999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Robust H∞state estimation for a class of complex networks with dynamic event-triggered scheme against hybrid attacks

2022-02-24 09:39:16YahanDeng鄧雅瀚ZhongkaiMo莫中凱andHongqianLu陸宏謙
Chinese Physics B 2022年2期

Yahan Deng(鄧雅瀚), Zhongkai Mo(莫中凱), and Hongqian Lu(陸宏謙)

School of Intelligent Systems Engineering,Guangxi City Vocational University,Chongzuo 532200,China

We investigate the dynamic event-triggered state estimation for uncertain complex networks with hybrid delays suffering from both deception attacks and denial-of-service attacks.Firstly, the effects of time-varying delays and finitedistributed delays are considered during data transmission between nodes.Secondly, a dynamic event-triggered scheme(ETS)is introduced to reduce the frequency of data transmission between sensors and estimators.Thirdly,by considering the discussed plant, dynamic ETS, state estimator, and hybrid attacks into a unified framework, this framework is transferred into a novel dynamical model.Furthermore,with the help of Lyapunov stability theory and linear matrix inequality techniques, sufficient condition to ensure that the system is exponentially stable and satisfies H∞performance constraints is obtained,and the design algorithm for estimator gains is given.Finally,two numerical examples verify the effectiveness of the proposed method.

Keywords: dynamic event-triggered scheme,hybrid attacks,complex networks,state estimation

1.Introduction

Complex networks (CNs) can be seen as a class of generalized mathematical models abstracted from certain actual complex systems and introduced as an important tool in related cross-disciplines.A CN model can describe a large number of complex systems that exist in practice,and it usually consists of nodes,edges and topologies.[1]Nodes are used to represent different individuals in an actual system.The relationship between individuals is represented by edges, and the dynamic structure of the network is influenced by the topology.[2]Neural systems,computer networks, power networks,social relationship networks,and transportation systems are typical CNs,for example, in a nervous system, each nerve cell connected by nerve fibers can be regarded as a node,and a nervous system can be regarded as a CN.[3]Due to many advantages of CNs,they have been widely used in fields such as the Internet,sociology, communication security and image processing.[4]In recent years, research on complex networks has become a hot topic in theory and practice,for example,synchronization,consensus and state estimation.[5,6,8–11]Specifically, the authors of Ref.[9] proposed synchronization approach for delay CNs with nonlinearity and deception attacks.Based on an event-triggered scheme(ETS),the authors of Ref.[10]discussed the state estimation problem for nonlinearly coupled CNs with finite-distributed delays and discrete delay.Considering incomplete measurements and uncertain inner-coupling,a design method ofH∞state estimator was proposed for discrete CNs in Ref.[11].In this paper, we discuss the state estimation problem of complex networks with respect to both network security and resource constraint.

Generally, for the traditional data transmission strategy,the measurement signal of the estimator is updated with equal cycles.[12]Due to the limited network bandwidth resources,how to ensure the system has a certain performance,while effectively reducing the waste of network resources has been one of the key issues for networked systems.[13,14]Among many data transmission scheduling schemes, the event-triggered scheme stands out.[15]The core idea of ETS is to determine whether the current packet can meet the preset triggering conditions, and if so, the packet will be transmitted to the remote destination through the communication network.[16]As the problem of networked systems becomes more complex,more and more improved ETSs are proposed for reaping superior results, such as dynamic ETS,[17]adaptive ETS,[18]selftriggered scheme,[19]distributed ETS,[20]and hybrid ETS.[21]Specifically,a dynamic event-driven state estimation issue was investigated in Ref.[22] for discrete CNs with probabilistic sensor saturation.By utilizing an adaptive ETS,an state estimation problem was conducted for fractional-order CNs with probabilistic nonlinearities against cyber attacks in Ref.[23].In this paper, the design scheme of dynamic event-driven estimator is discussed in order to reduce the frequency of data exchange between sensors and estimators.

The application of networked systems has brought us a lot of convenience, but in the open network environment, the system faces security issues that cannot be ignored.[24]In recent years, malicious attacks against the networked systems of government agencies and enterprises have been increasing.For examples, on January 10, 2021, the Central Bank of New Zealand’s third-party hosting provider suffered a cyber attack that resulted in a data breach;on January 15,2021,the Scottish Environment Protection Agency disclosed a ransom attack that caused a serious network outage and theft of some data.[25]Based on the above-mentioned attaches, many security strategies for defending against cyber attacks[denialof-service (DoS) attacks, deception attacks, replay attacks,etc.] have been proposed.[26–28]Specifically, the authors of Ref.[29] proposed an improved recursive filtering algorithm for a class of CNs with state saturation and deception attacks.In Ref.[30],the problem of partial-nodes-based state estimation was studied for a class of uncertain CNs against deception attacks.Given that the impact of deception and DoS attacks on complex networks will be considered in this paper.The characteristics of the attacks are as follows: Deception attacks replace real data in a communication network by fake data.DoS attacks prevent the transmission of data in a communication network to a remote destination in order to destabilize the system.Note that the hybrid attacks mentioned subsequently in this paper refer to the attack model consisting of the deception attacks and the DoS attacks.

Currently, many scholars have studied the security of complex networks from the perspective of state estimation.However, the literature related to state estimation of complex networks under cyber attacks and network resource constraints is very limited,which is the main motivation of this paper.The other two motivations are as follows: on the one hand,the introduction of dynamic event triggering scheme to avoid bandwidth resource redundancy under high sampling frequency;on the other hand,the development of appropriate security strategies to deal with potential threats in an open network environment.Based on the above three points, this paper aims to meet the system performance requirements while improving the utilization of network resources and effectively resisting cyber attacks.

In this paper,the problem of security state estimation for a class of uncertain CNs with mixed delays and hybrid attacks is studied with the help of a dynamic ETS.To avoid the transmission of redundant data in the communication network, a dynamic ETS is introduced to reduce the need for estimators to perform unnecessary updates of measurement information.Also,a class of complex networks under cyber attacks and dynamic ETS is modeled as a dynamic system by considering unknown deception attacks and DoS attacks in the communication network.Then,sufficient conditions to ensure that this system is stable and satisfies theH∞performance constraint are obtained by using Lyapunov stability theory and linear matrix inequality(LMI).Based on the above stability criterion,a dynamic event-triggered estimator is designed to estimate the plant state.Finally,the validity of the designed dynamic eventtriggered estimator is verified by two examples.The main contributions of this paper are as follows:

A novel dynamics model is developed to describe the delay phenomenon among nodes, data transmission scheduling strategies and hybrid attack behaviors in CNs.

Considering the complexity of physical networks, the form of cyber attacks is extended from the universal single attack to the hybrid attacks consisting of many different attack behaviors.

Two sets of Bernoulli random variables are utilized to depict the random occurrence sequences of deception attacks and DoS attacks,respectively.

Based on the above dynamics model,uncertainties in the system parameters are further considered and robust stability analysis is also developed.

Notations: Rn×mmeansn×mreal matrix; Rndenotesn-dimensional Euclidean space;A> 0 (A≥0) implies positive definite (positive semi-definite) symmetric matrix; E {A} represents mathematical expectation of random variableA; colN{Xi} and diagN{Yi} stand for the blockcolumn matrix col{X1,X2,...,XN}and the block-diagonal matrix col{Y1,Y2,...,YN},respectively.

2.Preliminaries

Consider the following CNs withNcoupled nodes:

wherexi(k)∈Rn,yi(k)∈Rmandzi(k)∈Rrare,respectively,the state vector, the ideal measurement output and the output to be estimated of thei-th node; η(k) is the discrete timevarying delay and satisfies ηm≤η(k)≤ηM;is the finite-distributed delay and satisfies 10(i/=j)but not all zero,and the diagonal element is expressed bywii=.Ai,Bi,Di,EiandMiare known matrices.ΔAi(k), ΔBi(k), ΔDi(k) and ΔΓ(k) are the perturbed matrices,which are expressed as

whereNi,Mai,Mbi,Mdi,NΓandMΓare known matrices.F(k)is a uncertain matrix and satisfiesFT(k)F(k)≤I.

