Next Article in Journal
An Efficient and High-Precision Electromagnetic–Thermal Bidirectional Coupling Reduced-Order Solution Model for Permanent Magnet Synchronous Motors
Next Article in Special Issue
Research on Secure State Estimation and Recovery Control for CPS under Stealthy Attacks
Previous Article in Journal
Research on Machine Vision-Based Control System for Cold Storage Warehouse Robots
Previous Article in Special Issue
Fault Detection and Reliable Controller Design for Fractional-Order Systems Based on Dynamic Observer
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Observer-Based Active Control Strategy for Networked Switched Systems against Two-Channel Asynchronous DoS Attacks

1
The College of Information Science and Engineering, Northeastern University, Shenyang 110819, China
2
The State Key Laboratory of Synthetical Automation of Process Industries, Northeastern University, Shenyang 110819, China
*
Author to whom correspondence should be addressed.
Submission received: 20 July 2023 / Revised: 11 August 2023 / Accepted: 17 August 2023 / Published: 20 August 2023
(This article belongs to the Special Issue Sensor and Actuator Attacks of Cyber-Physical Systems)

Abstract

:
This paper addresses the security issue of networked switched systems under two-channel asynchronous denial-of-service (DoS) attacks, where the measurement channel and the control channel are subject to DoS attacks independently. For the case of partial-state measurements, an observer-based active control strategy is proposed to mitigate the negative impact on the control performance and stability of the system caused by the attacks. In this strategy, a novel mode-dependent finite-time observer is designed to estimate the system state rapidly and accurately, the predictor and the buffer are designed to ensure that the control signals transmitted to the actuator can be updated even when the control channel is blocked. Compared to the earlier results on the active control strategy that only consider the case of full-state measurements and assume that the DoS signals followed specific patterns, our work only limits the frequency and duration of the DoS signals, which is more general and challenging. Furthermore, the switching signal is designed to ensure the input-to-state stability (ISS) of the networked switched system with the active control strategy under two-channel asynchronous DoS attacks and asynchronous switching behaviors. Finally, the effectiveness and the merits of our work are validated through an example and a comparative experiment.

1. Introduction

With the combination and development of sensing, computing and communication technologies, cyber-physical systems (CPSs), i.e., systems whose physical processes are sensed and controlled by networks and remote computers [1,2], have found practical applications in many fields, such as smart grids [3,4,5], autonomous driving and intelligent industrial systems [6]. However, the security issue of CPSs has also attracted a lot of attention due to the use of remote computers and networks, where the external attacks introduced through the networked feedback channels may lead to deterioration of the control performance or even lead to instability [7].
The main types of cyber attacks that have been studied against CPSs include deception attacks and denial-of-service (DoS) attacks. Unlike deception attacks, DoS attacks are more practical and common as they disrupt the control performance and stability of the physical processes by blocking networked control channels and measurement channels without model knowledge and disclosure information [8,9]. Many resilient control theories have been proposed against DoS attacks on CPSs, such as DoS detection [10,11], secure state estimation [12,13,14,15,16], stability analysis [17,18,19,20], robust design [21,22,23] and so on.
Modelling of the DoS attacks is crucial for the analysis of resilience control. In [24], the DoS attack pattern is assumed to obey the Bernoulli distribution. In [25,26], the Pulse-Width Modulated DoS attacks have been studied. In [27], DoS signals with minimum sleeping time have been studied. More generally, in [17], an average dwell time (ADT)-like method is proposed to constrain the duration and frequency of DoS attacks without assuming that the DoS signals obey a certain pattern. In this paper, we will follow this DoS signal description and assume that the attack patterns employed by the adversaries are unknown.
In addition, DoS attacks against different networked channels have been widely studied. In [12,21,28,29], it is assumed that only the measurement channel is subject to DoS attacks. In [17,30], it is assumed that DoS attacks synchronously affect both the measurement and the control channels. In [31], CPSs with multiple transmission channels under DoS attacks are studied. However, asynchronous DoS attacks on both the measurement channel and the control channel are more challenging and have not received much attention.
On the other hand, as a special class of hybrid systems, networked switched systems, have been systematically studied in recent years [32,33,34]. In [32], the stability analysis is studied for the sampled-data switched systems with static quantizers by using the CLF method. In [33], the issue of stabilizing the switched and hybrid system with an encoding and control strategy is investigated. In [34], the adaptive tracking control problem of uncertain hybrid switching Markovian systems is studied by using the SMPLF method.
Additionally, the security issues of the networked switched systems under DoS attacks are studied in [35,36,37,38]. Specifically, in [35], the stability of networked switched systems with a ZOH controller under two-channel synchronous DoS attacks is investigated. In [36], the ISS problem of switched linear systems with unstabilizable modes is further investigated. However, it is shown that the passive defense strategies proposed in the above works lead to conservative results and strict constraints on DoS signals. In [37], the stability of the discrete switched system based on an active control strategy under two-channel asynchronous DoS attacks is investigated. This paper focuses on the scenario without any disturbances. However, in practical applications, disturbances are prevalent and can significantly impact the prediction accuracy in the active control strategy. This can, in turn, undermine the assurance of system robustness. In [38], the active control strategy is designed for switched systems suffering from disturbances and asynchronous attacks. However, the ISS conditions of the system are still not investigated.
Furthermore, observer design has been extensively studied in both networked switched systems [39,40] and CPSs [21,41,42]. Specifically, in [41], an observer-based ETC architecture is proposed for CPSs under DoS attacks, which necessitates sensors and actuators with specific computational capabilities. In [21], the robust design incorporating a finite-time observer and a predictor is proposed to rapidly estimate the system state during the sleeping periods of DoS attacks on the measurement channel. In [42], observer-based event-triggered control is studied for the continuous networked system subject to DoS attacks. In [39], a mode-dependent Luenberger-type observer is proposed for switched systems in both continuous-time and discrete-time contexts. In [40], an adaptive neural network observer is designed for networked switched systems via quantized output signals. However, to the best of our knowledge, the security issue for observer-based resilient control of networked switched systems under two-channel asynchronous DoS attacks has not been fully investigated, which motivates our work.
The main contributions of this paper are as follows:
  • An observer-based active control strategy is proposed for networked switched systems, which exhibits resilience and robustness against two-channel asynchronous DoS attacks and asynchronous switching behaviors. In addition, the buffer size design approach is proposed.
  • The switching signals are designed to ensure the ISS of the networked switched systems under active control strategy against two-channel asynchronous DoS attacks and asynchronous switching behaviors, specifically, the quantitative relationship between the frequency and duration of two-channel DoS attacks and the switching frequency is revealed under ISS conditions. The results can be degraded to the non-switched system case.
  • Unlike [26,37,38,43] that only consider the case of full-state measurements, the case of partial-state measurements is studied, and a mode-dependent finite-time observer is designed to rapidly and accurately estimate the system state. In addition, external disturbances are also considered in our work.
  • In the existing methods [37,38,43], the effectiveness of active control strategies often relies on assuming that the DoS signals adhere to specific patterns. However, in our work, the effectiveness of the active control strategy is only related to the frequency and duration of DoS attacks, without making any assumptions about specific patterns for DoS attacks, which is more general and challenging.
The remainder of the paper is organized as follows. In Section 2, the problem statement and preliminaries are presented. The observer-based active control strategy is proposed in Section 3. The ISS analysis of the networked switched systems under two-channel asynchronous DoS attacks and asynchronous switching behaviors is given in Section 4. Section 5 gives an example and a comparative experiment to validate the availability and merits of our work. Section 6 concludes the work of this paper.
Notations: N and R denote the integer set and real number set, respectively. Given an integer (real number) α , denote N α ( R α ) be the set of integers (reals) which are not smaller than α . Given a vector v R n , v denotes its Euclidean norm. Given a matrix M, M denotes its spectral norm. U V denotes the set of all elements belonging to set U, but not to set V. I stands for the identity matrix. μ A denotes the logarithmic norm of mitrix A. λ ¯ ( Q ) and λ ̲ ( Q ) represent the maximum and minimum eigenvalues of matrix Q, respectively.

