2) and the hybrid network attack model established in the step (3).
Due to the existence of DoS attacks, the transmission data will be affected, and the trigger condition based on the event trigger mechanism established in step 2 will no longer be applicable, so in consideration of the influence of DoS attacks, the transmission time is redefined as:
tk,nh={tk,ahsatisfying(1)|tk,ah∈Vn-1,1}∪{Fn}
wherein, tk,nh denotes the trigger time, t, of the cycle in the nth DoS attackk,ah represents the trigger time of the a-th DoS period, n represents n DoS attack periods, a represents the a-th DoS period, and t representsk,ah. n, a are all non-negative integers.
Event interval Xk,nThe method is divided into the following cells:the inter-cell representation of the event interval is as follows:
two piecewise functions are defined:
then, the transmission data after the event triggering mechanism is represented as:
e(tk,nh)=εk,n(t)+e(t-ηk,n(t)), wherein ηk,n(t)∈[0,ηM)。
The event triggering conditions at this time are:
wherein eta isk,n(t) represents the system time delay, ∈k,n(t) represents the error threshold, η, between the last transmitted signal and the current sampled signalMRepresents the time lag upper limit, and Ω represents a matrix of suitable dimensions;
the following tracking controller error system was set up:
wherein e (t) x (t) -xr(t), x (t) denotes a systematic vector, xr(t) denotes the reference model system vector, A, B, C, D, E denotes a matrix of appropriate dimensions, e (t) denotes the tracking error, and K is the required controller gain。Representing the actual input to the controller. α (t) is a bernoulli variable used to describe whether a spoofing attack occurred, where a value of 1 indicates no occurrence and 0 indicates occurrence. Suppose h (e (t)k,nh) ) represents a non-linear function of a spoofing attack. Eta of 0 ≦k,n(t)≤ηmRepresenting a time delay. We(t)=(A-D)xr(t)+Cω(t)-Er(t)。
The tracking performance indexes to be met are set as follows:where U is a positive definite matrix. Gamma > 0 is a tracking performance indicator. t is tfIndicating the termination time.
And 5: and a Lyapunov stability theory is utilized to obtain a sufficient condition for ensuring the tracking performance of the tracking system.
Give DoS parameterszmin、ηm、γ、ιDAnd positive scalar parameters alpha, h, c, beta1、β2、τ1、τ2A matrix K, L, P if there is a matrix Ω > 01>0、P2>0、Q1>0,Q2>0,R1>0,R2>0,Z1>0,Z2> 0, matrix U, S1,S2,M1,M2With the dimensions in place, the following inequality holds:
Ξ1<0
Ξ2<0
the constraint conditions are as follows:
wherein:
Σ11=2β1P1+P1A+ATP1+Q1-g1R1-g1Z1n+U,Σ32=g1(R1+S1+Z1+M1)
Σ21=αKTBTP1+g1R1+g1S1+g1Z1+g1M1
Δ22=diag{-Ω,-γ2I,-I}
Y11=-2β2P2+P2A+ATP2+Q2-g2Z2+U-g2R2
Y31=-g2M2-g2S2
Y21=g2(Z2+M2+R2+S2)
Y32=g2(Z2+M2+R2+S2)
Y33=-g2(Q2+Z2+R2)
Y51=ηmP2A,Y54=ηmP2,Y55=-P2(R2+Z2)-1P2
step 6: and solving the linear inequality to obtain a controller gain K of the tracking controller.
Give DoS parameterszmin、ηm、γ、ιDAnd positive scalar parameters alpha, h, c, beta1、β2、τ1、τ2Matrix L, if present Matrix arrayY has a suitable dimension and can be obtained using the linear inequality:
Γ1<0
Γ2<0
the constraint conditions are as follows:
wherein:
simulation analysis:
the Matlab program is written to solve the linear matrix inequality to solve the gain of the tracking controller and draw a simulation curve, and the effectiveness of the method is demonstrated by using a simulation example.
Consider the parameters in the system model as:
B=[0 1]T,C=[0 1]T
and the external disturbance input is: ω (t) ═ 8sin (t-0.5).
The reference model is:
wherein: r (t) sin (t + 0.5).
