Next Article in Journal
Integrated Development of a Topology-Optimized Compliant Mechanism for Precise Positioning
Next Article in Special Issue
Fault-Tolerant Control of Linear Systems with Unmatched Uncertainties Based on Integral Sliding Mode Technique
Previous Article in Journal
Position Tracking for Multi-Channel Double-Crystal Monochromator Scanning Based on Iterative Learning Control
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Data-Based Security Fault Tolerant Iterative Learning Control under Denial-of-Service Attacks

1
Shandong Key Laboratory of Industrial Control Technology, School of Automation, Qingdao University, Qingdao 266071, China
2
Institute of Advanced Technology, Nanjing University of Posts and Telecommunications, Nanjing 210000, China
3
School of Computer Science and Technology, Qilu University of Technology (Shandong Academy of Sciences), Jinan 250353, China
*
Author to whom correspondence should be addressed.
Actuators 2022, 11(7), 178; https://doi.org/10.3390/act11070178
Submission received: 7 June 2022 / Revised: 22 June 2022 / Accepted: 24 June 2022 / Published: 26 June 2022
(This article belongs to the Special Issue Sensor and Actuator Attacks of Cyber-Physical Systems)

Abstract

:
This paper mainly studies the data-based security fault tolerant iterative learning control (SFTILC) problem of nonlinear networked control systems (NCSs) under sensor failures and denial-of-service (DoS) attacks. Firstly, the radial basis function neural network (RBFNN) is used to approximate the sensor failure function and a DoS attack compensation mechanism is proposed in the iterative domain to lessen the impact of DoS attacks. Then, using the dynamic linearization technology, the nonlinear system considering failures and network attacks is transformed into a linear data model. Further, based on the designed linearization model, a new data-based SFTILC algorithm is designed to ensure the satisfactory tracking performance of the system. This process only uses the input and output data of the system, and the stability of the system is proved by using the compression mapping principle. Finally, a digital simulation is used to demonstrate the effectiveness of the proposed SFTILC algorithm.

1. Introduction

As the network technology develops, traditional local control systems (LCSs) have been gradually replaced by network control systems (NCSs) [1,2,3,4]. NCSs are integrated by controllers, sensors, actuators, and network transmission channels. NCSs receive sensor signals of equipment through networks and send control signals to control the equipment, so that remote control tasks can be completed accordingly. In NCSs, the separation of controllers and equipment is one of the most important characteristics of NCSs, but it requires a large amount of data transmission, and the existence of data also stimulates the research of data-based control (DDC) [5,6,7].
It is more and more difficult to identify the model of systems, and the control problem becomes more difficult and unrealistic by using the traditional model-based control theory. Therefore, DDC theory began to be researched. There have had many DDC methods in the existing literature, such as PID control, model free adaptive control (MFAC) [8], iterative learning control (ILC) [9,10,11,12], iterative feedback tuning (IFT) [13] and so on. MFAC and ILC are proposed to solve the control problem of nonlinear systems by directly applying the I/O data of the controlled systems. The paper [14] proposed a new MFAC method for discrete-time single input single output nonlinear systems combined with radial basis function neural networks. In [15], the bounded input–output stability and tracking performance of full format dynamic linearized MFAC were strictly proved by using the compression mapping principle. In [16], aiming at the problem of driverless vehicle ground heading control, an MFAC method based on the adaptive forgetting factor was proposed. When the control task is repeated, the system shows the same behavior. For the ILC method of the repeated process, when constructing the current algorithm, the information of the last iteration time stored by storage devices is used to correct the current control input, so as to improve the error accuracy of the system cycle process. In [17], the contraction mapping (CM)-based method was suitable for some robust ILCs that are non-competitive with uncertainties, especially for power system models. In order to ensure the robust convergence of iterative learning control designs, the H norm condition was proposed, and the learning gain matrix was determined by solving norm conditions. In [18], a class of multi-input and multi-output discrete linear systems was studied. Under the assumption that all iterative uncertainties were bounded, conditions to ensure the boundedness of all system trajectories and to ensure the convergence of tracking errors were given in [18]. In the presence of data quantization and DoS attacks, a quantized data-based iterative learning tracking control algorithm was proposed for a class of repetitive nonlinear systems in [19].
It is well-known that NCSs involve the transmission of data that are required by the control system through the network, while many network failures or network attacks exist in networks. Network attacks can be roughly divided into denial-of-service (DoS) [20,21,22] attacks, false data injection (FDI ) [23] attacks, and replay attacks. The basic goal of a DoS attack is to prevent the target network from providing regular service or resource access, as well as to cause the target system to become unresponsive or crash. In this way, NCSs cannot achieve the expected control objectives. Therefore, there has had much research on solving the impacts of DoS attacks in the existing literature. The consensus problem of linear multi-agent systems (MASs) under DoS attacks was investigated in [24]. The paper [25] studied the output tracking problem of distributed model-free adaptive control systems under DoS attacks. If the sensor in an NCS fails, it will also affect the accuracy of data transmission. Inaccurate data measurement leads to that the controller can not well generate control inputs to control the controlled system, resulting in the system can not achieve the expected control objectives. For a class of continuous-time disturbed systems, the paper [26] provided an adaptive compensation technique against state-dependent and partly bounded actuator failures and disturbances. In [27], the author studied the distributed fault tolerance and resilient consensus of heterogeneous multi-agent systems under equipment failures and DoS attacks. Under DoS attacks, the problem of fault-tolerant MFAC for nonlinear networked control systems was investigated in [28]. The above research on fault tolerance is to design fault-tolerant control methods and prove the stability in the time domain. There are few research findings on ILC fault-tolerant control under the repeated operation NCSs. Therefore, we investigate the nonlinear repetitive NCSs under DoS attacks and fault-tolerant control in the iteration domain, which are prompted by the above descriptions. The contributions of this paper can be listed as:
The nonlinear system is transformed into a linear data model by using the dynamic linearization technology under failures and DoS attacks. Then, a new data-based security fault tolerant iterative learning control (SFTILC) algorithm is designed to ensure the tracking performance of the system under the DoS attack.
The radial basis function neural network (RBFNN) is used to approximate the sensor failure function. A DoS attack compensation mechanism is proposed in the iterative domain to lessen the impacts of DoS attacks.
The structure of this document is as follows. The preparation and explanation of the problem are described in Section 2. In Section 3, the design of a fault tolerant controller is presented. Section 4 provides the stability analysis. The simulations and conclusions are presented in Section 5 and Section 6, respectively.

2. Preliminaries and Problem Formulations

2.1. System Description

The nonlinear discrete-time single-input single-output system that repeatedly runs at finite time intervals is given as follows
y i ( k + 1 ) = f ( y i ( k ) , , y i ( k n y ) , u i ( k ) , , u i ( k n u ) ) ,
where k { 0 , 1 , , T } is the sampling time, i { 1 , 2 , } is the number of iterations, y i ( k ) and u i ( k ) are the output and input signals of the system, respectively, n y and n u are two unknown positive integers, and f ( ) is an unknown nonlinear scalar function.

2.2. Dynamic Linearization

To facilitate the later controller design, the following assumptions are made for the system (1).
Assumption 1.
The partial derivative of f ( ) to u i ( k ) is continuous.
Assumption 2.
System (1) satisfies the generalized Lipschitz condition along the iteration axis, namely, k { 1 , T } , if | Δ u i ( k ) | 0 , the formula below applies
| Δ y i ( k + 1 ) | a | Δ u i ( k ) | , i = 1 , 2 ,
where Δ y i ( k + 1 ) = y i ( k + 1 ) y i 1 ( k + 1 ) , Δ u i ( k ) = u i ( k ) u i 1 ( k ) and a > 0 is a constant.
Remark 1.
Assumptions 1 and 2 are reasonable in many actual situations. In the control system design, Assumption 1 is a typical constraint condition for generic nonlinear systems. Assumption 2 limits the system output change rate produced by the change of the control input along the iteration axis. Namely, a bounded input energy change should result in a finite output energy change.
Lemma 1.
For the nonlinear system (1) that meets both Assumptions 1 and 2, when | Δ u i ( k ) | 0 , there is a time-varying pseudo partial derivative (PPD) ϕ i ( k ) so that system (1) can be transformed into the following linear data model
Δ y i ( k + 1 ) = ϕ i ( k ) Δ u i ( k ) , k { 0 , 1 , , N } , i = 1 , 2 ,
where | ϕ i ( k ) | a . The proof of Lemma 1 is the same as that in [29].

3. Design Fault Tolerant Controller

3.1. Model Free Adaptive Iterative Learning Control

Considering the input cost function as follows
ζ ( u i ( k ) ) = | y d ( k + 1 ) y i ( k + 1 ) | 2 + λ ( Δ u i ( k ) ) 2 ,
where λ is a weight coefficient and y d ( k + 1 ) is the time-invariant desired output signal.
The optimal control rate is obtained by minimizing the cost function ζ ( u i ( k ) ) . In order to make the algorithm more general, the step factor ρ ( 0 , 1 ] is introduced and the following optimal control algorithm is obtained
u i ( k ) = u i 1 ( k ) + ρ ϕ i ( k ) λ + ϕ i ( k ) 2 ( y d ( k + 1 ) y i 1 ( k + 1 ) ) .
Because ϕ i ( k ) are difficult to be measured in real systems, we need to estimate them by introducing the following performance function
ζ ( ϕ ^ i ( k ) ) = | Δ y i 1 ( k + 1 ) ϕ ^ i ( k ) Δ u i 1 ( k ) | 2 + μ | ϕ ^ i ( k ) ϕ ^ i 1 ( k ) | 2
where ϕ ^ i ( k ) is an estimate of ϕ i ( k ) , and μ is a weight factor.
Minimize the performance function ζ ( ϕ ^ i ( k ) ) to get ϕ ^ i ( k ) , similarly, in order to make the algorithm more general the step-size factor μ ( 0 , 1 ] is introduced, then one can obtain
ϕ ^ i ( k ) = ϕ ^ i 1 ( k ) + η Δ u i 1 ( k ) μ + Δ u i 1 2 ( k ) ( Δ y i 1 ( k + 1 ) Δ u i 1 ( k ) ϕ ^ i 1 ( k ) ) .
The above control algorithm is applied to the nominal system. However, in the practical networked control system, on the one hand, sensor failures will result in some deviations in the measurement data. On the other hand, the emergence of the network may bring cyber attacks. So, the above algorithm may not complete the tracking task well when these problems exist. Therefore, it seems necessary to design the secure fault-tolerant iterative learning control (SFTILC) algorithm under sensor failures and cyber attacks.
Figure 1 depicts the nonlinear NCS architecture under DoS attacks and sensor failures consideration.

3.2. Sensor Failure

According to Figure 1, when a fault occurs, the sensor measurement signal becomes to the following form
y i F ( k ) = y i ( k ) + F s , i ( k )
where F s , i ( k ) is a fault function, which can be approximated using the radial basis function neural network (RBFNN), the details are given as
F s , i ( k ) = v i T ( k ) ψ ( z ( k ) )
where v i ( k ) R p is the ideal weight vector in the output layer, p is the RBFNN’s node number, and ψ ( z ( k ) ) = [ ψ 1 ( z ( k ) ) , ψ 2 ( z ( k ) ) , ψ p ( z ( k ) ) ] T R p is the hidden layer’s basis function, which is a Gaussian function, and it can be represented as
ψ l ( z ( k ) ) = e x p ( z ( k ) ϱ l 2 τ l 2 )
where ϱ l denotes the RBFNN’s center, τ l denotes the RBFNN’s breadth for l 1 , 2 , , p , z ( k ) = [ u r ( k ) , F s , i ( k 1 ) , y i ( k ) ] T is the RBFNN input.
In most cases, v i ( k ) is not available, therefore, the following learning process is introduced to obtain it.
v i ( k ) = ϖ { Δ u i ( k ) ψ T ( k ) ϕ ^ i ( k ) }
where ϖ stands for the projection operator, Δ u i ( k ) can be calculated by (18), ϕ ^ i ( k ) can be defined in (17). Then ϖ is given as following, which has been employed in [30].
ϖ ( · ) = 0 , i f v i ( k ) = v ̲ a n d Δ u i ( k ) ψ T ( k ) ϕ ^ i ( k ) < 0 0 , i f v i ( k ) = v ¯ a n d Δ u i ( k ) ψ T ( k ) ϕ ^ i ( k ) > 0 Δ u i ( k ) ψ T ( k ) ϕ ^ i ( k ) , o t h e r w i s e .
where v ̲ and v ¯ are the lower and the upper bounds of v i ( k ) , respectively.
In the case of sensor failures, the nonlinear repetitive system is linearized dynamically by
y i F ( k + 1 ) = y i 1 ( k + 1 ) + ϕ i ( k ) Δ u i ( k ) + F s , i ( k + 1 )
where | F s , i ( k + 1 ) | p v ¯ with p being the node number of RBFNN and v ¯ is the upper bounds of v i ( k ) .

3.3. Attack Compensation

When a network attacker launches DoS attacks, the output signal is expressed as follows
y a i F ( k ) = α i ( k ) y i F ( k ) ,
where α i ( k ) obeys the Bernoulli distribution, α i ( k ) = 1 denotes a failed DoS attack, whereas α i ( k ) = 0 denotes a successful DoS attack. As a result, the probabilities are expressed as
P r P r [ α i ( k ) = 1 ] = α ¯ , P r [ α i ( k ) = 0 ] = 1 α ¯ .
To compensate for the impact of DoS attacks, the mechanism is designed as follows
y ¯ i ( k ) = α i ( k ) y i F ( k ) + ( 1 α i ( k ) ) y i 1 F ( k ) .
Consider sensor failure and DoS attacks, the SFTILC algorithm is proposed as follows
ϕ ^ i ( k ) = ϕ ^ 1 ( k ) , if | | ϕ ^ i ( k ) | | ϵ o r | Δ u i ( k ) | ϵ ϕ ^ i 1 ( k ) + η Δ u i 1 ( k ) μ + Δ u i 1 2 ( k ) ( y ¯ i 1 ( k + 1 ) y i 2 F ( k + 1 ) Δ u i 1 ( k ) ϕ ^ i 1 ( k ) ) , otherwise .
u i ( k ) = u i 1 ( k ) + ϕ i ( k ) λ + ϕ i ( k ) 2 ( y d ( k + 1 ) y ¯ i 1 ( k ) ) .
For the convenience, the tracking error e i ( k ) is defined as follows:
e i ( k ) = y d ( k ) y i ( k ) .
Problem 1.
This study aims to design the SFTILC algorithm to realize the mean-square bounded output tracking task of system (1) under the influence of sensor failures and DoS attacks, namely,
{ e i ( k ) E { | e i ( k ) | } b } ,
wherebis a constant, where E { · } denotes the expectation.

4. Stability Analysis

Theorem 1.
If there are parameters μ > 0 , ρ ( 0 , 1 ] , λ > ρ 2 a 2 4 , and η ( 0 , 1 ] such that the SFTILC algorithm constructed of (17) and (18) holds for system (1) subject to sensor failures and DoS attacks, then Problem 1 is solved, where a is the same as described in (2).
Proof. 
The proof of Theorem 1 consists of two parts: the bounded PPD parameter estimation and the bounded result of the output tracking error.
Part I: Boundedness of the PPD parameter estimation
(i) When | ϕ ^ i ( k ) | ε , ϕ ^ i ( k ) = ϕ ^ 1 ( k ) , so ϕ ^ i ( k ) is bounded.
(ii) When | ϕ ^ i ( k ) | > ε , the PPD estimation error is defined as
e ϕ i ( k ) = ϕ ^ i ( k ) ϕ i ( k ) .
Bring (17) into (20) to obtain the following formula
e ϕ i ( k ) = ϕ ^ i 1 ( k ) ϕ i ( k ) + η Δ u i 1 ( k ) μ + Δ u i 1 2 ( k ) y a , i 1 ( k + 1 ) y i 2 F ( k + 1 ) Δ u i 1 ( k ) ϕ ^ i 1 ( k ) = e ϕ i 1 ( k ) Δ ϕ i ( k ) + η Δ u i 1 ( k ) μ + Δ u i 1 2 ( k ) ( α i 1 ( k + 1 ) y i 1 F ( k + 1 ) y i 2 F ( k + 1 ) + ( 1 α i 1 ( k + 1 ) ) y i 2 F ( k + 1 ) Δ u i 1 ( k ) ϕ ^ i 1 ( k ) ) = ( 1 η Δ u i 1 2 ( k ) μ + Δ u i 1 2 ( k ) ) e ϕ i 1 ( k ) Δ ϕ i ( k ) + η Δ u i 1 ( k ) μ + Δ u i 1 2 ( k ) ( α i 1 ( k + 1 ) ) Δ F s , i 1 ( k + 1 ) + η Δ u i 1 2 ( k ) μ + Δ u i 1 2 ( k ) ( α i 1 ( k + 1 ) 1 ) ϕ i 1 ( k ) .
Taking the absolute value and expectation on both sides of (21), we can get
E { | e ϕ i ( k ) | } | 1 η Δ u i 1 2 ( k ) μ + Δ u i 1 2 ( k ) | E { | e ϕ i 1 ( k ) | } + | Δ ϕ i ( k ) | + | α ¯ η Δ u i 1 ( k ) μ + Δ u i 1 ( k ) Δ F s , i 1 ( k + 1 ) | + | η Δ u i 1 2 ( k ) μ + Δ u i 1 2 ( k ) ( α ¯ 1 ) ϕ i 1 ( k ) |
where | ϕ i ( k ) | a , 0 < α ¯ < 1 and μ + Δ u i 1 2 ( k ) > Δ u i 1 2 ( k ) > 0 , so
0 < η Δ u i 1 ( k ) μ + Δ u i 1 2 ( k ) < η 2 μ
0 < | η ( α ¯ 1 ) Δ u i 1 2 ( k ) μ + Δ u i 1 2 ( k ) | < η Δ u i 1 2 ( k ) μ + Δ u i 1 2 ( k ) m 1 < 1
0 < 1 η Δ u i 1 2 ( k ) μ + Δ u i 1 2 ( k ) m 2 < 1
where m 1 and m 2 are constants.
From (23)–(25), we can reduce (22) to the following inequality
E { | e ϕ i ( k ) | } m 2 E { | e ϕ i 1 ( k ) | } + m 3 ,
where m 3 = α ¯ η p v ¯ μ + 3 a .
By using the compressed mapping principle, we can get
E { | e ϕ i ( k ) | } m 2 2 E { | e ϕ i 2 ( k ) | } + m 2 m 3 + m 3 m 2 i 1 E { | e ϕ 1 ( k ) | } + m 2 i 2 m 3 + + m 3 = m 2 i 1 E { | e ϕ 1 ( k ) | } + m 3 ( 1 m 2 i 1 ) 1 m 2 ,
so, e ϕ i ( k ) converges to the following set
{ e ϕ i ( k ) E { | e ϕ i ( k ) | } m 3 1 m 2 } .
So far, the proof of the boundedness of e ϕ i ( k ) is completed because ϕ i ( k ) is bounded, leading to ϕ ^ i ( k ) also being bounded.
Part II: Tracking performance analysis
The boundedness of the PPD parameter estimation proved above can be used as a condition to prove the boundedness of the system tracking error.
By taking (3) and (18) into (19), we can get
e i ( k + 1 ) = y d ( k + 1 ) y i 1 ( k + 1 ) ϕ i ( k ) Δ u i ( k ) = e i 1 ( k + 1 ) ρ ϕ i ( k ) ϕ ^ i ( k ) λ + ϕ ^ i 2 ( k ) × ( y d ( k + 1 ) + y i 1 F ( k + 1 ) y i 1 F ( k + 1 ) α i 1 ( k + 1 ) y i 1 F ( k + 1 ) ( 1 α i 1 ( k + 1 ) ) y i 2 F ( k + 1 ) ) = ( 1 ρ ϕ i ( k ) ϕ ^ i ( k ) λ + ϕ ^ i 2 ( k ) ) e i 1 ( k + 1 ) ρ ϕ i ( k ) ϕ i 1 ( k ) ϕ ^ i ( k ) λ + ϕ ^ i 2 ( k ) ( 1 α i 1 ( k + 1 ) ) Δ u i 1 ( k ) ρ ϕ i ( k ) ϕ ^ i ( k ) λ + ϕ ^ i 2 ( k ) ( ( 1 α i 1 ( k + 1 ) ) Δ F s , i 1 ( k + 1 ) + F s , i 1 ( k + 1 ) ) .
Taking the absolute value and expectation on both sides of (29), we can get
E { | e i ( k + 1 ) | } | 1 ρ ϕ i ( k ) ϕ ^ i ( k ) λ + ϕ ^ i 2 ( k ) | E { | e i 1 ( k + 1 ) | } + | ρ ϕ i ( k ) ϕ i 1 ( k ) ϕ ^ i ( k ) λ + ϕ ^ i 2 ( k ) ( 1 α ¯ ) Δ u i 1 ( k ) | + | ρ ϕ i ( k ) ϕ ^ i ( k ) λ + ϕ ^ i 2 ( k ) ( ( 1 α ¯ ) Δ F s , i 1 ( k + 1 ) + F s , i 1 ( k + 1 ) ) | .
According to Theorem 1, (3) and (28), we can get
0 < m 4 ρ ϕ i ( k ) ϕ ^ i ( k ) λ + ϕ ^ i 2 ( k ) ρ a 2 λ = m 5 < 1 ,
0 < 1 ρ ϕ i ( k ) ϕ ^ i ( k ) λ + ϕ ^ i 2 ( k ) m 6 < 1 ,
0 < ρ ϕ i ( k ) ϕ i 1 ( k ) ϕ ^ i ( k ) λ + ϕ ^ i 2 ( k ) a m 5 < a ,
where m 4 , m 5 , and m 6 are constants.
In addition, generally because the energy of the equipment cannot be unlimited, the input increment Δ u i 1 ( k ) is similarly bounded with | Δ u i 1 ( k ) | σ . From (31)–(33) and (13), we can reduce (30) to the following inequality
E { | e i ( k + 1 ) | } m 6 | E { | e i 1 ( k + 1 ) | } + | a ( 1 α ¯ ) Δ u i 1 ( k ) | + ( 2 α ¯ ) p v ¯ ,
E { | e i ( k + 1 ) | } m 6 | E { | e i 1 ( k + 1 ) | } + m 7 ,
where m 7 = a ( 1 α ¯ ) σ + ( 2 α ¯ ) p v ¯ . Further, by using the principle of the compressed mapping, we can get
E { | e i ( k + 1 ) | } m 6 2 | E { | e i 2 ( k + 1 ) | } + m 6 m 7 + m 7 m 6 i 1 | E { | e 1 ( k + 1 ) | } + m 6 i 2 m 7 + + m 7 = m 6 i 1 | E { | e 1 ( k + 1 ) | } + m 7 ( 1 m 6 i 1 ) 1 m 6
so, e i ( k + 1 ) converges to the following set
{ e i ( k + 1 ) E { | e i ( k + 1 ) | } m 7 1 m 6 } .
Now, the proof of the boundedness of the tracking error is completed. □

5. Simulation Results

The nonlinear repetitive operation system described below is used
y i ( k + 1 ) = y i ( k ) 1 + y i 2 ( k ) + ( u i ( k ) + 0.01 r o u n d ( k 500 ) s i n ( y i ( k ) ) ) 3 + F s , i ( k ) .
The desired output is given as
y d ( k ) = 0.5 ( 1 ) r o u n d ( t 100 ) , 0 t 500 , 0.5 s i n ( t π 100 ) + 0.3 c o s ( t π 50 ) , 501 t 1000 .
The control input and control output have their initial values with u 1 ( 1 ) = u 1 ( 2 ) = 0.5 and y 1 ( 1 ) = y 1 ( 2 ) = y 1 ( 3 ) = 0.5 , respectively, and the estimated values of the PPD parameters are set to ϕ ^ 1 ( 1 ) = ϕ ^ 1 ( 2 ) = 0.5 . The controller parameters are selected as η = 1 , μ = 1 , ρ = 0.6 , λ = 20 and ε = 10 5 . The successful transmission rate is selected to be α ¯ = 0.5 .
Consider the actual sensor fault function as
F s , i ( k ) = 2 u r 2 ( k ) + F s , i ( k 1 ) 1 + F s , i 2 ( k 1 ) ,
where u r ( k ) = s i n ( k 1000 ) . In addition, the initial value of the hazard function is set to F s , i ( 1 ) = 0 .
In this paper, the learning rate of the RBFNN is set to χ = 0.05 , the RBFNN input defined as z ( k ) = [ u r ( k ) , F s , i ( k 1 ) , y i ( k ) ] T . The initial value of the Gaussian function is set to ϱ 0 = 0 0 0 0 0 0 0 0 0 0 and τ 0 = 5 5 5 5 5 T .
The input layer weight vector is set to v ¯ i = 0.6294 0.8116 0.7460 0.8268 0.4574 T .
The Bernoulli distribution is shown in Figure 2 for a random sequence of DoS attacks. Figure 3 shows the simulation diagram approaching the sensor fault function by RBFNN. From Figure 3, we can clearly see the superiority of the approximation performance of the RBFNN. In Figure 4a–c, it shows the performance of for different iterations.
Figure 5 shows the comparison of the maximum tracking error with the number of times of iterations by using the SFTILC algorithm and the traditional MFAILC [28] under DoS attacks. In Figure 5, the SFTILC can make the tracking error converge to a smaller bound. Comparative results of tracking the performance of the system are depicted in Figure 6. From Figure 6, we can see that the tracking of the desired trajectory with the SFTILC algorithm is obviously better than that of the traditional MFAILC.
According to simulation results, the SFTILC algorithm can handle the output tracking tasks well when taking sensor failure and DoS attacks into account.

6. Conclusions

The data-based SFTILC problem of nonlinear networked control systems has been studied in this paper with sensor failures and DoS attacks. Firstly, the radial basis function neural network has been used to approximate the sensor failure function and a DoS attack compensation mechanism has been proposed in iterative domain to lessen the impact of the DoS attack. Then, using the dynamic linearization technology, the nonlinear system considering fault and network attack has been transformed into a linear data model. Further, a new data-based SFTILC algorithm has been designed to ensure the tracking performance of the system. Finally, a digital simulation has been used to demonstrate the effectiveness of the proposed SFTILC algorithm. In the future, we will consider the partial form dynamic linearization-based model-free adaptive algorithm that uses more input information to improve the control performance of the system.

Author Contributions

Writing—original draft preparation and software, Z.L.; writing—review and editing, C.Z.; writing—review and editing, supervision, W.C.; investigation and supervision, C.D.; methodology, validation and software, X.J. All authors have read and agreed to the published version of the manuscript.

Funding

This work is supported by the National Natural Science Foundation of China (Grant No. 61873338), the Taishan Scholars (No. tsqn201812052), and the Natural Science Foundation of Shandong Province (ZR2020KF034).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Gaid, M.; Cela, A.; Hamam, Y. Optimal integrated control and scheduling of networked control systems with communication constraints: Application to a car suspension system. IEEE Trans. Control Syst. Technol. 2006, 14, 776–787. [Google Scholar] [CrossRef] [Green Version]
  2. Shi, Y.; Yu, B. Output feedback stabilization of networked control systems with random delays modeled by markov chains. IEEE Trans. Autom. Control 2009, 54, 1668–1674. [Google Scholar]
  3. Xu, H.; Jagannathan, S. Neural network-based finite horizon stochastic optimal control design for nonlinear networked control systems. IEEE Trans. Neural Netw. Learn. Syst. 2015, 26, 472–485. [Google Scholar] [CrossRef] [PubMed]
  4. Qiu, J.; Gao, H.; Ding, S. Recent advances on fuzzy-model-based nonlinear networked control systems: A survey. IEEE Trans. Ind. Electron. 2016, 63, 1207–1217. [Google Scholar] [CrossRef]
  5. Guardabassi, G.; Savaresi, S. Virtual reference direct design method: An off-line approach to data-based control system design. IEEE Trans. Autom. Control 2000, 45, 954–959. [Google Scholar] [CrossRef]
  6. Mahish, P.; Pradhan, A. Mitigating subsynchronous resonance using synchrophasor data based control of wind farms. IEEE Trans. Power Deliv. 2020, 35, 364–376. [Google Scholar] [CrossRef]
  7. Deng, C.; Wen, C.; Huang, J.; Zhang, X.; Zou, Y. Distributed observer-based cooperative control approach for uncertain nonlinear MASs under event-triggered communication. IEEE Trans. Autom. Control 2021, 67, 2669–2676. [Google Scholar] [CrossRef]
  8. Bu, X.; Hou, Z.; Zhang, H. Data-driven multiagent systems consensus tracking using model free adaptive control. IEEE Trans. Neural Netw. Learn. Syst. 2017, 29, 1514–1524. [Google Scholar] [CrossRef]
  9. Meng, D.; Zhang, J. Design and analysis of data-driven learning control: An optimization-bBased approach. systems and control. IEEE Trans. Neural Netw. Learn. Syst. 2021, 1–15. [Google Scholar] [CrossRef]
  10. Jin, X. Nonrepetitive trajectory tracking for nonlinear autonomous agents with asymmetric output constraints using parametric iterative learning control. Int. J. Robust Nonlinear Control 2019, 29, 1941–1955. [Google Scholar] [CrossRef]
  11. Radac, M.; Lala, T. Hierarchical Cognitive Control for Unknown Dynamic Systems Tracking. Mathematics 2021, 9, 2752. [Google Scholar] [CrossRef]
  12. Memon, F.; Shao, C. Data-driven optimal PID type ILC for a class of nonlinear batch process. Int. J. Syst. Sci. 2020, 52, 263–276. [Google Scholar] [CrossRef]
  13. Hildebrand, R.; Lecchini, A.; Solari, G.; Gevers, M. Optimal prefiltering in iterative feedback tuning. IEEE Trans. Autom. Control 2005, 50, 1196–1200. [Google Scholar] [CrossRef] [Green Version]
  14. Zhu, Y.; Hou, Z. Data-driven MFAC for a class of discrete-time nonlinear systems with RBFNN. IEEE Trans. Neural Netw. Learn. Syst. 2014, 25, 1013–1020. [Google Scholar] [CrossRef]
  15. Hou, Z.; Chi, R.; Gao, H. An overview of dynamic-linearization-based data-driven control and applications. IEEE Trans. Ind. Electron. 2017, 64, 4076–4090. [Google Scholar] [CrossRef]
  16. Liao, Y.; Du, T.; Jiang, Q. Model-free adaptive control method with variable forgetting factor for unmanned surface vehicle control. Appl. Ocean. Res. 2019, 93, 1141–1187. [Google Scholar] [CrossRef]
  17. Meng, D. Convergence conditions for solving robust iterative learning control problems under nonrepetitive model uncertainties. IEEE Trans. Neural Netw. Learn. Syst. 2019, 30, 1908–1919. [Google Scholar] [CrossRef]
  18. Meng, D.; Moore, K. Robust iterative learning control for nonrepetitive uncertain systems. IEEE Trans. Autom. Control 2017, 62, 907–913. [Google Scholar] [CrossRef]
  19. Zhou, C.; Che, W. Quantized data-based iterative learning control under denial-of-service attacks. Optim. Control. Appl. Methods 2021. [Google Scholar] [CrossRef]
  20. Zhang, X.; Han, Q.; Ge, X.; Ding, L. Resilient control design based on a sampled-data model for a class of networked control systems under denial-of-service attacks. IEEE Trans. Cybern. 2020, 50, 3616–3626. [Google Scholar] [CrossRef]
  21. Liu, J.; Suo, W.; Zha, L.; Tian, E.; Xie, X. Security distributed state estimation for nonlinear networked systems against DoS attacks. Int. J. Robust Nonlinear Control 2020, 30, 1156–1180. [Google Scholar] [CrossRef]
  22. Li, J.; Yang, Z.; Mu, X.; Wu, X. Passivity-based Event-triggered Fault Tolerant Control for Nonlinear Networked Control System with Actuator Failures and DoS Jamming Attacks. J. Frankl. Inst. 2020, 357, 9288–9307. [Google Scholar] [CrossRef]
  23. Hu, L.; Wang, Z.; Han, Q.; Liu, X. State estimation under false data injection attacks: Security analysis and system protection. Automatica 2018, 87, 176–183. [Google Scholar] [CrossRef] [Green Version]
  24. Ma, Y.; Che, W.; Deng, C.; Wu, Z. Observer-based event-triggered containment control for MASs under DoS attacks. IEEE Trans. Cybern. 2021, 1–12. [Google Scholar] [CrossRef] [PubMed]
  25. Ma, Y.; Che, W.; Deng, C.; Wu, Z. Distributed model-free adaptive control for learning nonlinear MASs under DoS attacks. IEEE Trans. Neural Netw. Learn. Syst. 2021, 1–10. [Google Scholar] [CrossRef]
  26. Jin, X.; Che, W.; Wu, Z.; Wang, H. Analog control circuit designs for a class of continuous-time adaptive fault-tolerant control systems. IEEE Trans. Cybern. 2020, 52, 4209–4220. [Google Scholar] [CrossRef]
  27. Deng, C.; Jin, X.; Che, W.; Wang, H. Learning-based distributed resilient fault-tolerant control method for heterogeneous MASs under unknown leader dynamic. IEEE Trans. Neural Netw. Learn. Syst. 2021, 1–10. [Google Scholar] [CrossRef]
  28. Su, M.; Che, W. Fault-Tolerant control for model-free networked control systems under DoS attacks. J. Frankl. Inst. 2021, 358, 9023–9033. [Google Scholar] [CrossRef]
  29. Xing, J.; Li, N.; Chi, R.; Huang, B.; Hou, Z. Data-driven nonlinear ILC with varying trial lengths. J. Frankl. Inst. 2020, 357, 10262–10287. [Google Scholar] [CrossRef]
  30. Lian, J.; Hu, J.; Żak, S. Variable Neural Adaptive Robust Control: A Switched System Approach. IEEE Trans. Neural Netw. Learn. Syst. 2015, 26, 903–915. [Google Scholar] [CrossRef]
Figure 1. System block diagram.
Figure 1. System block diagram.
Actuators 11 00178 g001
Figure 2. DoS attack sequence for the 100th iteration.
Figure 2. DoS attack sequence for the 100th iteration.
Actuators 11 00178 g002
Figure 3. Sensor fault estimation.
Figure 3. Sensor fault estimation.
Actuators 11 00178 g003
Figure 4. Performance for different iterations. (a) The tracking performance for the 10th iteration. (b) The tracking performance for the 50th iteration. (c) The tracking performance for the 100th iteration.
Figure 4. Performance for different iterations. (a) The tracking performance for the 10th iteration. (b) The tracking performance for the 50th iteration. (c) The tracking performance for the 100th iteration.
Actuators 11 00178 g004
Figure 5. Maximum tracking error.
Figure 5. Maximum tracking error.
Actuators 11 00178 g005
Figure 6. Tracking performance.
Figure 6. Tracking performance.
Actuators 11 00178 g006
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Li, Z.; Zhou, C.; Che, W.; Deng, C.; Jin, X. Data-Based Security Fault Tolerant Iterative Learning Control under Denial-of-Service Attacks. Actuators 2022, 11, 178. https://doi.org/10.3390/act11070178

AMA Style

Li Z, Zhou C, Che W, Deng C, Jin X. Data-Based Security Fault Tolerant Iterative Learning Control under Denial-of-Service Attacks. Actuators. 2022; 11(7):178. https://doi.org/10.3390/act11070178

Chicago/Turabian Style

Li, Zengwei, Changren Zhou, Weiwei Che, Chao Deng, and Xiaozheng Jin. 2022. "Data-Based Security Fault Tolerant Iterative Learning Control under Denial-of-Service Attacks" Actuators 11, no. 7: 178. https://doi.org/10.3390/act11070178

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop