Download PDF
Research Article  |  Open Access  |  31 Dec 2023

Adaptive neural control for delayed discrete-time switched systems under deception attacks

Views: 220 |  Downloads: 128 |  Cited:  0
Complex Eng Syst 2024;4:1.
10.20517/ces.2023.29 |  © The Author(s) 2024.
Author Information
Article Notes
Cite This Article

Abstract

This paper focuses on the issue of adaptive neural control for discrete-time switched systems with time delay and deception attacks. Firstly, the switching signal is constrained by the dwell time. Considering that the deception attacks are unknown, the neural network technique is employed to approximate the attack signals. Then, an adaptive state feedback controller is established to compensate for the adverse effects of deception attacks for switched systems. Meanwhile, sufficient conditions for the boundedness of the switched system are given through the Lyapunov functional method, and the controller gains can be obtained by resolving the linear matrix inequality. Finally, the feasibility of the proposed method is illustrated via a numerical example.

Keywords

Switched system, deception attacks, adaptive control

1. INTRODUCTION

Switched systems consist of some subsystems and a switching rule that manages these subsystems. Because of their complexity and practicality, switched systems have been used in a wide variety of applications, such as manipulator robots[1], aircraft control systems[2], circuit systems[3], and so on. The switched systems are featured as the stability of each subsystem is not necessarily related to the stability of the closed-loop system. Therefore, designing a correct switching strategy is very significant. In recent years, the approach to constrain a switching strategy has included dwell time (DT)[4] and average DT (ADT)[5].

With the popularity of networking, network control systems (NCSs) have been studied and applied by scholars. In NCSs, control and feedback signals are transmitted through communication networks between sensors, controllers, and actuators. It has the characteristics of high reliability and low cost. Therefore, combining the advantages of NCSs and switched systems is a valuable issue. Despite the evident advantages of NCSs, there are also unavoidable disadvantages such as communication resources and network security problems. In particular, network security is an important problem considered in the open network environment. At present, network attacks can be mainly divided into deception attacks[6,7] and denial-of-service (DoS) attacks. The purpose of the DoS attacks is to prevent the transmission of data. The deception attacks aim to modify real signals and substitute them with false signals. Therefore, the research on how to compensate for the adverse effects of deception attacks on the system is of extraordinary significance. The discrete nonlinear systems with deception attacks were considered, in which Bernoulli distributions were used to describe the adverse effects of deception attacks on the systems[8]. The Takagi-Sugeno fuzzy systems were considered, in which the deception attacks existed in the feedforward and feedback channels, and were modeled independent Bernoulli processes[9]. The problem of network security and communication resources of vehicles under deception attacks were investigated, in which deception attacks were considered as constrained bounded energy signals[10]. In the above articles, deception attacks are supposed to be known or bounded, which is obviously a limitation. Therefore, the deception attacks considered in this paper involve no assumptions but rather focus on the identification and estimation of unknown attack signals. According to the practical situation, deception attacks have been designed as system state-dependent nonlinear functions. Therefore, the deception attack signals can be identified and estimated by applying neural network (NN) techniques, and the approximation function can be employed to design the controller in this article. Currently, the applications of NN techniques to approximate nonlinear functions have yielded numerous research results[11]. In nonlinear systems, these techniques were employed to approximate nonlinear functions that construct adaptive models to save communication resources and address stabilization problems. For the nonlinear switched systems, error terms were approximated by NN technology and compensated with nonlinear filters to solve the adaptive tracking control problem[12]. The adaptive NN observer problem was studied, in which the NN observer is designed to compensate for quantization errors and accurately estimate the state of the actuator[13]. In addition, some existing research results have approximated deception attack signals with NN techniques. The authors investigated the filtering problem of networked switched systems by approximating deception attacks with these techniques[14]. The event-triggered mechanism was designed based on NN, and the deception attacks were approximated by NN, which solved the security control problem[15]. It should be noted that the NN technique has been widely applied to nonlinear systems, but there is little attention paid to the processing of deception attacks as nonlinear functions, which motivates our research. Therefore, the challenge addressed in this paper is how to employ NN techniques to estimate deception attacks occurring in the controller-actuator (C-A) transmission channel, where deception attacks are considered as nonlinear functions.

In this paper, the control problem of discrete-time switched systems with time delay and deception attacks is considered, and a controller design scheme is proposed by using NN techniques to approximate the deception attack signals. The main contributions are as follows:

(1) Different from bounded deception attacks[16], the deception attacks in this paper are approximated using NN techniques, which can better defend against deception attacks.

(2) The switching signals are constrained by the DT, and a new Lyapunov functional method is constructed to ensure the boundedness of the switched systems.

The rest of this paper is structured as follows. In Section 2, the system description and controller design strategy are proposed. The main results of adaptive neural controllers are introduced in Section 3. A numerical example is applied to demonstrate the feasibility of the method in Section 4. Finally, the conclusion is presented in Section 5.

Notation:$$ \mathbb{N} $$ signifies the set of integers, and the space of $$ n \times m $$ real matrices is represented as $$ \mathbb{R}^{n\times m} $$. In a symmetric block matrix, the symbol $$ * $$ represents the symmetric term. The symbol $$ \left\| \cdot \right\| $$ stands for the Euclidean vector norm. The $$ {\left\| \cdot \right\|_F} $$ is Frobenius norm.

2. PROBLEM FORMULATION AND PRELIMINARIES

2.1. System description

Consider a class of discrete-time switched systems with time delay given as

$$ \begin{equation} \left\{ {\begin{array}{*{20}{l}} {x(k + 1) = {A_{\partial (k)}}x(k) + A_{\partial (k)}^lx(k - l) + {B_{\partial (k)}}u(k), }\\ {x(k) = \wp (k), \; \; \; - l \le k \le 0, } \end{array}} \right. \end{equation} $$

where $$ x(k) \in {\mathbb{R}^{{n}}} $$ and $$ u(k) \in {\mathbb{R}^{{p}}} $$ denote the state vector and the control input, respectively. $$ l > 0 $$ is the time delay of the switched system, $$ \wp (k) $$ is the initial condition for $$ x(k) $$. $$ \partial \left[ {0, \infty } \right) \to {\cal K} = \left\{ {1, 2, \cdots , j} \right\} $$ is the switching signal, in which $$ j \in\mathbb{N} $$ is the quantity of subsystems. $$ {A_j} $$, $$ A_{j}^l $$ and $$ {B_j} $$ are known constant matrices with appropriate dimensions.

Let the switching instants be $$ \{ {k_d}, d \in{\mathbb{N}} \} $$, then the time interval between two adjacent switching instants is depicted as $$ {k_{d + 1}} - {k_d} \ge \varphi $$, where $$ \varphi $$ is the minimum DT.

2.2. Adaptive neural state feedback controller

The C-A transmission channel is influenced by deception attacks, and the authenticity of the data transmission is modified, as shown in Figure 1. Therefore, the actuator input is established as follows:

$$ u(k) = \tilde u(k) + h(x(k)), $$

Adaptive neural control for delayed discrete-time switched systems under deception attacks

Figure 1. Framework of a switched system under deception attacks.

where $$ \tilde u(k) $$ denotes the control signal, and $$ h(x(k)) $$ indicates the signal of deception attacks.

Assuming the signal of deception attacks is the nonlinear function that depends on the system state, then the nonlinear function $$ h(x(k)) $$ is expressed as

$$ h(x(k)) = {M^T}L(x(k)) + \gamma(x(k)), \; x(k) \in \Lambda \subset {\mathbb{R}^{{n}}}, $$

where $$ \Lambda $$ expresses a compact set, $$ M \in {\mathbb{R}^{m \times p}} $$ is a weight matrix in which $$ m $$ denotes the number of nodes, and $$ \gamma(x(k)) $$ stands for the approximation error with $$ \left\| {\gamma (x(k))} \right\| \le \bar \gamma \left\| {x(k)} \right\| $$. Then, the basis function

$$ L(x(k)) = {[\begin{array}{*{20}{c}} {{\ell _1}(x(k))}&{{\ell _2}(x(k))}& \cdots &{{\ell _m}(x(k))} \end{array}]^T}, $$

satisfies $$ \left\| {L( \cdot )} \right\| \le {L_{\max }} $$ in which $$ {L_{\max }} $$ is a positive constant. $$ {\ell _i}(x(k)) $$ has the form as follows:

$$ {\ell _i}(x(k)) = \exp \left( { - \frac{{{{\left\| {x(k) - {f_i}} \right\|}^2}}}{{{\upsilon_i}}}} \right), $$

where $$ {\upsilon_i } $$ and $$ {f_i} $$ denote the width and center of function $$ {\ell _i}(x(k)) $$, respectively. And $$ {f_i} = {[{{f_{i1}}}\; \; {{f_{i2}}}\; \; \cdots \; \; {{f_{in}}}]^T} $$.

The challenge of defending against deception attacks is recognizing unknown attack signals. In this article, the NN technique is applied to approximate the deception attacks, thereby compensating for the adverse effect of deception attacks on the switched system. Therefore, the adaptive neural controller can be constructed as follows:

$$ \tilde u(k) = {K_{\partial (k)}}x(k) - \hat h(x(k)), $$

where $$ {K_{\partial (k)}} $$ is the controller gains to be determined, and $$ \hat h(x(k)) $$ is the estimation of the deception attack signal $$ h(x(k)) $$.

Therefore, the estimation $$ \hat h(x(k)) $$ of the deception attack signal $$ h(x(k)) $$ is constructed as

$$\hat h(x(k)) = {{\hat M}^T}(k)L(x(k)), $$

where $$ {\hat M}(k) $$ is the estimation of $$ M $$. Then, $$ {\hat M}(k) $$ is designed as

$$ \hat M(k + 1) = - \lambda \hat M(k)+ \hat M(k) - \omega \eta (k){x^T}(k){S^T}, $$

where $$ \lambda > 0, \omega > 0 $$ are two constants, $$ S \in {\mathbb{R}^{n \times p}} $$ is an adjustment parameter and

$$ \eta(k)=L(x(k)) /\left(1+\|L(x(k))\|^2\|S x(k)\|^2\right) . $$

Let the error $$ \tilde M(k) = \hat M(k) - M $$, then we have

$$\tilde M(k + 1) = - \lambda \hat M(k) + \tilde M(k) - \omega \eta (k){x^T}(k){S^T}. $$

By means of the above analysis, the system is represented as

$$ \begin{equation} \left\{ {\begin{array}{*{20}{l}} {x(k + 1) = {A_{\partial (k)}}x(k) + A_{\partial (k)}^lx(k - l) + {B_{\partial (k)}}{K_{\partial (k)}}x(k) - {B_{\partial (k)}}{\tilde M^T}(k)L(x(k)) + {B_{\partial (k)}}\gamma (x(k))}, \\ {x(k) = \wp (k), \; \; \; - l \le k \le 0.} \end{array}} \right. \end{equation} $$

Remark 1Different from the result[17], the NN technique is employed to estimate and approximate the attack signal rather than constrain it to a bounded signal. The approximation capability of the NN is effectively utilized to estimate the attack signal, counteracting the malicious effects brought about by attacks.

3. MAIN RESULTS

In this section, the sufficient conditions for the uniform and ultimately bounded of the switched system (9) are given subject to deception attacks. Meanwhile, the controller gains are designed.

Theorem 1For given constants $$ 0 < \varpi < 1 $$, $$ \lambda> 0 $$, $$ h > 0 $$, $$ \tau > 0 $$, $$ \varsigma> 0 $$, $$ \bar \gamma> 0 $$ and $$ \kappa > 1 $$, if there exist matrices $$ {P_j}\in {\mathbb{R}^{n \times n}} > 0 $$, $$ {Q_j}\in {\mathbb{R}^{n \times n}} > 0 $$, $$ {F_{j1}}\in {\mathbb{R}^{n \times n}} > 0 $$, $$ {F_{j2}} \in {\mathbb{R}^{n \times n}} > 0 $$, such that

$$ \varpi {\kappa ^{\frac{1}{\varphi }}} < 1, $$

$$ \vartheta < 0, $$

$$ \begin{equation} \left[ {\begin{array}{*{20}{c}} {{\Psi _{j1}}}&{{\Psi _{j2}}}\\ *&{ - I_p} \end{array}} \right] < 0, \end{equation} $$

$$ {{P_j} \le \kappa {P_i}, }\; \; {{Q_j} \le \kappa {Q_i}, } $$

where

$$ \begin{align*} {\Psi _{j1}} =& e_1^T({Q_j}-\varpi{P_j}){e_1} + e_2^T{P_j}{e_2}- e_3^T{\varpi ^l}{Q_j}{e_3} - \tau e_4^T{e_4} +(e_1^T{F_{j1}} + e_2^T{F_{j2}})(F_{j1}{e_1} + F_{j2}{e_2}) \\& + {\rm{He\{ }}[e_1^T{F_{j1}} + e_2^T{F_{j2}}][({A_j} + {B_j}{K_j}){e_1} - {e_2} + A_j^l{e_3} - {B_j}{e_4}]{\rm{\} }}, \\ {\Psi _{j2}} =& {\bar \gamma }e_1^TB_j, \\ {e_1} =& \left[ {\begin{array}{*{20}{c}} {{I_n}}&{{0_{n \times n}}}&{{0_{n \times n}}}&{{0_{n \times m}}} \end{array}} \right], \\ {e_2} = &\left[ {\begin{array}{*{20}{c}} {{0_{n \times n}}}&{{I_n}}&{{0_{n \times n}}}&{{0_{n \times m}}} \end{array}} \right], \\ {e_3} =& \left[ {\begin{array}{*{20}{c}} {{0_{n \times n}}}&{{0_{n \times n}}}&{{I_n}}&{{0_{n \times m}}} \end{array}} \right], \\ {e_4} = &\left[ {\begin{array}{*{20}{c}} {{0_{m \times n}}}&{{0_{m \times n}}}&{{0_{m \times n}}}&{{I_m}} \end{array}} \right], \\ \vartheta =& h(1 - \varpi + \frac{1}{{4\varsigma }} - \lambda ) + \tau {{L^2_{\max }}}, \end{align*} $$

Then, the switched system (9) is bounded.

Proof 1Construct the Lyapunov functional method as

$$ {V_{\partial (k)}}(k) = V_{\partial (k)}^1(k)+ h{V^2}(k), $$

where $$ V_{\partial (k)}^1(k) = {x^T}(k){P_{\partial (k)}}x(k)+ \sum\limits_{d = k - l}^{k - 1} {{\varpi ^{ (k -d- 1)}}{x^T}(d){Q_{\partial (k)}}x(d)} $$ and $$ {V^2}(k) = {\rm{Tr\{ }}{{\tilde M}^T}(k)\tilde M(k){\rm{\} }} $$. For convenience, let $$ V_{\partial (k)}^1(k) = V_{j}^1(k) $$. Then the difference of $$ V_j^1(k) $$ along the trajectories of the switched system (9) can be obtained as

$$ \begin{align} \begin{split} V_j^1(k + 1) - \varpi V_j^1(k) =& {x^T}(k + 1){P_j}x(k + 1) + \sum\limits_{d = k + 1 - l}^k {{\varpi ^{k - d}}{x^T}(d){Q_{j}}x(d)} \\& - \varpi {x^T}(k){P_j}x(k)- \varpi \sum\limits_{d = k - l}^{k - 1} {{\varpi ^{k - d - 1}}{x^T}(d){Q_{j}}x(d)} \\ = &{x^T}(k)({Q_j} - \varpi {P_j})x(k)+{x^T}(k + 1){P_j}x(k + 1) - {\varpi ^l}{x^T}(k - l){Q_j}x(k - l). \end{split} \end{align} $$

Calculating the difference of $$ {V^2}(k) $$ along (8), we have

$$ \begin{align} \begin{split} V^2(k + 1) - V^2(k) =& {\rm{Tr\{ }}{{\tilde M}^T}(k + 1)\tilde M(k + 1){\rm{\} }} - {\rm{Tr\{ }}{{\tilde M}^T}(k)\tilde M(k){\rm{\} }}\\ =& {\rm{Tr\{ }}{\lambda ^2}{{\hat M}^T}(k)\hat M(k) - 2\lambda {{\hat M}^T}(k)\tilde M(k) + 2\lambda \omega \hat M(k)\eta (k)Sx(k) - 2\omega \tilde M(k)\eta (k)Sx(k){\rm{\} }}\\ &{\rm{ + }}{\omega ^2}{\left\| {\eta (k)} \right\|^2}{\left\| {Sx(k)} \right\|^2}. \end{split} \end{align} $$

According to the (7), we can get

$$ {\left\| {\eta (k)} \right\|^2}{\left\| {Sx(k)} \right\|^2} \le \frac{1}{4}.$$

Therefore, it is possible to obtain

$$ \begin{align} \begin{split} &{\rm{Tr\{ }}2\lambda \omega \hat M(k)\eta (k)Sx(k){\rm{\} }} \le \lambda {\rm{Tr\{ }}{{\hat M}^T}(k)\hat M(k){\rm{\} + }}\frac{{\lambda {\omega ^2}}}{4}, \\ &- {\rm{Tr\{ }}2\omega \tilde M(k)\eta (k)Sx(k){\rm{\} }} \le \frac{{{\rm{Tr\{ }}{{\tilde M}^T}(k)\tilde M(k){\rm{\} }}}}{{4\varsigma }} + \varsigma {\omega ^2}, \\ &{\rm{Tr\{ }} - 2\lambda {{\hat M}^T}(k)\tilde M(k){\rm{\} = Tr\{ }}\lambda {M^T}M - \lambda {{\tilde M}^T}(k)\tilde M(k) - \lambda {{\hat M}^T}(k)\hat M(k)\}. \end{split} \end{align} $$

Combining (16) and (17), it can yield

$$ \Delta {V^2}(k) \le (\frac{1}{{4\varsigma }} - \lambda )\left\| {\tilde M(k)} \right\|_F^2 + \delta, $$

where $$ \delta = \lambda \left\| M \right\|_F^2 + (\varsigma + \frac{{1 + \lambda }}{4}){\omega ^2} $$.

For the free-weighting matrices $$ {F_{j1}} $$ and $$ {F_{j2}} $$, we can deduce that

$$ \begin{align} \begin{split} 0=& 2[{x^T}(k){F_{j1}} + {x^T}(k + 1){F_{j2}}]\\ &\times [ - x(k + 1) + {A_j}x(k) + A_j^lx(k - l) + {B_j}{K_j}x(k) - {B_j}{{\tilde M}^T}(k)L(x(k)) + {B_j}\gamma (x(k))]\\ =& 2{\xi ^T}(k)[e_1^T{F_{j1}} + e_2^T{F_{j2}}][({A_j} + {B_j}{K_j}){e_1} - {e_2} + A_j^l{e_3} - {B_j}{e_4}]\xi (k)\\ &+ 2{\xi ^T}(k)[e_1^T{F_{j1}} + e_2^T{F_{j2}}]{B_j}\gamma (x(k)), \end{split} \end{align} $$

where $$ \xi (k) = {[{x^T}(k), {x^T}(k + 1), {x^T}(k - l), {L^T}(x(k))\tilde M(k)]^T} $$, we have

$$ \begin{align} \begin{split} 0 =& {\xi ^T}(k){\rm{He\{ }}[e_1^T{F_{j1}} + e_2^T{F_{j2}}][({A_j} + {B_j}{K_j}){e_1} - {e_2} + A_j^l{e_3} - {B_j}{e_4}]{\rm{\} }}\xi (k)\\ &+ 2{\xi ^T}(k)[e_1^T{F_{j1}} + e_2^T{F_{j2}}]{B_j}\gamma (x(k)), \end{split} \end{align} $$

in which

$$ \begin{align} \begin{split} 2{\xi ^T}(k)[e_1^T{F_{j1}} + e_2^T{F_{j2}}]{B_j}\gamma (x(k)) \le& {\xi ^T}(k)(e_1^T{F_{j1}} + e_2^T{F_{j2}})(F_{j1}{e_1} + F_{j2}{e_2})\xi (k) \\&+ {\xi ^T}(k)({\bar \gamma ^2}e_1^T{B_j}B_j^T{e_1})\xi (k). \end{split} \end{align} $$

For any positive constant $$ \tau $$, one obtains

$$ - \tau {L^T}(x(k))\tilde M(k){\tilde M^T}(k)L(x(k)) + \tau L_{\max }^2{\rm{Tr\{ }}{\tilde M^T}(k)\tilde M(k){\rm{\} }} \ge 0. $$

Combining (14), (15), (18) and (22), we can obtain

$$V_j^1(k + 1) - \varpi V_j^1(k) +h({V^2}(k+1)-\varpi{V^2}(k)) \le {\xi ^T}(k)[{\Psi _{j1}} + \Psi _{j2}^T{\Psi _{j2}}]\xi (k) +\vartheta \left\| {\tilde M(k)} \right\|_F^2+ {h \delta } $$

Based on the sufficient condition (11) and the Schur complement of sufficient condition (12), we can deduce that

$$ V(k+1) \le \varpi V(k) + {\bar \delta }, $$

where $$ {\bar \delta }={h \delta } $$.

For $$ k \in \left[ {{k_d}, {k_{d + 1}}} \right] $$, according to condition (13), we can obtain

$$ \begin{align} \begin{split} V(k) \le& {\varpi ^{k - {k_d}}}V({k_d}) +{\bar \delta} [ 1 + \varpi + \cdots { \varpi ^{k - {k_d} - 1}}], \\ \le& \kappa { \varpi ^{k - {k_d}}}V(k_d^ - ) +{\bar \delta} [1 + \varpi + \cdots {\varpi ^{k - {k_d} - 1}}], \\ \le& \kappa { \varpi ^{k - {k_{d-1}}}}V({k_{d-1}} ) + {\bar \delta}[1 + \varpi + \cdots { \varpi ^{k - {k_d} - 1}}] \\ &+ \kappa{\bar \delta}[ { \varpi^{k - {k_d}}} + { \varpi ^{k - {k_d} + 1}} + \cdots + { \varpi ^{k - {k_{d-1}} + 1}}], \\ \vdots \\ \le& {\kappa ^{D(0, k)}}{\varpi ^k}V(0) +{\bar \delta}[ 1 + \varpi + \cdots { \varpi ^{k - {k_d} - 1}}]\\ &+ \kappa{\bar \delta}[ {\varpi ^{k - {k_d}}} +{\varpi ^{k - {k_d} + 1}} + \cdots + {\Omega ^{k - {k_d} - 1}}] \\ &+ \cdots + {\kappa ^{D(0, k)}}{\bar \delta}[{\varpi ^{k - {k_1}}} + { \varpi ^{k - {k_1} + 1}} + \cdots +{\varpi ^{k - {k_0} - 1}}], \\ \le& {\kappa ^{D(0, k)}}{\varpi ^k}V(0) + [{{\bar \mu }_0} + {{\bar \mu }_1} + \cdots {{\bar \mu }_{D(0, k)}}], \end{split} \end{align} $$

in which

$$ \begin{align} \begin{split} {{\bar \mu }_0} =& \bar \delta [1 + \varpi + \cdots { \varpi ^{k - {k_d} - 1}}] = \frac{{\bar \delta (1 - {{\varpi }^{k - {k_d}}})}}{{1 - \varpi }} \le \frac{{\bar \delta }}{{1 - \varpi }}, \\ {{\bar \mu }_1} =& \kappa \bar \delta [{\varpi ^{k - {k_d}}} + {\varpi ^{k - {k_d} + 1}} + \cdots + { \varpi ^{k - {k_{d - 1}} - 1}}] \le \frac{{\kappa \bar \delta {{\varpi }^{k - {k_d}}}(1 - {{\varpi }^{{k_d} - {k_{d - 1}}}})}}{{1 - \varpi }} \le \frac{{\kappa \bar \delta {{\Omega }^\varphi }}}{{1 - \varpi}}, \\ {{\bar \mu }_2} =& {\kappa ^2}\bar \delta [{ \varpi ^{k - {k_{d - 1}}}} + { \varpi ^{k - {k_{d - 1}} + 1}} + \cdots + {\varpi ^{k - {k_{d - 2}} - 1}}] \le\frac{{{\kappa ^2}\bar \delta {{ \varpi }^{k - {k_{d - 1}}}}(1 - {{\varpi }^{{k_{d - 1}} - {k_{d - 2}}}})}}{{1 - \varpi }} \\ \le& \frac{{{\kappa ^2}\bar \delta {{(1 - \varpi )}^{k - {k_{d - 1}}}}}}{{1 - \varpi }} \le \frac{{{\kappa ^2}\bar \delta {{(1 - \varpi )}^{2\varphi }}}}{{1 - \varpi }}, \\ \vdots \\ {{\bar \mu }_{D(0, k)}} =& {\kappa ^{D(0, k)}}\bar \delta [{ \varpi ^{k - {k_1}}} + {\varpi ^{k - {k_1} + 1}} + \cdots + { \varpi ^{k - {k_0} - 1}}] \le \frac{{{\kappa ^{D(0, k)}}\bar \delta {{\varpi }^{k - {k_1}}}(1 - {{\varpi }^{k - {k_1}}})}}{{1 - \varpi}} \\ \le& \frac{{{\kappa ^{\frac{k}{\varphi }}}\bar \delta {{(1 -\varpi )}^{k - {k_1}}}}}{{1 - \varpi }} \le \frac{{{\kappa ^d}\bar \delta {{(1 - \varpi )}^{d\varphi }}}}{{1 - \varpi}}. \end{split} \end{align} $$

Based on (25) and (26), we can get

$$V(k) \le {(\varpi {\kappa ^{\frac{1}{\varphi }}} )^k}V(0) + \tilde \delta, $$

where $$ \tilde \delta = \sum\limits_{m = 0}^d {\frac{{{\kappa ^m}\bar \delta {{(1 - \varpi )}^{m\varphi }}}}{1 - \varpi }} $$.

The sufficient condition (10) is satisfied, implying that the switched system (9) is bounded. The proof is finished.

Theorem 2For given constants $$ 0 < \varpi < 1 $$, $$ \lambda> 0 $$, $$ h > 0 $$, $$ \tau > 0 $$, $$ \varsigma> 0 $$, $$ {\alpha_{j}}> 0 $$, $$ {\varepsilon _p}> 0 $$, $$ {\varepsilon _q}> 0 $$, $$ \bar \gamma> 0 $$ and $$ \kappa > 1 $$, if there exist matrices $$ {\tilde P_j}\in {\mathbb{R}^{n \times n}} > 0 $$, $$ {\tilde Q_j} \in {\mathbb{R}^{n \times n}} > 0 $$, $$ {Z_{j1}} \in {\mathbb{R}^{n \times n}} > 0 $$, $$ {Y_{j}} \in {\mathbb{R}^{n \times n}} $$, such that

$$ \begin{equation} \left[ {\begin{array}{*{20}{c}} {{{\tilde \Psi }_1}}&{{{\tilde \Psi }_2}}\\ *&{ - I_p} \end{array}} \right] < 0, \end{equation} $$

$$ \begin{equation} \left[ {\begin{array}{*{20}{l}} { - \kappa {{\tilde P}_i}}&{{Z_{i1}}}\\ *&{{{\bar P}_j}} \end{array}} \right] \le 0, \; \; \left[ {\begin{array}{*{20}{l}} { - \kappa {{\tilde Q}_i}}&{{Z_{i1}}}\\ *&{{{\bar Q}_j}} \end{array}} \right] \le 0, \end{equation} $$

where

$$ \begin{align*} {{\tilde \Psi }_1} =& e_1^T({{\tilde Q}_j}-\varpi{{\tilde P}_j}){e_1} + e_2^T{{\tilde P}_j}{e_2}-e_3^T{\varpi ^l}{{\tilde Q}_j}{e_3} - \tau e_4^T{e_4} + (e_1^T +\alpha e_2^T)({e_1} + \alpha{e_2}) \\& +{\rm{He}}\{ [e_1^T + \alpha e_2^T][({A_j} + {B_j}{K_j}){Z_{j1}}{e_1} - {Z_{j1}}{e_2} + A_j^l{Z_{j1}}{e_3} - {B_j}{e_4}]\} , \\ {{\tilde \Psi }_2} =& \bar \gamma e_1^TZ_{j1}B_j, \\ {{\bar P}_j} = &\varepsilon _p^2{{\tilde P}_j} - 2{\varepsilon _p}{Z_{j1}}, \\ {{\bar Q}_j} = &\varepsilon _q^2{{\tilde Q}_j} - 2{\varepsilon _q}{Z_{j1}}, \end{align*} $$

Then, switched system (9) is bounded. Moreover, the controller gains are designed as

$$ {K_j} = {Y_j}Z_{j1}^{ - 1}.$$

Proof 2Let

$$ \begin{equation*} \left\{ {\begin{array}{*{20}{l}} {{Z_{j1}} = F_{j1}^{ - 1}, }\\ {{F_{j2}} = {\alpha_{j}} {F_{j1}}.}\\ \end{array}} \right. \end{equation*} $$

According to Theorem 1, we define $$ \Phi _j = {[Z_{j1}, Z_{j1}, Z_{j1}, I_p, I_p]} $$, pre-multiplying and post-multiplying both sides of inequality (12) with $$ {\Phi_{j}} $$. We assume $$ {{{\tilde P}_j} = Z_{j1}{P_j}{Z_{j1}}} $$, $$ {{{\tilde Q}_j} = Z_{j1}{Q_j}{Z_{j1}}} $$.

In addition, it is easy to see that

$$ \begin{equation} \begin{array}{l} - P_j^{ - 1} = - {Z_{j1}}\tilde P_j^{ - 1}{Z_{j1}} \le \varepsilon _p^2{{\tilde P}_j} - 2{\varepsilon _p}{Z_{j1}}, \\ - Q_j^{ - 1} = - {Z_{j1}}\tilde Q_j^{ - 1}{Z_{j1}} \le \varepsilon _q^2{{\tilde Q}_j} - 2{\varepsilon _q}{Z_{j1}}. \end{array} \end{equation} $$

Similarly, pre-multiplying and post-multiplying both sides of inequalities in (13) with $$ {Z_{j1}} $$ and using the Schur complement lemma, then (29) is ensured by (13) holds. The inequality (12) can be guaranteed by (28). This proof is completed.

4. NUMERICAL EXAMPLES

Consider a discrete-time switched system with time delay (1) as follows:

$$ \begin{align*} \begin{split} {A_1} =& \left[ {\begin{array}{*{20}{c}} { - 0.2}&1\\ {0.1}&{0.6} \end{array}} \right], \; A_1^l = \left[ {\begin{array}{*{20}{c}} {0.01}&{0.3}\\ {0.1}&0 \end{array}} \right], \; {B_1} = {\left[ {\begin{array}{*{20}{c}} {0.2}&0 \end{array}} \right]^T}, \\ {A_2} =& \left[ {\begin{array}{*{20}{c}} { - 0.2}&{0.5}\\ { - 0.8}&{0.8} \end{array}} \right], \; A_2^l = \left[ {\begin{array}{*{20}{c}} {0.01}&0\\ {0.1}&{0.3} \end{array}} \right], \; {B_2} = {\left[ {\begin{array}{*{20}{c}} {0.2}&{0.1} \end{array}} \right]^T}. \end{split} \end{align*} $$

When $$ l = 1 $$, the parameters are given as $$ \bar \gamma = 1.5 $$, $$ {\varepsilon _q}=0.4 $$, $$ {\varepsilon _q}=0.5 $$, $$ {\alpha _1} = 1.8 $$, $$ {\alpha _2} = 2 $$, $$ \varpi = 0.9 $$, $$ \kappa = 1.8 $$, $$ \varphi=6 $$, $$ \tau=0.1 $$, $$ {{L^2_{\max }}}=81 $$, $$ \lambda = 0.6 $$, $$ \varsigma=100 $$, $$ h=1400 $$. Then, $$ \vartheta=-40.4 $$ and $$ \varpi {\kappa ^{\frac{1}{\varphi }}}=0.9926 $$ can be obtained through calculations, so conditions (10) and (11) in Theorem 1 are satisfied. By solving Theorem 2, we obtain

$$ {K_1} = \left[ {\begin{array}{*{20}{c}} {{\rm{1}}{\rm{.7615 }}}&{{\rm{ - 5}}{\rm{.4597}}} \end{array}} \right], \; \; {K_2} = \left[ {\begin{array}{*{20}{c}} {{\rm{3}}{\rm{.8378}}}&{{\rm{ - 3}}{\rm{.9402}}} \end{array}} \right].$$

The attack signal is set as $$ h(x(k)) = \sqrt {x_1^2(k) + x_2^2(k)}- 6\sin ({x_1}(k)) $$. The NN technique applied to approximate the attack signal $$ h(x(k)) $$ consists of 81 nodes whose centers $$ {f_i} $$ are evenly spaced in $$ \underbrace {[ - 6, 6] \times \cdots [ - 6, 6]}_{81} $$ and the widths are $$ {\upsilon _i} = 1 $$ with $$ i \in \langle 81\rangle $$.

Let the initial conditions be $$ x(0) = {[- 0.4\; \; 0.4]^T} $$, $$ \hat M(0) = {0_{81 \times 1}} $$ and $$ W = [ { - 1}\; \; 1] $$. The parameters $$ \lambda $$ and $$ \omega $$ play an important role in the updated law of $$ \hat{M} $$. To demonstrate the impact of parameters on performance, we introduce a performance metric $$ \tilde h $$, where $$ \tilde h = \sum\limits_{k = 1}^{60} {\left| {h(x(k)) - \hat h(x(k))} \right|} $$. Therefore, it is necessary to choose appropriate values for $$ \lambda $$ and $$ \omega $$. Trajectories for the attack signal $$ h(x(k)) $$ and its estimation $$ \hat{h}(x(k)) $$ at $$ \lambda=0.5 $$ and $$ \omega=0.7 $$ are depicted in Figure 2, while the corresponding paths at $$ \lambda=0.5 $$ and $$ \omega=0.8 $$ are shown in Figure 3. Additionally, trajectories for $$ \lambda=0.6 $$ and $$ \omega=0.8 $$ are presented in Figure 4. From Table 1, it can be observed that a smaller value of $$ \tilde h $$ corresponds to better parameter convergence. Then, the parameters are selected as $$ \lambda = 0.6 $$ and $$ \omega = 0.8 $$.

Adaptive neural control for delayed discrete-time switched systems under deception attacks

Figure 2. Trajectories of the attack signal and its estimation signal where $$\lambda=0.5$$ and $$ \omega=0.7$$.

Adaptive neural control for delayed discrete-time switched systems under deception attacks

3. Trajectories of the attack signal and its estimation signal where $$\lambda=0.5$$ and $$\omega=0.8$$.

Adaptive neural control for delayed discrete-time switched systems under deception attacks

Figure 4. Trajectories of the attack signal and its estimation signal where $$\lambda=0.6$$ and $$\omega=0.8$$.

Table 1

$$ \tilde h $$ for different $$ (\lambda, \omega) $$

$$ (\lambda , \omega ) $$$$ (0.5, 0.8) $$$$ (0.5, 0.7) $$$$ (0.6, 0.8) $$
$$ \tilde h $$$$ 7.3253 $$$$ 8.2059 $$$$ 6.9905 $$

Based on the parameters given above, we have the following simulation results. Figure 5 and Figure 6 depict the state responses $$ x(k) $$ and the control signal $$ u(k) $$, which indicate the ability of the controller to resist the adverse effects of deception attacks to bring the system to stability. The response of adaptive parameter $$ {\left\| {\hat M(k)} \right\|_F} $$ is illustrated in Figure 7. The switching modes of the switched system are shown in Figure 8. Therefore, the feasibility of the proposed method is demonstrated.

Adaptive neural control for delayed discrete-time switched systems under deception attacks

Figure 5. The state responses $$x(k)$$.

Adaptive neural control for delayed discrete-time switched systems under deception attacks

Figure 6. The control signal $$u(k)$$.

Adaptive neural control for delayed discrete-time switched systems under deception attacks

Figure 7. The responses of adaptive parameter $${\left\| {\hat M(k)} \right\|_F}$$.

Adaptive neural control for delayed discrete-time switched systems under deception attacks

Figure 8. The switching modes of the switched system.

5. CONCLUSIONS

In this article, we have addressed the problem of adaptive neural control for discrete-time switched systems with time delay and deception attacks. To counteract the impact of deception attacks, the NN technique has been employed to approximate the attack signal. An adaptive state controller, which incorporates the attack estimation signal and the approximation error, effectively eliminating malicious influences, has been proposed. Sufficient conditions for the boundedness of the switched system under deception attacks have been attained by using the Lyapunov functional and the DT methods. Additionally, a design strategy for controller gains has been presented. Finally, the feasibility of the proposed method has been demonstrated through a numerical example. Future work will focus on filtering and memory feedback control for hybrid systems.

DECLARATIONS

Authors' contributions

Methodology, Writing - original draft, investigation, and conceptualization: Zhao D

Conceptualization and visualization: Tian Y

Conceptualization, investigation, and visualization: Zhao N

Availability of data and materials

Not applicable.

Financial support and sponsorship

None.

Conflicts of interest

All authors declared that there are no conflicts of interest.

Ethical approval and consent to participate

Not applicable.

Consent for publication

Not applicable.

Copyright

© The Author(s) 2024.

REFERENCES

1. Gans NR, Hutchinson SA. Stable visual servoing through hybrid switched-system control. IEEE Trans Robot 2007;23:530-40.

2. Wang B, Yan J, Cheng J, Zhong S. New criteria of stability analysis for generalized neural networks subject to time-varying delayed signals. Appl Math Comput 2017;314:322-33.

3. Liu L, Liu YJ, Li D, Tong S, Wang Z. Barrier lyapunov function-based adaptive fuzzy FTC for switched systems and its applications to resistance-inductance-capacitance circuit system. IEEE Trans Cybern 2020;50:3491-502.

4. Yang D, Zhao J. Dissipativity for switched LPV systems and its application: a parameter and dwell time-dependent multiple storage functions method. IEEE Trans Syst Man Cybern Syst 2020;50:502-13.

5. Qi W, Park JH, Cheng J, Kao Y, Gao X. Exponential stability and L1-gain analysis for positive time-delay Markovian jump systems with switching transition rates subject to average dwell time. Inf Sci 2018;424:224-34.

6. Cheng J, Huang W, Park JH, Cao J. A hierarchical structure approach to finite-time filter design for fuzzy markov switching systems with deception attacks. IEEE Trans Cybern 2022;52:7254-64.

7. Cheng J, Wang Y, Park JH, Cao J, Shi K. Static output feedback quantized control for fuzzy markovian switching singularly perturbed systems with deception attacks. IEEE Trans Fuzzy Syst 2022;30:1036-47.

8. Ding D, Wang Z, Han QL, Wei G. Security control for discrete-time stochastic nonlinear systems subject to deception attacks. IEEE Trans Syst Man Cybern Syst 2018;48:779-89.

9. Sun HY, Han HG, Sun J, Yang HY, Qiao JF. Security control of sampled-data T-S fuzzy systems subject to cyberattacks and successive packet losses. IEEE Trans Fuzzy Syst 2023;31:1178-88.

10. Gu Z, Yin T, Ding Z. Path tracking control of autonomous vehicles subject to deception attacks via a learning-based event-triggered mechanism. IEEE Trans Neural Netw Learn Syst 2021;32:5644-53.

11. Ao W, Zhang H, Zhao N, Minchala LI. Adaptive neural security control for networked singular systems under deception attacks. IEEE Access 2022;10:33230-37.

12. Xu N, Zhao X, Zong G, Wang Y. Adaptive control design for uncertain switched nonstrict-feedback nonlinear systems to achieve asymptotic tracking performance. Appl Math Comput 2021;408:126344.

13. Chen L, Zhu Y, Ahn CK. Adaptive neural network-based observer design forswitched systems with quantized measurements. IEEE Trans Neural Netw Learn Syst 2023;34:5897-910.

14. Shang H, Zong G, Shi K. Neural-network-based distributed security filtering for networked switched systems. Int J Robust Nonlinear Control 2022;32:2791-804.

15. Gao X, Deng F, Zeng P, Zhang H. Adaptive neural event-triggered control of networked markov jump systems under hybrid cyberattacks. IEEE Trans Neural Netw Learn Syst 2023;34:1502-12.

16. Liu K, Guo H, Zhang Q, Xia Y. Distributed secure filtering for discrete-time systems under round-robin protocol and deception attacks. IEEE Trans Cybern 2020;50:3571-80.

17. Zhang L, Guo G. Observer-based adaptive event-triggered sliding mode control of saturated nonlinear networked systems with cyber-attacks. Inf Sci 2021;543:180-201.

Cite This Article

Research Article
Open Access
Adaptive neural control for delayed discrete-time switched systems under deception attacks
Dongke Zhao, ... Ning Zhao

How to Cite

Zhao, D.; Tian Y.; Zhao N. Adaptive neural control for delayed discrete-time switched systems under deception attacks. Complex. Eng. Syst. 2024, 4, 1. http://dx.doi.org/10.20517/ces.2023.29

Download Citation

If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click on download.

Export Citation File:

Type of Import

Tips on Downloading Citation

This feature enables you to download the bibliographic information (also called citation data, header data, or metadata) for the articles on our site.

Citation Manager File Format

Use the radio buttons to choose how to format the bibliographic data you're harvesting. Several citation manager formats are available, including EndNote and BibTex.

Type of Import

If you have citation management software installed on your computer your Web browser should be able to import metadata directly into your reference database.

Direct Import: When the Direct Import option is selected (the default state), a dialogue box will give you the option to Save or Open the downloaded citation data. Choosing Open will either launch your citation manager or give you a choice of applications with which to use the metadata. The Save option saves the file locally for later use.

Indirect Import: When the Indirect Import option is selected, the metadata is displayed and may be copied and pasted as needed.

About This Article

© The Author(s) 2024. Open Access This article is licensed under a Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, sharing, adaptation, distribution and reproduction in any medium or format, for any purpose, even commercially, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Data & Comments

Data

Views
220
Downloads
128
Citations
0
Comments
0
15

Comments

Comments must be written in English. Spam, offensive content, impersonation, and private information will not be permitted. If any comment is reported and identified as inappropriate content by OAE staff, the comment will be removed without notice. If you have any queries or need any help, please contact us at support@oaepublish.com.

0
Download PDF
Share This Article
Scan the QR code for reading!
See Updates
Contents
Figures
Related
Complex Engineering Systems
ISSN 2770-6249 (Online)

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/