The nonlinear function under a spoofing attack is: h (e (t) [ -tanh [)T(0.15e1(t)) -tanhT(0.05e2(t))]T;
The following scalar parameters are set: beta is a1=0.15,β2=2,τ1=1.02,τ2=1.02,ηm=0.2,zmin=1.3,The event trigger parameter c is 0.4; the index parameter of the tracking performance is gamma which is 0.7; the bernoulli variable α is 0.6, indicating that the system is subject to spoofing and DoS attacks. Initial conditions were set to x (0) ═ 0.2-0.1]T,xr(0)=[0.5 0.1]T. By solving the linear inequality by Matlab, the following matrix parameters can be obtained:
Y=[0.6030 -1.8109],
K=[0.0560 -0.0245]。
FIGS. 2-5 are graphs derived from Matlab, obtaining by simulation. FIGS. 2 and 3 show the state traces of system x (t) and reference system xr(t), therefore, the designed method can ensure that the system state can track the state of the reference model and has good tracking performance; FIG. 4 shows signals of a DoS attack; FIG. 5 shows the event-triggered release times and intervals; fig. 6 shows the occurrence time of a spoofing attack.
From the images obtained above, the following conclusions can be drawn: the controller of the networked control system based on the event trigger and the hybrid network attack can realize good tracking control.
The above description is only of the preferred embodiments of the present invention, and it should be noted that: it will be apparent to those skilled in the art that various modifications and adaptations can be made without departing from the principles of the invention and these are intended to be within the scope of the invention.
Claims (10)
1. A tracking controller based on an event trigger mechanism under hybrid network attack is characterized in that: the error system of the tracking controller is as follows:
wherein,denotes the derivative of e (t), t denotes the time, e (t) denotes the tracking error, e (t) x (t) -xr(t), x (t) denotes a systematic vector, xr(t) represents a reference model system vector, alpha (t) is a Bernoulli variable used for describing whether the spoofing attack occurs or not, wherein when the value is 1, the value does not occur, and when the value is 0, the value occurs; A. b, C, D, E, K is the required controller gain,representing the actual input to the controller; h (e (t)k,nh) Is shown in (a)A non-linear function of a spoofing attack; eta of 0 ≦k,n(t)≤ηmRepresenting a time delay, ηk,n(t) represents the time delay, ηmAn upper bound of the time lag is indicated,
definition of We(t)=(A-D)xr(t) + Cω (t) -Er (t), ω (t) representing the system external disturbance, r (t) representing the bounded reference input vector, εk,n(t) represents the error threshold between the last transmitted signal and the current sampled signal, V1,n-1Indicating the moment at which DoS attack does not occur, V2,n-1Representing the moment of occurrence of the DoS attack;
2. The tracking controller based on the event trigger mechanism under the hybrid network attack according to claim 1, wherein: the sufficient conditions of the tracking performance of the tracking controller are as follows:
Ξ1<0
Ξ2<0
the constraint conditions are as follows:
3. The tracking controller based on the event trigger mechanism under the hybrid network attack according to claim 2, wherein: intermediate parameter xi1The following were used:
Σ11=2β1P1+P1A+ATP1+Q1-g1R1-g1Z1+U
Σ32=g1(R1+S1+Z1+M1)
Σ21=αKTBTP1+g1R1+g1S1+g1Z1+g1M1
Σ31=-g1S1-g1M1
Σ32=g1(R1+S1+Z1+M1)
Σ33=-g1Q1-g1R1-g1Z1
Δ22=diag{-Ω,-γ2I,-I}
Δ22=diag{-Ω,-γ2I,-I}
Δ33=diag{-I,-P1(R1+Z1)-1P1,-P1(R1+Z1)-1P1},where α represents the expected value of the Bernoulli variable α (t), I represents the identity matrix of the appropriate dimension, Ω, L represent known matrices, ηm、ρ、β1Indicating a given positive parameter, U, R1、M1A matrix with appropriate dimensions is shown and K represents the controller gain.
4. The tracking controller based on the event trigger mechanism under the hybrid network attack according to claim 3, wherein: intermediate (II)
Parameter two xi2The following were used:
Y11=-2β2P2+P2A+ATP2+Q2-g2Z2+U-g2R2
Y21=g2(Z2+M2+R2+S2)
Y31=-g2M2-g2S2
Y32=g2(Z2+M2+R2+S2)
Y33=-g2(Q2+Z2+R2)
Y51=ηmP2A
Y54=ηmP2
Y55=-P2(R2+Z2)-1P2
wherein, beta2Representing a known vector, Z2、M2Representing a matrix with appropriate dimensions.
5. The tracking controller based on the event trigger mechanism under the hybrid network attack according to claim 4, wherein: controller gain K of the tracking controller:
give DoS parameterszmin、ηm、γ、ιDAnd positive scalar parameters alpha, h, c, beta1、β2、τ1、τ2Matrix L, if present Matrix arrayY has a suitable dimension and is obtained using the linear inequality:
Γ1<0
Γ2<0
the constraint conditions are as follows:
Λ51=ηmAX2
Λ54=ηm
where i ═ 1,2, Y denotes a matrix, X1Representing a positive definite matrix, X2Denotes a positive definite matrix, τ1Denotes a positive real number, τ2Which represents a positive real number, is,a positive definite matrix is represented and,a positive definite matrix is represented and,a positive definite matrix is represented and,a positive definite matrix is represented and,a matrix representing a suitable dimension is then formed,a matrix representing a suitable dimension is then formed,denotes a positive definite matrix, ζ1Denotes positive real number, beta2Which represents a positive real number, is,a matrix representing a suitable dimension is then formed,a matrix representing a suitable dimension is then formed,a positive definite matrix is represented and,a positive definite matrix is represented and,representing a positive definite matrix.
6. The tracking controller based on the event trigger mechanism under the hybrid network attack according to claim 5, wherein: the method comprises the following steps of:
the data transmitted under a spoofing attack is represented as:
wherein,representing a spoofing attackTransmitted data under attack, α (t) is a Bernoulli variable used to indicate whether a spoofing attack has occurred, where 0 indicates occurrence, 1 indicates non-occurrence, and h (e (t) isk,nh) A non-linear function representing a spoofing attack, e (t)k,nh) Representing the transmitted data after passing through the transmission mechanism, e (t)k,nh)=εk,n(t)+e(t-ηk,n(t)),εk,n(t) represents the error threshold, η, between the last transmitted signal and the current sampled signalk,n(t) represents a time delay, and t represents a time;
wherein,represents the transmission data under the DoS attack, and ζ (t) represents the state of the DoS attack; ζ (t) ═ 1 denotes when t ∈ [ F ]n,Fn+zn) Meanwhile, the DoS attack is in a dormant state; ζ (t) ═ 0 denotes when t ∈ [ F ]n+zn,Fn+1) When the system is in the active state, the system is attacked by the DoS; fnIndicating the start of the nth active period, Fn+1Indicating the end of the nth active period and the beginning of the (n + 1) th sleep period; z is a radical ofnRepresents the length of the sleep period; therefore, the start and end of DoS attack sleep cycle need to satisfy:
0≤F0<F1<F1+z1<F2<…<Fn<Fn+zn<Fn+1;
7. A method for designing a tracking controller based on an event trigger mechanism under the hybrid network attack according to claim 1, comprising the following steps:
step 1: establishing a system preliminary model and a preliminary reference model based on a networked control system, and designing a preliminary tracking controller;
step 2: according to the current sampling data and the latest transmission data, establishing a trigger condition based on an event trigger mechanism;
and step 3: respectively considering the influence of the deception attack and the DoS attack on the transmission data, and establishing a hybrid network attack model;
and 4, step 4: establishing a tracking controller error system and giving a tracking performance index according to the system initial model, the initial reference model and the initial tracking controller established in the step 1, the trigger condition based on the event trigger mechanism established in the step 2 and the hybrid network attack model established in the step 3;
and 5: obtaining sufficient conditions for ensuring the tracking performance of the tracking system by utilizing the Lyapunov stability theory;
step 6: and solving the linear inequality to obtain a controller gain K of the tracking controller.
8. The method for designing a tracking controller based on an event trigger mechanism under the hybrid network attack as claimed in claim 7, wherein: the system preliminary model, the preliminary reference model and the preliminary tracking controller in the step 1 are as follows:
and (3) a system preliminary model:
a primary reference model:
definitions e (t) ═ x (t) — xr(t), designing the following preliminary tracking controller:
wherein,denotes the derivative of x (t), x (t) denotes the system vector, u (t) denotes the controller output vector, ω (t) denotes the external input disturbance,denotes xrDerivative of (t), xr(t) represents the reference model system vector, r (t) represents the bounded reference input vector, A, B, C, D, E all represent matrices of suitable dimensions, e (t) represents the tracking error, and K is the controller gain required;representing the actual input to the controller.