Fig.1.The systematic structure.

It is well known that the limited network bandwidth is insufficient to support the transmission of high frequency sampled signals in communication networks.For this reason,we need to introduce a suitable data transmission scheduling scheme to reduce the amount of data transmission in the communication network.In addition for open network environments,we have to take into account the potential risk of cyber attacks.Specifically, the main work of this paper is devoted to study a co-design method for robust state estimation and dynamic event-triggered schemes against hybrid attacks.In Eq.(1),the uncertain complex networks with time-varying delay and finite-distributed delay are given.As shown in Fig.1,we model the dynamic event-triggered scheme,hybrid attacks as well as the system under consideration uniformly,and transform them into an estimation error dynamic model.Details are as follows:

Firstly,without dynamic event-triggered scheme and hybrid attacks, the ideal measurement output can be expressed asyi(k)=Cixi(k).Secondly, we introduce a dynamic eventtriggered scheme in the communication network between sensors and estimators.For each node, the next release instantof thei-th node(1

where πiand σiare given constants,and ξi(k)=yi(k)?;is the last released data-packet.Moreover,φi(k)is a dynamic function and satisfies

where 0<τi<1,and φi(0)is a given initial condition.

For ξi(k)=yi(k)?,the measurement output applied to the above scheme can be represented as

Then, since an open network environment may be exposed to multiple potential security risks, we discuss the impact of two types of cyber attacks on the complex networks.As a result,the data-packet transmitted to the estimator under the hybrid attacks can be expressed as

where αi(k) and βi(k) are Bernoulli distributed white sequences.

Assumption 1The nonlinear functionf(xi(k)) represents the deception attack signal and satisfies the following condition:

withFbeing a real constant matrix.

Assumption 2αi(k)and βi(k)satisfy the following statistical properties:

From this,we have

Remark 1In Eq.(6),andf(xi(k)) are introduced to model the transmission data under hybrid cyber attacks.When αi(k)=0 and βi(k)=0,the data transmission in the communication network is normal.When αi(k)=1 and βi(k)=0,the real data is replaced by false signal from deception attack.When αi(k)=0 and βi(k)=1,DoS attacks block all data transmission in the communication network.

Remark 2If∈(0,1)and∈(0,1),data transmission in the communication network is affected by both types of cyber attacks.The Bernoulli distributed white sequence used to describe the occurrence or non-occurrence of different cyber attacks is unlikely to be identical.DoS attack and deception attack may occur alternately or simultaneously.The DoS attack is characterized by preventing any data from being transmitted through the communication network to its destination,and the false signal generated by the deception attack is no exception.Therefore, we default the DoS attack to enjoy priority in the actual numerical simulation,that is,the deception attack is not considered when both types of cyber attacks are released at the same time.

Construct the following state estimator for nodei:

Denote thatei(k)=xi(k)?,and.

For natational convenience,we further denote

Then, through Kronecker product,in Eqs.(1) and (10) can be rewritten as.From Eqs.(1)–(10),we obtain

By setting ζ(k)=,we obtain the following augmented system:

where

For convenience of follow-on work,we require some necessary processing of Eq.(12)according to Assumption 2,and Eq.(12)can be rewritten as

where

Lemma 1For a real constant ρi>0, and matrixR>0,the following inequality holds:

The following definition will play an important role in the stability analysis of dynamic system(12)and the design of the corresponding estimator(10).

Definition 1[10]For real constants ?a>0 and 0<<1,dynamic system(12)withw(k)=0 is said to be exponentially mean-square stable(EMSS),so that

3.Main results

In this section,we design the estimator gain for a class of complex networks under the premise of ensuring the stability of the augmented system.First,we give a sufficient condition to ensure that the system is exponentially mean-square stable and that theH∞performance constraint is satisfied.Then,based on the above theorem,a design method for the estimator gain is given.The main content of this section will be presented as the following theorems.

Theorem 1Given,γ,τi,πi,σi(i=1,2,...,N),and the estimator gainL, system (12) is EMSS, and satisfies theH∞performance constraint for all nonzero ω(k),if there exist matricesP>0,Q>0,R>0,and scalar δ1>0,the following LMI will hold:

where

ProofChoose the following Lyapunov functional candidate:

where

Taking the difference and mathematical expectation ofV(k)along the system(12)yields

Taking consideration of triggering condition(3)and nonlinear constraint(7),the following inequalities hold:

Then,it follows from Lemma 1 that

where Σμ=.Notice that the following zero equality holds:

Denote

where C,F,M,Λ3,Λ4,Λ5,Π1,Π2,Π3and Π4are defined in Eq.(15).

Under the zero initial condition,we can obtain the following inequality by summing both sides of Eq.(26)from 0 toTand lettingT→∞:

which implies that theH∞performance constraint is ensured.Then,with the help of Schur complement,we can obtain

From Definition 1 and Eq.(27), when LMI (14) holds,augmented system(12)is EMSS and satisfiesH∞performance constraint.This completes the proof.

Next,a design method of the desired estimator in form of Eq.(10)for the augmented system(12)can be presented in the following theorem.

Theorem 2Given,,γ,τi,πi,σi(i=1,2,...,N),the estimator in form of Eq.(10) for the augmented system (12)can be designed if there exist matricesP=diag{P1,P2}>0(P1=diagN{P1i},P2=diagN{P2i}),Q>0,R>0, and scalar δ1>0,ε >0,such that the following LMI holds:

where

and Ξ is defined in Eq.(15).Moreover,the designed estimator gains can be obtained by

ProofRecalling Eq.(14),one has

where

Then,it follows from the S-procedure Lemma:

Through the Schur complement Lemma, Eq.(34) can be rewritten as

ConsideringP2L=X, we can obtain that Eq.(35) is equivalent to Eq.(29).This completes the proof.

4.Examples and simulations

In this section, two numerical examples are provided to verify the effectiveness of the proposed design scheme.

Example 1Consider CNs(1)withN=3, and the relevant parameters as follows:

The noise signal and the deception attack signal are chosen as ω(k) = 0.2cos(k)e?0.1kandf(y(k)) =?tanh(0.18y(k)), respectively.Set other parameters to ηm=2, ηM=4,h=0.1,d=3, μs=2?(s+1),F=0.18, πi=0.2,σi=0.5, τi=0.7,i=0.2,i=0.2 and γi=2(i=1,2,3).Then, the estimator gain matrices can be obtained by Theorem 2:

In simulation, the initial conditions of CNs and internal dynamic variable of dynamic event-triggered scheme(DETS)are assumed thatxi(0) =[0.1 ?0.1]T, and φi(0) = 0 (i=1,2,3).

Fig.2.Output estimation error of node 1.

Fig.3.Output estimation error of node 2.

For nodei(i= 1,2,3), the estimation errorsare shown in Figs.2–4; the occurrence of the deception attacks and the DoS attacks are illustrated in Figs.5 and 6.

Fig.4.Output estimation error of node 3.

Fig.5.Occurrence of the deception attacks.

Fig.6.Occurrence of the DoS attacks.

Fig.7.Output estimation errors of node 1,node 2,and node 3.

Fig.8.Dynamic event-triggered release instants and intervals in node 1.

Fig.9.Dynamic event-triggered release instants and intervals in node 2.

Example 2Consider that CNs (1) are composed of 3 nodes with

Other parameters are set as the same as in Example 1.Next,the gains of the designed estimator are given by Theorem 2:

Fig.10.Dynamic event-triggered release instants and intervals in node 3.

Simulation time isT=20 s,and sampling period selectsh=0.1 s.For nodei(i=1,2,3),the estimation errorsare shown in Fig.7.The dynamic event-triggered release instants and intervals in nodes 1, 2, and 3 are shown in Figs.8–10.The average period,maximum release interval,and transmission rate by DETS and time-triggered scheme are listed in Table 1.According to Table 1,it is easily found that the results simulated by DETS are better than those of the time-triggered scheme.From Figs.8–10 and Table 1, with the help of the dynamic event-triggered scheme(DETS),a higher communication efficiency is obtained against the hybrid attacks while ensuring the desired system performance,which shows the effectiveness of the proposed method.

Table 1.The average period,maximum release interval and transmission rate for different schemes in the examples.

5.Conclusion

In summary, the problem of robustH∞state estimation for a class of uncertain CNs with mixed delays and hybrid attacks has been studied by introducing a dynamic ETS.The hybrid attacks have been modeled with the help of two sets of Bernoulli random variables.A dynamic ETS has been introduced to improve the utilization of network resources.A structural framework containing CNs,dynamic ETS,state estimators, and hybrid attacks has been developed.The stability criterion for dynamic systems of this framework has been obtained.A dynamic event-triggered estimator has been designed for CNs under hybrid attacks.Finally, two examples have been given to illustrate the effectiveness of the proposed method.In the future,the problem of synchronization and pinning control for CNs under cyber attacks will be investigated.

主站蜘蛛池模板: 亚洲乱伦视频| 久久国产精品麻豆系列| 国产亚洲精品自在线| 在线观看国产黄色| 亚洲第一极品精品无码| 人妻丰满熟妇AV无码区| 国产办公室秘书无码精品| 欧美劲爆第一页| 欧美 国产 人人视频| 老司机精品一区在线视频| 欧美成人精品一区二区| 播五月综合| h视频在线播放| 色偷偷男人的天堂亚洲av| 欧美三级自拍| 免费一级毛片在线播放傲雪网| 成人福利在线视频免费观看| 性做久久久久久久免费看| 国产永久在线视频| aaa国产一级毛片| 久久久久久久久亚洲精品| 国产精品视频公开费视频| 国产精品自拍合集| 好紧好深好大乳无码中文字幕| 热re99久久精品国99热| 中文字幕第4页| 国产精品亚洲欧美日韩久久| 亚洲成肉网| 免费中文字幕在在线不卡| AV网站中文| 无码精品一区二区久久久| 国产理论一区| 欧美日韩成人| 少妇精品久久久一区二区三区| 免费无码又爽又刺激高| 国产成人8x视频一区二区| 欧美成一级| 91尤物国产尤物福利在线| 国产在线拍偷自揄拍精品| 亚洲人成影院午夜网站| a色毛片免费视频| 日韩黄色精品| 欧美成a人片在线观看| 久久精品人人做人人| 欧美三级视频网站| 久久人与动人物A级毛片| 9cao视频精品| 欧美国产日产一区二区| 日韩国产一区二区三区无码| 国产乱人视频免费观看| 国产97视频在线| 国产在线小视频| 97精品国产高清久久久久蜜芽 | 毛片视频网| 国产精品吹潮在线观看中文| 91福利在线观看视频| 国产精品任我爽爆在线播放6080| 女人18毛片一级毛片在线 | 日韩欧美国产区| 久久毛片免费基地| 亚洲精品视频在线观看视频| 国产成人av大片在线播放| 亚洲bt欧美bt精品| 99在线视频网站| 国产毛片网站| 91色老久久精品偷偷蜜臀| 久久9966精品国产免费| 日本免费a视频| 欧美三級片黃色三級片黃色1| 福利在线一区| 国产精品欧美亚洲韩国日本不卡| 97久久人人超碰国产精品| 国产精品美人久久久久久AV| 在线中文字幕日韩| 国产精品林美惠子在线观看| av无码一区二区三区在线| 国产精品亚欧美一区二区三区| 久久久噜噜噜| 久久天天躁狠狠躁夜夜2020一| 国产一区二区三区免费观看| 久久久久国产精品熟女影院| 久久精品中文字幕免费|