Preprint
Article

Adaptive Event-based Dynamic Output Feedback Control for Unmanned Marine Vehicle Systems Under DoS Attack

Altmetrics

Downloads

102

Views

35

Comments

0

A peer-reviewed article of this preprint also exists.

Submitted:

18 December 2023

Posted:

21 December 2023

You are already at the latest version

Alerts
Abstract
An event-based dynamic output feedback control (DOFC) strategy for unmanned marine vehicle (UMV) systems is concerned. The whole UMV systems are composed of an UMV closed-loop system, a land-based control unit and the communication network. To increase the effectiveness of data transmission in the network channel and better enable the control unit against attack, an adaptive event-triggered mechanism (AETM) is applied. Moreover, a quantizer is installed between the sampler and the control unit. The quantizer further reduces the communication burden. The occurrence of aperiodic denial-of-service (DoS) attack is considered in the channel from the control unit to the UMV system. Sufficient criterion for ensuring global exponential stability of system with an expected H∞ disturbance attenuation index is obtained. Co-design of the dynamic output feedback controller and the AETM is derived. The effectiveness of the proposed approach is verified in the given illustrative simulation. The simulation results indicate that the reduction percentages of yaw angle amplitudes and yaw velocity accumulative error of the UMV system with the control strategy proposed in this paper are 43.2%and 45.9%, respectively, which are 0.3% and 5.8% improvement in both metrics compared to the previously published work.
Keywords: 
Subject: Engineering  -   Control and Systems Engineering

1. Introduction

In recent years, Artificial Intelligence, Cloud Computing, Big Data and other internet fields develop rapidly [1]. All these rapid developments are inextricably linked to wireless network technology. The networked control systems (NCSs) become a hot area of research due to its practical applications. It enables the remote control in a networked environment [2,3,4,5,6]. As the significant advantages of lower cost of design and easier maintenance, NCSs are widely used in unmanned marine vehicle (UMV). The networked UMV is often used for its practical applications in the fields of military or non-military missions, management of fishery resources, marine environmental monitoring or cleaning, the exploration of oil and gas [7]. With the exploitation of the oceans, the analysis of UMV systems is emerged as a hot subject of investigation. UMV systems are inevitably subject to the effects of climate, waves and other uncertainties when carrying out tasks. As a result, plentiful control methods are proposed to guarantee the performance of the UMV systems, such as, sliding mode control [8,9], formation control [10,11,12], trajectory tracking control [13,14,15], neural network control [16,17] and so on.
In reference [18], the coordinated path tracking problem for UMV systems with directional topologies based on distributed control is investigated. A guidance method based finite-time line-of-slight is introduced to track the desired path for independent UMV. In [19], a dynamic output feedback control (DOFC) strategy is designed for UMV tracking problems with delay and packet loss. To resist disturbances, in reference [20], a coordinated tracking control strategy of UMV systems with unknown dynamics and external disturbances is studied. A wavelet neural network-based distributed tracking controller is introduced to accurately estimate unknown dynamics and external disturbances. A dwell control method for UMV systems is presented in [21] to counteract the effects of unknown size and orientation disturbances. An adaptive law for slow changes to gently alter the navigation of the vehicle is proposed to minimise positioning errors. In addition to the above-mentioned interference from environmental factors, UMV systems are vulnerable to cyber attavk as the open nature of the wireless network. Generally, there exist two main categories of cyber attack on NCSs. One is the denial-of-service (DoS) attack that blocks data transmission and the other is the deception attack that injects false information into the transmitted data [22,23]. The network-based Takagi-Sugeno (T-S) fuzzy UMV systems under DoS attack are studied and a semi-Markovian jumping system description of the DoS attack phenomenon is presented in [24]. In reference [25], hybrid attack including DoS attack and deception attack is investigated. A model which based on the T-S fuzzy system with random switching is proposed to defend against the hybrid attack.
More critically, traditional time-triggered control completes the sampling task within a fixed sampling period where sampling method inevitably wastes the network resources. The network channel is congested in severe cases and further causes packet loss and transmission delay. The event-triggered mechanism (ETM) is first proposed in [26]. It gradually becomes a hot research topic in past few decades and a significant number of achievements are emerged [27,28,29]. In reference [30], the problem of event-triggered dynamic localisation of switched UMV systems is investigated . A novel weighted ETM that considers the switching characteristics is studied. The containment problem of networked under actuated UMV systems is investigated in [31]. To guide the UMV systems toward the corresponding points of reference, an event-triggered control scheme is designed for individual UMV based on the observational data. This method effectively reduces the communication burden. In reference [32], a novel robust adaptive fault-tolerant control strategy and an improved multiplied ETM for UMV systems are introduced. An estimation model with a parsimonious form is used to design the ETM. As can be seen from the above research results, saving network resources is particularly important. As the quantizer can moderately compress the signal before transmission, the network bandwidth occupied by the signal transmission is significantly reduced [33,34]. It improves the utilization rate of communication resources. However, to the best of our knowledge, rare work on the problem of adaptive event-triggered mechanism (AETM) and quantitative mechanism based DOFC for UMV systems in the presence of DoS attack is performed yet. Therefore, the main motivation of this paper to shorten such a gap by initiating a systematic study.
Based on the above discussions and considering that the state vectors of the UMV system may not be all measurable due to the various complex environmental factors, a DOFC strategy which based on the ETM and the quantitative mechanism is investigated in this paper. The measurement data from the sampler is processed by the event-triggered unit and the quantitative unit. The processed measurement data is then sent to the land-based control unit. The calculated control signal is eventually transmitted to the UMV closed-loop system through the communication channel. The occurrence of aperiodic DoS attack is considered in the transmission channel of the control signal. In addition, an AETM is adopted. The threshold parameter for trigger condition is adjusted online by AETM. Through the construction of the Lyapunov functional, the conditions of global exponential stability for the UMV systems are obtained. Finally, the effectiveness of the proposed methods is verified by simulation. The main contributions are summarized in the following points:
(i)
A novel closed loop system model of networked UMV systems with an event-triggered unit and a quantizer is established. The impact of network induced delay, external disturbance and aperiodic DoS attack are involved.
(ii)
A quantitative mechanism is installed on the basis of adaptive event-triggered unit which can further save the network resources. And an environment accompanied by more severe cyber attack is considered.
The paper is organized as follows. In section 2, the modeling of the closed UMV systems are obtained. And a dynamic output feedback controller based on AETM and quantitative mechanism under aperiodic DoS attack is designed. Section 3 gives the sufficient criterion for ensuring global exponential stability of system with an expected H disturbance attenuation index and the design method of controller. A numerical simulation to verify the effectiveness of the proposed control strategy is given in Section 4. In section 5, conclusions and future work are shown.

1.1. Notation

Throughout this paper, the notation as follows is used: R n denotes the n-dimensional Euclidean space, · 2 denotes the Euclidean vector norm, P > 0 means that the matrix P is real symmetric positive definite, I is the identity matrix with appropriate dimension, the symbol ∗ denotes the symmetric term in a matrix, s y m ( P ) denotes P + P T , λ min A and λ max A denotes the minimum or maximum eigenvalue of the matrix A , respectively.

2. Preliminaries and problem formulation

2.1. Networked modelling for the UMV system

The main work is done in this section to model the UMV. As the usual model for describing the marine vehicle dynamics is the first order Nomoto model. The model of a nominally higher order state space is comparable to it [35]. Consequently, a three degrees of freedom UMV which is supplied with thrusters is served as a reference model for the target plant. In Figure 1, a structural diagram of the considered UMV system is shown with the ground-mounted frame and the body-mounted frame. Where x 0 , y 0 and z 0 indicate the vertical, horizontal and normal axes in the frame, respectively. The earth-fixed reference frames are represented as x , y and z.
The body-fixed equation for the UMV is described as the formula below:
M v ˙ + N v ( t ) + G η ( t ) = u ( t )
where v ( t ) = α ( t ) β ( t ) γ ( t ) T represents the velocity vector. The velocity of surge, sway and yaw is denoted as α ( t ) , β ( t ) and γ ( t ) , respectively. η ( t ) = x f ( t ) y f ( t ) φ f ( t ) T denotes a vector containing position and angle, where x f ( t ) and y f ( t ) represent positions, φ f represents the yaw angle. The control input vector is denoted as u ( t ) = u 1 ( t ) u 2 ( t ) u 3 ( t ) T . The forces of surge and sway are denoted as u 1 ( t ) , u 2 ( t ) and the moment in yaw is denoted as u 3 ( t ) , respectively; M is the matrix of inertia and it satisfies M = M T > 0 . Matrix N indicates damping. And matrix G indicates mooring forces. The function η ( t ) is satisfied as
η ˙ = K ( ψ ( t ) ) v ( t )
where K ( ψ ( t ) ) = cos ( ψ ( t ) ) sin ( ψ ( t ) ) 0 sin ( ψ ( t ) ) cos ( ψ ( t ) ) 0 0 0 1 .
Due to UMV may stop or anchor when executing tasks. We assume the yaw angle ψ ( t ) is sufficiently small. As the result, sin ( ψ ( t ) ) 0 and cos ( ψ ( t ) ) 1 can be obtained. Then the matrix K ( ψ ( t ) ) I is obtained. Give some definitions as M 1 G = A 1 , M 1 N = A , B = M 1 and v ( t ) = x ( t ) . Such that the system (1) is expressed as:
x ˙ ( t ) = A x ( t ) + B u ( t ) A 1 g ( t , x ( t ) )
where g ( t , x ( t ) ) = η ( t ) , and it represents a vector-valued function of state vector x ( t ) which is nonlinear. Inevitable disturbances such as wind and waves are denoted as ω ˜ ( t ) . The system (3) is then obtained as
x ˙ ( t ) = A x ( t ) + B u ( t ) + ω ˜ ( t ) A 1 g ( t , x ( t ) )
As mentioned above, there is a high degree of uncertainty when marine vehicles operates on the ocean. The main objective is to mitigate the yaw velocity error amplitude. It is accomplished by keeping state x ( t ) track an anticipated reference as accurately as possible. Through a combination of items ω ˜ ( t ) and A 1 g ( t , x ( t ) ) . Equation (4) is rewritten to:
x ˙ ( t ) = A x ( t ) + B u ( t ) + ω ^ ( t )
where ω ^ ( t ) = ω ˜ A 1 g ( t , x ( t ) ) .
For the given reference state x r ( t ) . The tracking error e ( t ) is then expressed as e ( t ) = x ( t ) x r ( t ) . Based on the definition of e ( t ) and Equation (5), we have:
e ˙ ( t ) = A e ( t ) + B u ( t ) + ω ( t )
where ω ( t ) = ω 1 ( t ) ω 2 ( t ) ω 3 ( t ) T = A x r ( t ) + ω ^ ( t ) .
The controlled output z ( t ) is described as:
z ( t ) = C z e ( t )
where C z is the output matrix with C z = 0 0 1 .
From the above equations (6) and (7), one can get that:
e ˙ ( t ) = A e ( t ) + B u ( t ) + ω ( t ) z ( t ) = C z e ( t ) , e ( t 0 ) = e 0
where e ( t ) R n and u ( t ) R u represent the error state and the control input, respectively. ω ( t ) R w represents the uncertain disturbance and it belongs to L 2 0 , . e 0 R n represents the initial vector of the error state. The constant matrices A , B of appropriate dimensions are known.
In this section, a dynamic error system for the UMV is established. The entire networked UMV systems are illustrated in Figure 2. It integrates an UMV system, a control unit and the communication network. The data packets are transmitted from the sampler to the control unit via the communication network. And the successful transmission of the sampling signal is determined by an ETM. In addition, a quantitative mechanism is also considered to further reduce communication resources. As the communication channel is vulnerable to cyber attack, the considered DOS attack is a common type that can severely jam communication channel. And the UMV closed-loop system cannot successfully receive control signal during the interval that the DoS attack signal occurs.

2.2. Aperiodic DoS attack

The occurrence of aperiodic DoS attack is integrated into the network channel between the land-based control unit and the UMV system. The n t h DoS attack interval is represented as S n l n , l n + δ n , ( n N , l n 0 , l 0 = 0 ) . During this interval, the network channel allows the data packet transmission and the attack signal is inactive [36]. Similarly, define T n l n + δ n , l n + 1 as the n t h DoS attack interval, the attack signal during this time interval is active. Released data packets from the control unit cannot be transmitted to the UMV system. It should be noted that δ n > 0 represents the sleeping length of the attack signal. We can get that the occurrence of the attack within a period appears at the time instant l n + δ n until the end of the time instant l n + 1 , which satisfies l n + 1 > l n + δ n . In addition, the DoS attack signal is aperiodic. It indicates there are variations in sleeping length δ n . With the above discussions, the aperiodic attack signal is defined by a piecewise function as follows to represent whether the attack is active or not:
D o S = 0 , t S n 1 , t T n
where the constant 0 in the piecewise function (9) indicates the DoS attack signal is inactive, the value of 1 indicates the DoS attack signal is active.
Note that if the DoS attack lasts long enough, the closed-loop system will be unstable and difficult to meet the desired performance indicators. To limit the dwell time and frequency of the attack signal, the assumptions are introduced to aid in the theoretical derivation.
Assumption 1
[36]: There are two positive scalars δ min , ϑ max , which satisfy δ min inf n N δ n for S n , ϑ max sup n N l n + 1 l n δ n for T n , respectively.
Assumption 2
[36]: The frequency of the DoS attack signal transition from active to inactive is defined as N t ( 0 , t ) during the time interval 0 , t . It is expressed as N t ( 0 , t ) = c a r d n N | t > l n + δ n , the symbol c a r d indicates the number of items contained in the set. Given a parameter τ D R > 0 , arbitrary k ^ R 0 , the DoS frequency constraint is satisfied by the sequence of attack signal given by T n for all t R 0 , the following condition is guaranteed:
N t ( 0 , t ) k ^ + t τ D
With the consideration of DoS attack, the error dynamic system is obtained as:
e ˙ ( t ) = A e ( t ) + B u ( t ) + ω ( t ) , t S n e ˙ ( t ) = A e ( t ) + ω ( t ) , t T n z ( t ) = C z e ( t ) , e ( t 0 ) = e 0
Remark 1.
According to the Assumptions 1 and 2, the lower sleep length boundary δ min , the upper attacking length boundary ϑ max and the DoS attack frequency N t ( 0 , t ) are defined. The scalar τ D in the constraint frequency condition is the average dwell-time. In addition, the upper sleeping length boundary is defined as δ max sup n N δ n .

2.3. The adaptive event-triggered communication mechanism

Due to a large number of data packets are transmitted from the sampler to the land-based control unit. The network channel is inevitably blocked. The considered ETM in UMV systems can not only reduce the amount of data traffic in the channel, but also protect against DoS attack. The sampling period of sampler is defined as h. And it satisfies 0 < h < δ n . We define a sampled-packet ( k , y ( k h ) ) which contains the released sampled signal y ( k h ) , k 1 , 2 , . . . and the corresponding marker k. The packets are transmitted from the event-triggered unit to the quantizer via channel after encapsulation. When the k t h data packet is transmitted successfully, we define this moment as t k , t N + and one can obtain that t 1 < t 2 < · · · < t k < · · · .
It should be noted that an ETM with dynamic threshold is investigated in this paper. It compares the last successfully released packet ( t k , y ( t k h ) ) , t k l with the current packet ( t k + d , y ( t k h + d h ) ) , d 1 , 2 , . . . to make the decision whether to transmit the current packet. In reference [37], the current packet released from the event-triggered unit and update the trigger time instant if the condition (11) holds:
t k + 1 h = inf t k h + d h > t k h | g ( t k + d ) h > 0
where g ( ( t k + d ) h ) = y ( ( t k + d ) h ) y ( t k h ) T Φ y ( ( t k + d ) h ) y ( t k h ) σ ( ( t k + d ) h ) y ( t k h ) T Φ y ( t k h ) , the item σ ( ( t k + d ) h ) represents the threshold parameter which is dynamic and variable, the weighting matrix Φ satisfies Φ > 0 , which is determined in the next section. And the threshold parameter σ is satisfied with the condition (12):
σ ( ( k + 1 ) h ) = ( 1 κ σ ( ( k + 1 ) h ) σ ( k h ) r ( k h )
where r ( k h ) = ( y ( t k + k ) h ) y ( t k h ) T Φ ( y ( t k + k ) h ) y ( t k h ) , ( t k + k ) h t k h , t k + 1 h , κ > 0 is a given constant.
Lemma 1.
[19] For the condition (12) of the dynamic threshold parameter, an initial threshold σ 0 0 , 1 is given that satisfies the condition below
0 σ ( k h ) σ 0 1
for all k N . And σ ( k h ) represents a sequence consisting of threshold parameters at different moments. Remark 2. It should be mentioned that the event-triggered condition is only related to the current sample signal and the previous trigger signal. The current data packets are passed to the control unit when the trigger condition (11) is fulfilled. The control signal is updated once. In addition, the threshold parameter in (11) is not always fixed and its value is dynamically adjusted based on condition (12).
Nevertheless, the condition of ETM (11) has some limitations. When the DoS attack occurs, condition (11) cannot be used directly. With this situation, the time instant of the event trigger is redefined as:
t k , n h = { t k h satisfying ( 11 ) | t k h S n } { l n }
The quantitative unit receives packets released by the event-triggered unit is defined as y ¯ ( t ) = y ( t k , n h ) .

2.4. The quantitative mechanism

A quantizer is considered to be installed in the communication channel between the sampler and the control unit. The measurement output signal y ¯ t is quantized by quantizer Q y ¯ t before being transmitted. And it is redefined as y ˜ ( t ) . The static logarithmic and time-invariant quantizer [38] is investigated to process signal in this paper. The quantitative level is given as:
U = ± u m , u = ρ m u 0 , m = 0 , ± 1 , ± 2 , . . . ± u 0 0
where 0 < ρ < 1 represents the quantification density and u 0 > 0 . The quantification function Q ( · ) is by the definition as (16):
Q ( ν ) = u m , 1 1 + δ y u m < υ < 1 1 δ y u m 0 , ν = 0 Q ( ν ) , ν < 0
where δ y = 1 ρ 1 + ρ
The quantizer Q y ¯ t is denoted as the following form:
Q y ¯ t = Q y ¯ 1 t , Q y ¯ 2 t , . . . , Q y ¯ n t T
For the quantification effects, we deal with quantification errors with the help of the sector constraint method which introduced in [38], where the quantizer is remodelled as:
Q y ¯ t y ¯ ( t ) = Δ y y ¯ ( t )
where Δ y = d i a g Δ y 1 , Δ y 2 , . . . , Δ y n , Δ y δ y , δ y
Based on the above discussions, the quantified data packets y ˜ ( t ) is expressed as (19):
y ˜ ( t ) = ( I + Δ y ) y ¯ ( t ) = ( I + Δ y ) y ( t k , n h )
Network induced delay in communication channel is inevitable. The networked delay is represented as τ k , n which occurs at time instant t k , n . It satisfies condition 0 τ t k , n τ ¯ . Such that, the controller successfully receives the released data packets at time t k , n h + τ t k , n and held until time t k + 1 , n h + τ t k + 1 , n . We make the following definition K k , n = t k , n h + τ t k , n , t k + 1 , n h + τ t k + 1 , n , from Equation (14), we have t 0 , n h 0 , and k C ( n ) 0 , 1 , . . . , k ( n ) , where k ( n ) = sup k N | t k , n h n + δ n , if t k ( n ) h h n + δ n , there must exist a time instant t k ( n ) + 1 satisfying t k ( n ) + 1 h > h n + δ n . In addition, the event interval K k , n is divided into the forms as follows:
K k , n = d = 0 d k ζ d
where
d k = t k + 1 , n t k , n 1 ζ 0 = t k , n h + τ t k , n , t k , n h + h + τ t k , n ζ d = t k , n h + d h + τ t k , n , t k , n h + ( d + 1 ) h + τ t k , n ζ d k = t k , n h + d k h + τ t k , n , t k + 1 , n h + τ t k + 1 , n
The delay of the time instant t and error function are defined as τ k , n ( t ) and η k , n ( t ) , respectively. And the following equations are obtained:
τ k , n ( t ) = t t k , n h d h
η k , n = y t k , n h y t k , n + d h
From equations (16), (17) and (18), we can obtain that the differentiable piecewise linear function τ k , n ( t ) satisfies the condition as follows:
0 τ t k , n τ t k , n ( t ) max τ t k , n , τ t k + 1 , n + h τ m + h τ M
where t m denotes the networked delay upper bound. And τ M denotes the boundary parameter parameter. It is related to the sampling period h and the networked delay τ k , n . Such that, one can obtain that:
y ¯ ( t ) = y ( t k , n h ) = y ( t k , n h + d h ) + η k , n ( t )
The signal received by the controller is described as:
y ˜ ( t ) = ( I + Δ y ) y ¯ ( t ) = ( I + Δ y ) [ y ( t τ k , n ( t ) ) + η k , n ( t ) ]

2.5. The investigated dynamic output feedback control strategy

The dynamic output feedback controller is considered as follows:
x ˙ c ( t ) = A c x c ( t ) + B c y ˜ ( t ) + D c x c ( t τ k , n ( t ) ) u ( t ) = C c x c ( t ) , t S n K k , n 0 , t T n
where x c ( t ) R n represents the state vector of the controller. Matrices A c , B c , C c and D c are controller gains with appropriate dimensions. Defining x ˜ ( t ) = c o l e ( t ) , x c ( t ) . By combining error dynamic system (10), trigger time instant condition (11) and the system (27), an extended state space equation is obtained as:
x ˜ ˙ ( t ) = A ˜ 1 x ˜ ( t ) + B ˜ 1 x ˜ ( t τ k , n ( t ) ) + B ˜ 2 η k , n ( t ) + B ˜ ω ω ( t ) , t S n K K , N A ˜ 2 x ˜ ( t ) + B ˜ 1 x ˜ ( t τ k , n ( t ) ) + B ˜ 2 η k , n ( t ) + B ˜ ω ω ( t ) , t T n z ( t ) = C ˜ x ˜ ( t )
where A ˜ 1 = A B C c 0 A c , B ˜ 1 = 0 0 ( I + Δ y ) B c C D c , B ˜ 2 = 0 ( I + Δ y ) B c , B ˜ ω = I 0 , A ˜ 2 = A 0 0 A c , C ˜ = C z 0 . From equations (11), (13), (14) above, for t S n K k , n , the inequality as follows is obtained:
η k , n T ( t ) Φ η k , n ( t ) σ 0 Θ T Φ Θ
where Θ = η k , n ( t ) + C H x ˜ ( t τ k , n ( t ) ) and matrix H is selected as I 0 T .
The model of dynamic output feedback controller and an extended state space equation are given in this section. For analyzing the global exponentially stability of the system (27) in the next section, some preparations are given below.
Definition 1.
[36]: The global exponentially stability of system (27) with ω ( t ) = 0 is guaranteed, if there exist positive scalars μ > 0 and ρ > 0 , which satisfy:
x ˜ ( t ) μ ρ t 0 τ
for t 0 , where 0 τ = sup τ t 0 x ˜ ( t ) , x ˜ ˙ ( t ) , ρ denotes the decay rate.
Lemma 2.
[39]: Given a matrix Y which is positive define symmetric and it satisfies Y > 0 , a scalar a, arbitrary vector x , the inequality as the following form:
a t a t x ˙ T ( s ) Y x ˙ ( s ) d s Ξ 1 T Y Ξ 1 + Ξ 1 T Z Ξ 2 + Ξ 1 T Z T Ξ 2 Ξ 2 T Y Ξ 2
holds, where Ξ 1 = x ( t τ ( t ) ) x ( t ) and Ξ 2 = x ( t a ) x ( t τ ( t ) ) and Z denotes a real matrix which satisfies
Y Z Y 0
Lemma 3.
[40]: Given a matrix U which is positive define symmetric and it satisfies U > 0 , the inequality as the following form:
P Q + ( P Q ) T P U P T + Q T U 1 Q
holds, where P and Q are real matrices with appropriate dimensions.

3. Main result

A lemma is first introduced to help with the subsequent theoretical analysis. The H performance and the exponential stability of the system (27) is analyzed, and the design of the controller (26) is given. Based on the previous descriptions, the construction of a piecewise Lyapunov functional is expressed as:
V ( t ) = V 1 ( t ) , t S n K k , n V 2 ( t ) , t T n
where V i ( t ) = x ˜ T ( t ) P i x ˜ ( t ) + t τ M t x ˜ T ( s ) ζ i R i x ˜ ( s ) d s + τ M τ M 0 t + θ t x ˜ T ( s ) ζ i Z i x ˜ ( s ) d s d θ and ζ i = e 2 ( 1 ) i α i ( t s ) .
Lemma 4.
[28]: Given the parameters δ m i n , ϑ m a x , τ D R > 0 of the DoS attack, and the boundary parameter τ M > 0 , consider the system (27) without disturbance ω ( t ) under DoS attack (9) and the controller (26). If for the given constants α i 0 , + , σ 0 ( 0 , 1 ) , there are some symmetric positive define matrices P i , R i , Z i , ( i = 1 , 2 ) and Φ with appropriate dimensions. Such that, along the trajectories of the system (27), the following inequalities are obtained:
V ( t ) = e 2 α 1 ( t l n ) V ( l n ) , t S n e 2 α 2 ( t l n δ n ) V ( l n + δ n ) , t T n
Based on the above lemmas and definition. The stability analysis of the system (27) is given below.

3.1. The analysis of stability

Theorem 1.
Given fixed parameters δ m i n , ϑ m a x , τ D R of the DoS attack, and the boundary parameter τ M > 0 , consider the system (27) without disturbance ω ( t ) and the controller (26). If for the given scalars σ 0 ( 0 , 1 ) , α i 0 , + , there are some symmetric positive define matrices P i , R i , Z i , ( i 1 , 2 ) and Φ of appropriate dimensions, the conditions as follows are satisfied.
P 1 μ 2 P 2 , P 2 μ 1 e 2 ( α 1 + α 2 ) τ M P 1 , R i μ 3 i R 3 i , Z i μ 3 i Z 3 i ,
0 < ε 2 α 1 δ m i n 2 ( α 1 + α 2 ) τ M 2 α 2 ϑ m a x ln ( μ 1 μ 2 ) τ D .
such that, the system (27) under aperiodic DoS attack (9) is globally exponentially stable (GES) with decay rate ρ ε / 2 .
Proof. 
Based on the Lemma 4, for t 0 , the inequalities as follows:
V 1 ( t ) e 2 α 1 ( t l n ) V 1 ( l n ) , t S n V 2 ( t ) e 2 α 2 ( t l n δ n ) V 2 ( l n + δ n ) , t T n
hold. When t l n , combining inequalities (34), we can obtain:
V ( ( l n ) + ) = x ˜ T ( ( l n ) + ) P 1 x ˜ ( ( l n ) + ) + l n τ M l n x ˜ T ( s ) e α 1 ( l n s ) R 1 x ˜ ( s ) d s + τ M τ M 0 l n + θ l n x ˜ ˙ T ( s ) e α 1 ( l n s ) Z 1 x ˜ ˙ ( s ) d s d θ μ 2 x ˜ T ( l n ) P 2 x ˜ ( l n ) + l n τ M l n x ˜ T ( s ) e 2 α 2 ( l n s ) R 2 x ˜ ( s ) d s + τ M τ M 0 l n + θ l n x ˜ ˙ T ( s ) e α 2 ( l n s ) Z 2 x ˜ ˙ ( s ) d s d θ ]
Similarly, when t l n + d n , the inequality e 2 α 1 ( t s ) e 2 α 1 τ M e 2 α 2 ( t s ) 2 ( α 1 + α 2 ) τ M can be obtained for s t τ M , t . The following inequality is obtained:
V 2 l n + δ n ) + μ 1 e 2 ( α 1 + α 2 ) τ M x ˜ T ( l n + δ n ) P 1 x ˜ ( l n + δ n ) + l n + δ n τ M l n + δ n μ 1 e 2 ( α 1 + α 2 ) τ M x ˜ T ( s ) e 2 α 1 ( l n + δ n s ) R 1 x ˜ ( s ) d s + τ M τ M 0 l n + δ n + θ l n + δ n μ 1 e 2 ( α 1 + α 2 ) τ M x ˜ ˙ T ( s ) e 2 α 1 ( l n + δ n s ) Z 2 x ˜ ˙ ( s ) d s d θ = μ 1 e 2 ( α 1 + α 2 ) τ M V 1 l n + δ n = μ 1 e 2 ( α 1 + α 2 ) τ M V 1 ( l n + δ n )
From the inequalities above, one can obtain that:
V 1 l n μ 2 V 2 l n V 2 l n + δ n μ 1 e 2 ( α 1 + α 2 ) τ M V 1 ( l n + δ n )
1. For t S n , it is well known from Assumption 1, Equations (36) and (37) that
V 1 ( t ) e 2 α 1 ( t l n ) V 1 ( l n ) μ 2 e 2 α 1 ( t l n ) V 2 ( l n ) e g 1 V 1 ( 0 ) e f 1 V 1 ( 0 )
where g 1 = 2 n ( α 1 + α 2 ) τ M + 2 α 2 [ ( l n l n 1 δ n 1 ) + ( l n 1 l n 2 δ n 2 ) + + ( l 1 l 0 δ 0 ) ] 2 α 1 ( δ n 1 + δ n 2 + + δ 0 ) + n ln ( μ 1 μ 2 ) , f 1 = 2 n ( α 1 + α 2 ) τ M + 2 α 2 n ϑ max 2 α 1 n δ min + n ln ( μ 1 μ 2 ) .
By combining Assumption 2 and Condition (35) , one can obtain that:
V 1 ( t ) V 1 ( 0 ) e ϖ 1 e 2 ρ t
where ϖ 1 = 2 ( α 1 + α 2 ) τ M + 2 α 2 ϑ max 2 α 1 δ min + ln ( μ 1 μ 2 ) k ^ .
2. For t T n , the following conclusion is obtained as the same way
V 2 ( t ) e 2 α 2 ( t l n δ n ) V 2 ( l n + δ n ) μ 1 e 2 α 2 ( t l n δ n ) + 2 ( α 1 + α 2 ) τ M V 1 ( ( l n + δ n ) ) 1 μ 2 e g 2 V 1 ( 0 ) 1 μ 2 e f 2 V 1 ( 0 )
where g 2 = 2 ( n + 1 ) ( α 1 + α 2 ) τ M + 2 α 2 [ ( l n + 1 l n δ n ) + ( l n l n 1 δ n 1 ) + + ( l 1 l 0 δ 0 ) ] 2 α 1 ( δ n + δ n 1 + + δ 0 ) + ( n + 1 ) ln ( μ 1 μ 2 ) , f 2 = 2 ( n + 1 ) ( α 1 + α 2 ) τ M + 2 α 2 ( n + 1 ) ϑ max 2 α 1 ( n + 1 ) δ min + ( n + 1 ) ln ( μ 1 μ 2 ) .
By combining Assumption 2 and Condition (35) , one can obtain that:
V 2 ( t ) 1 μ 2 V 1 ( 0 ) e ϖ 2 e 2 ρ t
where ϖ 2 = 2 ( α 1 + α 2 ) τ M + 2 α 2 ϑ max 2 α 1 δ min + ln ( μ 1 μ 2 ) ( k ^ + 1 ) .
Make the following definitions:
a max e ϖ 1 , 1 μ 2 e ϖ 2 , b 1 λ min ( P i ) , b 2 λ max ( P i ) , b 3 b 2 + τ M λ max ( R 1 ) + τ M 2 2 λ max ( Z 1 ) .
From inequalities (38) and (39), we have
V ( t ) a e 2 ρ t V 1 ( 0 )
Alternatively, since
V ( t ) b 1 x ˜ ( t ) 2 , V 1 ( 0 ) b 3 0 h 2
Finally, combining inequalities (40) and (41), we have
x ˜ ( t ) a b 3 b 1 e ρ t 0 h
which proves the system (27) is GES with decay rate ρ . □
Remark 3.
The value of n in the above proof is related to N t ( 0 , t ) which is defined in Assumption 2. Furthermore, a large decay rate ρ is required to ensure the desirable system performance. From the condition (35), we know that the decay rate ρ is related to the DoS attack parameters δ min and ϑ max and the average dwell-time τ D . Such that, the smaller the degree of DOS attack, the larger value of ρ obtained.

3.2. The analysis of H performance

Theorem 2.
Given fixed parameters δ m i n , ϑ m a x , τ D R > 0 for the DoS attack, and the boundary parameter τ M , the controller (26). If for the given scalars γ ( 0 , + ) , μ i ( 0 , + ) , α i 0 , + and σ 0 ( 0 , 1 ) , there are some symmetric positive define matrices P i , R i , Z i , Φ > 0 and matrix Y i , ( i 1 , 2 ) of appropriate dimensions, such that (34), the matrix inequalities as follows:
Σ 1 Σ 21 Σ 31 Σ 41 Σ 5 Σ 6 Φ 0 B ˜ 2 T I 0 γ 2 I B ˜ ω T 0 0 Σ 71 0 0 Σ 8 0 I < 0
Σ 2 Σ 22 Σ 32 Σ 42 Σ 5 Σ 6 Φ 0 B ˜ 2 T I 0 γ 2 I B ˜ ω T 0 0 Σ 72 0 0 Σ 8 0 I < 0
hold, where
Σ 1 = u 1 T sym ( P 1 A ˜ 1 + R 1 + 2 α 1 P 1 ) u 1 + u 1 T sym ( P 1 B ˜ 1 ) u 2 u 3 T e 2 α 1 τ M R 1 u 3 + e 2 α 1 τ M ( u 2 u 1 ) T Z 1 ( u 2 u 1 ) ( u 3 u 2 ) T Z 1 ( u 3 u 2 ) + ( u 2 u 1 ) T Y 1 ( u 3 u 2 ) + ( u 3 u 2 ) T Y 1 T ( u 2 u 1 ) , Σ 2 = u 1 T sym ( P 2 A ˜ 2 + R 2 + 2 α 2 P 2 ) u 1 + u 1 T sym ( P 2 B ˜ 1 ) u 2 u 3 T R 1 u 3 + ( u 2 u 1 ) T Z 2 ( u 2 u 1 ) ( u 3 u 2 ) T Z 2 ( u 3 u 2 ) + ( u 2 u 1 ) T Y 2 ( u 3 u 2 ) + ( u 3 u 2 ) T Y 2 T ( u 2 u 1 ) ,
Σ 21 = u 1 T P 1 B ˜ 2 , Σ 31 = u 1 T P 1 B ˜ ω , Σ 41 = u 1 T A ˜ 1 T + u 2 T B ˜ 1 T , Σ 5 = u 2 T H T C T , Σ 6 = u 1 T H T C z T , Σ 71 = ( τ M 2 Z 1 ) 1 , Σ 8 = ( σ 0 Φ ) 1 , Σ 22 = u 1 T P 2 B ˜ 2 , Σ 32 = u 1 T P 2 B ˜ ω , Σ 42 = u 1 T A ˜ 2 T + u 2 T B ˜ 1 T , Σ 72 = ( τ M 2 Z 2 ) 1 , u 1 = I 2 n 0 2 n × 4 n , u 1 = 0 2 n × 2 n I 2 n 0 2 n × 2 n , u 1 = 0 2 n × 4 n I 2 n .
The system (27) under the aperiodic DoS attack is GES with a prescribed H attenuation index γ ˜ = F 2 F 1 γ , where F 1 = min μ 2 1 , 1 , F 2 = max μ 2 1 e 2 α 1 δ max , e 2 α 2 ϑ max , respectively.
Proof. 
Based on the construction of the piecewise Lyapunov functional in (32). For analyzing the H performance of system (27) for any nonzero ω ( t ) , the inequalities as follows need to be guaranteed:
For t S n K k , n :
V ˙ 1 ( t ) + 2 α 1 V 1 ( t ) + z T ( t ) z ( t ) γ 2 ω T ( t ) ω ( t ) 0
For t T n :
V ˙ 2 ( t ) 2 α 2 V 2 ( t ) + z T ( t ) z ( t ) γ 2 ω T ( t ) ω ( t ) 0
In accordance with the Lyapunov functional in (32), we have
V ˙ 1 ( t ) = 2 x ˜ T ( t ) P 1 x ˜ ˙ ( t ) + x ˜ ( t ) T R 1 x ˜ ( t ) x ˜ T ( t τ M ) e 2 α 1 τ M R 1 x ˜ ( t τ M ) 2 α 1 t τ M t x ˜ T ( s ) e 2 α 1 ( t s ) R 1 x ˜ ( s ) d s + τ M 2 x ˜ ˙ T ( t ) Z 1 x ˜ ˙ ( t ) τ M t τ M t x ˜ ˙ ( s ) e 2 α 1 ( t s ) Z 1 x ˜ ( s ) d s 2 α 1 τ M τ M 0 t + θ t x ˜ ˙ ( s ) e 2 α 1 ( t s ) Z 1 x ˜ ( s ) d s d θ 2 x ˜ T ( t ) P 1 x ˜ ˙ ( t ) + x ˜ T ( t ) R 1 x ˜ ( t ) x ˜ T ( t τ M ) e 2 α 1 τ M R 1 x ˜ ( t τ M ) 2 α 1 t τ M t x ˜ T ( s ) e 2 α 1 ( t s ) R 1 x ˜ ( s ) d s + τ M 2 x ˜ ˙ T ( t ) Z 1 x ˜ ˙ ( t ) τ M e 2 α 1 τ M t τ M t x ˜ ˙ ( s ) Z 1 x ˜ ( s ) d s 2 α 1 τ M τ M 0 t + θ t x ˜ ˙ ( s ) e 2 α 1 ( t s ) Z 1 x ˜ ( s ) d s d θ
Based on the Lemma 2 and inequality (47). Define ( t ) = x ˜ , x ˜ ( t τ k , n ( t ) ) , x ˜ ( t τ M ) . The inequality (45) is converted to the following form:
V ˙ 1 ( t ) + 2 α 1 V 1 ( t ) + z T ( t ) z ( t ) γ 2 ω T ( t ) ω ( t ) T ( t ) u 1 T sym ( P 1 A ˜ 1 ) + R 1 + 2 α 1 P 1 u 1 + u 1 T sym ( P 1 B ˜ 1 ) u 2 u 3 T e 2 α 1 τ M R 1 u 3 + e 2 α 1 τ M ( u 2 u 1 ) T Z 1 ( u 2 u 1 ) ( u 3 u 2 ) T Z 1 ( u 3 u 2 ) + ( u 2 u 1 ) T Y 1 ( u 3 u 2 ) + ( u 3 u 2 ) T Y 1 T ( u 2 u 1 ) ( t ) + τ M 2 x ˜ ˙ T ( t ) Z 1 x ˜ ˙ ( t ) + z T ( t ) z ( t ) γ 2 ω T ( t ) ω ( t ) + η k , n T ( t ) Φ η k , n ( t ) η k , n T ( t ) Φ η k , n ( t )
By Schur complement and inequality (28), inequality (45) is converted to matrix inequality (43), and the establishment of condition (43) guarantees that inequality (45) holds. In the same way, if condition (44) is guaranteed, then condition (46) holds.
From condition (35), the following inequality is obtained:
μ 2 1 e 2 α 1 δ min μ 1 e 2 ( α 1 + α 2 ) τ M + 2 α 2 ϑ max 0
Defining F ^ 1 ( n ) = μ 2 1 e 2 α 1 ( t l n ) and F ^ 2 ( n ) = e 2 α 2 ( t l n + 1 ) , for t 0 , l n + 1 , the following inequality is derived:
k = 0 n l k l k + δ k F ^ 1 ( k ) γ 2 ω T ( t ) ω ( t ) z T ( t ) z ( t ) d t + k = 0 n l k + δ k l k + 1 F ^ 2 ( k ) γ 2 ω T ( t ) ω ( t ) z T ( t ) z ( t ) d t > 0
For t l k , l k + d k , we have
1 e 2 α 1 ( t l k ) e 2 α 1 δ k e 2 α 1 δ max
For t l k + d k , l k + 1 , we have
1 e 2 α 2 ( l k + 1 t ) e 2 α 2 ( l k + 1 l k δ k ) e 2 α 2 ϑ max
Defining F 1 = min μ 2 1 , 1 and F 2 = max μ 2 1 e 2 α 1 δ max , e 2 α 2 ϑ max , for t 0 , l n + 1 and with the zero initial condition, the inequality as follows is obtained:
k = 0 n l k l k + 1 F 1 z T ( t ) z ( t ) d t k = 0 n l k l k + 1 F 2 γ 2 ω T ( t ) ω ( t ) d t
which is equivalent to
0 l n + 1 z T ( t ) z ( t ) d t F 2 F 1 γ 2 0 l n + 1 ω T ( t ) ω ( t ) d t
Based on the results of the above discussions, we know that when l n + 1 , one can obtain that
0 z T ( t ) z ( t ) d t F 2 F 1 γ 2 0 ω T ( t ) ω ( t ) d t
This means that z ( t ) 2 γ ˜ ω ( t ) 2 for ω ( t ) L 2 0 , , where γ ˜ = F 2 F 1 γ .
Consequently, the H performance and the exponential stability are guaranteed for the system (27) under aperiodic DoS attack. □
Remark 4.
The sufficient criterion for ensuring global exponential stability of system (27) with a desired H disturbance attenuation index is given in the above theorems. However, the matrix parameters of the controller (26) are unknown. These unknown matrices appear in the matrix inequality as a non-linear manner, these matrices can not be derived by solving matrix inequalities through the above theorems. To address such problem, a new theorem as follows is proposed to satisfy the gain matrix design requirements for the designed controller.
Theorem 3.
Given fixed parameters δ m i n , ϑ m a x , τ D R > 0 of the DoS attack, and the boundary parameter τ M > 0 , an appropriate scalar δ y , matrices ϕ, T n , ( n = 1 , 2 , 3 ) , consider the controller (26). If for the given scalars α i 0 , + , μ i ( 0 , + ) , γ ( 0 , + ) and σ 0 ( 0 , 1 ) , there are some symmetric positive define matrices R ˜ i > 0 , Z ˜ i > 0 , U ˜ i > 0 , Φ > 0 , X > 0 , matrices Y ˜ i , S i , W i j , ( i = 1 , 2 ; j = 1 , 2 , . . . , 5 ) with appropriate dimensions and scalars ε 1 > 0 , ε 2 > 0 , such that (34), the matrix inequalities as follows:
Υ 1 = Υ ˜ 1 Ψ 11 T Ψ 21 T ε 1 I 0 ε 1 I < 0
Υ 2 = Υ ˜ 2 Ψ 12 T Ψ 21 T ε 2 I 0 ε 2 I < 0
hold, where
Υ ˜ 1 = Σ ˜ 1 u 1 T Π 13 u 1 T Π 14 Π 11 Π 12 u 1 T Π 15 Φ 0 Π 13 T I 0 γ 2 I Π 14 T 0 0 Ω ˜ 14 0 0 Ω ˜ 5 0 I < 0
Υ ˜ 2 = Σ ˜ 2 u 1 T Π 23 u 1 T Π 24 Π 21 Π 12 u 1 T Π 15 Φ 0 Π 23 T I 0 γ 2 I Π 24 T 0 0 Ω ˜ 24 0 0 Ω ˜ 5 0 I < 0
Ψ 11 = 0 δ y S 1 T u 1 0 0 δ y S 1 T 0 0 ,
Ψ 21 = B c C X C u 2 B c 0 0 0 0 ,
Ψ 12 = 0 δ y S 2 T u 1 0 0 δ y S 2 T 0 0 ,
Σ ˜ 1 = u 1 T sym X A T + W 14 B T W 11 A T A T U 1 + R ˜ 1 + 2 α 1 X I I U 1 u 1 + u 1 T sym 0 0 W 15 T W 13 C u 2 u 3 T e 2 α 1 τ M R ˜ 1 u 3 + e 2 α 1 τ M ( u 2 u 1 ) T Z ˜ 1 ( u 2 u 1 ) ( u 3 u 2 ) T Z ˜ 1 ( u 3 u 2 ) + ( u 2 u 1 ) T Y ˜ 1 ( u 3 u 2 ) + ( u 3 u 2 ) T Y ˜ 1 T ( u 2 u 1 ) ,
Σ ˜ 2 = u 1 T sym X A T + W 24 B T W 21 A T A T U 2 + R ˜ 2 2 α 2 X I I U 2 u 1 + u 1 T sym 0 0 W 25 T W 23 C u 2 u 3 T R ˜ 2 u 3 + ( u 2 u 1 ) T Z ˜ 2 ( u 2 u 1 ) ( u 3 u 2 ) T Z ˜ 2 ( u 3 u 2 ) + ( u 2 u 1 ) T Y ˜ 2 ( u 3 u 2 ) + ( u 3 u 2 ) T Y ˜ 2 T ( u 2 u 1 ) ,
Π 11 = u 1 T X A T + W 14 B T W 11 A T A T U 1 + u 2 T 0 W 15 0 C T W 13 T Π 12 = u 2 T X C T C , Π 13 = u 2 T 0 W 13 , Π 14 = u 2 T I K U 1 U 1 K , Π 15 = u 2 T X C z T C z T ,
Ω ˜ 14 = 1 τ M 2 T 1 Z ˜ 1 T 1 T T 1 G 1 T G 1 T 1 T , Ω ˜ 5 = T 2 Φ T 2 T σ 0 1 2 T 2 T σ 0 1 2 T 2 ,
Π 21 = u 1 T X A T W 21 A T A T U 2 + u 2 T 0 W 25 0 C T W 23 T , Π 23 = u 2 T 0 W 23 , Π 24 = u 2 T I K U 2 U 2 K ,
Ω ˜ 24 = 1 τ M 2 T 3 Z ˜ 2 T 3 T T 3 G 2 T G 2 T 3 T ,
and
Z ˜ i Y ˜ i Z ˜ i 0 ,
G i = X I I U i 0 ,
the globally exponentially stability is guaranteed for the system (27) with the H attenuation level γ ˜ under aperiodic DoS attack. And the matrix parameters of the controller (26) are obtained as the following equations:
A c = S 1 1 ( W 11 W 12 U 1 ) T N T B c = S 1 1 W 13 C c = W 14 T N T D c = S 1 1 ( W 15 S T C T W 13 T ) T N T
Proof. 
First, two matrices are defined as the following form:
Γ 1 = X I N T 0 , Γ 2 i = I U i 0 S i T
one can obtain that
P i = Γ 2 i Γ 1 1 = U i S i N 1 X ( U i X 1 ) X N T > 0
Define Z ˜ i = Γ 1 T Z i Γ 1 , R ˜ i = Γ 1 T R i Γ 1 , Y ˜ i = Γ 1 T Y i Γ 1 , and Z i > 0 , Φ > 0 , by Lemma 3, the following inequalities are obtained
( τ M 2 Z 1 ) 1 1 τ M 2 T 1 Z ˜ 1 T 1 T T 1 G 1 T G 1 T 1 T ( σ 0 Φ ) 1 T 2 Φ T 2 T T 2 T σ 0 1 2 T 2 σ 0 1 2 ( τ M 2 Z 2 ) 1 1 τ M 2 T 3 Z ˜ 2 T 3 T T 3 G 2 T G 2 T 3 T
Let Q = d i a g Γ 1 T , I , I , Γ 2 i T , I , I , ( i = 1 , 2 ) , then left-multiplying inequality (43) by Q and right-multiplying by the transpose of Q, respectively. And convert the resulting matrix inequality into the following form
Υ 1 ˜ + L ˜ 1 T Δ y L ˜ 2 + L ˜ 2 T Δ y T L ˜ 1 < 0
where Υ ˜ 1 = Σ ˜ 1 u 1 T Π 13 u 1 T Π 14 Π 11 Π 12 u 1 T Π 15 Φ 0 Π 13 T I 0 γ 2 I Π 14 T 0 0 Ω ˜ 14 0 0 Ω ˜ 5 0 I ,
L ˜ 1 = 0 S 1 T u 1 0 0 0 0 S 1 T 0 0 , L ˜ 2 = B c C X u 2 B c C u 2 B c 0 0 0 0 0 0 .
By the lemma in [41], there exist a scalar ε 1 > 0 such that
Υ ˜ 1 + ε 1 L ˜ 1 T Δ y 2 L ˜ 1 + ε 1 1 L ˜ 2 T L ˜ 2 < 0
where Δ y 2 < δ y 2 .
By using Schur complement, condition (52) is obtained. Similarly, condition (53) can also be obtained. Which means conditions (54) and (55) are satisfied. It provides further evidence that conditions (43) and (44) are guaranteed and the system (27) is of a prescribed H performance level γ ˜ .
On the other hand, define some variables W i j , ( i = 1 , 2 ; j = 1 , 2 , . . . , 5 ) so that the dynamic output feedback controller gain matrices are given by the equations as follows
A c = S 1 1 ( W 11 W 12 U 1 ) T N T B c = S 1 1 W 13 C c = W 14 T N T D c = S 1 1 ( W 15 S T C T W 13 T ) T N T
The proof is completed. □

4. Simulation and analysis

The effectiveness of the designed controller (26) for the network-based UMV systems under the aperiodic DoS attack is demonstrated within this section. The network-based UMV systems matrix parameters [42] are given as:
M = 1.0852 0 0 0 2.0575 0.4087 0 0.4087 0.2153 , N = 0.0865 0 0 0 0.0762 0.0151 0 0.0151 0.031 , G = 0.0389 0 0 0 0.0266 0 0 0 0 .
For the formulas as A = M 1 N , B = M 1 , such that the matrix parameters are obtained as:
A = 0.0797 0 0 0 0.0818 0.0577 0 0.2254 0.2535 , B = 0.9215 0 0 0 0.7802 1.4811 0 1.4811 7.4562 .
It is clear that matrix C z in section 2 is selected as C z = 0 0 1 and C is selected as C = I . The matrices T n , Œ in theorem 3 are selected as the identity matrices with appropriate dimensions. For the parameters of DoS attack, we assume that ϑ max = 0.7 s , δ min = 1.8 s , τ D = 1.15 s . The whole operating time is set to t = 30 s . Select μ 1 = μ 2 = 1.04 , α 1 = 0.018 , α 2 = 0.043 , τ M = 0.1 s , l = 0.05 s , γ = 2 , κ = 2 , ρ = 0.1 . And the initial threshold for the AETM is given as σ 0 = 0.05 .
The vector e 0 = 0.2 0.15 0.2 T is select as the initial value of system (10). The reference signals are given as α ( t ) = β ( t ) = 0 , and the piecewise constant function γ ( t ) is described as:
γ ( t ) = 0.2 , t 0 , 5 s 10 , 15 s 20 , 25 s 0.2 , t 5 , 10 s 15 , 20 s 25 , 30 s
The disturbance ω 1 ( t ) , ω 2 ( t ) and ω 3 ( t ) in surge, sway and yaw motions are
ω 1 ( t ) = 0.51 F 1 ( s ) N 1 ( t ) + I 1 A x r ω 2 ( t ) = cos ( 3 t ) e 2.4 t + I 2 A x r ω 3 ( t ) = 0.45 F 2 ( s ) N 2 ( t ) + I 3 A x r
where F 1 ( s ) and F 2 ( s ) denote the shaping filters described by F 1 = K ω 1 s s 2 + 2 ϱ 1 ζ 1 s + ζ 1 2 and F 2 = K ω 2 s s 2 + 2 ϱ 2 ζ 2 s + ζ 2 2 , respectively; The wave strength coefficients are denoted as K ω 1 and K ω 2 which K ω 1 = 0.2 and K ω 2 = 0.6 . The damping coefficients ares selected as ϱ 1 = 0.5 and ϱ 2 = 1.6 , respectively. The encountering wave frequencies are defined as ζ 1 and ζ 2 where ζ 1 = 0.7 and ζ 2 = 0.1 ; The band-limited white noise is denoted as N 1 ( t ) and N 2 ( t ) with the noise powers are 2 and 1.8; In addition, I 1 = 1 0 0 , I 2 = 0 1 0 , I 3 = 0 0 1 . Since the definition of yaw velocity error leads to the same amplitude of oscillation for yaw velocity and yaw velocity error, only yaw velocity error and yaw angle are investigated in the simulations of this paper.
The matrix parameters of the controller (26) are obtained by solving linear matrix inequalities (LMIs) (52) and (53) in Theorem 3 as follows:
A c = 0.0275 0 0 0 0.0380 0.2742 0 0.2098 1.4254 , B c = 0.1138 0 0 0 0.1098 0.0248 0 0.0215 0.1452 , C c = 239.1 0 0 0 229.69 137.3 0 441.3 150.5 , D c = 0.823 0 0 0 0.6979 0.1483 0 0.0973 0.9530 .
To demonstrate the effectiveness of the DOFC strategy, the response results with and without controller are investigated separately in this section. The simulation results and the comparison with reference [19] are shown in Figure 3, Figure 4, Figure 5, Figure 6, Figure 7, Figure 8, Figure 9 and Figure 10.
As shown in Figure 3, the square wave with a value of 1 means that the aperiodic DoS attack signal is active and 0 means that the aperiodic DoS attack signal is inactive. Different from the DoS attack signal in reference [19], the lower bound δ min is set to a smaller value of 1.5 s and the upper bound ϑ max is set to a larger value of 0.7 s . The yaw angle response is shown in Figure 4 and the yaw velocity error response is shown in Figure 6. The comparison responses of the reference are shown in Figure 5 and Figure 7, respectively. It is clear that the yaw velocity error amplitude and the yaw angle amplitude are greatly mitigated by the action of the considered controller under the more severe cyber attack environment. The response of yaw moment is shown in Figure 8. The responses of sway velocity and surge velocity are shown in Figure 9 and Figure 10. The amplitude of the sway velocity is also significantly reduced compared to the reference.
To give a more visual indication of the effect of DOFC strategy on system (27), the percentage reduction in yaw angle and yaw velocity error is represented as:
R y a = 1 A y a yaw angle under control A y a yaw angle without control × 100 % R y v e = 1 A C y v e yaw velocity error under control A C y v e yaw velocity error without control × 100 %
where A y a represents the oscillation amplitudes of yaw angle, A C y v e represents the accumulative error of yaw velocity error. The percentage reduction in the yaw angle amplitudes and the yaw velocity accumulative error is denoted as R P y a and R P y v e , respectively. As can be seen from Table 1, the proposed DOFC strategy based the ETM and the quantitative mechanism has tangible effectiveness in reducing the value of yaw velocity accumulative error. The amplitude of yaw angle oscillations is also reduced. And significant improvement in effectiveness compared to the reference.
Table 1. The comparison of the system performance under two strategies.
Table 1. The comparison of the system performance under two strategies.
A y a R P y a A C y v e R P y v e
No control(Reference [19]) 1.6805 - 6.3338 -
No control 1.6808 - 6.3868 -
With control(Reference [19]) 0.9602 42.9% 3.7957 40.1%
With control 0.9554 43.2% 3.4580 45.9%
The variation of threshold σ is shown in Figure 11. The trigger time instant and the release time interval of AETM are illustrated in Figure 12 and Figure 13.
Only 232 times are triggered during the whole simulation process. It saves 61.3 % of communication resources.
To demonstrate the strengths of the AETM in this work, two different transmission schemes are presented for comparison, i.e., fixed threshold ETM in [43] and AETM in [44] is given. The relevant quantitative comparison results of the data are given in Tables 2–4, respectively.
The comparison of the number of triggers under different mechanisms is shown in Table 2. The comparison results of the yaw angle oscillation amplitude and the yaw velocity error accumulative error under different initial thresholds are given in Tables 3 and 4. It can be seen from the results that compared with reference [43], the system performance is better when we have fewer trigger times. And we greatly reduce the number of triggers under the similar system performance compared with reference [44].
Table 2. Comparison of the number of triggers under different event-triggered mechanisms.
Table 2. Comparison of the number of triggers under different event-triggered mechanisms.
Threshold parameter σ 0 0.05 0.1 0.6 0.8
Reference [43] 232 174 65 60
Reference [44] 302 236 96 86
This work 232 174 64 58
Table 3. Comparison of the yaw angle oscillation amplitudes under different event-triggered mechanisms.
Table 3. Comparison of the yaw angle oscillation amplitudes under different event-triggered mechanisms.
Threshold parameter σ 0 0.05 0.1 0.6 0.8
Reference [43] 0.9795 0.9848 1.2082 1.2317
Reference [44] 0.9712 0.9776 1.1970 1.2073
This work 0.9795 0.9848 1.2054 1.2119
Table 4. Comparison of the yaw velocity error accumulative error under different event-triggered mechanisms.
Table 4. Comparison of the yaw velocity error accumulative error under different event-triggered mechanisms.
Threshold parameter σ 0 0.05 0.1 0.6 0.8
Reference [43] 3.4709 3.5263 4.2739 4.4751
Reference [44] 3.4574 3.4992 3.8627 4.0627
This work 3.4680 3.5213 4.0428 4.4620
The performance of the system is significantly influenced by the threshold parameter σ . Such that, different cases of initial threshold σ 0 are provided in Table 5. The selection rule of parameter σ 0 is followed by condition (13), where A y a , R P y a , A C y v e and R P y v e represent the same meanings as in Table 1.
Table 5. System performance indexes at five specific initial thresholds σ 0 .
Table 5. System performance indexes at five specific initial thresholds σ 0 .
A y a R P y a A C y v e R P y v e Trigger times
No control 1.6808 - 6.3868 - 600
σ 0 = 0.01 0.9249 45.0% 3.4296 46.3% 395
σ 0 = 0.05 0.9544 43.2% 3.4680 45.9% 232
σ 0 = 0.1 0.9595 42.9% 3.5213 44.9% 175
σ 0 = 0.3 0.9658 42.5% 3.7041 42.0% 99
σ 0 = 0.6 1.1420 32.1% 4.0428 36.7% 69
As shown in Table 5 and Figure 14 and Figure 15, when the parameter σ 0 increases, the performance of the system will decrease, but at the same time less data is transmitted. It should be noted that if σ 0 is too large, the stability of system (27) is hard to be guaranteed. For this reason, the advantages and disadvantages associated with its variation should be considered when selecting the triggering threshold parameter.

5. Conclusion

To guarantee the desired performance of the UMV systems under aperiodic DoS attack, a DOFC strategy which based on the ETM and the quantitative mechanism is investigated in this paper. Some uncertainties such as external interference and network-induced delay are considered in the UMV systems. For the purpose of reducing the communication burden and optimizing data transmission, an AETM and a quantizer are incorporated into the communication channel between the sampler and the control unit. And sufficient conditions for global exponential stability of system with H disturbance attenuation are given, the matrix parameters of the controller are obtained in terms of the LMIs. The simulation results and the performance analysis are demonstrated that the designed scheme has the tangible effectiveness on reducing the amplitude and deviation of the UMV systems.
Since this paper uses a conventional switching system to model acyclic DoS attacks, the attack signal is subject to conditional restrictions (35). Markovian jump systems, semi-Markovian systems and other methods provide a new perspective for modeling DoS attack signal. Within the proposed generic framework, the research directions can be expanded to hybrid attacks, network attack detection and so on, which are reserved for our future work.

Author Contributions

Methodology, writing-original draft, C.W.; Simulation, validation, W.X.; Writing-review editing, conceptualization, J.G.; Formal analysis, P.W.; Investigation, X.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China under Grant 62073296 and the Zhejiang Province Natural Science Foundation of China under Grant LZ23F030010.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Nieto-Hidalgo, M.; Gallego, A.J.; Gil, P.; Pertusa, A. Two-Stage Convolutional Neural Network for Ship and Spill Detection Using SLAR Images. IEEE Transactions on Geoscience & Remote Sensing 2018, 56, 5217–5230. [Google Scholar]
  2. Zhang, D.; Liu, G. Predictive control for networked high-order fully actuated systems subject to communication delays and external disturbances. ISA Transactions 2023. [Google Scholar] [CrossRef] [PubMed]
  3. Wang, W.; Wang, Y.; Liu, X.; Zhiwei, L. Quantized control for networked switched systems under denial-of-service attacks via a barrier event-triggered mechanism. Nonlinear Analysis: Hybrid Systems 2023, 49. [Google Scholar] [CrossRef]
  4. Chen, P.; Wu, J.; Tian, E. Stochastic Event-Triggered H Control for Networked Systems Under Denial of Service Attacks. IEEE Transactions on Systems, Man, and Cybernetics: Systems 2022, 52, 4200–4210. [Google Scholar] [CrossRef]
  5. Zhang, L.; Nguang, S.; Yan, S. Event-triggered H∞ control for networked control systems under denial-of-service attacks. Transactions of the Institute of Measurement and Control 2021, 43(5), 1077–1087. [Google Scholar] [CrossRef]
  6. Wang, H.; Dong, Z.; Qi, S.; Zhang, Z.; Zhang, H. Trajectory-tracking control of an underactuated unmanned surface vehicle based on quasi-infinite horizon model predictive control algorithm. Transactions of the Institute of Measurement and Control 2022. [Google Scholar] [CrossRef]
  7. Wang, N.; Qian, C.; Sun, J.; Liu, Y. Adaptive Robust Finite-Time Trajectory Tracking Control of Fully Actuated Marine Surface Vehicles. IEEE Transactions on Control Systems Technology 2016, 24(4), 1454–1462. [Google Scholar] [CrossRef]
  8. Hao, L.; Yu, y.; Li, T.; Li, H. Quantized Output-Feedback Control for Unmanned Marine Vehicles With Thruster Faults via Sliding-Mode Technique. IEEE Transactions on Cybernetics 2022, 52, 9363–9376. [Google Scholar] [CrossRef] [PubMed]
  9. Li, X.; Pan, H.; Deng, Y.; Han, S.; Yu, H. Finite-time event-triggered sliding mode predictive control of unmanned underwater vehicles without velocity measurements. Ocean Engineering 2023, 276. [Google Scholar] [CrossRef]
  10. Huang, C.; Xu, H.; Batista, P.; Zhang, X.; Guedes Soares, C. Fixed-time leader-follower formation control of underactuated unmanned surface vehicles with unknown dynamics and ocean disturbances. European Journal of Control 2023, 70. [Google Scholar] [CrossRef]
  11. Tang, C.; Zhang, H.T.; Wang, J. Flexible Formation Tracking Control of Multiple Unmanned Surface Vessels for Navigating Through Narrow Channels with Unknown Curvatures. IEEE Transactions on Industrial Electronics 2023, 70, 2927–2938. [Google Scholar] [CrossRef]
  12. Ma, Y.; Zhu, P.; Zhu, G.; Yan, X. Cooperative towing for double unmanned surface vehicles connected with a floating rope via vertical formation and adaptive moment control. Ocean Engineering 2023, 279. [Google Scholar] [CrossRef]
  13. Qin, H.; Chen, X.; Sun, Y. Adaptive state-constrained trajectory tracking control of unmanned surface vessel with actuator saturation based on RBFNN and tan-type barrier Lyapunov function. Ocean Engineering 2022, 253. [Google Scholar] [CrossRef]
  14. Wan, L.; Cao, Y.; Sun, Y.; Hongde, Q. Fault-tolerant trajectory tracking control for unmanned surface vehicle with actuator faults based on a fast fixed-time system. ISA Transactions 2022, p. [Google Scholar] [CrossRef] [PubMed]
  15. Wang, Y.; Jiang, B.; Wu, Z.; Xie, S.; Peng, Y. Adaptive Sliding Mode Fault-Tolerant Fuzzy Tracking Control With Application to Unmanned Marine Vehicles. IEEE Transactions on Systems, Man, and Cybernetics: Systems 2021, 51, 6691–6700. [Google Scholar] [CrossRef]
  16. Tang, F. Coverage path planning of unmanned surface vehicle based on improved biological inspired neural network. Ocean Engineering 2023, 278. [Google Scholar] [CrossRef]
  17. Zhang, G.; Dong, X.; Liu, J.; Zhang, X. Nussbaum-type function based robust neural event-triggered control of unmanned surface vehicle subject to cyber and physical attacks. Ocean Engineering 2023, 270. [Google Scholar] [CrossRef]
  18. Li, M.; Guo, C.; Yu, H. Global finite-time control for coordinated path following of multiple underactuated unmanned surface vehicles along one curve under directed topologies. Ocean Engineering 2021, 237. [Google Scholar] [CrossRef]
  19. Ye, Z.; Zhang, D.; Wu, Z. Adaptive event-based tracking control of unmanned marine vehicle systems with DoS attack. Journal of the Franklin Institute 2021, 358(3), 1915–1939. [Google Scholar] [CrossRef]
  20. Liang, X.; Qu, X.; Hou, Y.; Li, Y.; Zhang, R. Distributed coordinated tracking control of multiple unmanned surface vehicles under complex marine environments. Ocean Engineering 2020, 205. [Google Scholar] [CrossRef]
  21. Qu, Y.; Cai, L. Nonlinear station keeping control for underactuated unmanned surface vehicles to resist environmental disturbances. Ocean Engineering 2022, 246. [Google Scholar] [CrossRef]
  22. Deng, Y.; Yin, X.; Hu, S. Event-triggered predictive control for networked control systems with DoS attacks. Information Sciences 2021, 542, 71–91. [Google Scholar] [CrossRef]
  23. Lian, J.; Han, Y. Switching-Like Event-Triggered Control for Networked Markovian Jump Systems Under Deception Attack. IEEE Transactions on Circuits and Systems II: Express Briefs 2021, 68, 3271–3275. [Google Scholar] [CrossRef]
  24. Ye, Z.; Zhang, D.; Yan, H.; Wu, Z. A semi-Markovian jumping system approach to secure DPC of nonlinear networked unmanned marine vehicle systems with DoS attack. Journal of the Franklin Institute 2021. [Google Scholar] [CrossRef]
  25. Ye, Z.; Zhang, D.; Wu, Z.; Yan, H. A3C-Based Intelligent Event-Triggering Control of Networked Nonlinear Unmanned Marine Vehicles Subject to Hybrid Attacks. IEEE Transactions on Intelligent Transportation Systems 2021. [Google Scholar] [CrossRef]
  26. Arzen, K.E. A simple event-based PID controller. Proceedings of IFAC World Congress 1999, 32(2), 8687–8692. [Google Scholar]
  27. Han, X.; Zhao, X.; Sun, T.; Xu, N.; Zong, G. Event-Triggered Optimal Control for Discrete-Time Switched Nonlinear Systems With Constrained Control Input. IEEE Transactions on Systems Man Cybernetics-Systems 2021, 51, 7850–7859. [Google Scholar] [CrossRef]
  28. Li, Y.; Yang, G. Adaptive Neural Control of Pure-Feedback Nonlinear Systems With Event-Triggered Communications. IEEE Transactions on Neural Networks and Learning Systems 2018, 29(12), 6242–6251. [Google Scholar] [CrossRef] [PubMed]
  29. Hu, S.; Yue, D.; Xie, Y.; Ma, Y.; Yin, Y. Stabilization of Neural-Network-Based Control Systems via Event-Triggered Control With Nonperiodic Sampled Data. IEEE Transactions on Neural Networks and Learning Systems 2018, 29(3), 573–585. [Google Scholar] [CrossRef]
  30. Ma, L.; Wang, Y.; Han, Q. Event-Triggered Dynamic Positioning for Mass-Switched Unmanned Marine Vehicles in Network Environments. IEEE Transactions on Cybernetics 2022, 52, 3159–3171. [Google Scholar] [CrossRef]
  31. Li, M.; Guo, C.; Yu, H.; Yuan, Y. Event-triggered containment control of networked underactuated unmanned surface vehicles with finite-time convergence. Ocean Engineering 2022, 246. [Google Scholar] [CrossRef]
  32. Zhang, G.; Chu, S.; Huang, J.; Zhang, W. Robust adaptive fault-tolerant control for unmanned surface vehicle via the multiplied event-triggered mechanism. Ocean Engineering 2022, 249. [Google Scholar] [CrossRef]
  33. Li, Z.; Xiong, J. Event-triggered fuzzy filtering for nonlinear networked systems with dynamic quantization and stochastic cyber attacks. ISA Transactions 2022, 121, 53–62. [Google Scholar] [CrossRef] [PubMed]
  34. Zhao, Z.; Yi, X.; Ma, L.; Bai, X. Quantized recursive filtering for networked systems with stochastic transmission delays. ISA Transactions 2022, 127, 99–107. [Google Scholar] [CrossRef] [PubMed]
  35. Kahveci, N.; Ioannou, P. Adaptive steering control for uncertain ship dynamics and stability analysis. Automatica 2013, 49, 685–697. [Google Scholar] [CrossRef]
  36. Ma, Y.; Nie, Z.; Hu, S.; Li, Z.; Malekian, R.; Sotelo, M. Fault Detection Filter and Controller Co-Design for Unmanned Surface Vehicles Under DoS Attacks. IEEE Transactions on Intelligent Transportation Systems 2021, 22(3), 1422–1434. [Google Scholar] [CrossRef]
  37. Ge, X.; Han, Q. Distributed formation control of networked multi-agent systems using a dynamic event-triggered communication mechanism. IEEE Transactions on Industrial Electronics 2017, 64(10), 8118–8127. [Google Scholar] [CrossRef]
  38. Fu, M.; Xie, L. The sector bound approach to quantized feedbackcontrol. IEEE Transactions on Automatic Control 2005, 50(11), 1698–1711. [Google Scholar]
  39. Ge, X.; Han, Q. Distributed event-triggered H filtering over sensor networks with communication delays. Information Sciences 2015, 291, 128–142. [Google Scholar] [CrossRef]
  40. Zhang, X.; Han, Q. Event-triggered dynamic output feedback control for networked control systems. IET Control Theory and Applications 2014, 8(4), 226–234. [Google Scholar] [CrossRef]
  41. Xu, S.; Dooren, P.V.; Stefan, R.; J., L. Robust stability and stabilization for singular systems with state delay and parameter uncertainty. IEEE Transactions on Automatic Control 2002, 47, 1122–1128. [CrossRef]
  42. Wang, Y.; Han, Q. Network-based modelling and dynamic output feedback control for unmanned marine vehicles in network environments. Automatica 2018, 91, 43–53. [Google Scholar] [CrossRef]
  43. Ma, Y.; Nie, Z.; Hu, S.; Li, Z.; Malekian, R.; Sotelo, M. Fault Detection Filter and Controller Co-Design for Unmanned Surface Vehicles Under DoS Attacks. IEEE Transactions on Intelligent Transportation Systems 2021, 22, 1422–1434. [Google Scholar] [CrossRef]
  44. Wang, H.; Xue, A. Adaptive event-triggered H∞ filtering for discrete-time delayed neural networks with randomly occurring missing measurements. Signal Processing 2018, 153, 221–230. [Google Scholar] [CrossRef]
Figure 1. The reference frames of Earth-fixed and body-fixed.
Figure 1. The reference frames of Earth-fixed and body-fixed.
Preprints 93708 g001
Figure 2. Networked structure for the UMV systems.
Figure 2. Networked structure for the UMV systems.
Preprints 93708 g002
Figure 3. The signal of DoS attack ( δ min = 1.5 s , ϑ max = 0.7 s ) .
Figure 3. The signal of DoS attack ( δ min = 1.5 s , ϑ max = 0.7 s ) .
Preprints 93708 g003
Figure 4. The yaw angle response.
Figure 4. The yaw angle response.
Preprints 93708 g004
Figure 5. The yaw angle response in reference.
Figure 5. The yaw angle response in reference.
Preprints 93708 g005
Figure 6. The yaw velocity error response.
Figure 6. The yaw velocity error response.
Preprints 93708 g006
Figure 7. The yaw velocity error response in reference.
Figure 7. The yaw velocity error response in reference.
Preprints 93708 g007
Figure 8. The yaw moment response.
Figure 8. The yaw moment response.
Preprints 93708 g008
Figure 9. The surge velocity response.
Figure 9. The surge velocity response.
Preprints 93708 g009
Figure 10. The sway velocity response.
Figure 10. The sway velocity response.
Preprints 93708 g010
Figure 11. The adaptive threshold of event-triggered mechanism.
Figure 11. The adaptive threshold of event-triggered mechanism.
Preprints 93708 g011
Figure 12. The trigger time instant of adaptive event-triggered mechanism.
Figure 12. The trigger time instant of adaptive event-triggered mechanism.
Preprints 93708 g012
Figure 13. The release time interval of adaptive event-triggered mechanism.
Figure 13. The release time interval of adaptive event-triggered mechanism.
Preprints 93708 g013
Figure 14. The response of yaw angle in different initial thresholds.
Figure 14. The response of yaw angle in different initial thresholds.
Preprints 93708 g014
Figure 15. The response of yaw velocity error in different initial thresholds.
Figure 15. The response of yaw velocity error in different initial thresholds.
Preprints 93708 g015
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

© 2024 MDPI (Basel, Switzerland) unless otherwise stated