9. The method for designing a tracking controller based on an event trigger mechanism under the hybrid network attack as claimed in claim 8, wherein: triggering conditions based on an event triggering mechanism in the step 2:
wherein epsilonk(t) represents the error threshold between the last transmitted signal and the current sampled signal, Ω represents a free weight matrix of suitable dimensions, c represents an event trigger scalar parameter, e (t)kh + sh) represents the current sample data, e (t)kh) Indicating the latest transmitted data, tkh represents the latest transmission time, sh represents the current sampling time, s represents a positive integer, and h represents the sampling period;
εk(t)=e(tkh+sh)-e(tkh),Ω>0;
the next transmission instant tk+1h is expressed as:
10. The method for designing a tracking controller based on an event trigger mechanism under the hybrid network attack according to claim 9, wherein: and 4, establishing an error system of the tracking controller and giving a tracking performance index:
due to the existence of DoS attacks, the transmission data will be affected, and the trigger condition based on the event trigger mechanism established in step 2 will no longer be applicable, so in consideration of the influence of DoS attacks, the transmission time is redefined as:
tk,nh={tk,ah satisfying formula (1) | tk,ah∈V1,n-1}∪{Fn}
Wherein, tk,nh denotes the trigger time, t, of the cycle in the nth DoS attackk,ah represents the trigger time of the a-th DoS period, n represents n DoS attack periods, a represents the a-th DoS period, k represents the number of trigger times in the n-th DoS period, and tk,ah. n, a are all non-negative integers;
Event interval Xk,nThe method is divided into the following cells: the inter-cell representation of the event interval is as follows:
two piecewise functions are defined:
then, the transmission data after the event triggering mechanism is represented as:
e(tk,nh)=εk,n(t)+e(t-ηk,n(t)), wherein ηk,n(t)∈[0,ηM);
The event triggering conditions at this time are:
wherein eta isk,n(t) represents the system time delay, ∈k,n(t) represents the error threshold, η, between the last transmitted signal and the current sampled signalMRepresents the time lag upper limit, and Ω represents a matrix of suitable dimensions;
and establishing an error system of the tracking controller according to the event triggering condition at the moment.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110843029.6A CN113625684B (en) | 2021-07-26 | 2021-07-26 | Design method of tracking controller based on event trigger mechanism under hybrid network attack |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110843029.6A CN113625684B (en) | 2021-07-26 | 2021-07-26 | Design method of tracking controller based on event trigger mechanism under hybrid network attack |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113625684A true CN113625684A (en) | 2021-11-09 |
CN113625684B CN113625684B (en) | 2022-08-09 |
Family
ID=78381113
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110843029.6A Active CN113625684B (en) | 2021-07-26 | 2021-07-26 | Design method of tracking controller based on event trigger mechanism under hybrid network attack |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113625684B (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114285653A (en) * | 2021-12-27 | 2022-04-05 | 厦门大学 | Intelligent networking automobile queue self-adaptive event trigger control method under network attack |
CN114326382A (en) * | 2021-11-16 | 2022-04-12 | 山东师范大学 | Adaptive elastic tracking control method and system with spoofing attack |
CN114415633A (en) * | 2022-01-10 | 2022-04-29 | 云境商务智能研究院南京有限公司 | Security tracking control method based on dynamic event trigger mechanism under multi-network attack |
CN114609930A (en) * | 2022-03-24 | 2022-06-10 | 南京航空航天大学 | Unmanned aerial vehicle air-ground tracking control method based on mixed event triggering in network environment |
CN114710455A (en) * | 2022-03-29 | 2022-07-05 | 南京理工大学 | Large-scale network control system event triggering method based on software definition |
CN114995158A (en) * | 2022-06-30 | 2022-09-02 | 四川大学 | Self-adaptive sampling switching control method of complex circuit network system under DoS attack |
CN116679569A (en) * | 2023-07-07 | 2023-09-01 | 兰州理工大学 | Self-adaptive triggering ICPS asynchronous double-end DOS safety control method and system |
CN117518838A (en) * | 2024-01-05 | 2024-02-06 | 铵泰克(北京)科技有限公司 | Control method and system for output stability of networked control system |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040019781A1 (en) * | 2002-07-29 | 2004-01-29 | International Business Machines Corporation | Method and apparatus for improving the resilience of content distribution networks to distributed denial of service attacks |
CN109814381A (en) * | 2019-01-08 | 2019-05-28 | 华东理工大学 | A kind of Controller Design for Networked Control Systems method based on event triggering |
CN110213115A (en) * | 2019-06-25 | 2019-09-06 | 南京财经大学 | A kind of Multi net voting attacks the method for controlling security of lower event-driven network control system |
US20200244691A1 (en) * | 2019-01-29 | 2020-07-30 | Battelle Memorial Institute | Risk-informed autonomous adaptive cyber controllers |
CN111679572A (en) * | 2020-05-11 | 2020-09-18 | 南京财经大学 | Network control system security control method based on hybrid triggering under multi-network attack |
CN112286051A (en) * | 2020-09-20 | 2021-01-29 | 国网江苏省电力有限公司信息通信分公司 | Neural network quantitative control method based on adaptive event trigger mechanism under complex network attack |
CN112289020A (en) * | 2020-09-20 | 2021-01-29 | 国网江苏省电力有限公司信息通信分公司 | Vehicle path tracking safety control method based on self-adaptive triggering mechanism under hybrid network attack |
CN112865752A (en) * | 2020-12-24 | 2021-05-28 | 南京财经大学 | Filter design method based on adaptive event trigger mechanism under hybrid network attack |
CN112995154A (en) * | 2021-02-09 | 2021-06-18 | 南京理工大学 | Complex network synchronization control method under aperiodic DoS attack |
CN113009825A (en) * | 2021-02-08 | 2021-06-22 | 云境商务智能研究院南京有限公司 | Deception-attacked nonlinear networked system state estimation method |
-
2021
- 2021-07-26 CN CN202110843029.6A patent/CN113625684B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040019781A1 (en) * | 2002-07-29 | 2004-01-29 | International Business Machines Corporation | Method and apparatus for improving the resilience of content distribution networks to distributed denial of service attacks |
CN109814381A (en) * | 2019-01-08 | 2019-05-28 | 华东理工大学 | A kind of Controller Design for Networked Control Systems method based on event triggering |
US20200244691A1 (en) * | 2019-01-29 | 2020-07-30 | Battelle Memorial Institute | Risk-informed autonomous adaptive cyber controllers |
CN110213115A (en) * | 2019-06-25 | 2019-09-06 | 南京财经大学 | A kind of Multi net voting attacks the method for controlling security of lower event-driven network control system |
CN111679572A (en) * | 2020-05-11 | 2020-09-18 | 南京财经大学 | Network control system security control method based on hybrid triggering under multi-network attack |
CN112286051A (en) * | 2020-09-20 | 2021-01-29 | 国网江苏省电力有限公司信息通信分公司 | Neural network quantitative control method based on adaptive event trigger mechanism under complex network attack |
CN112289020A (en) * | 2020-09-20 | 2021-01-29 | 国网江苏省电力有限公司信息通信分公司 | Vehicle path tracking safety control method based on self-adaptive triggering mechanism under hybrid network attack |
CN112865752A (en) * | 2020-12-24 | 2021-05-28 | 南京财经大学 | Filter design method based on adaptive event trigger mechanism under hybrid network attack |
CN113009825A (en) * | 2021-02-08 | 2021-06-22 | 云境商务智能研究院南京有限公司 | Deception-attacked nonlinear networked system state estimation method |
CN112995154A (en) * | 2021-02-09 | 2021-06-18 | 南京理工大学 | Complex network synchronization control method under aperiodic DoS attack |
Non-Patent Citations (2)
Title |
---|
刘延等: "自适应触发下一类神经网络的安全同步控制", 《宜宾学院学报》 * |
王江宁等: "具有DoS攻击的网络控制系统事件触发安全控制", 《南京信息工程大学学报(自然科学版)》 * |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114326382A (en) * | 2021-11-16 | 2022-04-12 | 山东师范大学 | Adaptive elastic tracking control method and system with spoofing attack |
CN114326382B (en) * | 2021-11-16 | 2024-08-06 | 山东师范大学 | Self-adaptive elastic tracking control method and system with spoofing attack |
CN114285653B (en) * | 2021-12-27 | 2023-02-14 | 厦门大学 | Intelligent networking automobile queue self-adaptive event trigger control method under network attack |
CN114285653A (en) * | 2021-12-27 | 2022-04-05 | 厦门大学 | Intelligent networking automobile queue self-adaptive event trigger control method under network attack |
CN114415633A (en) * | 2022-01-10 | 2022-04-29 | 云境商务智能研究院南京有限公司 | Security tracking control method based on dynamic event trigger mechanism under multi-network attack |
