Loading [MathJax]/jax/output/SVG/jax.js
Research article

Adaptive event-triggered state estimation for complex networks with nonlinearities against hybrid attacks

  • Received: 17 September 2021 Accepted: 09 November 2021 Published: 22 November 2021
  • MSC : 93C57, 93C65

  • This paper investigates the event-triggered state estimation problem for a class of complex networks (CNs) suffered by hybrid cyber-attacks. It is assumed that a wireless network exists between sensors and remote estimators, and that data packets may be modified or blocked by malicious attackers. Adaptive event-triggered scheme (AETS) is introduced to alleviate the network congestion problem. With the help of two sets of Bernoulli distribution variables (BDVs) and an arbitrary function related to the system state, a mathematical model of the hybrid cyber-attacks is developed to portray randomly occurring denial-of-service (DoS) attacks and deception attacks. CNs, AETS, hybrid cyber-attacks, and state estimators are then incorporated into a unified architecture. The system state is cascaded with state errors as an augmented system. Furthermore, based on Lyapunov stability theory and linear matrix inequalities (LMIs), sufficient conditions to ensure the asymptotic stability of the augmented system are derived, and the corresponding state estimator is designed. Finally, the effectiveness of the theoretical method is demonstrated by numerical examples and simulations.

    Citation: Yahan Deng, Zhenhai Meng, Hongqian Lu. Adaptive event-triggered state estimation for complex networks with nonlinearities against hybrid attacks[J]. AIMS Mathematics, 2022, 7(2): 2858-2877. doi: 10.3934/math.2022158

    Related Papers:

    [1] Qiushi Wang, Hongwei Ren, Zhiping Peng . Event-triggered impulsive control for second-order nonlinear multi-agent systems under DoS attacks. AIMS Mathematics, 2024, 9(6): 13998-14011. doi: 10.3934/math.2024680
    [2] Chantapish Zamart, Thongchai Botmart, Wajaree Weera, Prem Junsawang . Finite-time decentralized event-triggered feedback control for generalized neural networks with mixed interval time-varying delays and cyber-attacks. AIMS Mathematics, 2023, 8(9): 22274-22300. doi: 10.3934/math.20231136
    [3] Jiaqi Liang, Zhanheng Chen, Zhiyong Yu, Haijun Jiang . Fixed-time consensus of second-order multi-agent systems based on event-triggered mechanism under DoS attacks. AIMS Mathematics, 2025, 10(1): 1501-1528. doi: 10.3934/math.2025070
    [4] Sheng-Ran Jia, Wen-Juan Lin . Adaptive event-triggered reachable set control for Markov jump cyber-physical systems with time-varying delays. AIMS Mathematics, 2024, 9(9): 25127-25144. doi: 10.3934/math.20241225
    [5] Kairui Chen, Yongping Du, Shuyan Xia . Adaptive state observer event-triggered consensus control for multi-agent systems with actuator failures. AIMS Mathematics, 2024, 9(9): 25752-25775. doi: 10.3934/math.20241258
    [6] Zhaohui Chen, Jie Tan, Yong He, Zhong Cao . Decentralized observer-based event-triggered control for an interconnected fractional-order system with stochastic Cyber-attacks. AIMS Mathematics, 2024, 9(1): 1861-1876. doi: 10.3934/math.2024091
    [7] Chengbo Yi, Rui Guo, Jiayi Cai, Xiaohu Yan . Pinning synchronization of dynamical neural networks with hybrid delays via event-triggered impulsive control. AIMS Mathematics, 2023, 8(10): 25060-25078. doi: 10.3934/math.20231279
    [8] Yuanyuan Cheng, Yuan Li . A novel event-triggered constrained control for nonlinear discrete-time systems. AIMS Mathematics, 2023, 8(9): 20530-20545. doi: 10.3934/math.20231046
    [9] Saravanan Shanmugam, Mohamed Rhaima, Hamza Ghoudi . Exponential synchronization analysis for complex dynamical networks with hybrid delays and uncertainties under given control parameters. AIMS Mathematics, 2023, 8(12): 28976-29007. doi: 10.3934/math.20231484
    [10] Yuming Chen, Jie Gao, Luan Teng . Distributed adaptive event-triggered control for general linear singular multi-agent systems. AIMS Mathematics, 2023, 8(7): 15536-15552. doi: 10.3934/math.2023792
  • This paper investigates the event-triggered state estimation problem for a class of complex networks (CNs) suffered by hybrid cyber-attacks. It is assumed that a wireless network exists between sensors and remote estimators, and that data packets may be modified or blocked by malicious attackers. Adaptive event-triggered scheme (AETS) is introduced to alleviate the network congestion problem. With the help of two sets of Bernoulli distribution variables (BDVs) and an arbitrary function related to the system state, a mathematical model of the hybrid cyber-attacks is developed to portray randomly occurring denial-of-service (DoS) attacks and deception attacks. CNs, AETS, hybrid cyber-attacks, and state estimators are then incorporated into a unified architecture. The system state is cascaded with state errors as an augmented system. Furthermore, based on Lyapunov stability theory and linear matrix inequalities (LMIs), sufficient conditions to ensure the asymptotic stability of the augmented system are derived, and the corresponding state estimator is designed. Finally, the effectiveness of the theoretical method is demonstrated by numerical examples and simulations.



    In recent decades, the development of information technology has brought great portability to people's production and life [1]. CNs can be used to portray smart grids, intelligent transportation, social networks and neural systems, etc., and have been given significant research significance and wide application context by academia and industry [2]. It is well known that nodes and connection relationships are two key factors that constitute CNs [3]. For example, in a power system network, power plants are connected to each other by transmission lines, where power plants can be abstractly considered as nodes, and similarly, transmission lines between power plants can be considered as connection relations [4]. For a multi-robot system, each mobile robot is considered as a node in the network, and the mutual sensing and intercommunication between robots are seen as the connection relationship. When the number of controlled objects is large, the cooperation and formation maintenance for the multi-robot system can be studied with the help of the theory of CNs. Similarly, the above ideas are also applicable to the study of multi-UAS. It can be seen that the connection relations, nodes, and the interactions between connection relations and nodes constitute CNs [5]. From the perspective of control discipline, some works such as state estimation, synchronization and control, and topology identification of CNs are still widely studied [6,7,8]. In addition, many practical problems are inevitable in information transmission, such as channel redundancy, cyber-attacks, time delay, packet loss, and noise [9,10]. The authors in [7] studied the partial-nodes-based state estimation problem on estimating the entire network state using partial outputs of the available nodes. In this paper, the impact of cyber-attacks and channel redundancy on the state estimation for CNs is discussed.

    In practical engineering, the network bandwidth available to a system is usually limited [11,12]. Due to the limitation of network resources, channel redundancy, data congestion, network-induced delay, and packet loss inevitably occur when the components within the system perform network access and information transmission [13,14]. To mitigate the impact of these problems on system performance, various data transmission mechanisms have been proposed, such as event-triggered schemes (ETSs), communication protocol scheduling, and codec strategies. Currently, ETS is a common data transmission scheduling strategy in networked systems [15,16]. The core idea of the scheme is to determine in real time whether the current system state satisfies the triggering conditions to control the task execution on demand and meet the system performance [17]. On this basis, data transmission strategies such as distributed ETS, AETS, self-triggered scheme, and dynamic ETS have been proposed one after another [18,19,20,21]. By introducing the AETS, a fuzzy dynamic output feedback controller is designed for the nonlinear system with actuator failure and packet loss [20]. In [21], the authors propose a co-design method for filter and distributed AETS for nonlinear interconnected systems.

    ETSs bring great convenience to networked systems, but open networks are vulnerable to malicious attackers, which poses a potential security risk to networked systems [22,23]. In networked systems, network attacks appear in various ways and affect or even destroy system performance, such as DoS attacks and deception attacks [24]. DoS attacks: attackers can block the transmission of information in the communication network between sensors and controllers (estimators), resulting in no available data [25]. Deception attack: attackers can tamper with the available data received by the controller (estimator) from the sensor, thus corrupting the integrity of the data [26]. In recent years, the security of networked systems has attracted widespread attention from the community, for example, on May 11, 2021, Belgium's public sector Internet service provider Belnet was subjected to a massive distributed DoS attack, which took all internal systems of the Belgian government and public-facing websites offline and forced many government websites and services in Belgium offline; on August 1, 2021, Italy The local vaccination appointment system was forced to shut down due to the cyber-attacks. In [10], the authors investigated the state estimation problem for a class of uncertain complex networks with partial node failures resistant to deception attacks. A co-design approach for dynamic ETS and observer-based PID controller against deception attacks has been presented in [27]. In [28], the authors studied the problem of state estimation for cyberphysical systems constrained by communication resources, DoS attacks, and sensor saturation. The authors in [29] presented event-triggered control countermeasures for the multiple cyber-attacks that can occur in cyberphysical systems. Since large-scale CNs have a large number of nodes with intricate connections, their states are usually unmeasurable and only partial information about the network nodes can be obtained through the output of the communication channel [30]. Due to the limitation of network bandwidth and the threat of cyber-attacks, only part of the node information is generally measurable [31]. In order to solve the node state agnosticism, the design of state estimator for CNs is necessary. In this paper, we use two sets of Bernoulli distribution variables and arbitrary functions related to the system state to characterize randomly occurring DoS attacks and deception attacks.

    Inspired by the above mentioned work, it can be seen that although event-triggered state estimation for CNs has been extensively studied, relevant research on CNs with multiple attack scenarios is very limited. Second, we also discuss how to efficiently conserve network resources under the condition of limited communication channel capacity. The above two points are the two motivations that motivate the completion of this paper.

    Based on the above discussion, we focus on the design of event-triggered state estimators for CNs with malicious attacks. In addition, an AETS is introduced to avoid sensors from sending unnecessary packets to the remote estimator for the purpose of saving network bandwidth. Then, based on the derived sufficient conditions for system stability, a feasible approach for co-design is proposed. Finally, a numerical example verifies the effectiveness of the proposed method. The main contributions of this paper are as follows.

    ● In order to reflect the real network environment, multiple scenarios of possible malicious attacks in the transmission channel are considered. By introducing Bernoulli distribution variables and an arbitrary function based on the system state, a mathematical model of the deception attacks is developed. Then the action sequence of the DoS attacks is portrayed by introducing another set of Bernoulli variables. The so-called hybrid network attack is modeled.

    ● We incorporate the plant to be studied, the state estimator, the network resource scheduling policy, and the aforementioned attack model into a unified architecture and describe them through an augmented system.

    ● We derive sufficient conditions to ensure the asymptotic stability of the above system (Theorem I). Then we give a co-design method for computing the estimation gain of the estimator and the weight matrix of the AETS (Theorem II).

    Notations: Rn×m means n×m real matrix; Rn denotes n-dimensional Euclidean space; A>0(A0) implies positive definite (positive semi-definite) symmetric matrix; E{A} represents mathematical expectation of random variable A; colN{Xi} and diagN{Yi} stand for the block-column matrix col{X1,X2,,XN} and the block-diagonal matrix col{Y1,Y2,,YN}, respectively; denotes Kronecker product.

    Consider the following class of CNs:

    {˙xi(t)=Dixi(t)+g(xi(t))+Nj=1aijΓ,xj(t)+Eiwi(t),yi(t)=Cixi(t),zi(t)=Mixi(t),xi(t)=ϕi(θ),θ(,0],i=1,2,,N, (2.1)

    where xi(t), yi(t), and zi(t) denote, respectively, the state vector, the measurement output, and the output of the i-th node. wi(t)L2[0,) denotes the disturbance noise. ϕ is the initial conditions. g() is the the nonlinear vector-valued function. Γ=diag{γ1,γ2,,γn} is an inner-coupling matrix. A=(aij)N×N is thecoupled configuration matrix with aij>0(ij) but not all zero. As usual, the diagonal element is described by aii=Nj=1,jiaij. Ci,Di,Ei, and Mi are the known matrices.

    In a networked system, the instant information in the communication network is usually transmitted in an equal-period transmission scheme, which can cause unnecessary waste of limited network bandwidth. The event-based transmission strategy allows the communication channel not to be occupied all the time, thus reducing the network burden and achieving the goal of saving network resources. However, an open network environment also exposes the system to potential security risks, and for this reason, the impact of cyber attacks on the system is further discussed. The main work of this paper is to discuss a co-design approach of state estimators and AETS for a class of complex networks suffering from hybrid cyber attacks. Then, we incorporate the above-mentioned complex network model with AETS, hybrid cyber attack model and state estimator into a unified framework as shown in Figure 1. In the rest of this section, AETS, hybrid cyber attack modeling, and system modeling are discussed respectively. The details are as follows:

    Figure 1.  The systematic structure.

    With the booming development of network technology, the ETS has been very effective in scheduling network resources. Under the ETS, the successful transmission of sampled data needs to satisfy a triggering condition:

    (yi(bkh)yi(bkh+lh))TΩi(yi(bkh)yi(bkh+lh))ϱyTi(bkh)Ωiyi(bkh)>0. (2.2)

    Based on the traditional ETS, a new ETS with variable threshold is proposed to save more network resources. Under the AETS, the threshold in the triggering condition can be described as:

    ˙ϱ(t)=1ϱ(t)(1ϱ(t)ϖ)eTki(t)Ωieki(t), (2.3)

    where 0<ϱ(0)1, ϖ>0, and eki(t)=yi(bkh)yi(bkh+lh).

    Define that τk=tkbkh and k=bk+1bk1, where τk is network-induced delay, and τk[τm,τM]. According to tk<tk+1, the interval [tk,tk+1) can be divided as kl=0l, where

    n={[tk+lh,tk+(l+1)h),l=0,1,,k1,[tk+lh,tk+1),l=k. (2.4)

    By setting d(t)=t(bkh+lh), we have

    d(t)={tbkh,t0,tbkhh,t1,,tbkhkh,tk, (2.5)
    eki(t)={0,t0,yi(bkh)yi(bkh+h),t1,,yi(bkh)yi(bkh+kh),tk. (2.6)

    From (2.1)–(2.6), the actual measurement output under AETM can be expressed as:

    ˉyi(t)=yi(td(t))+eki(t), (2.7)

    where 0<τmd(t)h+τM=dM.

    Remark 1. In the ith sensor-to-estimator channel, the ith trigger determines whether the current sampled data of the ith sensor corresponding to the node needs to be sent, i.e., whether the current sampled data in sensor i satisfies the ith adaptive event-triggered condition (2.2). The above scheme is introduced to ensure that the information transmission efficiency can be effectively improved under the limitation of network bandwidth.

    The AETS greatly facilitate the transfer of data between components in a networked system. However, the actual network network environment is complex and volatile, and there may be potential security threats. From the defender's standpoint, the attack type and attack moment cannot be determined. For this reason, both deception attacks and DoS attacks are considered, both of which are the most common attack behaviors in network. Also, two sets of Bernoulli distributed variables are introduced to characterize the moment of occurrence of the two attack behaviors. Denote that F=f(yi(tη(t))). The hybrid attack model can be expressed as follows:

    ˜yi(t)=(1βi(t))[(1αi(t))ˉyi(t)+αi(t)F], (2.8)

    where, αi(t) and βi(t) are BDVs, and satisfy the following statistical properties:

    Pr{αi(t)=1}=ˉαi,Pr{αi(t)=0}=1ˉαi,E{αi(t)}=ˉαi,E{αi(t)ˉαi}=0,E{(αi(t)ˉαi)2}=ˉαi(1ˉαi)=δ2α.Pr{βi(t)=1}=ˉβi,Pr{βi(t)=0}=1ˉβi,E{βi(t)}=ˉβi,E{βi(t)ˉβi}=0,E{(βi(t)ˉβi)2}=ˉβi(1ˉβi)=δ2β. (2.9)

    Remark 2. Equation (2.8) is a hybrid-driven cyber-attack behavior, i.e., the deception attacks and the DoS attacks both switch with each other at different frequencies in the communication channel. The BDVs α(t) and β(t) describe the occurrence sequence of deception attacks and DoS attacks, respectively. For example, if β(t)=1, the communication network is under DoS attacks, which means that all transmission data is blocked. If α(t)=1, the communication network suffers from under deception attack, which means that the real transmission data is replaced by the deception attack signal.

    Remark 3. For the hybrid attack model, a nonlinear function with time delay η(t) on the interval (0,ηM] is introduced to express the deception attack signal F, and satisfies the following assumption:

    ||f(yi(tη(t)))||2||Fiyi(tη(t))||2, (2.10)

    where F is a known matrix.

    Under AETM and hybrid attacks, the estimator on the node i is given as follows:

    {ˆxi(t)=Diˆxi(t)+g(ˆxi(t))+Nj=1aijΓˆxj(t)+Li(˜yi(t)ˆyi(t)),ˆyi(t)=Ciˆxi(t),ˆzi(t)=Miˆxi(t), (2.11)

    where ˆxRn is the estimated state on the node i, ˆzi(t)Rm is the estimate of zi(t), and Li is the estimator gain to be designed.

    Define

    ei(t)=xi(t)ˆxi(t),

    and

    ˜zi(t)=zi(t)ˆzi(t).

    For simplicity, we denote that

    e(t)=colN{ei(t)},ed(t)=colN{ei(td(t))},x(t)=colN{xi(k)},xd(t)=colN{xi(td(t))},˜x(t)=colN{˜xi(t)},w(t)=colN{wi(t)},z(t)=colN{zi(t)},C|D|E|L|M|Ω=diagN{Ci|Di|Ei|Li|Mi|Ωi},α(t)|β(t)=diagN{αi(t)|βi(t)},ˉα|ˉβ=diagN{ˉαi|ˉβi},ek(t)=colN{eki(t)},f(y(tη(t)))=colN{f(yi(tη(t)))}.

    Then, by combining (2.1)–(2.11) and utilizing Kronecker product, we have

    {˙e(t)=(D+AΓLC)e(t)+g(e(t))+LCx(t)+Ew(t){(1β(t))(1α(t))LC[x(td(t))+ek(t)]+(1β(t))α(t)LF},˜z(t)=Me(t). (2.12)

    Denote ˜x(t)=[x(t)e(t)], and the augmented system can be obtained from (2.1) and (2.11) as follows:

    {˙˜x(t)=D˜x(t)+g(˜x(t))+Ew(t)(1β(t))(1α(t)){Λ1˜x(td(t))+Λ2ek(t)}(1β(t))α(t)Λ3F.˜z(t)=˜M˜x(t). (2.13)

    where

    D=[D+AΓ0LCD+AΓLC],E=[EE],˜M=[0M],Λ1=[00LC0],Λ2=[0LC],Λ3=[0L],H=[I0],

    system (2.13) can be written as:

    ˙˜x(t)=Π1+(α(t)ˉα)Π2+(β(t)ˉβ)Π3+(α(t)ˉα)(β(t)ˉβ)Π4, (2.14)

    where

    Π1=D˜x(t)+g(˜x(t))+Eω(t)(1ˉβ)(1ˉα){Λ1˜x(td(t))+Λ2ek(t)}(1ˉβ)ˉαΛ3F,Π2=(1ˉβ)[Λ1˜x(td(t))+Λ2ek(t)Λ3F],Π3=(1ˉα)[Λ1˜x(td(t))+Λ2ek(t)]+ˉαΛ3F,Π4=Λ1˜x(td(t))Λ2ek(t)+Λ3F.

    Assumption 1. [24] For positive diagonal maxtrix U=diag{μ1,μ2,,μn}, the following inequality holds:

    [˜x(t)g(˜x(t))]T[UG1G2UU][˜x(t)g(˜x(t))]0, (2.15)

    where

    G1=diag{ν1ν+1,ν2ν+2,,νnν+n},G2=diag{ν1+ν+12,ν2+ν+22,,νn+ν+n2}.

    Lemma 1. [24] For any matrices R1|2>0, positive scalars dM|ηM, and d(t)|η(t)[0,dM|ηM], if there exist matrices N1|2Rn×n such that [R1|2N1|2R1|2]>0, the following inequality holds:

    dM|ηMttdM|ηM˙˜xT(s)R1|2˙˜x(s)dsΞT[R1|2R1|2N1|22R1|2+N1|2+NT1|2N1|2R1|2N1|2R1|2]Ξ. (2.16)

    where Ξ=[˜x(t)˜x(td(t)|η(t))˜x(tdM|ηM)].

    Lemma 2. [11] For any positive-definite matrices R,Z and scalar ϵ, the following inequality holds.

    ZR1Zϵ2R2ϵZ. (2.17)

    This section is concerned with the design problem for adaptive event-triggered state estimators such that the augmented dynamics (2.14) of the CNs (2.1) is asymptotically stable.

    Theorem 1. For given constants dM,ηM,ˉα,ˉβ,ϖ, estimator gain L, and weighting matrix Ω, the augmented dynamics (2.14) is asymptotically stable if there exist matrices P>0,Qi>0,Ri>0, and Ni, such that the following inequalities are satisfied for i=1,2:

    Θ=[ΣΨ1RΨ20RΨ300RΨ4000R]<0, (3.1)
    [R1N1R1]>0, (3.2)
    [R2N2R2]>0, (3.3)

    where

    Σ=[(1.1)=DTP+PD+Q1+Q2UG1R1R2+˜MT˜M(2.1)=(1ˉα)(1ˉβ)ΛT1P+R1N1(2.2)=HTCTΩCH2R1+N1+NT1(3.1)=N1,(3.2)=R1N1,(3.3)=R1Q1(4.1)=R2N2,(4.4)=2R2+N2+NT2+HTCTFTFCH(5.1)=N2,(5.4)=R2N2,(5.5)=Q2R2(6.1)=(1ˉβ)(1ˉα)ΛT2P,(6.6)=ϖΩ(7.1)=(1ˉβ)ˉαΛT3P,(7.7)=I(8.1)=P+G2U,(8.8)=U(9.1)=EP,(9.9)=γ2],Ψj=[dMΓjηMΓj],Γ1=[PD(1ˉβ)(1ˉα)PΛ1000(1ˉβ)(1ˉα)PΛ2(1ˉβ)(1ˉα)PΛ3PPE],Γ2=[0δα(1ˉβ)PΛ1000δα(1ˉβ)PΛ2δα(1ˉβ)PΛ300],Γ3=[0δβ(1ˉα)PΛ1000δβ(1ˉα)PΛ2δαδβPΛ300],Γ4=[0δαδβPΛ1000δαδβPΛ2δαδβPΛ300],R=diag{PR11P,PR12P}.

    Proof. Contruct an Lyapunov functional candidate:

    V(x(t),t)=3i=1Vi(x(t),t)+V4(t), (3.4)

    where

    V1(x(t),t)=˜xT(t)P˜x(t),V2(x(t),t)=ttdM˜xT(s)Q1˜x(s)ds+ttηM˜xT(s)Q2˜x(s)ds,V3(x(t),t)=dM0dMtt+θ˙˜xT(s)R1˙˜x(s)dsdθ+ηM0ηMtt+θ˙˜xT(s)R2˙˜x(s)dsdθ,V4(t)=12ϱ2(t),

    The derivative and mathematical expectation of (3.4) can be calculated as:

    E{˙V(x(t),t)}=sym{˜xT(t)PΠ1}+˜xT(t)(Q1+Q2)˜x(t)˜xT(tdM)Q1˜x(tdM)˜xT(tηM)Q2˜x(tηM)+ΠT1ΞΠ1+δ2αΠT2ΞΠ2+δ2βΠT3ΞΠ3+δ2αδ2βΠT4ΞΠ4+1ϱ(t)eTk(t)Ωek(t)ϖeTk(t)Ωek(t)dMttdM˙˜xT(s)R1˙˜x(s)dsηMttηM˙˜xT(s)R2˙˜x(s)ds, (3.5)

    where Ξ=d2MR1+η2MR2.

    Then, the following inequality can be obtained from Remark 3:

    ˜xT(tη(t))HTCTFTFCH˜x(tη(t))FTF0. (3.6)

    Combining (3.5) and (3.6), using Lemma 1 to estimate one cross term in (3.5), taking the adaptive triggering condition (2.2) and (2.3) to bound the term 1ϱ(t)eTk(t)Ωek(t) in (3.5), and adding (2.15) in Assumption 1 to the right-hand side of (3.5), one obtains

    E{˙V(x(t),t)}+˜zT(t)˜z(t)γ2wT(t)w(t)ξT(t)Σξ(t)+ΠT1ΞΠ1+δ2αΠT2ΞΠ2+δ2βΠT3ΞΠ3+δ2αδ2βΠT4ΞΠ4, (3.7)

    where ξ(t)={˜x(t),˜x(td(t)),˜x(tdM),˜x(tη(t)),˜x(tηM),ek(t),F,g(˜x(t)),w(t)}.

    Utilizing Schur complement, we can obtain that (3.7) is equivalent to (3.1)–(3.3). When w(t)=0, it can be seen that the system (2.14) is asymptotically stable from the LMIs (3.1)–(3.3). This completes the proof.

    So far, the stability analysis problem of augmented systems for state estimation about complex network has been solved. Based on Theorem 1, we can easily obtain the estimator gains. Details are as follows.

    Theorem 2. For given constants dM,ηM,ˉα,ˉβ,ϖ, the estimator (2.11) for the system (2.14) can be designed if there exist matrices P=diag{P1,P2}>0,Qi>0,Ri>0, and Ni, such that the following inequalities are satisfied for i=1,2:

    ˆΘ=[ˆΣˆΨ1ˆRˆΨ20ˆRˆΨ300ˆRˆΨ4000ˆR]<0, (3.8)

    (3.2) and (3.3), where

    ˆΣ=[(1.1)=Λ4+ΛT4+Q1+Q2UG1R1R2+˜MT˜M(2.1)=(1ˉα)(1ˉβ)ΛT5+R1N1(2.2)=HTCTΩCH2R1+N1+NT1(3.1)=N1,(3.2)=R1N1,(3.3)=R1Q1(4.1)=R2N2,(4.4)=2R2+N2+NT2+HTCTFTFCH(5.1)=N2,(5.4)=R2N2,(5.5)=Q2R2(6.1)=(1ˉβ)(1ˉα)ΛT6,(6.6)=ϖΩ(7.1)=(1ˉβ)ˉαΛT7,(7.7)=I(8.1)=P+G2U,(8.8)=U(9.1)=EP,(9.9)=γ2],ˆΨj=[dMˆΓjηMˆΓj],ˆΓ1=[Λ4(1ˉβ)(1ˉα)Λ5000(1ˉβ)(1ˉα)Λ6(1ˉβ)(1ˉα)Λ7PPE],ˆΓ2=[0δα(1ˉβ)Λ5000δα(1ˉβ)Λ6δα(1ˉβ)Λ700],ˆΓ3=[0δβ(1ˉα)Λ5000δβ(1ˉα)Λ6δαδβΛ700],ˆΓ4=[0δαδβΛ5000δαδβΛ6δαδβΛ700],ˆR=diag{ε2R12εP,ε2R22εP},Λ4=[P1D+P1AΓ0XCP2D+P2AΓXC],Λ5=[00XC0],Λ6=[0XC],Λ7=[0X].

    In addition, the estimator gains can be obtained by Li=P12iXi(i=1,2,,N).

    Proof. By applying Lemma 2, replacing PR1P in (3.1) by εR12εP, a new ˆR is obtained as:

    ˆR=diag{ε2R12εP,ε2R22εP}.

    Noticing that X=P2L, (3.8) can be obtained. This completes the proof.

    In this section, we provide numerical simulations to demonstrate the validity of the theoretical approach. We take a complex network with three nodes as an example.

    Example 1. The system parameters are given as follows:

    D1=D2=D3=[1001],Γ=[0.5000.5],aij={2,ij1,i=j,E1=[0.30.3],E2=[0.50.5],E3=[0.40.4],C1=[0.40.5],C2=[0.40.5],C3=[0.40.5],M1=M2=M3=[0.30.7],g(xi(t))=[0.5xi1(t)tanh(0.2xi1(t))+0.2xi2(t),0.95xi2(t)tanh(0.75xi1(t))].

    The deception attack signal is chosen as

    f(xi(t))=[tanh(0.3xi2(t))tanh(0.3xi1(t))].

    Moreover, other parameters are selected by

    dM=0.1,ηM=0.1,ˉα=0.2,ˉβ=0.2,ϖ=7,γ=4,ε=1,F=diagN{0.3,0.3},G1=diagN{0,0},G2=diagN{0.02,0.02}.

    By utilizing the MATLAB LMI Toolbox, the feasible solutions can be obtained based on the constraints (3.8), (3.2) and (3.3) in Theorem 2.

    X1=[11.478411.2668],X2=[0.11312.8645],X3=[0.15902.6171].P21=103×[2.50192.46982.46982.5020],P22=103×[2.50872.46292.46292.5088],P23=103×[2.50872.46282.46282.5089],Ω1=52.0965,Ω2=839.7490,Ω2=950.6389.

    Further, the estimator gains can be designed as:

    L1=[0.35380.3538],L2=[0.03220.0327],L3=[0.02640.0270].

    Given the initial state x1(0)=[11]T, x2(0)=[10]T, x3(0)=[01]T, ˆxi(0)=[00]T, and ϱi(0)=0.25(i=1,2,3), numerical simulations further verify the validity of our theoretical approach. Figures 24 show the state responses for node i. Figures 27 plot the output estimation error for node i. Figures 8 and 9 depict the occurring instants of deception attacks and DoS attacks, respectively. Figures 1012 present the release instants and intervals under AETS for node i. In addition, the release instants and intervals of ETS are plotted in Figures 1315, respectively. The average period, maximum release interval, and transmission rate by Theorem 2 and reported in [24] are listed in Table 1, which the transmission rate indicates thetransmitteddatathesampleddata×100%. Obviously, the AETS can obtain a larger release interval than the traditional ETS, and have a lower data delivery rate.

    Figure 2.  Response of x(t) for node 1.
    Figure 3.  Response of x(t) for node 2.
    Figure 4.  Response of x(t) for node 3.
    Figure 5.  Output estimation error of ˜z(t) for node 1.
    Figure 6.  Output estimation error of ˜z(t) for node 2.
    Figure 7.  Output estimation error of ˜z(t) for node 3.
    Figure 8.  Occurring instants of deception attacks.
    Figure 9.  Occurring instants of DoS attacks.
    Figure 10.  Release instants and intervals under AETS of node 1.
    Figure 11.  Release instants and intervals under AETS of node 2.
    Figure 12.  Release instants and intervals under AETS of node 3.
    Figure 13.  Release instants and intervals under ETS [24] of node 1.
    Figure 14.  Release instants and intervals under ETS [24] of node 2.
    Figure 15.  Release instants and intervals under ETS [24] of node 3.
    Table 1.  The average period, maximum release interval and transmission rate for different scheme in Example 1.
    sampling period h=0.1s average period maximum release interval transmission rate
    AETS in node 1 0.4000 4.4 25%
    AETS in node 2 1.4285 4.3 7%
    AETS in node 3 1.4285 3.5 7%
    ETS [24] in node 1 0.3571 3.0 28%
    ETS [24] in node 2 1.2500 4.0 8%
    ETS [24] in node 3 1.2500 3.2 8%

     | Show Table
    DownLoad: CSV

    The issue of event-triggered state estimation has been studied for CNs under hybrid cyber-attacks in this paper. AETS has been introduced to alleviate the network congestion problem. With the help of two sets of BDVs and an arbitrary function related to the system state, a mathematical model of the hybrid cyber-attacks has been established to portray randomly occurring DoS attacks and deception attacks. Then, CNs, AETS, hybrid cyber-attacks, and state estimators have been incorporated into a unified architecture. As a result, an augmented system has been presented. Furthermore, based on Lyapunov stability theory and LMIs, sufficient conditions to ensure the asymptotic stability of the augmented system have been derived, and the corresponding state estimator has been designed. Finally, the effectiveness of the theoretical method has been demonstrated by numerical examples and simulations. In the future, security state estimation problems for a class of CNs suffered by underlying attacks will be studied.

    The authors declare that there is no conflict of interest regarding the publication of this paper.



    [1] H. Shen, M. P. Xing, Z. G. Wu, J. D. Cao, T. W. Huang, l2l state estimation for persistent Dwell-time switched coupled networks subject to round-robin protocol, IEEE T. Neur. Net. Lear., 32 (2020), 2002–2014. doi: 10.1109/TNNLS.2020.2995708. doi: 10.1109/TNNLS.2020.2995708
    [2] T. D. Wei, X. Xie, X. D. Li, Input-to-state stability of delayed reaction-diffusion neural networks with multiple impulses, AIMS Mathematics, 6 (2021), 5786–5800. doi: 10.3934/math.2021342. doi: 10.3934/math.2021342
    [3] H. L. Dong, N. Hou, Z. D. Wang, Fault estimation for complex networks with randomly varying topologies and stochastic inner couplings, Automatica, 112 (2020), 108734. doi: 10.1016/j.automatica.2019.108734.
    [4] J. Hu, Z. D. Wang, G. P. Liu, H. X. Zhang, Variance-constrained recursive state estimation for time-varying complex networks with quantized measurements and uncertain inner coupling, IEEE T. Neur. Net. Lear., 31 (2020), 1955–1967. doi: 10.1109/TNNLS.2019.2927554. doi: 10.1109/TNNLS.2019.2927554
    [5] R. Sakthivel, M. Sathishkumar, B. Kaviarasan, S. M. Anthoni, Synchronization and state estimation for stochastic complex networks with uncertain inner coupling, Neurocomputing, 328 (2017), 44–55. doi: 10.1016/j.neucom.2017.01.035. doi: 10.1016/j.neucom.2017.01.035
    [6] L. Liu, X. W. Ding, W. N. Zhou, Prescribed-time cluster synchronization of uncertain complex dynamical networks with switching via pinning control, Neurocomputing, 419 (2021), 136–147. doi: 10.1016/j.neucom.2020.08.043. doi: 10.1016/j.neucom.2020.08.043
    [7] Y. R. Liu, Z. D. Wang, Y. Yuan, F. E. Alsaadi, Partial-nodes-based state estimation for complex networks with unbounded distributed delays, IEEE T. Neur. Net. Lear., 29 (2018), 3906–3912. doi: 10.1109/TNNLS.2017.2740400. doi: 10.1109/TNNLS.2017.2740400
    [8] W. L. Li, Y. M. Jia, J. P. Du, State estimation for stochastic complex networks with switching topology, IEEE T. Automat. Contr, 62 (2017), 6377–6384. doi: 10.1109/TAC.2017.2649878. doi: 10.1109/TAC.2017.2649878
    [9] F. E. Alsaadi, Z. D. Wang, D. Wang, F. E. Alsaadi, F. W. Alsaade, Recursive fusion estimation for stochastic discrete time-varying complex networks under stochastic communication protocol: The state-saturated case, Inform. Fusion, 60 (2020), 11–19. doi: 10.1016/j.inffus.2020.01.012. doi: 10.1016/j.inffus.2020.01.012
    [10] N. Hou, Z. D. Wang, D. W. C. Ho, H. L. Dong, Robust partial-nodes-based state estimation for complex networks under deception attacks, IEEE T. Cybernetics., 50 (2020), 2793–2802. doi: 10.1109/TCYB.2019.2918760. doi: 10.1109/TCYB.2019.2918760
    [11] H. Q. Lu, Y. H. Deng, W. N. Zhou, Hierarchical type stability and stabilization of networked control systems with event-triggered mechanism via canonical Bessel–Legendre inequalities, J. Franklin I., 358 (2021), 6592–6611. doi: 10.1016/j.jfranklin.2021.06.024. doi: 10.1016/j.jfranklin.2021.06.024
    [12] Y. S. Tan, S. M. Fei, J. L. Liu, Distributed hybrid-triggered state estimation for complex networked system with network attacks, China Sci. Inf. Ser., 48 (2018), 1198–1213. doi: 10.1360/N112017-00279. doi: 10.1360/N112017-00279
    [13] Y. S. Tan, Y. Liu, B. Niu, S. M. Fei, Event-triggered synchronization control for T–S fuzzy neural networked systems with time delay, J. Franklin I., 357 (2020), 5934–5953. doi: 10.1016/j.jfranklin.2020.03.024. doi: 10.1016/j.jfranklin.2020.03.024
    [14] W. Zhou, Y. Sun, X. Zhang, P. Shi, Cluster synchronization of coupled neural networks with Lˊevy noise via event-triggered pinning control, IEEE T. Neur. Net. Lear., 2021. doi: 10.1109/TNNLS.2021.3072475.
    [15] G. Cena, A. Valenzano, Achieving round-robin access in controller area networks, IEEE T. Ind. Electron, 49 (2002), 1202–1213. doi: 10.1109/TIE.2002.804968. doi: 10.1109/TIE.2002.804968
    [16] M. E. M. B. Gaid, A. Cela, Y. Hamam, Optimal integrated control and scheduling of networked control systems with communication constraints: Application to a car suspension system, IEEE T. Contr. Syst. T., 14 (2006), 776–787. doi: 10.1109/TCST.2006.872504. doi: 10.1109/TCST.2006.872504
    [17] H. Q. Lu, Y. Hu, C. Q. Guo, W. N. Zhou, Cluster synchronization for a class of complex dynamical network system with randomly occurring coupling delays via an improved event-triggered pinning control approach, J. Franklin I., 357 (2020), 2167–2184. doi: 10.1016/j.jfranklin.2019.11.076. doi: 10.1016/j.jfranklin.2019.11.076
    [18] N. Li, Q. Li, J. H. Suo, Dynamic event-triggered H state estimation for delayed complex networks with randomly occurring nonlinearities, Neurocomputing, 421 (2021), 97–104. doi: 10.1016/j.neucom.2020.08.048. doi: 10.1016/j.neucom.2020.08.048
    [19] W. P. M. H. Heemels, K. H. Johansson, P. Tabuada, An introduction to event-triggered and self-triggered control, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC), 2012, 3270–3285. doi: 10.1109/CDC.2012.6425820.
    [20] Z. X. Zhang, H. L. Liang, C. W. Wu, C. K. Ahn, Adaptive event-triggered output feedback fuzzy control for nonlinear networked systems with packet dropouts and actuator failure, IEEE T. Fuzzy Syst., 27 (2019), 1793–1806. doi: 10.1109/TFUZZ.2019.2891236. doi: 10.1109/TFUZZ.2019.2891236
    [21] Z. Gu, P. Shi, D. Yue, Z. T. Ding, Decentralized adaptive event-triggered h filtering for a class of networked nonlinear interconnected systems, IEEE T. Cybernetics., 49 (2018), 1570–1579. doi: 10.1109/TCYB.2018.2802044. doi: 10.1109/TCYB.2018.2802044
    [22] M. H. Zhu, S. Martinez, On the performance analysis of resilient networked control systems under replay attacks, IEEE T. Automat. Contr., 59 (2014), 804–808. doi: 10.1109/TAC.2013.2279896. doi: 10.1109/TAC.2013.2279896
    [23] Y. S. Tan, Q. Y. Liu, D. S. Du, B. Niu, S. M. Fei, Observer-based finite-time H control for interconnected fuzzy systems with quantization and random network Attacks, IEEE T. Fuzzy Syst., 29 (2019), 674–685. doi: 10.1109/TFUZZ.2019.2960719. doi: 10.1109/TFUZZ.2019.2960719
    [24] Y. H. Deng, H. Q. Lu, W. N. Zhou, Security event-triggered control for Markovian jump neural networks against actuator saturation and hybrid cyber attacks, J. Franklin I., 358 (2021), 7096–7118. doi: 10.1016/j.jfranklin.2021.07.022. doi: 10.1016/j.jfranklin.2021.07.022
    [25] C. De Persis, P. Tesi, Input-to-state stabilizing control under denial-of-service, IEEE T. Automat. Contr., 60 (2015), 2930–2944. doi: 10.1109/TAC.2015.2416924. doi: 10.1109/TAC.2015.2416924
    [26] E. Tian, C. Peng, Memory-based event-triggering H load frequency control for power systems under deception attacks, IEEE T. Cybernetics, 50 (2020), 4610–4618. doi: 10.1109/TCYB.2020.2972384. doi: 10.1109/TCYB.2020.2972384
    [27] D. Zhao, Z. D. Wang, G. L. Wei, Q. L. Han, A dynamic event-triggered approach to observer-based PID security control subject to deception attacks, Automatica, 120 (2020), 109128. doi: 10.1016/j.automatica.2020.109128.
    [28] J. L. Liu, T. T. Yin, M. Q. Shen, X. P. Xie, J. Cao, State estimation for cyber–physical systems with limited communication resources, sensor saturation and denial-of-service attacks, ISA T., 104 (2020), 101–114. doi: 10.1016/j.isatra.2018.12.032. doi: 10.1016/j.isatra.2018.12.032
    [29] M. M. Hamdan, M. S. Mahmoud, U. A. Baroudi, Event-triggering control scheme for discrete time cyberphysical systems in the presence of simultaneous hybrid stochastic attacks, ISA T., 2021. In press. doi: 10.1016/j.isatra.2021.04.027.
    [30] R. Rakkiyappan, K. Sivaranjani, Sampled-data synchronization and state estimation for nonlinear singularly perturbed complex networks with time-delays, Nonlinear Dyn., 84 (2016), 1623–1636. doi: 10.1007/s11071-015-2592-1. doi: 10.1007/s11071-015-2592-1
    [31] K. Sivaranjani, R. Rakkiyappan, Delayed impulsive synchronization of nonlinearly coupled Markovian jumping complex dynamical networks with stochastic perturbations, Nonlinear Dyn., 88 (2017), 1917–1934. doi: 10.1007/s11071-017-3353-0. doi: 10.1007/s11071-017-3353-0
  • This article has been cited by:

    1. Na Lin, Dongyan Chen, Jun Hu, Chaoqing Jia, Hui Yu, Partial‐nodes‐based state estimation for state‐saturated complex networks with random mixed couplings under dynamic event‐triggered protocol, 2023, 0890-6327, 10.1002/acs.3568
    2. Xun Wang, Engang Tian, Bin Wei, Jinliang Liu, Novel attack‐defense framework for nonlinear complex networks: An important‐data‐based method, 2023, 33, 1049-8923, 2861, 10.1002/rnc.6551
    3. Cai Chen, Bowen Yue, Chaoqing Jia, Resolution‐Dependent State Estimation for a Class of Nonlinear Coupled Complex Networks With Stochastic Communication and Correlated Noises, 2024, 0890-6327, 10.1002/acs.3914
    4. M. Mubeen Tajudeen, M. Syed Ali, Grienggrai Rajchakit, Anuwat Jirawattanapanit, Bandana Priya, Extended dissipative performance for a complex dynamical networks based on adaptive event‐triggered filter method subject to hybrid attacks, 2024, 38, 0890-6327, 415, 10.1002/acs.3707
    5. Li Liu, Yinfang Song, Hong Yu, Gang Zhang, Almost sure exponential synchronization of multilayer complex networks with Markovian switching via aperiodically intermittent discrete observa- tion noise, 2024, 9, 2473-6988, 28828, 10.3934/math.20241399
  • Reader Comments
  • © 2022 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(2182) PDF downloads(130) Cited by(5)

Figures and Tables

Figures(15)  /  Tables(1)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog