Adaptive neural control for delayed discrete-time switched systems under deception attacks
Abstract
This paper focuses on the issue of adaptive neural control for discrete-time switched systems with time delay and deception attacks. Firstly, the switching signal is constrained by the dwell time. Considering that the deception attacks are unknown, the neural network technique is employed to approximate the attack signals. Then, an adaptive state feedback controller is established to compensate for the adverse effects of deception attacks for switched systems. Meanwhile, sufficient conditions for the boundedness of the switched system are given through the Lyapunov functional method, and the controller gains can be obtained by resolving the linear matrix inequality. Finally, the feasibility of the proposed method is illustrated via a numerical example.
Keywords
1. INTRODUCTION
Switched systems consist of some subsystems and a switching rule that manages these subsystems. Because of their complexity and practicality, switched systems have been used in a wide variety of applications, such as manipulator robots[1], aircraft control systems[2], circuit systems[3], and so on. The switched systems are featured as the stability of each subsystem is not necessarily related to the stability of the closed-loop system. Therefore, designing a correct switching strategy is very significant. In recent years, the approach to constrain a switching strategy has included dwell time (DT)[4] and average DT (ADT)[5].
With the popularity of networking, network control systems (NCSs) have been studied and applied by scholars. In NCSs, control and feedback signals are transmitted through communication networks between sensors, controllers, and actuators. It has the characteristics of high reliability and low cost. Therefore, combining the advantages of NCSs and switched systems is a valuable issue. Despite the evident advantages of NCSs, there are also unavoidable disadvantages such as communication resources and network security problems. In particular, network security is an important problem considered in the open network environment. At present, network attacks can be mainly divided into deception attacks[6,7] and denial-of-service (DoS) attacks. The purpose of the DoS attacks is to prevent the transmission of data. The deception attacks aim to modify real signals and substitute them with false signals. Therefore, the research on how to compensate for the adverse effects of deception attacks on the system is of extraordinary significance. The discrete nonlinear systems with deception attacks were considered, in which Bernoulli distributions were used to describe the adverse effects of deception attacks on the systems[8]. The Takagi-Sugeno fuzzy systems were considered, in which the deception attacks existed in the feedforward and feedback channels, and were modeled independent Bernoulli processes[9]. The problem of network security and communication resources of vehicles under deception attacks were investigated, in which deception attacks were considered as constrained bounded energy signals[10]. In the above articles, deception attacks are supposed to be known or bounded, which is obviously a limitation. Therefore, the deception attacks considered in this paper involve no assumptions but rather focus on the identification and estimation of unknown attack signals. According to the practical situation, deception attacks have been designed as system state-dependent nonlinear functions. Therefore, the deception attack signals can be identified and estimated by applying neural network (NN) techniques, and the approximation function can be employed to design the controller in this article. Currently, the applications of NN techniques to approximate nonlinear functions have yielded numerous research results[11]. In nonlinear systems, these techniques were employed to approximate nonlinear functions that construct adaptive models to save communication resources and address stabilization problems. For the nonlinear switched systems, error terms were approximated by NN technology and compensated with nonlinear filters to solve the adaptive tracking control problem[12]. The adaptive NN observer problem was studied, in which the NN observer is designed to compensate for quantization errors and accurately estimate the state of the actuator[13]. In addition, some existing research results have approximated deception attack signals with NN techniques. The authors investigated the filtering problem of networked switched systems by approximating deception attacks with these techniques[14]. The event-triggered mechanism was designed based on NN, and the deception attacks were approximated by NN, which solved the security control problem[15]. It should be noted that the NN technique has been widely applied to nonlinear systems, but there is little attention paid to the processing of deception attacks as nonlinear functions, which motivates our research. Therefore, the challenge addressed in this paper is how to employ NN techniques to estimate deception attacks occurring in the controller-actuator (C-A) transmission channel, where deception attacks are considered as nonlinear functions.
In this paper, the control problem of discrete-time switched systems with time delay and deception attacks is considered, and a controller design scheme is proposed by using NN techniques to approximate the deception attack signals. The main contributions are as follows:
(1) Different from bounded deception attacks[16], the deception attacks in this paper are approximated using NN techniques, which can better defend against deception attacks.
(2) The switching signals are constrained by the DT, and a new Lyapunov functional method is constructed to ensure the boundedness of the switched systems.
The rest of this paper is structured as follows. In Section 2, the system description and controller design strategy are proposed. The main results of adaptive neural controllers are introduced in Section 3. A numerical example is applied to demonstrate the feasibility of the method in Section 4. Finally, the conclusion is presented in Section 5.
Notation:
2. PROBLEM FORMULATION AND PRELIMINARIES
2.1. System description
Consider a class of discrete-time switched systems with time delay given as
where
Let the switching instants be
2.2. Adaptive neural state feedback controller
The C-A transmission channel is influenced by deception attacks, and the authenticity of the data transmission is modified, as shown in Figure 1. Therefore, the actuator input is established as follows:
where
Assuming the signal of deception attacks is the nonlinear function that depends on the system state, then the nonlinear function
where
satisfies
where
The challenge of defending against deception attacks is recognizing unknown attack signals. In this article, the NN technique is applied to approximate the deception attacks, thereby compensating for the adverse effect of deception attacks on the switched system. Therefore, the adaptive neural controller can be constructed as follows:
where
Therefore, the estimation
where
where
Let the error
By means of the above analysis, the system is represented as
Remark 1Different from the result[17], the NN technique is employed to estimate and approximate the attack signal rather than constrain it to a bounded signal. The approximation capability of the NN is effectively utilized to estimate the attack signal, counteracting the malicious effects brought about by attacks.
3. MAIN RESULTS
In this section, the sufficient conditions for the uniform and ultimately bounded of the switched system (9) are given subject to deception attacks. Meanwhile, the controller gains are designed.
Theorem 1For given constants
where
Then, the switched system (9) is bounded.
Proof 1Construct the Lyapunov functional method as
where
Calculating the difference of
According to the (7), we can get
Therefore, it is possible to obtain
Combining (16) and (17), it can yield
where
For the free-weighting matrices
where
in which
For any positive constant
Combining (14), (15), (18) and (22), we can obtain
Based on the sufficient condition (11) and the Schur complement of sufficient condition (12), we can deduce that
where
For
in which
Based on (25) and (26), we can get
where
The sufficient condition (10) is satisfied, implying that the switched system (9) is bounded. The proof is finished.
Theorem 2For given constants
where
Then, switched system (9) is bounded. Moreover, the controller gains are designed as
Proof 2Let
According to Theorem 1, we define
In addition, it is easy to see that
Similarly, pre-multiplying and post-multiplying both sides of inequalities in (13) with
4. NUMERICAL EXAMPLES
Consider a discrete-time switched system with time delay (1) as follows:
When
The attack signal is set as
Let the initial conditions be
Figure 2. Trajectories of the attack signal and its estimation signal where
3. Trajectories of the attack signal and its estimation signal where
Figure 4. Trajectories of the attack signal and its estimation signal where
Based on the parameters given above, we have the following simulation results. Figure 5 and Figure 6 depict the state responses
5. CONCLUSIONS
In this article, we have addressed the problem of adaptive neural control for discrete-time switched systems with time delay and deception attacks. To counteract the impact of deception attacks, the NN technique has been employed to approximate the attack signal. An adaptive state controller, which incorporates the attack estimation signal and the approximation error, effectively eliminating malicious influences, has been proposed. Sufficient conditions for the boundedness of the switched system under deception attacks have been attained by using the Lyapunov functional and the DT methods. Additionally, a design strategy for controller gains has been presented. Finally, the feasibility of the proposed method has been demonstrated through a numerical example. Future work will focus on filtering and memory feedback control for hybrid systems.
DECLARATIONS
Authors' contributions
Methodology, Writing - original draft, investigation, and conceptualization: Zhao D
Conceptualization and visualization: Tian Y
Conceptualization, investigation, and visualization: Zhao N
Availability of data and materials
Not applicable.
Financial support and sponsorship
None.
Conflicts of interest
All authors declared that there are no conflicts of interest.
Ethical approval and consent to participate
Not applicable.
Consent for publication
Not applicable.
Copyright
© The Author(s) 2024.
REFERENCES
1. Gans NR, Hutchinson SA. Stable visual servoing through hybrid switched-system control. IEEE Trans Robot 2007;23:530-40.
2. Wang B, Yan J, Cheng J, Zhong S. New criteria of stability analysis for generalized neural networks subject to time-varying delayed signals. Appl Math Comput 2017;314:322-33.
3. Liu L, Liu YJ, Li D, Tong S, Wang Z. Barrier lyapunov function-based adaptive fuzzy FTC for switched systems and its applications to resistance-inductance-capacitance circuit system. IEEE Trans Cybern 2020;50:3491-502.
4. Yang D, Zhao J. Dissipativity for switched LPV systems and its application: a parameter and dwell time-dependent multiple storage functions method. IEEE Trans Syst Man Cybern Syst 2020;50:502-13.
5. Qi W, Park JH, Cheng J, Kao Y, Gao X. Exponential stability and L1-gain analysis for positive time-delay Markovian jump systems with switching transition rates subject to average dwell time. Inf Sci 2018;424:224-34.
6. Cheng J, Huang W, Park JH, Cao J. A hierarchical structure approach to finite-time filter design for fuzzy markov switching systems with deception attacks. IEEE Trans Cybern 2022;52:7254-64.
7. Cheng J, Wang Y, Park JH, Cao J, Shi K. Static output feedback quantized control for fuzzy markovian switching singularly perturbed systems with deception attacks. IEEE Trans Fuzzy Syst 2022;30:1036-47.
8. Ding D, Wang Z, Han QL, Wei G. Security control for discrete-time stochastic nonlinear systems subject to deception attacks. IEEE Trans Syst Man Cybern Syst 2018;48:779-89.
9. Sun HY, Han HG, Sun J, Yang HY, Qiao JF. Security control of sampled-data T-S fuzzy systems subject to cyberattacks and successive packet losses. IEEE Trans Fuzzy Syst 2023;31:1178-88.
10. Gu Z, Yin T, Ding Z. Path tracking control of autonomous vehicles subject to deception attacks via a learning-based event-triggered mechanism. IEEE Trans Neural Netw Learn Syst 2021;32:5644-53.
11. Ao W, Zhang H, Zhao N, Minchala LI. Adaptive neural security control for networked singular systems under deception attacks. IEEE Access 2022;10:33230-37.
12. Xu N, Zhao X, Zong G, Wang Y. Adaptive control design for uncertain switched nonstrict-feedback nonlinear systems to achieve asymptotic tracking performance. Appl Math Comput 2021;408:126344.
13. Chen L, Zhu Y, Ahn CK. Adaptive neural network-based observer design forswitched systems with quantized measurements. IEEE Trans Neural Netw Learn Syst 2023;34:5897-910.
14. Shang H, Zong G, Shi K. Neural-network-based distributed security filtering for networked switched systems. Int J Robust Nonlinear Control 2022;32:2791-804.
15. Gao X, Deng F, Zeng P, Zhang H. Adaptive neural event-triggered control of networked markov jump systems under hybrid cyberattacks. IEEE Trans Neural Netw Learn Syst 2023;34:1502-12.
16. Liu K, Guo H, Zhang Q, Xia Y. Distributed secure filtering for discrete-time systems under round-robin protocol and deception attacks. IEEE Trans Cybern 2020;50:3571-80.
Cite This Article
How to Cite
Zhao, D.; Tian Y.; Zhao N. Adaptive neural control for delayed discrete-time switched systems under deception attacks. Complex. Eng. Syst. 2024, 4, 1. http://dx.doi.org/10.20517/ces.2023.29
Download Citation
Export Citation File:
Type of Import
Tips on Downloading Citation
Citation Manager File Format
Type of Import
Direct Import: When the Direct Import option is selected (the default state), a dialogue box will give you the option to Save or Open the downloaded citation data. Choosing Open will either launch your citation manager or give you a choice of applications with which to use the metadata. The Save option saves the file locally for later use.
Indirect Import: When the Indirect Import option is selected, the metadata is displayed and may be copied and pasted as needed.
Comments
Comments must be written in English. Spam, offensive content, impersonation, and private information will not be permitted. If any comment is reported and identified as inappropriate content by OAE staff, the comment will be removed without notice. If you have any queries or need any help, please contact us at support@oaepublish.com.