CN114415633B (en) * | 2022-01-10 | 2024-02-02 | 云境商务智能研究院南京有限公司 | Security tracking control method based on dynamic event triggering mechanism under multi-network attack |
CN114609930A (en) * | 2022-03-24 | 2022-06-10 | 南京航空航天大学 | Unmanned aerial vehicle air-ground tracking control method based on mixed event triggering in network environment |
CN114710455B (en) * | 2022-03-29 | 2024-03-01 | 南京理工大学 | Event triggering method for large-scale network control system based on software definition |
CN114710455A (en) * | 2022-03-29 | 2022-07-05 | 南京理工大学 | Large-scale network control system event triggering method based on software definition |
CN114995158A (en) * | 2022-06-30 | 2022-09-02 | 四川大学 | Self-adaptive sampling switching control method of complex circuit network system under DoS attack |
CN116679569A (en) * | 2023-07-07 | 2023-09-01 | 兰州理工大学 | Self-adaptive triggering ICPS asynchronous double-end DOS safety control method and system |
CN116679569B (en) * | 2023-07-07 | 2024-05-03 | 兰州理工大学 | Self-adaptive triggering ICPS asynchronous double-end DOS safety control method and system |
CN117518838A (en) * | 2024-01-05 | 2024-02-06 | 铵泰克(北京)科技有限公司 | Control method and system for output stability of networked control system |
CN117518838B (en) * | 2024-01-05 | 2024-03-29 | 铵泰克(北京)科技有限公司 | Control method and system for output stability of networked control system |
Also Published As
Publication number | Publication date |
---|---|
CN113625684B (en) | 2022-08-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113625684B (en) | Design method of tracking controller based on event trigger mechanism under hybrid network attack | |
CN113009825B (en) | Deception-attacked nonlinear networked system state estimation method | |
CN112286051A (en) | Neural network quantitative control method based on adaptive event trigger mechanism under complex network attack | |
CN111679572B (en) | Network control system security control method based on hybrid triggering under multi-network attack | |
CN114415633B (en) | Security tracking control method based on dynamic event triggering mechanism under multi-network attack | |
CN113721467B (en) | Self-adaptive event triggering-based H under spoofing attack and DoS attack∞Filter design method | |
CN113741309B (en) | Dual-dynamic event trigger controller model design method based on observer | |
Qi et al. | Dual-terminal decentralized event-triggered control for switched systems with cyber attacks and quantization | |
Liu et al. | Quantized state estimation for neural networks with cyber attacks and hybrid triggered communication scheme | |
CN113741198A (en) | T-S fuzzy system self-adaptive event trigger state estimation method under random network attack | |
CN112099356A (en) | Design method of event-driven SDOFQH controller under DoS attack | |
Li et al. | Stability of networked switched systems in the presence of denial‐of‐service attacks | |
CN112859607A (en) | Collaborative design method for distributed security event driver and SDOFD controller | |
Lu et al. | Event‐triggered control of complex‐valued networked control systems under randomly occurring deception attacks | |
Chen et al. | Event-triggered generalized dissipative filtering for delayed neural networks under aperiodic DoS jamming attacks | |
Zha et al. | Finite‐time adaptive event‐triggered asynchronous state estimation for Markov jump systems with cyber‐attacks | |
Lu et al. | Adaptive event‐triggered resilient stabilization for nonlinear semi‐Markov jump systems subject to DoS attacks | |
Chen et al. | Attack‐parameter‐dependent state feedback controller design for stochastic systems with denial‐of‐service attacks | |
CN118034346A (en) | Aircraft system dynamic memory event triggering fault-tolerant control method based on intermediate observer | |
Zhang et al. | Parallel adaptive event-triggered asynchronous control for two-time-scale fuzzy semi-Markov jump systems under deception attacks | |
Yan et al. | Quantized stabilization of switched systems with partly unstabilizable subsystems and denial‐of‐service attacks | |
Zhang et al. | Event‐triggered fault detection filter design for networked switched systems with all subsystems unstable and cyber attacks | |
Zhang et al. | Co-design of output-based security control and dynamic event-triggered mechanism for NCSs under hybrid cyber attacks | |
CN112118139B (en) | Collaborative design method for security event driver and SDOFH controller | |
Shi et al. | Flocking control for Cucker–Smale model under denial‐of‐service attacks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |