Loading [MathJax]/jax/output/HTML-CSS/jax.js
A journal of IEEE and CAA , publishes high-quality papers in English on original theoretical/experimental research and development in all areas of automation
Ning Wang and Xiaojian Li, "Secure Synchronization Control for a Class ofCyber-Physical Systems WithUnknown Dynamics," IEEE/CAA J. Autom. Sinica, vol. 7, no. 5, pp. 1215-1224, Sept. 2020. doi: 10.1109/JAS.2020.1003192
Citation: Ning Wang and Xiaojian Li, "Secure Synchronization Control for a Class ofCyber-Physical Systems WithUnknown Dynamics," IEEE/CAA J. Autom. Sinica, vol. 7, no. 5, pp. 1215-1224, Sept. 2020. doi: 10.1109/JAS.2020.1003192

Secure Synchronization Control for a Class of Cyber-Physical Systems With Unknown Dynamics

doi: 10.1109/JAS.2020.1003192
Funds:  This work was supported in part by the National Natural Science Foundation of China (61873050), the Fundamental Research Funds for the Central Universities (N180405022, N2004010), the Research Fund of State Key Laboratory of Synthetical Automation for Process Industries (2018ZCX14), and Liaoning Revitalization Talents Program (XLYC1907088)
More Information
  • This paper investigates the secure synchronization control problem for a class of cyber-physical systems (CPSs) with unknown system matrices and intermittent denial-of-service (DoS) attacks. For the attack free case, an optimal control law consisting of a feedback control and a compensated feedforward control is proposed to achieve the synchronization, and the feedback control gain matrix is learned by iteratively solving an algebraic Riccati equation (ARE). For considering the attack cases, it is difficult to perform the stability analysis of the synchronization errors by using the existing Lyapunov function method due to the presence of unknown system matrices. In order to overcome this difficulty, a matrix polynomial replacement method is given and it is shown that, the proposed optimal control law can still guarantee the asymptotical convergence of synchronization errors if two inequality conditions related with the DoS attacks hold. Finally, two examples are given to illustrate the effectiveness of the proposed approaches.

     

  • CYBER-PHYSICAL systems (CPSs) combine physical processes, computational resources, with communication capability [1], which have been studied intensively for their various fields of applications, such as power grid systems in [2], multi-agent systems in [3]–[6] and smart networked systems in [7], [8]. However, CPSs embedded networked control technique are more vulnerable on account of cyber attacks. Therefore, the security of CPSs has recently attracted extensive concern in control field, such as secure state estimation under sparse attacks in [9], [10], secure control and distributed filtering under deception attacks in [11], [12], the resilient control for systems under replay attacks in [13] and the effects of denial-of-service (DoS) attacks on systems in [14]–[19].

    DoS attacks, a kind of common attacks in CPSs, attempt to render some or all components of a control system inaccessible by preventing the information transmission. Some existing studies referred to DoS attacks have been published. For example, the stability analysis for a networked system in the presence of DoS attacks, which is on assumptions about the limited DoS attacks frequency and duration, is given in [14]. In [15]–[19], some resilient control methods for CPSs under DoS attacks, which is used to maximize frequency and duration of DoS attacks under the condition that the close-loop stability is not destroyed [15], are introduced. In order to improve the resilience ability of a system under DoS attacks, the state estimation problem is proposed in [20]–[22]. While, the above results are all for a single system.

    Recently, based on the studies for a single system, the secure synchronization problem of complex networked systems, which results from that the synchronization behavior relying on the information of other nodes will be affected when DoS attacks successfully break down the information transmission channels, has triggered considerable attentions [23]–[26]. For example, for complex dynamical networks (CDNs) under recoverable attacks destroying the network topology, the authors in [24] introduced the attack frequency and the average recovering time to study the secure synchronization problem. In the presence of DoS attacks interrupting the communication channels of each agent in [25], [26], some sufficient conditions about achieving secure consensus of multi-agent systems are derived by using the Lyapunov function approach. However, it should be pointed that the exact system dynamic matrices are required to be known to analyze the stability of a networked system in [14]–[22] or to solve the secure synchronization control problem in [23]–[26].

    In fact, in the absence of DoS attacks, the synchronization problem for the complex networked systems with unknown dynamics has been investigated. To solve optimal synchronization problems of multi-agent systems, a Q-learning method and a model-free off-policy reinforcement learning approach are developed in [27], [28], respectively. Besides, for CDNs of which the couplings are involved in node dynamic equations, the optimal synchronization control problem has been explored in our previous works [29], [30]. Nevertheless, the above results [27]–[30] about the complex networked systems with unknown dynamics were all based on the assumption that the networks were attack free. For the case that the CDNs are with unknown dynamics, how to design the secure synchronization control strategy and further to characterize the frequency and duration of DoS attacks under which the stability of synchronization errors is not destroyed, are challenging. Therefore, it is highly desired to study those problems, which motivates the current research.

    In this paper, the secure synchronization control problem is considered for a class of CDNs with unknown dynamics in the presence of intermittent DoS attacks. The main contributions of this paper are summarized as follows.

    1) For the attack cases, the stability analysis of synchronization errors cannot be directly carried out by using the existing Lyapunov function approach due to the presence of unknown system matrices. To overcome this difficulty, a matrix polynomial replacement method is proposed in the paper. More specifically, the unknown system matrices involved in the Lyapunov function are replaced with the known control gain matrices derived by iteratively solving an algebraic Riccati equation (ARE). And based on the replacement method, the decay rates about sleeping and active intervals of DoS attacks are further computed by solving a set of linear matrix inequalities.

    2) According to the obtained decay rates and using the switching technique, the upper bounds of the frequency and duration of DoS attacks, under which the CDNs with unknown dynamics achieve secure synchronization, are given in terms of inequalities.

    This paper is organized as follows. In Section II, some necessary concepts about the graph theory and the attack model are presented. An optimal synchronization control protocol is proposed in Section III. Stability analysis of secure synchronization is given in Section IV. In Section V, two examples of the CDNs are provided. Conclusion is given in Section VI.

    Notations: In this paper, is used to represent the Euclidean norm for vectors or matrices. For a matrix P, define PT as its transpose and He(P)=P+PT. For a symmetric matrix P, P>0 means that P is a positive definite matrix. Besides, given a real symmetric matrix P, λmin(P) and λmax(P) denote the smallest eigenvalue and the largest eigenvalue of P, respectively. P=[pij]n×n denotes a matrix PRn×n with the ith row and jth column being pij. Define vec(A) as an mn-vector for ARm×n, i.e., vec(A)=[αT1,αT2,,αTn], where αiRn is the ith column of A. Assume two sets W and N and WN means that the elements belong to W, but not to N. Finally, let represent the Kronecker product.

    A directed graph (digraph) G=(V,E) contains a set V=1,2,,N of vertices and a set E=1,2,,M of arcs (i,j) leading from the initial vertex i to the terminal vertex j. Each arc (i,j)E is associated with a real-valued weight with lij>0, while the ith node and the jth node have no connection with lij=0. Assumed that there is no self loop in the graph. Furthermore, define the Laplacian matrix of a digraph as

    L=[m1l1ml12l1Nl21m2l2ml2NlN1lN2mNlNm].

    More detailed concepts on the digraph were shown in [31].

    Consider the CDNs model with N linear nodes given as

    ˙xi(t)=Axi(t)+Biui(t)+Nj=1,jilijΓi(xj(t)xi(t)) (1)

    where xiRn and uiRm are the state and the controlled input, respectively. ARn×n is an unknown matrix and BiRn×n is the constant invertible matrix. lij are known coupling weights, and ΓiRm is the known inner connecting matrix of the ith node.

    Assume the dynamic equation of the leader has the following form

    ˙z0=Sz0 (2)

    where z0Rn is the leader’s state. The leader can be regarded as a command generator, which generates the desired target trajectory.

    Assumption 1: (A,Bi) is controllable.

    In practice, the state information xi measured by using sensors is sent to controllers via networked channels. As a kind of common attacks in CPSs, DoS attacks compromise certain or all transmission channels of a control system (see Fig. 1), which leads to the unavailability of transmitted information.

    Figure  1.  Framework of the CDNs under DoS attacks.

    Due to the energy constraint of adversaries [32], [33], DoS attacks need to terminate attack activities and shift to a sleep period to supply its energy for next attack. That is to say, one adversary launches DoS attacks discontinuously. As mentioned in [14] and [19], {zs}sN+ represents the time instant when the sth DoS attack is active. Then

    Ts=[zs,zs+ds) (3)

    means the time interval of the sth DoS attack with a length dsR+. Thus, for given t>τ, define that

    Ξ(τ,t)=jNTs[τ,t] (4)
    Λ(τ,t)=[τ,t]Ξ(τ,t) (5)

    which denote, during each interval [τ,t], the sets of time instants when the communication is denied or allowed, respectively. Moreover, |Ξ(τ,t)| and |Λ(τ,t)| represent the total lengths of DoS attacks being active and sleeping during the interval [τ,t].

    Further, let {tk}kR0 with t0=0 represent the sequence of time instants at which communication is attempted. Define the finite sampling rate as

    Δk=tk+1tk (6)

    for kN. Thus, the state information received by controllers is considered as

    xi(tk)={0,tΞ(0,+)xi(tk),tΛ(0,+)

    with i=0,1,2,,N. And the information received by actuators is given as

    ui(tk)={0,tΞ(0,+)ui(tk),tΛ(0,+).

    Similar to [14], there are two assumptions for DoS attacks.

    Assumption 2 (DoS frequency): There exist constants η0 and τD>0 such that for all t,τR+

    n(τ,t)η+tττD. (7)

    Assumption 3 (DoS Duration): There exists constant T1 such that for all t,τR+

    Ξ(τ,t)∣≤tτT. (8)

    Assumption 2 is inspired by the concept of average dwell time [14] to specify the number of DoS attacks occurring on the interval [τ,t] and Assumption 3 is used to describe the length of the interval over which communication is interrupted. From [14] and [16], it is known that those two assumptions are common for reflecting the constraint energy of DoS attacks.

    Now, the considered problem in this paper is presented as follows.

    Problem 1: The main objective of this paper is to design a secure synchronization control law for the system (1) with unknown system matrices, such that the synchronization errors are asymptotically convergent for both attack-free and attack cases.

    By using (1) and (2), define the synchronization error ei for the ith node as

    ei=xiz0,i=1,2,,N. (9)

    Then the synchronization problem is described as

    limt(xiz0)=0,i=1,2,,N. (10)

    The dynamic equation of the synchronization error ei has the following form

    ˙ei=Aei+Biui+Nj=1,jilijΓi(ejei)=ˉAiei+Bi(ui+Fiωi) (11)

    where ˉAi=ANj=1,jilijΓi, ωi=Nj=1,jilijΓiej and Fi satisfies BiFi=I.

    Besides, similar to [30], define the performance function for the ith node (11), which involves the couplings information

    Ji=12t(eTiQiei+uTiRiui+2uTiRiMiωi+ωTiFTiRiFiωi)dτ (12)

    where QiRn×n and RiRn×n are symmetric positive weight matrices.

    Theorem 1: For the error dynamics of CDNs (11) with the quadratic performance index (12), a control protocol is an optimal one if and only if it has the following form

    ui=FiNj=1,jilijΓiejR1iBTiPiei (13)

    where Pi is a symmetric positive matrix and satisfies the following ARE

    ˉATiPi+PiˉAi+QiPiBiR1iBTiPi=0. (14)

    Proof: First, one gives the necessity proof of Theorem 1.

    Based on (12), define the Hamiltonian function for (11) as

    Hi=12(eTiQiei+uTiRiui+2uTiRiMiωi+ωTiFTiRiFiωi)+λTi(t)(ˉAiei+Bi(ui+Fiωi)) (15)

    where λi(t) is a multiplier to be determined. The necessary condition Hiui=0 on which a control protocol of system (11) is an optimal one results in

    ui=FiNj=1,jilijΓiejR1iBTiλi. (16)

    Since 2Hiu2i=Ri>0, the optimal control has the form of (16). Assume that ei and λi satisfy the following linear equation [34]

    λi(t)=Piei (17)

    where Pi is obtained by solving the ARE (14). According to (17) and the canonical equation shown in [29], one gets the ARE

    ˉATiPi+PiˉAi+QiPiBiR1iBTiPi=0.

    Using (16) and (17), it yields the control law (13). Therefore, the necessity is proven.

    The proof process of sufficiency for Theorem 1, which is divided into two steps, is given as follows.

    Step 1: It is necessary to prove that the control law (13) ensures the asymptotical stability of the synchronization errors. That is to say

    limteTi(t)Piei(t)=0. (18)

    Define the Lyapunov function of system (11) as V(t)=eTiPiei, and its derivative is

    ˙Vi(t)=˙eTiPiei+eTiPi˙eTi=(ˉAiei+Bi(ui+Fiωi))TPiei+eiPi(ˉAiei+Bi(ui+Fiωi))=eTi(PiˉAi+ˉATiPi2PiBiR1iBTiPi)ei=eTi(Qi+PiBiR1iBTiPi)ei. (19)

    According to ARE (14), (19) is rewritten as

    ˙Vi(t)=eTi(Qi+PiBiR1iBTiPi)ei. (20)

    Since Qi0, Ri>0, and Qi+PiBiR1iBTiPi>0 for all states ei, ˙Vi(t)<0, and the control law (13) ensures that the synchronization errors (9) asymptotically converge to zero.

    Step 2: Consider the following equation:

    limteTi(t)Piei(t)eTi(t0)Piei(t0)=t0d(eTiPiei)dτdτ=t0(eTiPi˙ei+˙eiTPiei)dτ=t0(eTi(ˉATiPi+PiˉAi)ei+(ui+Fiωi)TBTiPiei+eTiPiBi(ui+Fiωi))dτ. (21)

    Based on the ARE (14) and the condition (18), the performance index Ji is rewritten as

    Ji=12(eTi(t0)Piei(t0)+t0(uiui)TRi(uiui)dτ) (22)

    with ui=FiNj=1,jilijΓiejR1iBTiPiei. Due to Ri>0 and XTi(t0)PiXi(t0) being a constant, the minimum value Ji=12eTi(t0)Piei(t0) of the performance function (22) can be obtained if and only if ui=ui.■

    The optimal control law (13) is composed of the feedback control R1iBTiPiei and feedforward control FiNj=1,jilijΓiej compensating the couplings in system dynamics. The details are also shown in [30].

    Consider the optimal controller with the following form

    ui=KieiFiNj=1,jilijΓiej (23)

    where

    Ki=R1iBTiPi. (24)

    When all system dynamics are accurately known, the feedback gain Ki is determined by solving the ARE (14). Since (14) is nonlinear in Pi, the solution Pi cannot be obtained from (14) directly. To overcome this difficulty, an algorithm has been developed in [35] by solving (25) iteratively

    (ˉAiBiKki)TPki+Pki(ˉAiBiKki)+Qi+(Kk+1i)TRiKk+1i=0 (25)

    with Kk+1i=R1iBTiPki, where K0i is a given feedback gain matrix stabilizing system (11) and k represents the number of iterations.

    However, when the system matrix A is unavailable which means that the system matrices ˉAi are unknown, the above method is invalid. To obtain the feedback gain Ki, according to [29] and [30], an online iterative policy relying on the information of state, input and couplings is given as follows.

    First, for a given stabilizing controller gain matrix K0i, the input signal for learning is chosen as ui=K0iFiωi+e with e being the exploration noise. Based on (25) and Kk+1i=R1iBTiPki, one has

    eTi(t+δt)Pkiei(t+δt)eTi(t)Pkiei(t)=t+δtteTi((ˉAki)TPki+PkiˉAki)ei+2(ui+Kkie+Fiωi)TBTiPkieidτ=t+δtteTiQkieidτ+2t+δtt(ui+Kkiei+Fiωi)TRiKk+1ieidτ (26)

    with ˉAki=ˉAiBiKki and Qki=Qi+(Kki)TRiKki. Note that, relying on (26), the requirement of the system matrix in (25) is replaced by the information of states xi, inputs ui and couplings Fiωi measured online.

    Further, for all t=tj,j=1,2,,l, satisfying 0t0t1tl and δt=tlt0=t2t1==tltl1, (26) holds. Define matrices δixxRl×12n(n+1), IixxRl×n2, IixuRl×n2 and IixwRl×n2, so that

    δixx=[ˆei(t1)ˆei(t0),ˆei(t2)ˆei(t1),,ˆei(tl)ˆei(tl1)]TIiee=[t1t0eieidτ,t2t1eieidτ,,tltl1eieidτ]TIieu=[t1t0eiuidτ,t2t1eiuidτ,,tltl1eiuidτ]TIiew=[t1t0(eiFiωi)dτ,t2t1(eiFiωi)dτ,,tltl1(eiFiωi)dτ]T (27)

    where ˆei has been defined in [29]. For a matrix P=[pij]n×n, an operator is defined as

    ˆP=[p11,2p12,,p22,2p23,,2pn1,n,pnn]T. (28)

    According to (26)–(28), one has the following equation:

    Θki[ˆPikvec(Kk+1i)]=Ξki (29)

    where ΘkiRl×[12n(n+1)+n2] and ΞkiRl are given as

    Θki=[δixx,2Iixx(Inq(Kki)TRi)2Iixu(InqRi)2Iixw(InqRi)]Ξki=Iixxvec(Qki).

    Furthermore, if Θki has full column rank ([36], Lemma 1), the unknown matrices Pki and Kk+1i can be solved together by the least squares method as follows:

    [ˆPikvec(Kk+1i)]=(ΘkiTΘki)1(Θki)TΞki. (30)

    And the sequences of Pki and Kk+1i have been proven to be convergent (that is, limkKki=Ki, limkPk1i=Pi) in [29].

    Remark 1: The feedback gain Ki is obtained under the attack free case, and the proposed iterative policy method requires that all the information of states xi, control inputs ui and couplings ωi are available.

    As shown in [14], there may be a time interval elapsing from the time zs+ds to the time zs+ds+vs at which the state information is successfully sampled and transmitted. And the time interval vs (shown in Fig. 2) satisfies

    Figure  2.  An example of DoS attacks.
    vsΔkΔ (31)

    with Δ representing the upper bound on the inter-sampling rate in [14]. Thus the time interval [τ,t) is composed of the following two sub-intervals:

    ˜Ξ(τ,t)=sN+Vs[τ,t] (32)
    ˜Λ(τ,t)=[τ,t]˜Ξ(τ,t) (33)

    where Vs=[zs,zs+ds+vs). Specially, for all τ,tR0,

    |˜Ξ(τ,t)||Ξ(τ,t)|+(1+n(τ,t))Δ (34)
    |˜Λ(τ,t)|=tτ|˜Ξ(τ,t)|tτ|Ξ(τ,t)|(1+n(τ,t))Δ. (35)

    Next, by using the Lyapunov function method and switching technique, the stability of the error systems (11) under DoS attacks will be discussed.

    Note that, to analyze the stability of synchronization errors, the system dynamic matrices are required to be known in [23]–[26]. However, such a requirement cannot be satisfied in this paper, and then these existing methods are no longer applicable. To overcome this difficulty, a matrix polynomial replacement method is proposed based on the ARE (37) and the iterative learning results Pia and Ki. The details are shown as follows.

    Divide the process of stability analysis into two steps.

    Step 1: Consider the time interval ˜Λ(τ,t) and define the Lyapunov function of the ith node

    Via(t)=eTiPiaei. (36)

    According to the ARE (14) and the condition Ki=R1iBTi×Pia, one gets

    (ˉAiBiKi)TPia+Pia(ˉAiBiKi)=(Qi+KiTRiKi). (37)

    Define φ(ˉAi,Pia)=PiaˉAi+ˉATiPia2PiaBiR1iBTiPia and ψ(Ki)=(Qi+KTiRiKi). Then the derivative of the Lyapunov function (36) is

    ˙Via(t)=eTiφ(ˉAi,Pia)ei=eTi(Qi+PiaBiR1iBTiPia)ei. (38)

    By resorting to ARE (37) and the iterative learning results Pia and Ki in (37), one has

    ˙Via(t)=eiTψ(Ki)ei. (39)

    As clarified in Theorem 1, the error systems (11) are asymptotically stable during the time interval ˜Λ(τ,t). Thus suppose

    ˙Via(t)αiVia (40)

    with αi>0. That is to say,

    ψ(Ki)αiPia. (41)

    Therefore, the convergence rate αi of the system (11) can be computed by (41). Before applying the optimal control gain Ki to system (1), the matrix Pia and the feedback gain matrix Ki in ARE (37) have been obtained by iteratively solving (30).

    Step 2: Consider the time interval ˜Ξ(τ,t). The state information received by controllers is xi=0, i.e. ei=0. Thus controllers are out of action, i.e., ui=0. Define the Lyapunov function as

    Vib(t)=eTiPibei (42)

    where its derivative satisfies

    ˙Vib(t)=˙eTiPibei+eTiPib˙eTi=eTi(ˉATiPib+PibˉAi)eiβVib (43)

    with the exponential divergence rates βi>0. That is

    ˉATiPib+PibˉAiβiPib. (44)

    Choose Pib=In, and (44) becomes ˉATi+ˉAi<βiInN. From (11), it is known that

    ˉATi+ˉAi=AT+A(Nj=1,jilijΓi)TNj=1,jilijΓi. (45)

    Assumption 4: Assume λmax(He(ˉAi)) is available.

    Based on Assumption 4, one has

    He(ˉAi)He(Nj=1,jilijΓi)λmax(He(ˉAi))Inλmin(He(Nj=1,jilijΓi))In<βiIn (46)

    which yields the following inequality

    βi>λmax(He(A))λmin(He(Nj=1,jilijΓi)). (47)

    Combining the above analysis results (41) and (47) of the piecewise Lyapunov functions (36) and (42), respectively, the stability of closed-loop system, which switches between stable and unstable subsystems, is established by using the switching technique. The conditions on the frequency and duration of DoS attacks, under which the secure synchronization can be guaranteed, are shown in Theorem 2.

    Theorem 2: For system (11), suppose Assumptions 1–4 hold. Given any positive definite symmetric matrices Ri and Qi with i=1,2,,N, if there exist positive constants θi such that the following two inequalities hold

    1T<mini{αiθiαi+βi} (48)
    1τD<mini{θi2lnμi+(αi+βi)Δ} (49)

    where αi and βi satisfy (41) and (47), respectively, and μi=max{λmax(Pia)/λmin(Pib),λmax(Pib)/λmin(Pia)}. Then, the optimal control laws (13) ensure that the synchronization errors are convergent under DoS attacks.

    Proof: Consider any time interval [zs,zs+1) that Vib is activated in [zs,zs+ds+vs) and Via is activated in [zs+ds+vs,zs+1). By comparison lemma in [37], one gives

    Vi(t){eβi(tzs)Vib(zs),t[zs,zs+ds+vs)eαi(tzsdsvs)Via(zs+ds+vs),t[zs+ds+vs,zs+1) (50)

    Similar to [26], there are the following two cases:

    Case 1: If t[zs,zs+ds), n(t0,t)=s,

    Vi(t)eβi(tzs)Vib(zs)μieβi(tzs)Via(zs)μieβi(tzs)eαi(zszs1ds1vs1)×Via(zs1+ds1+vs1)μ2ieβi(tzs)eαi(zszs1ds1vs1)×Vib(zs1+ds+vs)μ2ieβi(tzs+zs1+ds1+vs1zs1)×eαi(zszs1ds1vs1)Vib(zs1)μ2s1ieβi|˜Ξ(t0,t)|eα|˜Λ(t0,t)|Vi(t0)=μ2n(t0,t)1ieβi|˜Ξ(t0,t)|eα|˜Λ(t0,t)|Vi(t0). (51)

    Case 2: If t[zs+ds+vs,zs+1), n(t0,t)=s,

    Vi(t)eαi(tzsdsvs)Via(zs+ds+vs)μieαi(tzsdsvs)Vib(zs+ds+vs)μieαi(tzsdsvs)eβi(zs+ds+vszs)Vib(zs)μ2ieαi(tzsdsvs)eβi(zs+ds+vszs)Via(zs)μ2sieβi|˜Ξ(t0,t)|eαi|˜Λi(t0,t)|V(t0)=μ2n(t0,t)ieβi|˜Ξ(t0,t)|eαi|˜Λ(t0,t)|Vi(t0). (52)

    Thus, for tt0,

    Vi(t)μ2n(t0,t)ieβi|˜Ξ(t0,t)|eαi|˜Λ(t0,t)|Vi(t0). (53)

    According to Assumptions 2 and 3, and inequalities (34) and (35), it yields that

    Vi(t)μ2ηiie(αi+βi)(1+ηi)Δ×e(αi2lnμi+(αi+βi)ΔτDαi+βiT)(tt0)Vi(t0). (54)

    Let ξi=μ2ηiie(αi+βi)(1+ηi)Δ and δi=αi2lnμi+(αi+βi)ΔτDαi+βiT. Then, one has

    Vi(t)ξieδi(tt0). (55)

    From (48) and (49), it is known that δi>0. Thus the synchronization errors ei, i=1,2,,N, are convergent exponentially, which implies that limtei(t)=0.■

    Remark 2: DoS attacks compromise certain or all transmission channels, which is also introduced in [15], [16], [19] and [26]. The case that all transmission channels are interrupted when DoS attacks occur is considered in Theorem 2. This case can also be found in [23] and [26].

    Remark 3: The stability analysis of synchronization errors under DoS attacks in [23]–[26] is based on the Lyapunov function approach and the exact system dynamic matrices are required to be known. While, the system matrices are not available in this paper. To overcome this difficulty, the matrix polynomial φ(ˉAi,Pia) including the unknown matrices ˉAi and Pia is replaced by ψ(Ki), which includes the known matrices Qi, Ri and the control gain matrix Ki obtained by the iterative learning method.

    In this section, two complex dynamical network examples are taken to verify the effectiveness of above methods.

    Example 1: Similar to [7], consider a spring-connected multi-vehicle system (shown in Fig. 3) composed of an isolated leader and four slave vehicles. The springs are regarded as the interconnection between two vehicles. In fact, the ith vehicle is modeled as

    Figure  3.  Spring-connected multi-vehicle system with four slave vehicles.
    mi¨di=Nj=1,jilijk(djdi)+ui (56)

    where di is the position of ith vehicle from its equilibrium position (i=1,2,3,4), mi represents the weight of ith vehicle and k means the stiffness coefficient of spring. The information of di and the velocity ˙di is transmitted to controllers through communication channels. From (56), the slave vehicle dynamics can be governed as

    ˙xi=Axi+Nj=1,jilijΓi(xjxi)+ui (57)

    where xi=[di,˙di]T,

    A=[0100],Γi=[00kmi0].

    Here, assume m1=1, m2=2.5, m3=1.5, m4=0.5 and k=1. Moreover, the dynamic equation of leader is described as

    ˙z0=[0100]z0.

    The simulation process is divided into two steps:

    Step 1: Solving process of the solutions Ki and Pia satisfying (37).

    Suppose the initial values e1=[9,9]T, e2=[8,8]T, e3=[7,7]T and e4=[6,6]T. Then choose the weighting matrices Q1=10I2, Q2=20I2, Q3=15I2, Q4=18I2 and Ri=I2 for i=1,2,3,4. The initial feedback gain is assumed as

    Ki0=[0000]

    with i=1,2,3,4. The exploration noise e, introduced in [36], is the sum of sinusoidal signals with different frequencies from t=0s to t=4s and it has the following form:

    e=550l=1sin(ωlt) (58)

    where ωl, with l=1,,50, is randomly selected from [50,50]. Besides, the internal σk=0.01s is used to solve the optimal control gain Ki based on policy iteration with the information of states xi, inputs ui and couplings ωi. The matrices Pia and Ki, with i=1,2,3,4, converge to their optimal values after 5 iterations, 4 iterations, 4 iterations, 4 iterations, respectively. Similar to [29], Pkia and Kki respectively converge to the corresponding optimal values in (59) and (60) when the stopping criterion PkaPk1a0.005 is met.

    P1a=[3.1623003.1623],P2a=[4.45390.09610.09614.4925]P3a=[3.92230.15280.15283.8303],P4a=[4.42520.4450.4454.1124] (59)
    K1=[3.1623003.1623],K2=[4.45390.09610.09614.4925]K3=[3.92230.15280.15283.8303],K4=[4.42520.4450.4454.1124]. (60)

    After applying the optimal control law (23) with obtained gains Ki to this spring-connected multi-vehicle system (56), the state synchronization errors without any attacks are shown in Fig. 4. Clearly, the state synchronization errors of vehicles 1 – 4 are asymptotically convergent.

    Figure  4.  Synchronization errors of vehicles 1–4 for the attack free case.

    Step 2: Stability analysis of secure synchronization.

    Based on the analysis results (41) and (47), one gets

    α1=20.0000,α2=39.1422,α3=28.8137,α4=32.4177β1=2.0000,β2=1.8000,β3=2.3333,β4=3.0000μ1=3.1623,μ2=4.5712,μ3=4.0359,μ4=4.7405. (61)

    Assume the adversary launches DoS attacks with τD=2 and T=1.24. Here ΔΔk=0.001. By computing (48) and (49), it is obtained that

    θ1>2lnμ1+(α1+β1)ΔτD=2.2513θ1<α1α1+β1T=2.2581θ2>2lnμ2+(α2+β2)ΔτD=3.5669θ2<α2α2+β2T=6.1243θ3>2lnμ3+(α3+β3)ΔτD=2.9526θ3<α3α3+β3T=3.6951θ4>2lnμ4+(α4+β4)ΔτD=3.3270θ4<α4α4+β4T=3.8550. (62)

    From (62), it is known that the conditions in (48) and (49) of Theorem 2 are satisfied. Further, the synchronization errors with DoS attacks are plotted in Fig. 5 and it is known that the states of the spring-connected multi-vehicle system with unknown dynamics can track the leader’s if the DoS frequency and DoS duration satisfy n(0,20)η+10 and ˜Ξ(0,20)16.1, respectively. While, the system performance shown in Fig. 5 degrades due to the effects of the DoS attacks. Besides, the control laws ui, which are larger after each DoS attack ends, are plotted in Fig. 6.

    Figure  5.  Synchronization errors of vehicles 1–4 with unknown system matrix A for the DoS attacks case.
    Figure  6.  Control laws of vehicles 1–4 with unknown system matrix A for the DoS attacks case.

    Moreover, under the assumption of availability on the system matrices ˉAi, the solutions Pia of ARE (37) and the optimal controller gains Ki are directly computed by (37) and (24). In particular, they are the same as the optimal values Pia and Ki in (59) and (60), respectively (i=1,2,3,4). Then, one gets the exponential convergence rates αi=αi by solving (41) directly. Due to (44) is nonlinear in Pib and βi, we search for solutions of (44) with βki=βk1i+0.001 (β0i=0) where k represents the number of searches. Finally, the exponential divergence rates βi=0.001 and the following matrices Pib are obtained

    P1b=[15.88500015.8850],P2b=[14.61360.00010.000118.2673]P3b=[114.47360.00050.000585.8552],P4b=[114.47360.00050.000585.8552].

    According to Pia and Pib, one has μi=5.0233 for i=1,2,3,4. Assume the adversary launches DoS attacks with τD=2 and T=1.156. By computing (48) and (49), it is obtained that

    2.6141<θ1<2.6990,3.5712<θ2<5.28213.0548<θ3<3.8883,3.2350<θ4<4.3746.

    Obviously, the conditions in (48) and (49) of Theorem 2 are satisfied. The synchronization errors under DoS attacks with frequency satisfying n(0,20)η+10 and the duration satisfying ˜Ξ(0,20)17.3 are plotted in Fig. 7. Besides, the corresponding control laws ui are plotted in Fig. 8. As shown in Figs. 7 and 8, the system performance degrades due to the effects of the DoS attacks. Further, after each DoS attack ends, much control effort is needed to drive the synchronization errors to be convergent.

    Figure  7.  Synchronization errors of vehicles 1–4 with known system matrix A for DoS attacks case.
    Figure  8.  Control laws of vehicles 1–4 with known system matrix A for DoS attacks case.

    As shown above, the upper bounds of the DoS attack frequency and the DoS duration which are solved by the proposed method in this paper are slightly smaller than those obtained by the model based method.

    To further prove the effectiveness of the proposed approaches in this paper, Example 2 with more complex graph structure is given as follows.

    Example 2: Consider CDNs are with five nodes, and the correlative graph is shown in Fig. 9. The leader node’s dynamic is described as

    Figure  9.  Graph structure for the CDNs.
    ˙x0(t)=[0.4110]x0

    and the system dynamics of five nodes are shown as

    A=[0.4110]

    with B=I2, Γ1=0.9I2, Γ2=0.7I2, Γ3=0.9I2, Γ4=I2, Γ5=2I2. Suppose the initial values e1=[6,6]T, e2=[5,5]T, e3=[4,4]T, e4=[2,6]T and e5=[5,3]T. Then choose the weighting matrices Q5=12I2.

    Similar to Example 1, the simulation process is divided into two steps.

    Step 1: Use the policy iteration method to obtain the solutions Pia and Ki. The initial controller gain is chosen as

    Ki0=[1000.1].

    Besides, the other parameters are assumed to be the same as those in Example 1. By utilizing the PI method, the optimal solutions Pia and Ki with i=1,2,3,4,5 are obtained after 4 iterations. They are given as

    K1a=[2.04990.02870.02871.8464],K2a=[3.57580.03060.03063.2926]K3a=[2.71140.02790.02792.4773],K4a=[2.37250.01700.01702.1994]K5a=[2.37250.01700.01702.1994] (63)
    P1a=[2.04990.02870.02871.8464],P2a=[3.57580.03060.03063.2926]P3a=[2.71140.02790.02792.4773],P4a=[2.37250.01700.01702.1994]P5a=[2.37250.01700.01702.1994]. (64)

    Step 2: Stability analysis of secure synchronization

    According to the analysis results (41) and (47), suppose that the DoS attacks with τD=2 and T=1.2 occur during time interval (0,20), which satisfying the conditions in (48) and (49) in Theorem 2.

    The synchronization errors under the DoS attacks are given in Fig. 10. Besides, the corresponding control laws ui are plotted in Fig. 11. As shown in Fig. 10, the synchronization errors become large when the system is under DoS attacks. Finally, the system with unknown dynamics can track the leader, if the DoS frequency satisfies n(0,20)η+10 and the DoS duration satisfies ˜Ξ(0,20)16.6.

    Figure  10.  Synchronization errors of nodes 1–5 with unknown system matrix A for the DoS attacks case.
    Figure  11.  Control laws of nodes 1–5 with unknown system matrix A for the DoS attacks case.

    This paper investigates the secure synchronization control problem for CPSs subject to intermittent DoS attacks. The considered CPSs are modeled as a class of CDNs with unknown dynamics. First, to deal with the state couplings, a distributed optimal controller is proposed based on our previous works [29]. And the optimal feedback gain matrix is learned by iteratively solving the ARE. Especially, based on the ARE and the iteratively learning results, the decay rates for each node about sleeping and active intervals of DoS attacks, are determined by solving a set of linear matrix inequalities. Moreover, by using the switching technique and the obtained decay rates, the upper bounds of the DoS attacks frequency and duration, under which the synchronization for all nodes is still achieved, have been proposed. Finally, the simulations of two examples verify the effectiveness of the proposed methods.

  • [1]
    V. Reppa, M. M. Polycarpou, and C. G. Panayiotou, “Distributed sensor fault diagnosis for a network of interconnected cyberphysical systems,” IEEE Trans. Control of Network Systems, vol. 2, no. 1, pp. 11–23, 2015. doi: 10.1109/TCNS.2014.2367362
    [2]
    A. Bidram, A. Davoudi, F. L. Lewis, and J. M. Guerrero, “Distributed cooperative secondary control of microgrids using feedback linearization,” IEEE Trans. Power Systems, vol. 28, no. 3, pp. 3462–3470, 2013. doi: 10.1109/TPWRS.2013.2247071
    [3]
    A. Isidori, L. Marconi, and G. Casadei, “Robust output synchronization of a network of heterogeneous nonlinear agents via nonlinear regulation theory,” IEEE Trans. Autom. Control, vol. 59, no. 10, pp. 2680–2691, 2014. doi: 10.1109/TAC.2014.2326213
    [4]
    M. H. Zhu and S. Martinez, “On the performance analysis of resilient networked control systems under replay attacks,” IEEE Trans. Autom. Control, vol. 59, no. 3, pp. 804–808, 2014. doi: 10.1109/TAC.2013.2279896
    [5]
    H. Liu, X. H. Cao, J. P. He, P. Cheng, C. G. Li, J. M. Chen, and Y. X. Sun, “Distributed identification of the most critical node for average consensus,” IEEE Trans. Signal Processing, vol. 63, no. 16, pp. 4315–4328, 2015. doi: 10.1109/TSP.2015.2441039
    [6]
    M. S. Rahman, M. A. Mahmud, A. M. T. Oo, and H. R. Pota, “Multi-agent approach for enhancing security of protection schemes in cyber-physical energy systems,” IEEE Trans. Industrial Informatics, vol. 13, no. 2, pp. 436–447, 2017. doi: 10.1109/TII.2016.2612645
    [7]
    X. Z. Jin, G. H. Yang, and W. W. Che, “Adaptive synchronization of master-slave large-scale systems against bias actuators and network attenuations,” Int. J. Control,Autom. and Systems, vol. 10, no. 6, pp. 1102–1110, 2012. doi: 10.1007/s12555-012-0604-1
    [8]
    Y. Wang, J. L. Xiong, and D. W. C. Ho, “Decentralized control scheme for large-scale systems defined over a graph in presence of communication delays and random missing measurements,” Automatica, vol. 98, pp. 190–200, 2018. doi: 10.1016/j.automatica.2018.09.023
    [9]
    A. Y. Lu and G. H. Yang, “Secure state estimation for cyber-physical systems under sparse sensor attacks via a switched Luenberger observer,” Information Sciences, vol. 417, pp. 454–464, 2017. doi: 10.1016/j.ins.2017.07.029
    [10]
    Y. Shoukry and P. Tabuada, “Event-triggered state observers for sparse sensor noise/attacks,” IEEE Trans. Autom. Control, vol. 61, no. 8, pp. 2079–2091, 2016. doi: 10.1109/TAC.2015.2492159
    [11]
    D. R. Ding, Z. D. Wang, D. W. C. Ho, and G. L. Wei, “Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks,” Automatica, vol. 78, pp. 231–240, 2017. doi: 10.1016/j.automatica.2016.12.026
    [12]
    X. Huang and J. X. Dong, “Reliable control policy of cyber-physical systems against a class of frequency-constrained sensor and actuator attacks,” IEEE Trans. Cybernetics, vol. 48, no. 12, pp. 3432–3439, 2018. doi: 10.1109/TCYB.2018.2815758
    [13]
    G. Franzè, F. Tedesco, and W. Lucia, “Resilient control for cyberPhysical systems subject to replay attacks,” IEEE Control Systems Letters, vol. 3, no. 4, pp. 984–989, 2019. doi: 10.1109/LCSYS.2019.2920507
    [14]
    C. D. Persis and P. Tesi, “Input-to-state stabilizing control under denial-ofservice,” IEEE Trans. Autom. Control, vol. 60, no. 11, pp. 2930–2944, 2015. doi: 10.1109/TAC.2015.2416924
    [15]
    S. Feng and P. Tesi, “Resilient control under denial-of-service: Robust design,” Automatica, vol. 79, pp. 42–51, 2017. doi: 10.1016/j.automatica.2017.01.031
    [16]
    V. S. Dolk, P. Tesi, C. De Persis, and W. P. M. H. Heemels, “Eventtriggered control systems under denial-of-service attacks,” IEEE Trans. Control of Network Systems, vol. 4, no. 1, pp. 93–105, 2017. doi: 10.1109/TCNS.2016.2613445
    [17]
    A. Y. Lu and G. H. Yang, “Input-to-state stabilizing control for cyberphysical systems with multiple transmission channels under denial of service,” IEEE Trans. Autom. Control, vol. 63, no. 6, pp. 1813–1820, 2018. doi: 10.1109/TAC.2017.2751999
    [18]
    S. L. Hu, D. Yue, X. L. Chen, Z. H. Cheng, and X. P. Xie, “Resilient H filtering for event-triggered networked systems under nonperiodic DoS jamming attacks,” IEEE Trans. Systems, Man, and Cybernetics: Systems, Mar. 2019.
    [19]
    L. W. An and G. H. Yang, “Decentralized adaptive fuzzy secure control for nonlinear uncertain interconnected systems against intermittent DoS attacks,” IEEE Trans. Cybernetics, vol. 49, no. 3, pp. 827–838, 2017.
    [20]
    L. H. Peng, L. Shi, X. H. Cao, and C. Y. Sun, “Optimal attack energy allocation against remote state estimation,” IEEE Trans. Autom. Control, vol. 63, no. 7, pp. 2199–2205, 2017.
    [21]
    K. M. Ding, Y. Z. Li, D. E. Quevedo, S. Dey, and L. Shi, “A multi-channel transmission schedule for remote state estimation under DoS attacks,” Automatica, vol. 78, pp. 194–201, 2017. doi: 10.1016/j.automatica.2016.12.020
    [22]
    B. Chen, D. W. C. Ho, W. A. Zhang, and L. Yu, “Distributed dimensionality reduction fusion estimation for cyber-physical systems under DoS attacks,” IEEE Trans. Systems,Man,and Cybernetics:Systems, vol. 49, no. 2, pp. 455–468, 2017.
    [23]
    D. Zhang, L. Liu, and G. Feng, “Consensus of heterogeneous linear multiagent systems subject to aperiodic sampled-data and DoS attack,” IEEE Trans. Cybernetics, vol. 49, no. 4, pp. 1501–1511, 2018.
    [24]
    Y. W. Wang, H. O. Wang, J. W. Xiao, and Z. H. Guan, “Synchronization of complex dynamical networks under recoverable attacks,” Automatica, vol. 46, no. 1, pp. 197–203, 2010. doi: 10.1016/j.automatica.2009.10.024
    [25]
    Y. Xu, M. Fang, P. Shi, and Z. G. Wu, “Event-based secure consensus of mutiagent systems against DoS attacks,” IEEE Trans. Cybernetics, Jun. 2019.
    [26]
    Z. Feng and G. Q. Hu, “Secure cooperative event-triggered control of linear multiagent systems under DoS attacks,” IEEE Trans. Control Systems Technology, 2019.
    [27]
    B. Kiumarsi and F. L. Lewis, “Output synchronization of heterogeneous discrete-time systems: A model-free optimal approach,” Automatica, vol. 84, pp. 86–94, 2017. doi: 10.1016/j.automatica.2017.07.004
    [28]
    H. Modares, S. P. Nageshrao, G. A. D. Lopes, R. Babuška, and F. L. Lewis, “Optimal model-free output synchronization of heterogeneous systems using off-policy reinforcement learning,” Automatica, vol. 71, pp. 334–341, 2016. doi: 10.1016/j.automatica.2016.05.017
    [29]
    N. Wang and X. J. Li, “Optimal output synchronization control of a class of complex dynamical networks with partially unknown system dynamics,” IEEE Trans. Systems, Man, and Cybernetics: Systems, 2018.
    [30]
    Y. W. Cao, G. H. Yang, and X. J. Li, “Optimal synchronization controller design for complex dynamical networks with unknown system dynamics,” J. Franklin Institute, vol. 356, no. 12, pp. 6071–6086, 2019. doi: 10.1016/j.jfranklin.2018.11.054
    [31]
    M. Y. Li and Z. S. Shuai, “Global-stability problem for coupled systems of differential equations on networks,” J. Differential Equations, vol. 248, no. 1, pp. 1–20, 2010. doi: 10.1016/j.jde.2009.09.003
    [32]
    H. Zhang, P. Cheng, L. Shi, and J. M. Chen, “Optimal denial-of-service attack scheduling with energy constraint,” IEEE Trans. Autom. Control, vol. 60, no. 11, pp. 3023–3028, 2015. doi: 10.1109/TAC.2015.2409905
    [33]
    H. Zhang, P. Cheng, L. Shi, and J. M. Chen, “Optimal DoS attack scheduling in wireless networked control system,” IEEE Trans. Control Systems Technology, vol. 24, no. 3, pp. 834–852, 2016.
    [34]
    F. L. Lewis, D. Vrabie, and V. Syrmos, Optimal Control, 3rd edition, New York: Wiley, 2012.
    [35]
    D. Kleinman, “On an iterative technique for Riccati equation computations,” IEEE Trans. Autom. Control, vol. 13, no. 1, pp. 114–115, 1968. doi: 10.1109/TAC.1968.1098829
    [36]
    Y. Jiang and Z. P. Jiang, “Computational adaptive optimal control for continuous-time linear systems with completely unknown dynamics,” Automatica, vol. 48, pp. 2699–2704, 2012. doi: 10.1016/j.automatica.2012.06.096
    [37]
    H. K. Khalil, Nonlinear Systems, 3rd edition, Prentice Hall, Englewood Cliffs, NJ, 2003.
  • Related Articles

    [1]Hongxing Xiong, Guangdeng Chen, Hongru Ren, Hongyi Li. Broad-Learning-System-Based Model-Free Adaptive Predictive Control for Nonlinear MASs Under DoS Attacks[J]. IEEE/CAA Journal of Automatica Sinica, 2025, 12(2): 381-393. doi: 10.1109/JAS.2024.124929
    [2]Lifu Wang, Zhaofei Li, Ge Guo, Zhi Kong. Target Controllability of Multi-Layer Networks With High-Dimensional Nodes[J]. IEEE/CAA Journal of Automatica Sinica, 2024, 11(9): 1999-2010. doi: 10.1109/JAS.2023.124152
    [3]Rong Zhao, Jun-e Feng, Dawei Zhang. Self-Triggered Set Stabilization of Boolean Control Networks and Its Applications[J]. IEEE/CAA Journal of Automatica Sinica, 2024, 11(7): 1631-1642. doi: 10.1109/JAS.2023.124050
    [4]Tao Wang, Qiming Chen, Xun Lang, Lei Xie, Peng Li, Hongye Su. Detection of Oscillations in Process Control Loops From Visual Image Space Using Deep Convolutional Networks[J]. IEEE/CAA Journal of Automatica Sinica, 2024, 11(4): 982-995. doi: 10.1109/JAS.2023.124170
    [5]Xiaoting Du, Lei Zou, Maiying Zhong. Set-Membership Filtering Approach to Dynamic Event-Triggered Fault Estimation for a Class of Nonlinear Time-Varying Complex Networks[J]. IEEE/CAA Journal of Automatica Sinica, 2024, 11(3): 638-648. doi: 10.1109/JAS.2023.124119
    [6]Meng Li, Zhigang Zeng. Nested Saturated Control of Uncertain Complex Cascade Systems Using Mixed Saturation Levels[J]. IEEE/CAA Journal of Automatica Sinica, 2024, 11(5): 1163-1174. doi: 10.1109/JAS.2023.124176
    [7]Dan Wang, Wei Chen, Li Qiu. The First Five Years of a Phase Theory for Complex Systems and Networks[J]. IEEE/CAA Journal of Automatica Sinica, 2024, 11(8): 1728-1743. doi: 10.1109/JAS.2024.124542
    [8]Yao Cui, Pei Cheng, Xiaohua Ge. Exponential Synchronization of Delayed Stochastic Complex Dynamical Networks via Hybrid Impulsive Control[J]. IEEE/CAA Journal of Automatica Sinica, 2024, 11(3): 785-787. doi: 10.1109/JAS.2023.123867
    [9]Lifu Wang, Zhaofei Li, Lianqian Cao, Ge Guo, Zhi Kong. Controllability of Multi-Relational Networks With Heterogeneous Dynamical Nodes[J]. IEEE/CAA Journal of Automatica Sinica, 2024, 11(12): 2476-2486. doi: 10.1109/JAS.2024.124404
    [10]Xiuyang Chen, Changbing Tang, Zhao Zhang. A Game Theoretic Approach for a Minimal Secure Dominating Set[J]. IEEE/CAA Journal of Automatica Sinica, 2023, 10(12): 2258-2268. doi: 10.1109/JAS.2023.123315
    [11]Chengze Jiang, Xiuchun Xiao. Norm-Based Adaptive Coefficient ZNN for Solving the Time-Dependent Algebraic Riccati Equation[J]. IEEE/CAA Journal of Automatica Sinica, 2023, 10(1): 298-300. doi: 10.1109/JAS.2023.123057
    [12]Lifu Wang, Zhaofei Li, Guotao Zhao, Ge Guo, Zhi Kong. Input Structure Design for Structural Controllability of Complex Networks[J]. IEEE/CAA Journal of Automatica Sinica, 2023, 10(7): 1571-1581. doi: 10.1109/JAS.2023.123504
    [13]Xiaohua Ge, Qing-Long Han, Qing Wu, Xian-Ming Zhang. Resilient and Safe Platooning Control of Connected Automated Vehicles Against Intermittent Denial-of-Service Attacks[J]. IEEE/CAA Journal of Automatica Sinica, 2023, 10(5): 1234-1251. doi: 10.1109/JAS.2022.105845
    [14]Wenli Duso, MengChu Zhou, Abdullah Abusorrah. A Survey of Cyber Attacks on Cyber Physical Systems: Recent Advances and Challenges[J]. IEEE/CAA Journal of Automatica Sinica, 2022, 9(5): 784-800. doi: 10.1109/JAS.2022.105548
    [15]Lulu Chen, Lei Shi, Quan Zhou, Hanmin Sheng, Yuhua Cheng. Secure Bipartite Tracking Control for Linear Leader-Following Multiagent Systems Under Denial-of-Service Attacks[J]. IEEE/CAA Journal of Automatica Sinica, 2022, 9(8): 1512-1515. doi: 10.1109/JAS.2022.105758
    [16]Lei Liu, Lifeng Ma, Jie Zhang, Yuming Bo. Sliding Mode Control for Nonlinear Markovian Jump Systems Under Denial-of-Service Attacks[J]. IEEE/CAA Journal of Automatica Sinica, 2020, 7(6): 1638-1648. doi: 10.1109/JAS.2019.1911531
    [17]Zhen Hong, Rui Wang, Xile Li. A Clustering-tree Topology Control Based on the Energy Forecast for Heterogeneous Wireless Sensor Networks[J]. IEEE/CAA Journal of Automatica Sinica, 2016, 3(1): 68-77.
    [18]Xiaojuan Chen, Jun Zhang, Tiedong Ma. Parameter Estimation and Topology Identification of Uncertain General Fractional-order Complex Dynamical Networks with Time Delay[J]. IEEE/CAA Journal of Automatica Sinica, 2016, 3(3): 295-303.
    [19]Yongsong Wei, Shaoyuan Li. Water Supply Networks as Cyber-physical Systems and Controllability Analysis[J]. IEEE/CAA Journal of Automatica Sinica, 2015, 2(3): 313-319.
    [20]Yumei Li, Holger Voos, Mohamed Darouach, Changchun Hua. An Algebraic Detection Approach for Control Systems under Multiple Stochastic Cyber-attacks[J]. IEEE/CAA Journal of Automatica Sinica, 2015, 2(3): 258-266.

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(11)

    Article Metrics

    Article views (1417) PDF downloads(135) Cited by()

    Highlights

    • This paper investigates the secure synchronization control problem for a class of cyber-physical systems (CPSs) with unknown system matrices and intermittent denial-of-service (DoS) attacks.
    • For the attack free case, an optimal control law consisting of a feedback control and a compensated feedforward control is proposed to achieve the synchronization, and the feedback control gain matrix is learned by iteratively solving an Algebraic Riccati Equation (ARE).
    • Considering the attack cases, it is difficult to perform the stability analysis of the synchronization errors by using the existing Lyapunov function methods due to the presence of unknown system matrices. In order to overcome this difficulty, a matrix polynomial replacement method is given and it is proved that, the proposed optimal control law can still guarantee the convergence of synchronization errors if two inequality conditions related with the DoS attacks hold.

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return