2. Problem Statement and Preliminaries

2.1. Networked Switched Linear System

The system to be investigated is a networked switched linear system described by
x ˙ ( t ) = A σ ( t ) x ( t ) + B σ ( t ) u ( t ) + w ( t ) y ( t ) = C σ ( t ) x ( t )
where x ( t ) R n , t R t 0 denotes the state vector, u ( t ) R m denotes the control input, w ( t ) R w stands for the unknown bounded external disturbance. σ ( t ) : [ t 0 , ) M = 1 , 2 , , m denotes the switching signal which is a right-continuous piecewise constant function and A i , B i , C i with i M denote constant matrices with suitable dimensions. In this paper, we assume that ( A i , B i ) is stabilizable, ( C i , e A i Δ ) is μ i -steps observable and that a state-feedback matrix K i has been predesigned such that Φ i = ( A i + B i K i ) is hurwitz. At all switching instants, there is no state jump.
In this paper, we assume that both the measurement channel and the control channel are networked and adopt the same sampling scheme synchronously with a fixed sampling period Δ . Let t k k N 0 denote the sequence of sampling instants, i.e.,
t k + 1 t k = Δ , k N 0 .
The system’s mode can switch at any t s ( n ) t 0 , where n N 1 represents the nth switching, then the sensor transmits the system’s mode to the observer at the first successful transmission after t s ( n ) . Next we introduce some assumptions used in this paper.
Assumption A1.
[44] (switching frequency). Let n σ ( t 0 , t ) , t > t 0 be the number of switching behaviors over the interval [ t 0 , t ) . If
n σ ( t 0 , t ) N σ + t t 0 τ σ
with N σ 1 , then τ σ > Δ is called the ADT. for τ d R > 0 , If any two consecutive switching instants t s ( n ) and t s ( n + 1 ) satisfy t s ( n + 1 ) t s ( n ) τ d , then τ d < τ σ is called the minimum dwell time.
Remark 1.
If τ a Δ , then the switches occurring right after each sampling instant is allowed, the closed-loop system will always be mismatched and the system will become unstable.

2.2. Two-Channel Asynchronous DoS Attacks

In this paper, we assume that both the measurement channel and the control channel are subject to DoS attacks. Both the mode signal and the measurement/control signal can be blocked by DoS attacks. Due to the unknown attack strategy applied by the attacker, we only limit the frequency and duration of the two-channel attacks.
We define h n o as the sequence of DoS off/on transitions, and Γ n o , n 0 as the nth DoS interval on channel o { m , c } . where “m” denotes the measurement channel and “c” denotes the control channel. Given t 0 , t R t 0 , let
Ξ o ( t 0 , t ) : = n N 0 Γ n o [ t 0 , t ]
and let
Θ o ( t 0 , t ) : = [ t 0 , t ] Ξ o ( t 0 , t )
denote the union of time intervals over [ t 0 , t ] during which the o channel is subject to DoS attacks and not subject to DoS attacks, respectively.
Assumption A2.
[17] (DoS duration). There exist κ D o R 0 and T D o R > 1 such that
Ξ o ( t 0 , t ) κ D o + t t 0 T D o
for all t 0 , t R t 0 .
Remark 2.
T σ > 1 ensures that the DoS duration cannot be infinitely long.
Assumption A3.
[17] (DoS frequency). Let n D o ( t 0 , t ) , t > t 0 be the number of DoS attacks over the interval [ t 0 , t ) . If
n D o ( t 0 , t ) N D o + t t 0 τ D o
with N D o 1 and τ D o > Δ .

2.3. Control Objective

Definition 1.
[45] System under unknown bounded external disturbance w ( t ) is defined as input-to-state stable (ISS) if there exist some χ KL -function and υ K -function such that
x ( t ) χ ( x ( t 0 ) , t ) + υ ( w t )
holds for all t t 0 . w t := ess sup s [ t 0 , t ) w ( s ) .
The objective of our work is to design an observer-based active control strategy that exhibits resilience against DoS attacks on both the measurement channel and the control channel, thereby ensuring the ISS of the switched system.

3. Observer-Based Active Control Strategy

3.1. Mode-Dependent Finite-Time Observer Design

Let { w j } j N 0 stand for the sequence of successful transmission attempts on measurement channel and let { z m } m N 0 stand for the sequence of successful transmission attempts preceded by μ 1 consecutive w j with the same mode i. the observer scheme is designed as follows:
ξ ˙ ( t ) = A σ ( w j ( t ) ) ξ ( t ) + B σ ( w j ( t ) ) u ( t ) , t w j ξ ( t ) = ξ ( t ) + L σ ( w j ( t ) ) y ( t ) C σ ( w j ( t ) ) ξ ( t ) , t = w j
where
ξ ( t 0 ) = L σ ( w 0 ) y ( t 0 ) , t 0 = w 0 ξ ( z 1 ) = 0 , o t h e r w i s e
and
j ( t ) = 1 , i f Θ ( t 0 , t ) = s u p j N 0 w j Θ ( t 0 , t ) , o t h e r w i s e
ξ ( t ) in (9) represents the state of the finite-time observer, the initial condition is given by ξ ( z 1 ) = 0 . Without loss of generality, we assume that at t 0 , the observer’s mode may not necessarily match the system’s mode, i.e., σ ( w 1 ) = σ ( z 1 ) can be any i M . There exists a state reconstruction matrix L i such that R i μ i = 0 holds, where μ i denotes the observability index of ( C i , e A i Δ ) and R i = ( I L i C i ) e A i Δ .

3.2. Active Control Strategy

In the case of DoS attacks on the control channel, the existing works usually employ a ZOH controller [17,35,36], where the actuator maintains the previous control signal when the control channel is blocked by DoS. This paper proposes an observer-based active control strategy for switched systems under two-channel asynchronous DoS attacks, ensuring that the actuator can update the control signal at each sampling instant (cf. Figure 1).
Denote { s r } r N 0 as the sequence of successful transmission attempts on the control channel, and let { s m } m N 0 denotes the sequence of the first s r following z m (cf. Figure 2).
The algorithm of the active control strategy can be described as follows:
  • Step 1: The observer resets the estimate of the system state ξ ( z m ) when it receives μ consecutive measurement signals with the same mode i from the sensor, and then sends it to the predictor.
  • Step 2: Based on the estimate ξ ( z m ) , the system’s mode σ ( z m ) and the actual control signals, the predictor predicts the system state x ^ and the controller generate the control sequence U ( z m ) and transmit it to the buffer at s m by using one data packet.
  • Step 3: The buffer discards the outdated control signals and sequentially sends the control signals to the actuator, one by one, at each sampling instant. The actuator holds the control signal until the next sampling instant. Return to Step 1.
The control sequence U ( z m ) can be expressed by
U ( z m ) = { u [ z m z m ] , u [ z m + Δ z m ] , , u [ z m + ( H 1 ) Δ z m ] }
with u [ z m + n Δ z m ] = K σ ( z m ) x ^ ( z m + n Δ z m ) , n [ 0 , H 1 ] for all m N 0 . H represents the buffer size that will be designed later. x ^ ( z m + n Δ z m ) represents the prediction of x ( z m + n Δ ) based on ξ ( z m ) and σ ( z m ) , and can be calculated iteratively through
x ^ ( t k + Δ z m ) = A σ ( z m ) δ x ^ ( t k z m ) + B σ ( z m ) δ u ( t k ) , t k [ z m , s m + 1 ) x ^ ( z m z m ) = ξ ( z m )
where the actual control signal u ( t k ) can be described as
u ( t k ) = u [ t k z m 1 ] = K σ ( z m 1 ) x ^ ( t k z m 1 ) , t k [ z m , s m ) u [ t k z m ] = K σ ( z m ) x ^ ( t k z m ) , t k [ s m , z m + 1 )
for all m { 1 } N 0 , where A i δ = e A i Δ and B i δ = B i 0 Δ e A i s d s . The initial condition is given by x ^ ( t 0 z 1 ) = x ^ ( z 1 z 1 ) = ξ ( z 1 ) = 0 .
After the buffer receives the new control sequence U ( z m ) , it sends an acknowledgment (ack) signal back to the controller through the control channel. Upon receiving the ack signal, the controller sends the new control sequence to the observer and the predictor to ensure that the observer, the predictor and the system adopt the same control signal at all sampling instants.
Remark 3.
In the time interval [ z m , s m ) , the system applies the preceding control sequence U ( z m 1 ) . Due to the uncertainty of the control channel’s availability, the prediction of the system can only be generated one by one at each sampling instant. At s m , the remaining control signals of the control sequence U ( z m ) are generated all at once.

3.3. Buffer Size Design

In the measurement channel, both DoS attacks and the switching behaviors can disrupt the estimation of the system state by the observer. Furthermore, in the control channel, DoS attacks prevent the transmission of control sequences based on the latest estimate to the buffer. Therefore, establishing the sufficient conditions for the control mechanism to generate control signals and transmit them to the buffer within a finite time is crucial for buffer size design and system ISS analysis.
First, the sufficient conditions are proposed for the mode-dependent finite-time observer to estimate the system state under DoS attacks on the measurement channel and switching behaviors.
Lemma 1.
Consider the networked switched linear system (1) under the transmission policy (2) and the active control strategy (9) and (11), consider the DoS signal satisfying (6) and (7), the swicthing signal satisfying (3), the observer can necessarily estimate the system state within a finite time if
1 1 T D m μ Δ τ D m μ Δ τ σ > 0
holds true, where μ = m a x { μ i } , i M . And { z m } m N 0 satisfies
z m + 1 z m Q m + Δ z 0 t 0 + Q m + ( μ 1 ) Δ
where Q m = ( κ D m + N D m μ Δ + N σ μ Δ ) ( 1 1 T D m μ Δ τ D m μ Δ τ σ ) 1 .
Proof. 
Define Θ ˜ m ( h n m , t ) as the time interval starting from h n m during which the observer is capable of generating ξ ( z m ) at each sampling instant. Prolonging each DoS interval and each asynchronous switching interval by μ samplings, we have
Θ ˜ m ( h n m , t ) t h n m Ξ m ( h n m , t ) n D m ( h n m , t ) μ Δ n σ ( h n m , t ) μ Δ t h n m ( κ D m + t h n m T D m ) ( N D m + t h n m τ D m ) μ Δ ( N σ + t h n m τ σ ) μ Δ ( t h n m ) ( 1 1 T D m μ Δ τ D m μ Δ τ σ ) κ D m N D m μ Δ N σ μ Δ
Θ ˜ m ( h n m , t ) > 0 implies that within the time interval [ h n , t ] , there must be at least μ consecutive successful transmissions with the same mode passing through the measurement channel and being received by the observer. From (15) we can see that, if (13) holds true, then there must exist a sufficiently large t such that Θ ˜ m ( h n m , t ) > 0 is satisfied.
Then, if switching signals or DoS attacks do not occur in [ t 0 , t 0 + ( μ 1 ) Δ ] , then z 0 t 0 + Q m + ( μ 1 ) Δ holds trivially. If switching signals or DoS attacks occur in [ t 0 , t 0 + ( μ 1 ) Δ ] , we have μ consecutive successful transmissions with the same mode no later than t 0 + Q m + ( μ 1 ) Δ . Similarly, if switching signals or DoS attacks do not occur in [ z m , z m + Δ ] , then z m + 1 z m Q m + Δ holds trivially. If switching signals or DoS attacks occur in [ z m , z m + Δ ] , we have μ consecutive successful transmissions with the same mode no later than z m + Q m + Δ . □
Remark 4.
In [21], sufficient conditions are proposed for the finite-time observer to estimate the system state under DoS attacks on the measurement channel. In this paper, both DoS attacks and switching behaviors can interrupt the estimation of system state by the finite-time observer. Lemma 1 provides the limitation for DoS signals on the measurement channel and switching signals in the worst-case scenario, under which the estimation of the system state can be achieved.
Next, the sufficient conditions are proposed for the data packet of the control sequence U ( z m ) to be transmitted to the buffer under DoS attacks on the control channel.
Lemma 2.
Consider the transmission policy (2) and the DoS signal satisfying (6) and (7), the control sequence U ( z m ) can be transmitted to the buffer within a finite time if
1 1 T D c Δ τ D c > 0
holds true. Recall that we denote { s r } r N 0 as the sequence of successful transmission attempts on the control channel and { s r } r N 0 satisfies
s r + 1 s r Q c + Δ s 0 t 0 + Q c
where Q c = ( κ D c + N D c Δ ) ( 1 1 T D c Δ τ D c ) 1 .
Proof. 
The proof of Lemma 2 is similar to the proof of Lemma 1 under the conditions of μ = 1 and swicthing-free. Therefore, it is omitted. □
Finally, based on Lemma 1 and Lemma 2, the minimum buffer size in the worst-case scenario is designed.
Lemma 3.
Consider system (1) under the transmission policy (2) and the active control strategy (9) and (11), consider the DoS signals on the measurement channel and the switching signals satisfying (13) and the DoS signals on the control channel satisfying (16). The buffer size is designed to update the control signal to the actuator at any sampling time under switching signals and two-channel asynchronous DoS attacks if
H Q m + Q c Δ + 1
holds true.
Proof. 
Recall that we denote { s m } m N 0 as the sequence of the first s r following z m . At z m , the controller needs to calculate the control sequence from u [ z m z m ] to u [ s m + 1 Δ z m ] based on the value of ξ ( z m ) . In the worst-case scenario, we assume that there are DoS attacks on the control channel right at z m + 1 , then combining (14) and (17), we have
s m + 1 z m Q m + Q c + Δ .
Therefore, as long as the buffer size meets (18), it is guaranteed that the actuator can update the control sequence U ( z m ) at each sampling time before the next control sequence U ( z m + 1 ) based on ξ ( z m + 1 ) is successfully transmitted to the buffer through the control channel. □
Remark 5.
Since the initial condition is given by ξ ( z 1 ) = 0 , the control sequence u [ t k z 1 ] = K σ ( z 1 ) x ^ ( t k z 1 ) = 0 for all t k [ t 0 , s 0 ) , the buffer outputs remain at 0 before s 0 . Therefore, when designing the buffer size, there is no need to consider the time interval [ t 0 , s 0 ] .

4. Input-to-State Stability Analysis

4.1. Dynamics under Two-Channel DoS Attacks without Asynchronous Switching

First, we consider the scenario without asynchronous switching. Denote x ^ ( t ) as the prediction of x ( t ) applied be the actuators. We define θ ( t ) = x ^ ( t ) x ( t ) as the prediction error, and let e ( t ) = x ( t k ) x ( t ) be the error between the state at the last sampling instant and the state at t. Then consider any interval [ t k , t k + 1 ] , the dynamics of the switched system can be rewritten as
x ˙ ( t ) = Φ i x ( t ) + B i K i ( x ^ ( t k ) x ( t ) ) + w ( t ) = Φ i x ( t ) + B i K i ( x ^ ( t k ) x ( t k ) + x ( t k ) x ( t ) ) + w ( t ) = Φ i x ( t ) + B i K i θ ( t k ) + B i K i e ( t ) + w ( t ) .
First, we find the upper bound of θ ( t k ) . We denote ϕ ( t ) = ξ ( t ) x ( t ) as the observation error. Considering the finite-time observer (9), we obtain
ϕ ( z m ) = ( I L i C i ) ϕ ( z m ) ,
combining with ϕ ˙ ( t ) = A i ϕ ( t ) w ( t ) and R i μ i = 0 , we obtain
ϕ ( z m ) = ( I L i C i ) e A i Δ ϕ ( z m Δ ) z m Δ z m e A i ( z m τ ) w ( τ ) d τ = R i ( I L i C i ) ϕ ( ( z m Δ ) ) ( I L i C i ) z m Δ z m e A i ( z m τ ) w ( τ ) d τ = R i μ i 1 ( I L i C i ) ϕ ( ( z m ( μ i 1 ) Δ ) ) ( I L i C i ) p = 0 μ i 2 R i p z m p Δ Δ z m p Δ e A i ( z m p Δ τ ) w ( τ ) d τ = R i μ i e A i Δ ϕ ( ( z m ( μ i 1 ) Δ ) ) ( I L i C i ) p = 0 μ i 2 R i p z m p Δ Δ z m p Δ e A i ( z m p Δ τ ) w ( τ ) d τ = ( I L i C i ) p = 0 μ i 2 R i p z m p Δ Δ z m p Δ e A i ( z m p Δ τ ) w ( τ ) d τ .
Using the property that e A t e μ A t for all t R t 0 , we have
ϕ ( z m ) ( I L i C i ) p = 0 μ i 2 R i p 1 μ A i ( e μ A i Δ 1 ) w t
ρ 1 w t
where ρ 1 = ( I L i C i ) p = 0 μ i 2 R i p 1 μ A i ( e μ A i Δ 1 ) , thus ϕ ( z m ) is upper bounded. Recall now that ξ ( z m ) = x ^ ( z m z m ) , we then have
θ ( z m z m ) = x ^ ( z m z m ) x ( z m ) ρ 1 w t .
During the time interval [ z m , s m + 1 ] , we further have
θ ( t k z m ) e μ A i ( t k z m ) θ ( z m z m ) + z m t k e μ A i ( t k τ ) w ( τ ) d τ ρ 1 e μ A i H Δ + 1 μ A i ( e μ A i H Δ 1 ) w t ρ w t
where ρ = m a x i M ρ 1 e μ A i H Δ + 1 μ A i ( e μ A i H Δ 1 ) . Note that the prediction error resets at each s m . We finally have
θ ( t k ) ρ w t .
Furthermore, in the case where no switching occurs in interval [ z m 1 , z m ) , by applying the triangular inequality we have
x ^ ( t k z m 1 ) x ^ ( t k z m ) 2 ρ w t , t k [ z m , s m ) .
Next, we find the upper bound of e ( t ) .
Lemma 4.
Consider system (1) under the transmission policy (2) and the active control strategy (9) and (11), in the absence of switching, if the sampling rate is properly chosen by Δ = t k + 1 t k Δ ¯ , k N 0 ,
Δ ¯ : = ϱ 1 + ϱ 1 m a x Φ i , 1 , A i , μ A i 0 1 μ A i l o g ϱ 1 + ϱ 1 m a x Φ i , 1 , A i μ A i + 1 , μ A i > 0 .
Then e ( t ) = x ( t k ) x ( t ) satisfies
e ( t ) ϱ x ( t ) + ϱ ( 2 ρ + 1 ) w t ,
where ϱ is designed and used to describe the disparity between the state of the system at time t and the state of the system at the most recent sampling instant before t.
Proof. 
Consider any interval [ t k , t k + 1 ] , the dynamics of e(t) satisfy
e ˙ ( t ) = A i x ( t ) B i K i x ^ ( t k ) w ( t ) = A i x ^ ( t k ) A i x ( t ) A i x ^ ( t k ) B i K i x ^ ( t k ) w ( t ) = A i ( x ^ ( t k ) x ( t k ) + x ( t k ) x ( t ) ) ϕ x ^ ( t k ) w ( t ) = A i θ ( t k ) + A i e ( t ) ϕ x ^ ( t k ) w ( t ) .
Notice that e ( t k ) = 0 ,we then have
e ( t ) N t k t e μ A ( t τ ) θ ( t k ) + x ^ ( t k ) + w ( τ ) d τ
where N = m a x Φ i , 1 , A i , we further have
e ( t ) N F ( t t k ) θ ( t k ) + x ^ ( t k ) + w t
where F ( t t k ) = t k t e μ A ( t τ ) d τ . From (27) we further have
x ^ ( t ) x ( t ) + ρ w t
then we have
e ( t ) N F ( t t k ) ( 2 ρ + 1 ) w t + N F ( t t k ) ( x ( t ) + e ( t ) ) N F ( t t k ) 1 N F ( t t k ) x ( t ) + N F ( t t k ) 1 N F ( t t k ) ( 2 ρ + 1 ) w t
By letting N F ( t t k ) 1 N F ( t t k ) = ϱ , notice that F ( 0 ) = 0 and that F ( t t k ) is monotonically increasing with t, the positive correlation between ϱ and Δ can be described as
Δ = 1 μ A i l o g ϱ 1 + ϱ 1 m a x Φ i , 1 , A i μ A i + 1
for special cases where μ A 0 , we have
F ( Δ ) Δ .
Therefore, as long as Δ is chosen to be sufficiently small to satisfy (29), (30) is guaranteed to hold true. □
Based on (27) and Lemma 4, Given any symmetric positive definite matrix Q i , let P i be the unique solution of the Lyapunov equation Φ i T P i + P i Φ i = Q i . Let V i ( x ) = x T P i x . Substituting (20) into the derivative of V i ( x ) = x T P i x yields
V ˙ i ( x ( t ) ) = x ( t ) T ( Φ i T P i + P i Φ i ) x ( t ) + 2 e ( t ) T K i B i T P x ( t ) + 2 θ ( t k ) T K i B i T P x ( t ) + 2 x ( t ) T P w ( t ) ( γ 1 + γ 2 ϱ ) x ( t ) 2 + ( γ 2 ( ρ + ϱ ( 2 ρ + 1 ) ) + γ 3 ) x ( t ) v ( t ) ,
where γ 1 = λ ̲ ( Q i ) , γ 2 = 2 K i B i T P i , γ 3 = 2 P i , v ( t ) = s u p w ( t ) , w t . By selecting an appropriate sampling period Δ , we can obtain a sufficiently small ϱ to make γ 4 = ( γ 1 + γ 2 ϱ ) negative according to Lemma 4. Using Young’s inequality yields
V ˙ i ( x ( t ) ) γ 4 2 x ( t ) 2 + ( γ 2 ( ρ + ϱ ( 2 ρ + 1 ) ) + γ 3 ) 2 2 γ 4 v 2 ( t ) γ 4 2 λ ¯ ( P i ) V i ( x ( t ) ) + ( γ 2 ( ρ + ϱ ( 2 ρ + 1 ) ) + γ 3 ) 2 2 γ 4 v 2 ( t ) ,
finally we obtain
V i ( x ( t ) ) e α i ( t s m ) V i ( x ( s m ) ) + a i w t 2 e α ( t s m ) V i ( x ( s m ) ) + a w t 2
where α i = γ 4 2 λ ¯ ( P i ) , a i = ( γ 2 ( ρ + ϱ ( 2 ρ + 1 ) ) + γ 3 ) 2 2 γ 4 α i , α = m i n i M α i , a = m a x i M a i .

4.2. Dynamics under Two-Channel DoS Attacks with Asynchronous Switching

Next, we consider the scenario with asynchronous switching. Based on the assumptions stated earlier, the system’s mode and ξ ( z m ) are transmitted to the predictor at z m . Therefore, if the system switches between [ z m , z m + 1 ] , the mode of the control sequence will mismatch with the system’s mode throughout the interval [ t s ( n ) , s m + 1 ) , where t s ( n ) [ z m , z m + 1 ] .
In the actual control process, the switching behaviors are not very frequent, so we assume that the asynchronous switching intervals do not overlap, and for simplicity, we assume that the minimum dwell time of the switching signal satisfies
τ d 2 ( Q m + Δ )
Due to the negative impact of asynchronous switching on system performance and stability, in the worst-case scenario, we maximize the duration of asynchronous switching within interval [ t 0 , t ] ; specifically, assuming that the system switches immediately after z m each time. We denote Π ( t 0 , t ) as the union of asynchronous intervals within [ t 0 , t ] . The dynamics of the system under asynchronous switching can be described as
x ˙ ( t ) = A j x ( t ) + B j K i x ^ ( t k ) + w ( t ) .
Substituting it into the derivative of V j ( x ) = x T P j x yields
V ˙ ( x ( t ) ) = x T ( t ) ( A j T P j + P j A j ) x ( t ) + 2 x T ( t ) P j B j K i x ^ ( t k ) + 2 x T ( t ) P j w ( t ) η 1 x ( t ) 2 + η 2 x ( t ) x ^ ( t k ) + η 3 x ( t ) v ( t )
where η 1 = A j T P j + P j A j , η 2 = 2 P j B j K i , η 3 = 2 P j . Notice that (34) does not necessarily hold during asynchronous switching; a lemma is required to further describe the energy function of the system under asynchronous switching.
Lemma 5.
Consider the sampling scheme (2) satisfying (29) in Lemma 4, where γ 1 + γ 2 ϱ < 0 , the switching signal satisfying (41), then x ^ ( t k ) of the control sequence satisfying
x ^ ( t k ) Γ x ( z m ) + Υ w t
where Γ = λ ¯ ( P i ) λ ̲ ( P i ) , Υ = λ ¯ ( P i ) λ ̲ ( P i ) ρ + θ 2 λ ¯ ( P i ) θ 1 λ ̲ 2 ( P i ) .
Proof. 
Please see Appendix A. □
By Lemma 5, (43) can be further rewritten as
V ˙ ( x ( t ) ) η 1 x ( t ) 2 + η 2 Γ x ( t ) x ( z m ) + ( η 2 Υ + η 3 ) x ( t ) v ( t ) .
It can be obtained
2 x ( t ) x ( z m ) η 1 η 2 Γ x ( t ) 2 + η 2 Γ η 1 x ( z m ) 2
and
2 x ( t ) v ( t ) η 1 η 2 Υ + η 3 x ( t ) 2 + η 2 Υ + η 3 η 1 v 2 ( t ) .
Then,
V ˙ ( x ( t ) ) 2 η 1 x ( t ) 2 + ( η 2 Γ ) 2 2 η 1 x ( z m ) 2 + ( η 2 Υ + η 3 ) 2 2 η 1 v 2 ( t ) .
Thus,
V ˙ ( x ( t ) ) β i j m a x { V ( x ( t ) ) , V ( x ( z m ) } + ( η 2 Υ + η 3 ) 2 2 η 1 w t 2
where β i j = m a x { 2 η 1 λ ̲ ( P j ) + ( η 2 Γ ) 2 2 η 1 λ ̲ ( P j ) } . By iteration, we finally have
V ( x ( t ) ) e β ( t z m ) V ( x ( z m ) ) + e β ( t z m ) b w t 2 , t Π z m , s m + 1
where β = m a x i , j M { β i j } , b = m a x i , j M { ( η 2 Υ + η 3 ) 2 2 η 1 β i j } .
Remark 6.
There are two reasons why switching after z m is the worst case; first, in this paper we consider the system under asynchronous switching as an open-loop system with an upper bounded input, and by Lemma 5 we show that the upper bound on the input is maximized when the switching occurs exactly after z m . Furthermore, when the switching occurs exactly after the z m , the mode of the system must wait until z m + 1 to be corrected and until s m + 1 to be applied to the actuator, thus maximising the asynchronous switching duration.
Remark 7.
For the case where z m + 1 belongs to ( z m , s m ] , s m coincides with s m + 1 , and still assuming that the system switches immediately after z m . it is easy to obtain that the energy function of x ( t ) within the asynchronous switching interval ( z m , s m ) can still be described by (50). The duration of the asynchronous switching is s m z m Q c (this case is obviously not the worst-case-scenario).
Now it is ready to derive the sufficient conditions for ISS of the switched systems under two-channel asynchronous DoS attacks.

4.3. Input-to-State Stability Analysis

Theorem 1.
Consider the switched linear system (1) under sampling logic (29) and observer-based active control strategy (9), (11), ζ V ( t s ( n ) ) V ( t s ( n ) ) with ζ 1 . Consider the DoS signals on the measurement channel and the switching signals satisfying (13) and the DoS signals on the control channel satisfying (16). If τ σ in (3) satisfy
τ σ > l n ζ + ( α + β ) ( Q m + Q c + Δ ) α τ σ > τ d 2 ( Q m + Δ )
where α, β are in (40) and (50), Q m and Q c are in (14) and (17), then the system is ISS.
Proof. 
Recall that the initial condition is given by ξ ( z 1 ) = 0 , the control sequence U ( z 1 ) = 0 over the time interval [ t 0 , s 0 ] . From Lemma 5 it is easy to see that (44) holds trivially and the energy function over [ t 0 , s 0 ] can be expressed as (50). Combining (40) and (50), by iteration, the energy function over [ t 0 , t ] can be derived as
V ( x ( t ) ) ζ n σ ( t 0 , t ) e α ( t t 0 ) e ( α + β ) Π ( t 0 , t ) V ( x ( t 0 ) ) + ζ n σ ( t 0 , t ) e α ( t t 0 ) e ( α + β ) Π ( t 0 , t ) b w t 2 + m a x { a , b } 1 + 2 i = 1 n σ ( t 0 , t ) ζ n σ ( t s ( i ) , t ) e α ( t t s ( i ) ) e ( α + β ) Π ( t s ( i ) , t ) w t 2 .
We first prove that the third term on the RHS of the inequality (52) is bounded.
Due to Assumption 1, the summation
i = 1 n σ ( t 0 , t ) ζ n σ ( t s ( i ) , t ) e α ( t t s ( i ) ) e ( α + β ) Π ( t s ( i ) , t )
can be rewritten as
i = 1 n σ ( t 0 , t ) e n σ ( t s ( i ) , t ) l n ζ α ( t t s ( i ) ) + ( α + β ) [ n σ ( t s ( i ) , t ) H Δ ] e N σ l n ζ + ( α + β ) N σ H Δ i = 1 n σ ( t 0 , t ) e [ l n ζ τ σ + ( α + β ) H Δ τ σ α ] ( t t s ( i ) ) e N σ l n ζ + ( α + β ) N σ H Δ i = 1 n σ ( t 0 , t ) e ϵ ( t t s ( i ) ) ,
where ϵ = l n ζ τ σ + ( α + β ) H Δ τ σ α 0 , from (3), we have
t t s ( i ) τ σ N ( t s ( i ) , t ) τ σ N 0 ,
combining (54) and (55), the summation can be further rewritten as
e N σ l n ζ + ( α + β ) N σ H Δ ϵ N σ τ σ i = 1 N ( t 0 , t ) e ϵ τ σ i e N σ l n ζ + ( α + β ) N σ H Δ ϵ N σ τ σ e ϵ τ σ 1 e ϵ τ σ
thus the third term on the RHS of (52) is bounded.
Similarly, the first and the second terms on the RHS of the inequality (52) can be respectively rewritten as
e N σ l n ζ + ( α + β ) ( N σ H Δ + Q m + Q c + ( μ 1 ) Δ ) + ϵ ( t t 0 ) V ( x ( t 0 ) )
and
e N σ l n ζ + ( α + β ) N σ H Δ + Q m + Q c + ( μ 1 ) Δ + ϵ ( t t 0 ) b w t 2
letting Ω = e N σ l n ζ + ( α + β ) N σ H Δ , Ω = e N σ l n ζ + ( α + β ) N σ H Δ + Q m + Q c + ( μ 1 ) Δ (52) can be rewritten as
V ( x ( t ) ) Ω e ϵ ( t t 0 ) V ( x ( t 0 ) ) + m a x { a , b } ( 1 + Ω + 2 Ω e ϵ N 0 τ σ e ϵ τ σ 1 e ϵ τ σ ) w t 2 .
Let λ ¯ ( P i ) and λ ̲ ( P i ) respectively represent the maximum and minimum eigenvalues of the positive-definite matrix P i , i M . By Cauchy–Schwarz inequality, we finally obtain
x ( t ) Ω 1 2 λ ¯ ( P i ) λ ̲ ( P i ) e ϵ 2 ( t t 0 ) x ( t 0 ) + m a x { a , b } λ ̲ ( P i ) ( 1 + Ω + 2 Ω e ϵ N σ τ σ e ϵ τ σ 1 e ϵ τ σ ) 1 2 w t .
This completes the proof. □
Remark 8.
In Section 5, we verify through simulation that β tends to be much larger than α, i.e., in (51), the average dwell time τ σ is much larger than the minimum dwell time τ d . Therefore, it is not out of generality to assume that the asynchronous switching intervals do not overlap.
In what follows, the sufficient conditions for ISS stability of non-switched systems under the active control strategy against two-channel asynchronous DoS attacks is given.
Corollary 1.
Consider a non-switched linear system
x ˙ ( t ) = A x ( t ) + B u ( t ) + w ( t ) y ( t ) = C x ( t )
under the active control strategy (9), (11). Consider the sampling rate chosen by sampling logic (29), where ϱ is a positive constant satisfying γ 1 + γ 2 ϱ < 0 . Then the closed-loop system is ISS for two-channel asynchronous DoS attacks satisfying
1 1 T D m μ Δ τ D m > 0 1 1 T D c Δ τ D c > 0 .
The buffer size is designed to update the control signal to the actuator at any sampling time under two-channel asynchronous DoS attacks if
H Q ˜ m + Q c Δ + 1
holds true. Where Q ˜ m = ( κ D m + N D m μ Δ ) ( 1 1 T D m μ Δ τ D m ) 1 .
Proof.
The proof of this corollary is similar to the derivation in Section 4.1 in the absence of switching behaviors, and is therefore omitted. □

5. Numerical Example

In this section, the main results of our work are verified by an example. Furthermore, a comparative experiment is presented to verify the superiority of the active control strategy over the existing ZOH controller proposed in [17,35,36] against two-channel DoS attacks.
Consider the networked switched system consisting of modes i and j
A i = 1 0 0 1 ,   B i = 1 0 ,   C i = 1 1 ,   L i = 5.52 4.52 ,   K i = 2 0 ,  
A j = 1 1 1 0 ,   B j = 0 1 ,   C j = 1 2 ,   L j = 18.08 8.54 ,   K j = 1 1 .
By selecting different positive definite matrices Q i , Q j , the unique solution of the Lyapunov equation is given as follows
Q i = 1 0 0 1 ,   P i = 0.5 0 0 0.5 ,   Q j = 1 0.5 0.5 1 ,   P j = 0.5 0.25 0.25 0.75
L i is chosen to ensure that R i μ = 0 with R i = ( I L i C i ) e A i Δ ([46]). We know that α = 0.2 , β = 27.7 , μ = 2 . ϱ < 0.4 must be satisfied in order for (40) to become a decreasing energy equation, picking for ϱ = 0.2 , Lemma 4 yields Δ ¯ = 0.12 . We let Δ = 0.1 , ζ = 2 and the remaining variables can be easily calculated.
We assume that the DoS attacks applied to the measurement channel satisfy 1 T D m = 0.15 and 1 τ D m = 0.05 , the DoS attacks applied to the control channel satisfy 1 T D c = 0.6 and 1 τ D c = 0.4 , By Theorem 1, a feasible solution τ σ = 110 τ d = 1.14 can be found and the switching mode is presented in Figure 3. Figure 4 and Figure 5 depict DoS attacks on the measurement channel and the control channel, respectively. The state response of the switched system with the active control strategy under the above-mentioned situations is depicted in Figure 6.
The state response with a ZOH controller ([17,35,36]) under the same conditions is depicted in Figure 7. Comparing Figure 6 and Figure 7, it can be observed that thanks to the predictive control sequences, the active control strategy proposed in this paper exhibits better resilience and robustness against two-channel DoS attacks and asynchronous switching behaviors.
In addition, the state response of the non-switching subsystem j with the active control strategy under the two-channel DoS attacks is depicted in Figure 8. The jamming rates applied to the control and the measurement channels are approximately 60% and 45%, respectively, further validating Corollary 1.
In the Lyapunov method, the energy function of a system is divided into functions associated with energy reduction and energy increase. When the overall energy of the system decreases more than it increases, the system achieves stability.
In passive strategies [17,35,36], a system under DoS attacks, a system under asynchronous switching and a system under both DoS attacks and asynchronous switching are all described as functions associated with energy increase. However, in active control strategies, thanks to the predictor and the buffer, a system under DoS attacks can be described as function associated with energy reduction, while only system under asynchronous switching is described as function associated with energy increase. Therefore, in the same conditions, active control strategies exhibit greater energy reduction compared to passive control strategies. This energy reduction contributes to higher stability, resulting in superior robustness and resilience against DoS attacks and asynchronous switching behaviors.

6. Conclusions

In our work, the security issue of the networked switched systems under two-channel DoS attacks has been studied. An observer-based active control strategy has been devised. With this strategy, the ISS sufficient conditions for the networked switched system under asynchronous DoS attacks have been derived. In particular, the coupling relationship among the features of two-channel DoS attacks and the switching frequency is revealed. Compared to the ZOH controller, the proposed active control strategy shows better robustness and resilience against two-channel asynchronous DoS attacks and asynchronous switching behaviors. Based on the framework in this paper, event-triggered control and nonlinear dynamics can be further investigated in the future, and the strategy can be further optimized and extended to handle more complex and sophisticated cyber threats.

Author Contributions

Conceptualization, J.Y.; methodology, J.Y.; software, J.Y.; validation, J.Y. and A.L.; formal analysis, J.Y.; writing—original draft preparation, J.Y.; writing—review and editing, J.Y. and A.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Data sharing is not applicable to this article.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Proof of Lemma 5.
During the sampling interval [ s m , s m + 1 ) , the dynamics of x ^ ( t z m ) can be descibed as
x ^ ˙ ( t z m ) = A i x ^ ( t z m ) + B i K i x ^ ( t k z m ) = Φ i x ^ ( t z m ) + B i K i x ^ ( t k z m ) x ^ ( t z m ) = Φ i x ^ ( t z m ) + B i K i e ^ ( t ) .
Similar to the proof of Lemma 4, we have
e ^ ( t ) ϱ * x ^ ( t z m )
if the sampling interval Δ = t k + 1 t k Δ ¯ * , k N 0 ,
Δ ¯ * : = ϱ * 1 + ϱ * 1 Φ i , μ A i 0 1 μ A i l o g ϱ * 1 + ϱ * 1 Φ i μ A i + 1 , μ A i > 0 .
Substituting (A2) into the derivative of V i ( x ^ ) = x ^ T P i x ^ , it can be obtained that
V ˙ ( x ^ ( t z m ) ) ( γ 2 ϱ * γ 1 ) x ^ ( t z m ) 2 .
Selecting the sampling interval Δ satisfying (29) in Lemma 4, where γ 1 + γ 2 ϱ < 0 , based on the positive correlation between Δ and ϱ , as well as the positive correlation between Δ and ϱ * , we have
ϱ * ϱ
further we have
γ 1 + γ 2 ϱ * < 0
it is obtained that
V ( x ^ ( t z m ) ) e 2 α i * ( t s m ) V ( x ^ ( s m z m ) )
where α i * = γ 1 γ 2 ϱ * 2 λ ¯ ( P i ) , we finally have
x ^ ( t z m ) λ ¯ ( P i ) λ ̲ ( P i ) e α i * ( t s m ) x ^ ( s m z m ) λ ¯ ( P i ) λ ̲ ( P i ) x ^ ( s m z m ) .
During the interval [ z m , s m ) , the actuator applies control sequence U ( z m 1 ) , we have
x ^ ( t k z m 1 ) λ ¯ ( P i ) λ ̲ ( P i ) x ^ ( z m z m 1 ) .
Similarly, within interval [ s m , s m + 1 ) , the actuator applies control sequence U ( z m ) , we have
x ^ ( t k z m ) λ ¯ ( P i ) λ ̲ ( P i ) x ^ ( s m z m )
Next, we find the relationship between x ^ ( s m z m ) and x ^ ( z m z m ) . During the interval [ z m , s m ) , the dynamics of x ^ ( t z m ) can be described as
x ^ ˙ ( t z m ) = A i x ^ ( t z m ) + B i K i x ^ ( t k z m 1 ) = Φ i x ^ ( t z m ) + B i K i θ ^ ( t k ) + B i K i e ^ ( t )
where θ ^ ( t k ) = x ^ ( t k z m 1 ) x ^ ( t k z m ) , e ^ ( t ) = x ^ ( t k z m ) x ^ ( t z m ) . Since we assume that the asynchronous switching intervals do not overlap, i.e., no switching occurs in [ z m 1 , z m ] , then we have (28) holds true for all t k [ z m , s m ) even if a switching behavior occurs after z m ( U ( z m 1 ) and U ( z m ) are independent of the switching signal after z m ). Similar to the Proof of Lemma 4, we can derive that for the sampling interval Δ satisfying (29) in Lemma 4, where γ 1 + γ 2 ϱ < 0 , we have
e ^ ( t ) ϱ * * x ^ ( t z m ) + ϱ * * 4 ρ w t
where ϱ * * ϱ .
By Lyapunov method and young’s inequality, we further have
V ˙ ( x ^ ( t z m ) ) = x ^ ( t z m ) T ( Φ i T P i + P i Φ i ) x ^ ( t z m ) + 2 e ( t ) T K i B i T P x ^ ( t z m ) + 2 θ ( t k ) T K i B i T P x ^ ( t z m ) ( γ 1 + γ 2 ϱ * * ) x ^ ( t z m ) 2 + γ 2 ρ ( 2 + 4 ϱ * * ) x ^ ( t z m ) w t γ 1 γ 2 ϱ * * 2 λ ¯ ( P i ) V i ( x ^ ( t z m ) ) + 2 [ γ 2 ρ ( 1 + 2 ϱ * * ) ] 2 γ 1 γ 2 ϱ * * w t 2
then,
V ( x ^ ( t z m ) ) e θ 1 ( t z m ) V ( x ^ ( z m z m ) ) + θ 2 θ 1 w t 2
where θ 1 = γ 1 γ 2 ϱ * * 2 λ ¯ ( P i ) , θ 2 = 2 [ γ 2 ρ ( 1 + 2 ϱ * * ) ] 2 γ 1 γ 2 ϱ * * , thus,
x ^ ( t z m ) ) λ ¯ ( P i ) λ ̲ ( P i ) e θ 1 2 ( t z m ) x ^ ( z m z m ) + θ 2 θ 1 λ ̲ ( P i ) w t 2 λ ¯ ( P i ) λ ̲ ( P i ) x ^ ( z m z m ) + θ 2 θ 1 λ ̲ ( P i ) w t
for all t [ z m , s m + 1 ) . Combining (A9) and (A14), we have
x ^ ( t k z m ) ) λ ¯ ( P i ) λ ̲ ( P i ) x ^ ( z m z m ) + θ 2 λ ¯ ( P i ) θ 1 λ ̲ 2 ( P i ) w t
for all t [ z m , s m + 1 ] ) . By continuity of x ( t ) we have
x ^ ( z m z m 1 ) ) x ( z m ) + ρ w t x ^ ( z m z m ) ) x ( z m ) + ρ w t .
Combining (A8), (A14) and (A16), we finally have
x ^ ( t k ) λ ¯ ( P i ) λ ̲ ( P i ) x ( z m ) + λ ¯ ( P i ) λ ̲ ( P i ) ρ + θ 2 λ ¯ ( P i ) θ 1 λ ̲ 2 ( P i ) w t .
Then the proof is completed. □

References

  1. Lee, E.A. Cyber physical systems: Design challenges. In Proceedings of the 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC), Orlando, FL, USA,, 5–7 May 2008. [Google Scholar]
  2. Sha, L.; Gopalakrishnan, S.; Liu, X.; Wang, Q. Cyber-physical systems: A new frontier. In Proceedings of the 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC 2008), Taichung, Taiwan, 11–13 June 2008; pp. 1–9. [Google Scholar]
  3. Farraj, A.; Hammad, E.; Kundur, D. A cyber-physical control framework for transient stability in smart grids. IEEE Trans. Smart Grid 2016, 9, 1205–1215. [Google Scholar] [CrossRef]
  4. Peng, C.; Sun, H.; Yang, M.; Wang, Y.L. A survey on security communication and control for smart grids under malicious cyber attacks. IEEE Trans. Syst. Man Cybern. Syst. 2019, 49, 1554–1569. [Google Scholar] [CrossRef]
  5. Liu, X.; Li, L.; Li, Z.; Chen, X.; Fernando, T.; Iu, H.H.C.; He, G. Event-trigger particle filter for smart grids with limited communication bandwidth infrastructure. IEEE Trans. Smart Grid 2017, 9, 6918–6928. [Google Scholar] [CrossRef]
  6. Hu, F.; Lu, Y.; Vasilakos, A.V.; Hao, Q.; Ma, R.; Patil, Y.; Zhang, T.; Lu, J.; Li, X.; Xiong, N.N. Robust cyber–physical systems: Concept, models, and implementation. Future Gener. Comput. Syst. 2016, 56, 449–475. [Google Scholar] [CrossRef]
  7. Teixeira, A.; Shames, I.; Sandberg, H.; Johansson, K.H. A secure control framework for resource-limited adversaries. Automatica 2015, 51, 135–148. [Google Scholar] [CrossRef]
  8. Lu, A.Y.; Yang, G.H. False data injection attacks against state estimation without knowledge of estimators. IEEE Trans. Autom. Control 2022, 67, 4529–4540. [Google Scholar] [CrossRef]
  9. Horak, T.; Cervenanska, Z.; Huraj, L.; Vazan, P.; Janosik, J.; Tanuska, P. The vulnerability of securing IoT production lines and their network components in the Industry 4.0 concept. IFAC-PapersOnLine 2020, 53, 11237–11242. [Google Scholar] [CrossRef]
  10. Mishra, A.; Joshi, B.K.; Arya, V.; Gupta, A.K.; Chui, K.T. Detection of Distributed Denial of Service (DDoS) Attacks Using Computational Intelligence and Majority Vote-Based Ensemble Approach. Int. J. Softw. Sci. Comput. Intell. (IJSSCI) 2022, 14, 1–10. [Google Scholar] [CrossRef]
  11. Cvitić, I.; Perakovic, D.; Gupta, B.B.; Choo, K.K.R. Boosting-based DDoS detection in internet of things systems. IEEE Internet Things J. 2021, 9, 2109–2123. [Google Scholar] [CrossRef]
  12. Yan, J.J.; Yang, G.H. Secure state estimation with switched compensation mechanism against DoS attacks. IEEE Trans. Cybern. 2021, 52, 9609–9620. [Google Scholar] [CrossRef]
  13. Li, D.; Dong, J. Fuzzy Control Based on Reinforcement Learning and Subsystem Error Derivatives for Strict-Feedback Systems with an Observer. IEEE Trans. Fuzzy Syst. 2022, 31, 2509–2521. [Google Scholar] [CrossRef]
  14. Jin, Z.; Zhang, S.; Hu, Y.; Zhang, Y.; Sun, C. Security State Estimation for Cyber-Physical Systems against DoS Attacks via Reinforcement Learning and Game Theory. Actuators 2022, 11, 192. [Google Scholar] [CrossRef]
  15. Chen, H.; Zong, G.; Zhao, X.; Gao, F.; Shi, K. Secure filter design of fuzzy switched CPSs with mismatched modes and application: A multidomain event-triggered strategy. IEEE Trans. Ind. Inform. 2023, 19, 10034–10044. [Google Scholar] [CrossRef]
  16. Lu, A.Y.; Yang, G.H. Distributed secure state estimation for linear systems against malicious agents through sorting and filtering. Automatica 2023, 151, 110927. [Google Scholar] [CrossRef]
  17. Persis, C.D.; Tesi, P. Input-to-State Stabilizing Control Under Denial-of-Service. IEEE Trans. Autom. Control 2015, 60, 2930–2944. [Google Scholar] [CrossRef]
  18. Lu, A.Y.; Yang, G.H. Stability analysis for cyber-physical systems under denial-of-service attacks. IEEE Trans. Cybern. 2020, 51, 5304–5313. [Google Scholar] [CrossRef]
  19. Li, Z.; Zhou, C.; Che, W.; Deng, C.; Jin, X. Data-Based Security Fault Tolerant Iterative Learning Control under Denial-of-Service Attacks. Actuators 2022, 11, 178. [Google Scholar] [CrossRef]
  20. Chen, H.; Zong, G.; Gao, F.; Shi, Y. Probabilistic event-triggered policy for extended dissipative finite-time control of MJSs under cyber-attacks and actuator failures. IEEE Trans. Autom. Control, 2023; early access. [Google Scholar] [CrossRef]
  21. Feng, S.; Tesi, P. Resilient control under denial-of-service: Robust design. Automatica 2017, 79, 42–51. [Google Scholar] [CrossRef]
  22. Lu, A.Y.; Yang, G.H. Detection and identification of sparse sensor attacks in cyber physical systems with side information. IEEE Trans. Autom. Control, 2022; early access. [Google Scholar] [CrossRef]
  23. Li, X.J.; Shen, X.Y. A data-driven attack detection approach for DC servo motor systems based on mixed optimization strategy. IEEE Trans. Ind. Inform. 2019, 16, 5806–5813. [Google Scholar] [CrossRef]
  24. Guo, L.; Yu, H.; Hao, F. Event-triggered control for stochastic networked control systems against denial-of-service attacks. Inf. Sci. 2020, 527, 51–69. [Google Scholar] [CrossRef]
  25. Shisheh Foroush, H.; Martínez, S. On triggering control of single-input linear systems under pulse-width modulated DoS signals. SIAM J. Control Optim. 2016, 54, 3084–3105. [Google Scholar] [CrossRef]
  26. Fu, J.; Qi, Y.; Xing, N.; Li, Y. A new switching law for event-triggered switched systems under DoS attacks. Automatica 2022, 142, 110373. [Google Scholar] [CrossRef]
  27. Hu, S.; Yue, D.; Chen, X.; Cheng, Z.; Xie, X. Resilient H filtering for event-triggered networked systems under nonperiodic DoS jamming attacks. IEEE Trans. Syst. Man Cybern. Syst. 2019, 51, 1392–1403. [Google Scholar] [CrossRef]
  28. Zhang, X.M.; Han, Q.L.; Ge, X.; Ding, L. Resilient control design based on a sampled-data model for a class of networked control systems under denial-of-service attacks. IEEE Trans. Cybern. 2019, 50, 3616–3626. [Google Scholar] [CrossRef]
  29. Zhao, N.; Shi, P.; Xing, W.; Lim, C.P. Event-triggered control for networked systems under denial of service attacks and applications. IEEE Trans. Circuits Syst. I Regul. Pap. 2021, 69, 811–820. [Google Scholar] [CrossRef]
  30. Liu, D.; Ye, D. Pinning-observer-based secure synchronization control for complex dynamical networks subject to DoS attacks. IEEE Trans. Circuits Syst. I Regul. Pap. 2020, 67, 5394–5404. [Google Scholar] [CrossRef]
  31. Lu, A.Y.; Yang, G.H. Input-to-state stabilizing control for cyber-physical systems with multiple transmission channels under denial of service. IEEE Trans. Autom. Control 2017, 63, 1813–1820. [Google Scholar] [CrossRef]
  32. Wakaiki, M.; Yamamoto, Y. Stability analysis of sampled-data switched systems with quantization. Automatica 2016, 69, 157–168. [Google Scholar] [CrossRef]
  33. Liberzon, D. Finite data-rate feedback stabilization of switched and hybrid linear systems. Automatica 2014, 50, 409–420. [Google Scholar] [CrossRef]
  34. Yang, D.; Zong, G.; Shi, Y.; Shi, P. Adaptive tracking control of hybrid switching Markovian systems with its applications. SIAM J. Control Optim. 2023, 61, 434–457. [Google Scholar] [CrossRef]
  35. Qu, H.; Zhao, J. Stabilisation of switched linear systems under denial of service. IET Control Theory Appl. 2020, 14, 1438–1444. [Google Scholar] [CrossRef]
  36. Wang, Y.W.; Zeng, Z.H.; Liu, X.K.; Liu, Z.W. Input-to-state stability of switched linear systems with unstabilizable modes under DoS attacks. Automatica 2022, 146, 110607. [Google Scholar] [CrossRef]
  37. Zhao, R.; Zuo, Z.; Wang, Y.; Zhang, W. Active control strategy for switched systems against asynchronous DoS attacks. Automatica 2023, 148, 110765. [Google Scholar] [CrossRef]
  38. Zhao, R.; Zuo, Z.; Wang, Y.; Zhang, W. Active control strategy for disturbed switched systems under asynchronous dos attacks. IEEE Control Syst. Lett. 2022, 6, 2701–2706. [Google Scholar] [CrossRef]
  39. Zhao, X.; Liu, H.; Zhang, J.; Li, H. Multiple-mode observer design for a class of switched linear systems. IEEE Trans. Autom. Sci. Eng. 2013, 12, 272–280. [Google Scholar] [CrossRef]
  40. Chen, L.; Zhu, Y.; Ahn, C.K. Adaptive neural network-based observer design for switched systems with quantized measurements. IEEE Trans. Neural Netw. Learn. Syst. 2021; early access. [Google Scholar] [CrossRef]
  41. Sun, Y.C.; Yang, G.H. Event-triggered resilient control for cyber-physical systems under asynchronous DoS attacks. Inf. Sci. 2018, 465, 340–352. [Google Scholar] [CrossRef]
  42. Hu, S.; Yue, D.; Han, Q.L.; Xie, X.; Chen, X.; Dou, C. Observer-based event-triggered control for networked linear systems subject to denial-of-service attacks. IEEE Trans. Cybern. 2019, 50, 1952–1964. [Google Scholar] [CrossRef]
  43. Li, T.; Chen, B.; Yu, L.; Zhang, W.A. Active security control approach against DoS attacks in cyber-physical systems. IEEE Trans. Autom. Control 2020, 66, 4303–4310. [Google Scholar] [CrossRef]
  44. Hespanha, J.P.; Morse, A.S. Stability of switched systems with average dwell-time. In Proceedings of the 38th IEEE conference on decision and control (Cat. No. 99CH36304), Phoenix, AZ, USA, 7–10 December 1999; Volume 3, pp. 2655–2660. [Google Scholar]
  45. Sontag, E.D.; Agrachev, A.A.; Morse, A.S.; Sussmann, H.J.; Utkin, V.I. Input to State Stability: Basic Concepts and Results; Springer: Berlin/Heidelberg, Germany, 2008. [Google Scholar]
  46. O’Reilly, J. Observers for Linear Systems; Academic Press: Cambridge, MA, USA, 1983. [Google Scholar]
Figure 1. Observer-based active control strategy.
Figure 1. Observer-based active control strategy.
Actuators 12 00335 g001
Figure 2. The schematic diagram of the transmission policy under switching behaviors and two-channel asynchronous DoS attacks. The solid arrows represent the successful transmissions.
Figure 2. The schematic diagram of the transmission policy under switching behaviors and two-channel asynchronous DoS attacks. The solid arrows represent the successful transmissions.
Actuators 12 00335 g002
Figure 3. Switching mode with τ σ = 110 .
Figure 3. Switching mode with τ σ = 110 .
Actuators 12 00335 g003
Figure 4. DoS attacks on the measurement channel with approximately 15% of the jamming rate.
Figure 4. DoS attacks on the measurement channel with approximately 15% of the jamming rate.
Actuators 12 00335 g004
Figure 5. DoS attacks on the control channel with approximately 60% of the jamming rate.
Figure 5. DoS attacks on the control channel with approximately 60% of the jamming rate.
Actuators 12 00335 g005
Figure 6. State response under the active control strategy, set the initial state x ( t 0 ) = [ 1 , 1 ] T and the disturbance magnitude to 0.01.
Figure 6. State response under the active control strategy, set the initial state x ( t 0 ) = [ 1 , 1 ] T and the disturbance magnitude to 0.01.
Actuators 12 00335 g006
Figure 7. State response with a ZOH controller.
Figure 7. State response with a ZOH controller.
Actuators 12 00335 g007
Figure 8. State response of the non-switched subsystem j under the active control strategy.
Figure 8. State response of the non-switched subsystem j under the active control strategy.
Actuators 12 00335 g008
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Yin, J.; Lu, A. Observer-Based Active Control Strategy for Networked Switched Systems against Two-Channel Asynchronous DoS Attacks. Actuators 2023, 12, 335. https://0-doi-org.brum.beds.ac.uk/10.3390/act12080335

AMA Style

Yin J, Lu A. Observer-Based Active Control Strategy for Networked Switched Systems against Two-Channel Asynchronous DoS Attacks. Actuators. 2023; 12(8):335. https://0-doi-org.brum.beds.ac.uk/10.3390/act12080335

Chicago/Turabian Style

Yin, Jiayuan, and Anyang Lu. 2023. "Observer-Based Active Control Strategy for Networked Switched Systems against Two-Channel Asynchronous DoS Attacks" Actuators 12, no. 8: 335. https://0-doi-org.brum.beds.ac.uk/10.3390/act12080335

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop